Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate
2011-01-25
2011-01-25
Song, Hosuk (Department: 2435)
Information security
Monitoring or scanning of software or data including attack...
C726S023000, C726S024000
Reexamination Certificate
active
07877802
ABSTRACT:
A system, method, and computer readable medium for the proactive detection of malware in operating systems that receive application programming interface (API) calls is provided. A virtual operating environment for simulating the execution of programs and determining if the programs are malware is created. The virtual operating environment confines potential malware so that the systems of the host operating environment will not be adversely effected. During simulation, a behavior signature is generated based on the API calls issued by potential malware. The behavior signature is suitable for analysis to determine whether the simulated executable is malware.
REFERENCES:
patent: 5978917 (1999-11-01), Chi
patent: 7146305 (2006-12-01), van der Made
patent: 7228434 (2007-06-01), Zisowski
Deeb, K., and S. Lewis, “A Biological Approach to the Development of Computer Autoimmune Systems,” Proceedings of 13th Int'l Symposium: Foundations of Intelligent Systems (ISMIS 2002), Lyon, France, Jun. 27-29, 2002, in M.-S. Hacid et al. (eds.), “Lecture Notes in Computer Science” 2366:514-525, 2002.
Hilley, S. (ed.), “Hackers Hit and Run,” Computer Fraud & Security, Nov. 2003, pp. 1-2.
Karresand, M., “Separating Trojan Horses, Viruses, and Worms—A Proposed Taxonomy of Software Weapons,” Proceedings of the 2003 IEEE Workshop on Information Assurance, United States Military Academy, West Point, N.Y., Jun. 2003, pp. 127-134.
Natvig, K., “Sandbox Technology Inside AV Scanners,” Proceedings of the Eleventh Virus Bulletin Int'l Conf. and Exhibition, Prague, Sep. 27-28, 2001, pp. 475-488.
Shinagawa, T., et al., “Flexible and Efficient Sandboxing Based on Fine-Grained Protection Domains,” Proceedings of Mext-NSF-JSPS Int'l Symposium: Software Security—Theories and Systems (ISSS 2002), Tokyo, Nov. 8-10, 2002, in M. Okada et al. (eds.), “Lecture Notes in Computer Science” 2609:172-184, 2002.
Weber, M., et al., “A Toolkit for Detecting and Analyzing Malicious Software,” Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC'02), Las Vegas, Nevada, Dec. 9-13, 2002, pp. 423-431.
Xie, B.Q., “The Effect of Infection Behaviors of Computer Virus on Early Detection and Detection Systems Deployment Strategies,” Proceedings of the Int'l Conf. on Telecommunications (ICT 2002), Beijing, Jun. 23-26, 2002, vol. 1, pp. 108-118.
Microsoft Corporation
Song Hosuk
Wolf Greenfield & Sacks P.C.
LandOfFree
System and method for proactive computer virus protection does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method for proactive computer virus protection, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for proactive computer virus protection will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2698786