×

Methods, systems, and media for detecting covert malware

  • US 8,528,091 B2
  • Filed: 12/31/2010
  • Issued: 09/03/2013
  • Est. Priority Date: 12/31/2009
  • Status: Active Grant
First Claim
Patent Images

1. A method for detecting covert malware in a computing environment, the method comprising:

  • generating simulated user activity outside of the computing environment;

    conveying the simulated user activity to an application inside the computing environment;

    determining whether state information of the application matches an expected state after the simulated user activity is conveyed to the application;

    determining whether a decoy corresponding to the simulated user activity has been accessed by an unauthorized entity, wherein the decoy includes at least part of the simulated user activity and wherein the decoy is inside the computing environment; and

    in response to determining that the decoy has been accessed by the unauthorized entity, determining that covert malware is present in the computing environment.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×