-
公开(公告)号:US10516531B2
公开(公告)日:2019-12-24
申请号:US16111322
申请日:2018-08-24
申请人: Sophos Limited
摘要: Threat detection instrumentation is simplified by providing and updating labels for computing objects in a context-sensitive manner. This may include simple labeling schemes to distinguish between objects, e.g., trusted/untrusted processes or corporate/private data. This may also include more granular labeling schemes such as a three-tiered scheme that identifies a category (e.g., financial, e-mail, game), static threat detection attributes (e.g., signatures, hashes, API calls), and explicit identification (e.g., what a file or process calls itself). By tracking such data for various computing objects and correlating these labels to malware occurrences, rules can be written for distribution to endpoints to facilitate threat detection based on, e.g., interactions of labeled objects, changes to object labels, and so forth. In this manner, threat detection based on complex interactions of computing objects can be characterized in a platform independent manner and pre-processed on endpoints without requiring significant communications overhead with a remote threat management facility.
-
公开(公告)号:US10691824B2
公开(公告)日:2020-06-23
申请号:US16248417
申请日:2019-01-15
申请人: Sophos Limited
发明人: Kenneth D. Ray , Andrew J. Thomas , Anthony John Merry , Harald Schütz , Andreas Berger , John Edward Tyrone Shaw
摘要: Securing an endpoint against exposure to unsafe content includes encrypting files to prevent unauthorized access, and monitoring an exposure state of a process to potentially unsafe content by applying behavioral rules to determine whether the exposure state is either exposed or secure, where (1) the process is initially identified as secure, (2) the process is identified as exposed when the process opens a network connection to a URL that is not internal to an enterprise network of the endpoint and that has a poor reputation, (3) the process is identified as exposed when it opens a file identified as exposed, and (4) the process is identified as exposed when another exposed process opens a handle to the process. Access to the files may be restricted when the process is exposed by controlling access through a file system filter that conditionally decrypts files for the process according to its exposure state.
-
公开(公告)号:US10650154B2
公开(公告)日:2020-05-12
申请号:US15042862
申请日:2016-02-12
申请人: Sophos Limited
发明人: Kenneth D. Ray , Andrew J. Thomas , Anthony John Merry , Harald Schütz , Andreas Berger , John Edward Tyrone Shaw
摘要: Securing an endpoint against malicious activity includes encrypting a plurality of files on an endpoint to prevent unauthorized access to the plurality of files, receiving a request to access a file from a process executing on the endpoint, decrypting the file for the process, and monitoring a security state of the process. If the security state becomes a compromised state, a technique involves maintaining access to any open files (including the file decrypted for the process), prohibiting access to other files, and initiating a remediation of the process by facilitating a restart of the process. If the remediation is successful, access by the process to the plurality of files may be restored.
-
公开(公告)号:US20180276378A1
公开(公告)日:2018-09-27
申请号:US15970846
申请日:2018-05-03
申请人: Sophos Limited
发明人: Kenneth D. Ray , Daniel Salvatore Schiappa , Simon Neil Reed , Mark D. Harris , Neil Robert Tyndale Watkiss , Andrew J. Thomas , Robert W. Cook , Harald Schütz , John Edward Tyrone Shaw , Anthony John Merry
CPC分类号: G06F21/554 , G06F21/552 , G06F21/56 , G06F21/6218 , G06F2221/033 , G06F2221/034 , G06F2221/2107 , G06F2221/2113 , G06F2221/2145 , H04L63/06 , H04L63/1408 , H04L63/20
摘要: Threat detection instrumentation is simplified by providing and updating labels for computing objects in a context-sensitive manner. This may include simple labeling schemes to distinguish between objects, e.g., trusted/untrusted processes or corporate/private data. This may also include more granular labeling schemes such as a three-tiered scheme that identifies a category (e.g., financial, e-mail, game), static threat detection attributes (e.g., signatures, hashes, API calls), and explicit identification (e.g., what a file or process calls itself). By tracking such data for various computing objects and correlating these labels to malware occurrences, rules can be written for distribution to endpoints to facilitate threat detection based on, e.g., interactions of labeled objects, changes to object labels, and so forth. In this manner, threat detection based on complex interactions of computing objects can be characterized in a platform independent manner and pre-processed on endpoints without requiring significant communications overhead with a remote threat management facility.
-
公开(公告)号:US10063373B2
公开(公告)日:2018-08-28
申请号:US15360591
申请日:2016-11-23
申请人: Sophos Limited
CPC分类号: H04L9/0891 , G06F21/552 , G06F2221/034 , G06F2221/2113 , H04L63/06 , H04L63/1408
摘要: Threat detection instrumentation is simplified by providing and updating labels for computing objects in a context-sensitive manner. This may include simple labeling schemes to distinguish between objects, e.g., trusted/untrusted processes or corporate/private data. This may also include more granular labeling schemes such as a three-tiered scheme that identifies a category (e.g., financial, e-mail, game), static threat detection attributes (e.g., signatures, hashes, API calls), and explicit identification (e.g., what a file or process calls itself). By tracking such data for various computing objects and correlating these labels to malware occurrences, rules can be written for distribution to endpoints to facilitate threat detection based on, e.g., interactions of labeled objects, changes to object labels, and so forth. In this manner, threat detection based on complex interactions of computing objects can be characterized in a platform independent manner and pre-processed on endpoints without requiring significant communications overhead with a remote threat management facility.
