Discovering Malicious Input Files and Performing Automatic and Distributed Remediation
The subject disclosure is directed towards detecting malware or possible malware in an input file by allowing the input file to be opened, and by monitoring for one or more behaviors corresponding to the open file that likely indicate malware. Only certain executable files and/or file types opened t...
Gespeichert in:
Hauptverfasser: | , , , , , , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | THOMAS ANIL FRANCIS KAPOOR VISHAL SEINFELD MARC E JOHNSON JOSEPH J FAULHABER JOSEPH L KELLER JONATHAN MARK KUMAR AJITH MARINESCU ADRIAN M JARRETT MICHAEL SEAN |
description | The subject disclosure is directed towards detecting malware or possible malware in an input file by allowing the input file to be opened, and by monitoring for one or more behaviors corresponding to the open file that likely indicate malware. Only certain executable files and/or file types opened thereby may be monitored, with various collected event data used for antimalware purposes when improper behavior is observed. Example behaviors include writing of a file to storage, generation of network traffic, injection of a process, running of script, and/or writing system registry data. Telemetry data and/or a sample of the file may be sent to an antimalware service, and malware remediation may be performed. Data (e.g., the collected events) may be distributed to other nodes for use in antimalware detection, e.g., to block execution of a similar file. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2012297488A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2012297488A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2012297488A13</originalsourceid><addsrcrecordid>eNrjZAhzySxOzi9LLcrMS1fwTczJTM7MLy1W8MwrKC1RcMvMSS1WSMxLUQhILUrLL8oFKXIsLcnPTSzJTAZLALWXFGUmlZakpigEpeampmQCpfLzeBhY0xJzilN5oTQ3g7Kba4izh25qQX58anFBYnJqXmpJfGiwkYGhkZGluYmFhaOhMXGqAAmkOqc</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Discovering Malicious Input Files and Performing Automatic and Distributed Remediation</title><source>esp@cenet</source><creator>THOMAS ANIL FRANCIS ; KAPOOR VISHAL ; SEINFELD MARC E ; JOHNSON JOSEPH J ; FAULHABER JOSEPH L ; KELLER JONATHAN MARK ; KUMAR AJITH ; MARINESCU ADRIAN M ; JARRETT MICHAEL SEAN</creator><creatorcontrib>THOMAS ANIL FRANCIS ; KAPOOR VISHAL ; SEINFELD MARC E ; JOHNSON JOSEPH J ; FAULHABER JOSEPH L ; KELLER JONATHAN MARK ; KUMAR AJITH ; MARINESCU ADRIAN M ; JARRETT MICHAEL SEAN</creatorcontrib><description>The subject disclosure is directed towards detecting malware or possible malware in an input file by allowing the input file to be opened, and by monitoring for one or more behaviors corresponding to the open file that likely indicate malware. Only certain executable files and/or file types opened thereby may be monitored, with various collected event data used for antimalware purposes when improper behavior is observed. Example behaviors include writing of a file to storage, generation of network traffic, injection of a process, running of script, and/or writing system registry data. Telemetry data and/or a sample of the file may be sent to an antimalware service, and malware remediation may be performed. Data (e.g., the collected events) may be distributed to other nodes for use in antimalware detection, e.g., to block execution of a similar file.