×

Detection of spyware threats within virtual machine

  • US 9,043,913 B2
  • Filed: 06/04/2012
  • Issued: 05/26/2015
  • Est. Priority Date: 01/23/2006
  • Status: Active Grant
First Claim
Patent Images

1. A method for preventing sources of content that are accessible over a network from installing spyware or other undesired items into a user environment, the method comprising:

  • producing a virtual machine on a computing device and installing an operating system on the virtual machine to create a virtual machine environment configured to test a potential source of content accessible on the network, to determine if the potential source of content attempts to install spyware on the computing device of a user;

    automatically loading the content from the potential source of content within the virtual machine environment;

    determining whether or not the potential source of content has at least attempted to install spyware in the virtual machine environment, by detecting whether at least one of a plurality of predefined triggers are fired, andin the case where at least one of the plurality of predefined triggers is detected, determining that the potential source of content is at least attempting to perform an attack in the virtual machine environment;

    wherein the predefined triggers comprise at least one ofdetermining which processes of the virtual machine are either a browser process or known helper processes associated with the browser process and detecting that a new process is launched, excluding the browser process and known helper processes;

    determining which folders are safe folders and detecting that a file is created or modified outside of the determined safe folders;

    determining which processes of the virtual machine are either the browser process or known helper processes associated with the browser process and detecting that a process besides the determined browser process and its known helper processes performed a file creation or modification;

    determining which registry entries are sensitive registry entries and detecting that one of the sensitive registry entries is modified; and

    determining that the browser process or an operating system process has crashed or has stopped responding;

    in the case where the potential source of content has not at least attempted to install spyware in the virtual machine environment, transferring the content to a user environment other than the virtual machine; and

    in the case where the potential source of content has at least attempted to install spyware in the virtual machine environment, preventing the content from being loaded to the user environment other than the virtual machine;

    wherein producing the virtual machine, automatically loading the content, and determining whether or not the potential source of content has at least attempted to install spyware are each performed by a client-side spyproxy module of the computing device.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×