-
公开(公告)号:US10657277B2
公开(公告)日:2020-05-19
申请号:US15817705
申请日:2017-11-20
申请人: Sophos Limited
发明人: Kenneth D. Ray , Andrew J. Thomas , Anthony John Merry , Harald Schütz , Andreas Berger , John Edward Tyrone Shaw
摘要: Securing an endpoint against exposure to unsafe content includes encrypting files to prevent unauthorized access, and monitoring an exposure state of a process to potentially unsafe content by applying behavioral rules to determine whether the exposure state is either exposed or secure, where (1) the process is initially identified as secure, (2) the process is identified as exposed when the process opens a network connection to a URL that is not internal to an enterprise network of the endpoint and that has a poor reputation, (3) the process is identified as exposed when it opens a file identified as exposed, and (4) the process is identified as exposed when another exposed process opens a handle to the process. Access to the files may be restricted when the process is exposed by controlling access through a file system filter that conditionally decrypts files for the process according to its exposure state.
-
公开(公告)号:US10558800B2
公开(公告)日:2020-02-11
申请号:US15970846
申请日:2018-05-03
申请人: Sophos Limited
发明人: Kenneth D. Ray , Daniel Salvatore Schiappa , Simon Neil Reed , Mark D. Harris , Neil Robert Tyndale Watkiss , Andrew J. Thomas , Robert W. Cook , Harald Schütz , John Edward Tyrone Shaw , Anthony John Merry
摘要: Threat detection instrumentation is simplified by providing and updating labels for computing objects in a context-sensitive manner. This may include simple labeling schemes to distinguish between objects, e.g., trusted/untrusted processes or corporate/private data. This may also include more granular labeling schemes such as a three-tiered scheme that identifies a category (e.g., financial, e-mail, game), static threat detection attributes (e.g., signatures, hashes, API calls), and explicit identification (e.g., what a file or process calls itself). By tracking such data for various computing objects and correlating these labels to malware occurrences, rules can be written for distribution to endpoints to facilitate threat detection based on, e.g., interactions of labeled objects, changes to object labels, and so forth. In this manner, threat detection based on complex interactions of computing objects can be characterized in a platform independent manner and pre-processed on endpoints without requiring significant communications overhead with a remote threat management facility.
-
公开(公告)号:US09965627B2
公开(公告)日:2018-05-08
申请号:US14485769
申请日:2014-09-14
申请人: Sophos Limited
发明人: Kenneth D. Ray , Daniel Salvatore Schiappa , Simon Neil Reed , Mark D. Harris , Neil Robert Tyndale Watkiss , Andrew J. Thomas , Robert W. Cook , Harald Schütz , John Edward Tyrone Shaw , Anthony John Merry
CPC分类号: G06F21/554 , G06F21/552 , G06F21/56 , G06F21/6218 , G06F2221/033 , G06F2221/034 , G06F2221/2107 , G06F2221/2113 , G06F2221/2145 , H04L63/06 , H04L63/1408 , H04L63/20
摘要: Threat detection instrumentation is simplified by providing and updating labels for computing objects in a context-sensitive manner. This may include simple labeling schemes to distinguish between objects, e.g., trusted/untrusted processes or corporate/private data. This may also include more granular labeling schemes such as a three-tiered scheme that identifies a category (e.g., financial, e-mail, game), static threat detection attributes (e.g., signatures, hashes, API calls), and explicit identification (e.g., what a file or process calls itself). By tracking such data for various computing objects and correlating these labels to malware occurrences, rules can be written for distribution to endpoints to facilitate threat detection based on, e.g., interactions of labeled objects, changes to object labels, and so forth. In this manner, threat detection based on complex interactions of computing objects can be characterized in a platform independent manner and pre-processed on endpoints without requiring significant communications overhead with a remote threat management facility.
-
公开(公告)号:US20170235966A1
公开(公告)日:2017-08-17
申请号:US15042862
申请日:2016-02-12
申请人: Sophos Limited
发明人: Kenneth D. Ray , Andrew J. Thomas , Anthony John Merry , Harald Schütz , Andreas Berger , John Edward Tyrone Shaw
CPC分类号: G06F21/6218 , G06F21/554 , H04L63/1408
摘要: Securing an endpoint against malicious activity includes encrypting a plurality of files on an endpoint to prevent unauthorized access to the plurality of files, receiving a request to access a file from a process executing on the endpoint, decrypting the file for the process, and monitoring a security state of the process. If the security state becomes a compromised state, a technique involves maintaining access to any open files (including the file decrypted for the process), prohibiting access to other files, and initiating a remediation of the process by facilitating a restart of the process. If the remediation is successful, access by the process to the plurality of files may be restored.
-
公开(公告)号:US20210344715A1
公开(公告)日:2021-11-04
申请号:US17370863
申请日:2021-07-08
申请人: Sophos Limited
摘要: A honeypot file is cryptographically secured with a cryptographic key. The key, or related key material, is then placed on a central keystore and the file is placed on a data store within the enterprise network. Unauthorized access to the honeypot file can then be detecting by monitoring use of the associated key material, which usefully facilitates detection of file access at any time when, and from any location where, cryptographic access to the file is initiated.
-
-
-
-
-
-
-
-
-