APPARATUS TO AUTOMATICALLY ESTABLISH OR MODIFY MUTUAL AUTHENTICATIONS AMONGST THE COMPONENTS IN A SOFTWARE DEFINED NETWORKING (SDN) SOLUTION

    公开(公告)号:US20210075789A1

    公开(公告)日:2021-03-11

    申请号:US16998371

    申请日:2020-08-20

    Applicant: VMware, Inc.

    Abstract: The disclosure provides an approach for establishing authentication between components in a network. Embodiments deploying a node of a monitoring appliance in response to a request and providing a token for accessing a network manager to the node of the monitoring appliance. Embodiments include generating, by the node of the monitoring appliance, a certificate of the node of the monitoring appliance and providing the certificate of the node of the monitoring appliance to the network manager with the token for accessing the network manager. Embodiments include adding, by the network manager, based on the token for accessing the network manager, the certificate of the node of the monitoring appliance to a first trust store and providing, by the network manager, a network manager certificate to the node of the monitoring appliance. Embodiments include adding, by the node of the monitoring appliance, the network manager certificate to a second trust store.

    PREVENTING ACTIVATION OF MALWARE BY EXHIBITING SANDBOX BEHAVIOR IN A NON-SANDBOX ENVIRONMENT

    公开(公告)号:US20230385413A1

    公开(公告)日:2023-11-30

    申请号:US17825684

    申请日:2022-05-26

    Applicant: VMware, Inc.

    CPC classification number: G06F21/566 G06F21/53 G06F2221/034

    Abstract: The disclosure herein describes executing unknown processes while preventing sandbox-evading malware therein from performing malicious behavior. A process execution event associated with an executable is detected, wherein the executable is to be executed in a production environment. The executable is determined to be an unknown executable (e.g., an executable that has not been analyzed for malware) using signature data in the process execution event. A function call hook interface of a sandbox simulator is activated, and a process of the executable is executed in the production environment. Any function calls from the executing process are intercepted by the activated function call hook interface, and sandbox-style responses to the intercepted function call are generated using sandbox response data of the sandbox simulator. The generated sandbox responses are provided to the executing process, whereby malware included in the executable behaves as if the executing process is executing in a sandbox environment.

    SERVICE LABELING USING SEMI-SUPERVISED LEARNING

    公开(公告)号:US20210336899A1

    公开(公告)日:2021-10-28

    申请号:US16855305

    申请日:2020-04-22

    Applicant: VMware, Inc.

    Abstract: The disclosure provides an approach for workload labeling and identification of known or custom applications. Embodiments include determining a plurality of sets of features comprising a respective set of features for each respective workload of a first subset of a plurality of workloads. Embodiments include identifying a group of workloads based on similarities among the plurality of sets of features. Embodiments include receiving label data from a user comprising a label for the group of workloads. Embodiments include associating the label with each workload of the group of workloads to produce a training data set. Embodiments include using the training data set to train a model to output labels for input workloads. Embodiments include determining a label for a given workload of the plurality of workloads by inputting features of the given workload to the model.

Patent Agency Ranking