Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate
2008-05-20
2008-05-20
Song, Hosuk (Department: 2135)
Information security
Monitoring or scanning of software or data including attack...
C726S023000, C726S024000
Reexamination Certificate
active
10783275
ABSTRACT:
A system, method, and computer readable medium for the proactive detection of malware in operating systems that receive application programming interface (API) calls is provided. A virtual operating environment for simulating the execution of programs and determining if the programs are malware is created. The virtual operating environment confines potential malware so that the systems of the host operating environment will not be adversely effected. During simulation, a behavior signature is generated based on the API calls issued by potential malware. The behavior signature is suitable for analysis to determine whether the simulated executable is malware.
REFERENCES:
patent: 7146305 (2006-12-01), van der Made
patent: 7228434 (2007-06-01), Zisowski
Deeb, K., and S. Lewis, “A Biological Approach to the Development of Computer Autoimmune Systems,”Proceedings of the Foundations of Intelligent Systems 13th International Symposium, Lyon, France, Jun. 27-29, 2002, pp. 514-525.
Hilley, S., “Hackers Hit and Run,”Computer Fraud&Security, Nov. 2003, pp. 1-2.
Karresand, M., “Separating Trojan Horses, Viruses, and Worms—A Proposed Taxonomy of Software Weapons,”Proceedings of the 2003 IEEE Workshop on Information Assurance, United States Military Academy, West Point, New York, Jun. 2003, pp. 127-134.
Natvig, K., “Sandbox Technology Inside AV Scanners,”Proceedings of the 11th Virus Belletin International Conference and Exhibition, Prague, Czech Republic, Sep. 27-28, 2001, pp. 491-504.
Shinagawa, T., et al., “Flexible and Efficient Sandboxing Based on Fine-Grained Protection Domains,”Proceedings of the Mext-NSF-JSPS International Symposium, Software Security—Theories and Systems, ISSS 2002, Tokyo, Japan, Nov. 8-10, 2002, pp. 172-184.
Weber, M., et al., “A Toolkit for Detecting and Analyzing Malicious Software,”Proceedings of the 18th Annual Computer Security Applications Conference(ACSAC'02), IEEE Computer Society, Las Vegas, Nevada, Dec. 9-13, 2002, pp. 423-431.
Xie, B.Q., “The Effect of Infection Behaviors of Computer Virus on Early Detection and Detection Systems Deployment Strategies,”Proceedings of the International Conference on Telecommunications, Beijing, China, Jun. 23-26, 2002, pp. 108-118.
Christensen O'Connor Johnson & Kindness PLLC
Song Hosuk
LandOfFree
System and method for proactive computer virus protection does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method for proactive computer virus protection, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for proactive computer virus protection will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3921206