MALWARE DETECTION AND CONTENT ITEM RECOVERY

    公开(公告)号:US20230139473A1

    公开(公告)日:2023-05-04

    申请号:US18147468

    申请日:2022-12-28

    Applicant: Dropbox, Inc.

    Abstract: Disclosed are systems, methods, and non-transitory computer-readable storage media for malware detection and content item recovery. For example, a content management system can receive information describing changes made to content items stored on a user device. The content management system can analyze the information to determine if the described changes are related to malicious software on the user device. When the changes are related to malicious software, the content management system can determine which content items are effected by the malicious software and/or determine when the malicious software first started making changes to the user device. The content management system can recover effected content items associated with the user device by replacing the effected versions of the content items with versions of the content items that existed immediately before the malicious software started making changes to the user device.

    IDENTIFYING MALWARE BASED ON CONTENT ITEM IDENTIFIERS

    公开(公告)号:US20190065741A1

    公开(公告)日:2019-02-28

    申请号:US15685215

    申请日:2017-08-24

    Applicant: Dropbox, Inc.

    Inventor: Ray Zhang

    Abstract: Disclosed are systems, methods, and non-transitory computer-readable storage media for identifying malware based on content item identifiers. For example, a system for detecting malware can be made more efficient by reducing the number of content items that are scanned or analyzed for malicious software code or computer instructions. The number of content items that need to be scanned can be reduced by identifying suspicious content items based on tokens (e.g., strings of characters) commonly used by malware in the identifiers of malware related content items and then analyzing the identified suspicious content items for malicious content (e.g., malicious software instructions) using the anti-malware software.

    Malware detection and content item recovery

    公开(公告)号:US11580221B2

    公开(公告)日:2023-02-14

    申请号:US15394385

    申请日:2016-12-29

    Applicant: DROPBOX, INC.

    Abstract: Disclosed are systems, methods, and non-transitory computer-readable storage media for malware detection and content item recovery. For example, a content management system can receive information describing changes made to content items stored on a user device. The content management system can analyze the information to determine if the described changes are related to malicious software on the user device. When the changes are related to malicious software, the content management system can determine which content items are effected by the malicious software and/or determine when the malicious software first started making changes to the user device. The content management system can recover effected content items associated with the user device by replacing the effected versions of the content items with versions of the content items that existed immediately before the malicious software started making changes to the user device.

    IDENTIFYING MALWARE BASED ON CONTENT ITEM IDENTIFIERS

    公开(公告)号:US20200082077A1

    公开(公告)日:2020-03-12

    申请号:US16681146

    申请日:2019-11-12

    Applicant: Dropbox, Inc

    Inventor: Ray Zhang

    Abstract: Disclosed are systems, methods, and non-transitory computer-readable storage media for identifying malware based on content item identifiers. For example, a system for detecting malware can be made more efficient by reducing the number of content items that are scanned or analyzed for malicious software code or computer instructions. The number of content items that need to be scanned can be reduced by identifying suspicious content items based on tokens (e.g., strings of characters) commonly used by malware in the identifiers of malware related content items and then analyzing the identified suspicious content items for malicious content (e.g., malicious software instructions) using the anti-malware software.

Patent Agency Ranking