Systems and methods for identifying malware threat vectors
    1.
    发明授权
    Systems and methods for identifying malware threat vectors 有权
    用于识别恶意软件威胁载体的系统和方法

    公开(公告)号:US08819828B1

    公开(公告)日:2014-08-26

    申请号:US13457152

    申请日:2012-04-26

    摘要: A computer-implemented method for identifying malware threat vectors may include 1) identifying a computing system that includes a first human interface device, 2) detecting an introduction of a new device to the computing system that presents itself to the computing system as a second human interface device, 3) determining that the second human interface device is configured to generate a type of input event equivalent to the type of input event generated by the first human interface device, 4) determining, based on the second human interface device being configured to generate the type of input event equivalent to the type of input event generated by the first human interface device, that the second human interface device includes a potential malware attack vector. Various other methods, systems, and computer-readable media are also disclosed.

    摘要翻译: 用于识别恶意软件威胁载体的计算机实现的方法可以包括:1)识别包括第一人机接口设备的计算系统,2)检测将新设备引入到计算系统的计算系统,所述计算系统将自身呈现为计算系统作为第二人 接口设备,3)确定所述第二人机界面设备被配置为生成等同于由所述第一人机接口设备生成的输入事件的类型的输入事件的类型,4)基于所述第二人机接口设备被配置为 生成等同于由第一人机接口设备生成的输入事件的类型的输入事件的类型,第二人机接口设备包括潜在的恶意软件攻击向量。 还公开了各种其它方法,系统和计算机可读介质。