Classification of malware using clustering that orders events in accordance with the time of occurance
    1.
    发明授权
    Classification of malware using clustering that orders events in accordance with the time of occurance 有权
    使用根据发生时间对事件进行排序的群集进行恶意软件分类

    公开(公告)号:US07809670B2

    公开(公告)日:2010-10-05

    申请号:US11608625

    申请日:2006-12-08

    IPC分类号: G06F17/00

    CPC分类号: G06F21/564

    摘要: The present invention is directed to a method and system for automatically classifying an application into an application group which is previously classified in a knowledge base. More specifically, a runtime behavior of an application is captured as a series of events which are monitored and recorded during the execution of the application. The series of events are analyzed to find a proper application group which shares common runtime behavior patterns with the application. The knowledge base of application groups is previously constructed based on a large number of sample applications. The construction of the knowledge base is done in such a manner that each sample application can be classified into application groups based on a set of classification rules in the knowledge base. The set of classification rules are applied to a new application in order to classify the new application into one of the application groups.

    摘要翻译: 本发明涉及一种将应用程序自动分类为先前分类为知识库的应用组的方法和系统。 更具体地,应用程序的运行时行为被捕获为在应用程序的执行期间被监视和记录的一系列事件。 分析一系列事件,以找到与应用程序共享公共运行时行为模式的正确应用程序组。 基于大量示例应用程序,先前构建了应用程序组的知识库。 基于知识库中的一组分类规则,完成知识库的构建,使得每个样本应用程序可以分类为应用组。 将一组分类规则应用于新应用程序,以便将新应用程序分类到其中一个应用程序组中。

    System and method for efficiently scanning a file for malware
    2.
    发明授权
    System and method for efficiently scanning a file for malware 有权
    用于高效扫描恶意软件文件的系统和方法

    公开(公告)号:US07861296B2

    公开(公告)日:2010-12-28

    申请号:US11154267

    申请日:2005-06-16

    IPC分类号: G06F11/00

    CPC分类号: G06F21/51 G06F21/566

    摘要: The present invention is directed toward a system, method, and a computer-readable medium for efficiently loading data into memory in order to scan the data for malware. The logic provided in the present invention improves the experience of a user when operating a computer protected with antivirus software. One aspect of the present invention is a method that identifies a pattern in which data in a file is loaded into memory from a computer-readable medium. Then the method identifies a pattern in which data in the file may be loaded into memory in a way that minimizes the time required to read data in the file. When a subsequent scan of the file is scheduled to occur, the method causes data in the file to be loaded in memory using the pattern that minimizes the time required to read data in the file.

    摘要翻译: 本发明涉及一种用于将数据有效地加载到存储器中以便扫描恶意软件的数据的系统,方法和计算机可读介质。 本发明提供的逻辑提高了用户在操作受防病毒软件保护的计算机时的体验。 本发明的一个方面是从计算机可读介质中识别文件中的数据被加载到存储器中的模式的方法。 然后,该方法识别可以以最小化在文件中读取数据所需的时间的方式将文件中的数据加载到存储器中的模式。 当调度文件的后续扫描时,该方法会使文件中的数据使用最小化文件中读取数据所需的时间的模式加载到内存中。

    System and method for detecting malware in executable scripts according to its functionality
    3.
    发明授权
    System and method for detecting malware in executable scripts according to its functionality 有权
    根据其功能,在可执行脚本中检测恶意软件的系统和方法

    公开(公告)号:US07707634B2

    公开(公告)日:2010-04-27

    申请号:US10769104

    申请日:2004-01-30

    IPC分类号: G06F11/00

    摘要: A malware detection system and method for determining whether an executable script is malware is presented. The malware detection system determines whether the executable script is malware by comparing the functional contents of the executable script to the functional contents of known malware. In practice, the executable script is obtained. The executable script is normalized, thereby generating a script signature corresponding to the functionality of the executable script. The script signature is compared to known malware script signatures in a malware signature store to determine whether the executable script is malware. If a complete match is made, the executable script is considered to be malware. If a partial match is made, the executable script is considered to likely be malware. The malware detection system may perform two normalizations, each normalization generating a script signature which is compared to similarly normalized known malware script signatures in the malware signature store.

