×

Systems and methods for virtualization and emulation assisted malware detection

  • US 9,519,781 B2
  • Filed: 11/03/2011
  • Issued: 12/13/2016
  • Est. Priority Date: 11/03/2011
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • in response to a data collector on a first network determining that an object transmitted from a first digital device to a second digital device and intercepted by the data collector is suspicious, receiving at a second network the object from the data collector on the first network; and

    at the second network;

    instantiating a set of virtualization environments, each virtualization environment including a different set of one or more resources based on metadata received from the data collector;

    processing the object within the set of virtualization environments;

    tracing operations of the object while processing within each of the virtualization environments of the set of virtualization environments to generate a first set of traced operations;

    detecting suspicious behavior associated with the object in at least one of the virtualization environments of the set of virtualization environments;

    instantiating an emulation environment in response to the detected suspicious behavior in the at least one of the virtualization environments of the set of virtualization environments;

    processing the object within the emulation environment;

    recording responses to the object within the emulation environment to generate recorded responses;

    tracing operations of the object while processing within the emulation environment to generate a second set of traced operations;

    determining a likelihood of maliciousness based on at least one of the suspicious behavior associated with the object in the at least one of the virtualization environments, the recorded responses, the first set of traced operations, and the second set of traced operations; and

    if the determined likelihood of maliciousness is greater than a threshold, generating a report regarding the object, the report including at least one of the recorded responses, the first set of traced operations, and the second set of traced operations.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×