×

Systems and methods for virtualized malware detection

  • US 9,792,430 B2
  • Filed: 11/03/2011
  • Issued: 10/17/2017
  • Est. Priority Date: 11/03/2011
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • in response to a data collector on a first network determining that an object transmitted from a first digital device to a second digital device is suspicious, receiving at a second network the object intercepted by the data collector on the first network,at the second network;

    determining one or more resources the object will require when the object is executed;

    instantiating a first instance of a virtual environment with the one or more resources;

    processing the object within the first instance of the virtual environment;

    monitoring the operations of the object during the processing within the first instance of the virtual environment;

    identifying an additional resource for the object during the processing within the first instance of the virtual environment, the additional resource not provided in the first instance of the virtual environment;

    instantiating a second instance of the virtual environment in addition to the first instance of the virtual environment such that the processing of the object in the first instance of the virtual environment continues, the second instance of the virtual environment with the additional resource not provided in the first instance of the virtual environment as well as the one or more resources;

    processing the object within the second instance of the virtual environment;

    monitoring the operations of the object during the processing within the second instance of the virtual environment;

    identifying actions from the monitored operations of the object within the first instance of the virtual environment and the second instance of the virtual environment;

    determining a threat value of the object intercepted by the data collector on the first network based on the actions from the monitored operations of the object within the first instance of the virtual environment and the second instance of the virtual; and

    if the determined threat value of the object intercepted by the data collector on the first network is greater than a threshold, generating a report based on the first instance of the virtual environment and the second instance of the virtual environment identifying the operations and the actions of the object.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×