    摘要翻译: 用于确定可执行脚本是否是恶意软件的恶意软件检测系统和方法。 恶意软件检测系统通过将可执行脚本的功能内容与已知恶意软件的功能内容进行比较来确定可执行脚本是否为恶意软件。 在实践中,获得可执行脚本。 可执行脚本被归一化,从而生成与可执行脚本的功能相对应的脚本签名。 将脚本签名与恶意软件签名存储中的已知恶意软件脚本签名进行比较,以确定可执行脚本是否为恶意软件。 如果完成匹配,可执行脚本被认为是恶意软件。 如果进行了部分匹配,则可执行脚本被认为可能是恶意软件。 恶意软件检测系统可以执行两个规范化,每个规范化生成脚本签名,其与恶意软件签名存储中的类似规范化的已知恶意软件脚本签名进行比较。

    System and method for unpacking packed executables for malware evaluation
    4.
    发明授权
    System and method for unpacking packed executables for malware evaluation 有权
    打包包装可执行文件进行恶意软件评估的系统和方法

    公开(公告)号:US07620990B2

    公开(公告)日:2009-11-17

    申请号:US10769103

    申请日:2004-01-30

    IPC分类号: G06F11/00 G06F11/30

    CPC分类号: G06F21/51 G06F21/56

    摘要: A system and method for determining whether a packed executable is malware is presented. In operation, a malware evaluator intercepts incoming data directed to a computer. The malware evaluator evaluates the incoming data to determine whether the incoming data is a packed executable. If the incoming data is a packed executable, the malware evaluator passes the packed executable to an unpacking module. The unpacking module includes a set of unpacker modules for unpacking a packed executable of a particular type. The unpacking module selects an unpacker module according to the type of the packed executable, and executes the selected unpacker module. Executing the unpacker module generates an unpacked executable corresponding to the packed executable. The unpacked executable is returned to the malware evaluator where it is evaluated to determine whether the packed executable is malware.

    摘要翻译: 提出了一种用于确定打包的可执行文件是否是恶意软件的系统和方法。 在操作中,恶意软件评估器拦截指向计算机的传入数据。 恶意软件评估程序评估传入数据以确定传入数据是否是打包的可执行文件。 如果传入的数据是打包的可执行文件,则恶意软件评估程序将打包的可执行文件传递到拆包模块。 拆包模块包括一组解包器模块,用于解包特定类型的打包可执行文件。 解包模块根据打包的可执行文件的类型选择解包器模块,并执行所选的解包器模块。 执行解包器模块生成与打包的可执行文件相对应的解包的可执行文件。 解压缩的可执行文件被返回到恶意软件评估器,在其中进行评估,以确定打包的可执行文件是否为恶意软件。

    THREAD SCANNING AND PATCHING TO DISABLE INJECTED MALWARE THREATS
    5.
    发明申请
    THREAD SCANNING AND PATCHING TO DISABLE INJECTED MALWARE THREATS 有权
    螺纹扫描和安装禁止注射的恶意软件威胁

    公开(公告)号:US20090199297A1

    公开(公告)日:2009-08-06

    申请号:US12025142

    申请日:2008-02-04

    IPC分类号: G06F21/24

    CPC分类号: G06F21/566

    摘要: An arrangement for scanning and patching injected malware code that is executing in otherwise legitimate processes running on a computer system is provided in which malware code is located in the memory of processes by extracting the start addresses of processes' threads and then searching near these addresses. Additional blocks of code in memory that are invoked by the code identified by each start address are also identified and the blocks are then matched against scanning signatures associated with known malware threads. If the entire signature can be matched against a subset of the blocks, then the thread is determined to be infected. The infected thread is suspended and in-memory modifications are performed to patch the injected code to render it harmless. The thread can be resumed or terminated to disable the protection mechanisms of the malware without causing any harm to the process in which the thread is injected.

    摘要翻译: 提供扫描和修补在计算机系统上运行的其他合法进程中执行的注入的恶意软件代码的布置,​​其中通过提取进程的线程的开始地址然后在这些地址附近进行搜索,其中恶意代码位于进程的存储器中。 由每个起始地址识别的代码调用的内存中的其他代码块也被识别,然后将块与已知恶意软件线程相关的扫描签名进行匹配。 如果整个签名可以与块的子集进行匹配,则确定线程被感染。 受感染的线程被暂停,并且执行内存中的修改来修补注入的代码以使其无害化。 可以恢复或终止线程以禁用恶意软件的保护机制,而不会对注入线程的进程造成任何损害。

    System and method for proactive computer virus protection
    6.
    发明授权
    System and method for proactive computer virus protection 有权
    主动计算机病毒保护的系统和方法

    公开(公告)号:US07877802B2

    公开(公告)日:2011-01-25

    申请号:US12019479

    申请日:2008-01-24

    IPC分类号: G06F11/00

    CPC分类号: G06F21/566

    摘要: A system, method, and computer readable medium for the proactive detection of malware in operating systems that receive application programming interface (API) calls is provided. A virtual operating environment for simulating the execution of programs and determining if the programs are malware is created. The virtual operating environment confines potential malware so that the systems of the host operating environment will not be adversely effected. During simulation, a behavior signature is generated based on the API calls issued by potential malware. The behavior signature is suitable for analysis to determine whether the simulated executable is malware.

