-
1.
公开(公告)号:US20230297687A1
公开(公告)日:2023-09-21
申请号:US17655779
申请日:2022-03-21
Applicant: VMware, Inc.
Inventor: Shivali SHARMA , Raunak Ravindra SINGWI , Kedar Bhalchandra CHAUDHARI , Akeem Lamar JENKINS
CPC classification number: G06F21/577 , G06F21/566 , G06F2221/033 , G06F2221/2141
Abstract: A method for assigning permissions to files in a malware detection system, is provided. The method generally includes assigning a first subset of permissions to a first file classified as an unknown file, opening the first file in accordance with the first subset of permissions, determining a first verdict for the first file, the first verdict indicating the first file is benign, assigning a second subset of permissions to the first file based on determining the first verdict indicating the first file is benign, and executing the first file in accordance with the second subset of permissions.
-
2.
公开(公告)号:US20230275932A1
公开(公告)日:2023-08-31
申请号:US17681559
申请日:2022-02-25
Applicant: VMware, Inc.
Inventor: Marc Wayne BROTHERSON , Akeem Lamar JENKINS
IPC: H04L9/40
CPC classification number: H04L63/205 , H04L63/105 , H04L63/1433
Abstract: This application relates generally to validating cybersecurity standard compliance of a computer system within a protected execution environment. An example method includes, obtaining one or more messages from a first component while the first component is operating in a protected execution environment created by applying cybersecurity requirements of a security standard, wherein the one or more messages include information about the cybersecurity requirements, and wherein the one or more messages are encrypted; decrypting the one or more messages; comparing the information contained in the one more messages with corresponding cybersecurity requirements of the security standard for the first component; and determining whether the first component is in compliance with the security standard based on the comparing of the information contained in the one more messages with corresponding cybersecurity requirements of the security standard.
-