    摘要翻译: 提供了用于在接收应用程序接口(API)调用的操作系统中主动检测恶意软件的系统,方法和计算机可读介质。 用于模拟程序的执行并确定程序是否是恶意软件的虚拟操作环境被创建。 虚拟操作环境限制潜在的恶意软件,使得主机操作环境的系统不会受到不利影响。 在仿真期间,根据潜在恶意软件发出的API调用生成行为签名。 行为签名适用于分析,以确定模拟的可执行文件是否为恶意软件。

    System and method for gathering exhibited behaviors on a .NET executable module in a secure manner
    7.
    发明授权
    System and method for gathering exhibited behaviors on a .NET executable module in a secure manner 失效
    以安全的方式收集.NET可执行模块的行为的系统和方法

    公开(公告)号:US07730530B2

    公开(公告)日:2010-06-01

    申请号:US10769097

    申请日:2004-01-30

    IPC分类号: G06F11/00

    摘要: A system and method for gathering exhibited behaviors of a .NET executable module in a secure manner is presented. In operation, a .NET behavior evaluation module presents a virtual .NET environment to a Microsoft Corporation .NET code module. The .NET behavior evaluation module implements a sufficient number of aspects of an actual Microsoft Corporation .NET environment that a .NET code module can execute. As the .NET code module executes, the .NET behavior evaluation module records some of the exhibited behaviors, i.e., .NET system supplied libraries/subroutines, that are associated with known malware. The recorded behaviors are placed in a behavior signature for an external determination as to whether the .NET code module is malware, i.e., an unwanted computer attack.

    摘要翻译: 提出了以安全的方式收集.NET可执行模块的展示行为的系统和方法。 在运行中,.NET行为评估模块向Microsoft Corporation .NET代码模块呈现虚拟.NET环境。 .NET行为评估模块实现.NET代码模块可以执行的实际Microsoft Corporation .NET环境的足够数量的方面。 当.NET代码模块执行时,.NET行为评估模块记录与已知恶意软件相关联的一些展示行为,即.NET系统提供的库/子程序。 记录的行为被放置在行为签名中,以便外部确定.NET代码模块是否是恶意软件,即不需要的计算机攻击。

    Applying antimalware logic without revealing the antimalware logic to adversaries
    10.
    发明授权
    Applying antimalware logic without revealing the antimalware logic to adversaries 有权
    应用反恶意软件逻辑,而不会向对手揭示反恶意软件逻辑

    公开(公告)号:US08955133B2

    公开(公告)日:2015-02-10

    申请号:US13156726

    申请日:2011-06-09

    IPC分类号: G06F21/00 G06F21/55 G06F21/56

    CPC分类号: G06F21/552 G06F21/566

    摘要: The subject disclosure is directed towards a technology by which antimalware detection logic is maintained and operated at a backend service, with which a customer frontend machine communicates (queries) for purposes of malware detection. In this way, some antimalware techniques are maintained at the backend service rather than revealed to antimalware authors. The backend antimalware detection logic may be based upon feature selection, and may be updated rapidly, in a manner that is faster than malware authors can track. Noise may be added to the results to make it difficult for malware authors to deduce the logic behind the results. The backend may return results indicating malware or not malware, or return inconclusive results. The backend service may also detect probing-related queries that are part of an attempt to deduce the unrevealed antimalware detection logic, with noisy results returned in response and/or other actions taken to foil the attempt.

    摘要翻译: 主题公开涉及一种技术,通过该技术,反恶意软件检测逻辑在后端服务中被维护和操作,客户前端机器为此进行通信(查询)以用于恶意软件检测。 这样一来,后端服务就会保留一些反恶意软件技术,而不是反恶意软件作者。 后端反恶意软件检测逻辑可以基于特征选择,并且可以以比作者可追踪的恶意软件更快的方式快速更新。 噪声可能会添加到结果中,使恶意软件作者难以推断出结果背后的逻辑。 后端可能返回指示恶意软件或不是恶意软件的结果,或返回不确定的结果。 后端服务还可以检测作为尝试推断出未显示的反恶意软件检测逻辑的一部分的探测相关查询,其中响应返回噪声结果和/或为了抵制该尝试而采取的其他动作。