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2012</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20121122&DB=EPODOC&CC=US&NR=2012297488A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76290</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20121122&DB=EPODOC&CC=US&NR=2012297488A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>THOMAS ANIL FRANCIS</creatorcontrib><creatorcontrib>KAPOOR VISHAL</creatorcontrib><creatorcontrib>SEINFELD MARC E</creatorcontrib><creatorcontrib>JOHNSON JOSEPH J</creatorcontrib><creatorcontrib>FAULHABER JOSEPH L</creatorcontrib><creatorcontrib>KELLER JONATHAN MARK</creatorcontrib><creatorcontrib>KUMAR AJITH</creatorcontrib><creatorcontrib>MARINESCU ADRIAN M</creatorcontrib><creatorcontrib>JARRETT MICHAEL SEAN</creatorcontrib><title>Discovering Malicious Input Files and Performing Automatic and Distributed Remediation</title><description>The subject disclosure is directed towards detecting malware or possible malware in an input file by allowing the input file to be opened, and by monitoring for one or more behaviors corresponding to the open file that likely indicate malware. Only certain executable files and/or file types opened thereby may be monitored, with various collected event data used for antimalware purposes when improper behavior is observed. Example behaviors include writing of a file to storage, generation of network traffic, injection of a process, running of script, and/or writing system registry data. Telemetry data and/or a sample of the file may be sent to an antimalware service, and malware remediation may be performed. Data (e.g., the collected events) may be distributed to other nodes for use in antimalware detection, e.g., to block execution of a similar file.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2012</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZAhzySxOzi9LLcrMS1fwTczJTM7MLy1W8MwrKC1RcMvMSS1WSMxLUQhILUrLL8oFKXIsLcnPTSzJTAZLALWXFGUmlZakpigEpeampmQCpfLzeBhY0xJzilN5oTQ3g7Kba4izh25qQX58anFBYnJqXmpJfGiwkYGhkZGluYmFhaOhMXGqAAmkOqc</recordid><startdate>20121122</startdate><enddate>20121122</enddate><creator>THOMAS ANIL FRANCIS</creator><creator>KAPOOR VISHAL</creator><creator>SEINFELD MARC E</creator><creator>JOHNSON JOSEPH J</creator><creator>FAULHABER JOSEPH L</creator><creator>KELLER JONATHAN MARK</creator><creator>KUMAR AJITH</creator><creator>MARINESCU ADRIAN M</creator><creator>JARRETT MICHAEL SEAN</creator><scope>EVB</scope></search><sort><creationdate>20121122</creationdate><title>Discovering Malicious Input Files and Performing Automatic and Distributed Remediation</title><author>THOMAS ANIL FRANCIS ; KAPOOR VISHAL ; SEINFELD MARC E ; JOHNSON JOSEPH J ; FAULHABER JOSEPH L ; KELLER JONATHAN MARK ; KUMAR AJITH ; MARINESCU ADRIAN M ; JARRETT MICHAEL SEAN</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2012297488A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2012</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>THOMAS ANIL FRANCIS</creatorcontrib><creatorcontrib>KAPOOR VISHAL</creatorcontrib><creatorcontrib>SEINFELD MARC E</creatorcontrib><creatorcontrib>JOHNSON JOSEPH J</creatorcontrib><creatorcontrib>FAULHABER JOSEPH L</creatorcontrib><creatorcontrib>KELLER JONATHAN MARK</creatorcontrib><creatorcontrib>KUMAR AJITH</creatorcontrib><creatorcontrib>MARINESCU ADRIAN M</creatorcontrib><creatorcontrib>JARRETT MICHAEL SEAN</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>THOMAS ANIL FRANCIS</au><au>KAPOOR VISHAL</au><au>SEINFELD MARC E</au><au>JOHNSON JOSEPH J</au><au>FAULHABER JOSEPH L</au><au>KELLER JONATHAN MARK</au><au>KUMAR AJITH</au><au>MARINESCU ADRIAN M</au><au>JARRETT MICHAEL SEAN</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Discovering Malicious Input Files and Performing Automatic and Distributed Remediation</title><date>2012-11-22</date><risdate>2012</risdate><abstract>The subject disclosure is directed towards detecting malware or possible malware in an input file by allowing the input file to be opened, and by monitoring for one or more behaviors corresponding to the open file that likely indicate malware. Only certain executable files and/or file types opened thereby may be monitored, with various collected event data used for antimalware purposes when improper behavior is observed. Example behaviors include writing of a file to storage, generation of network traffic, injection of a process, running of script, and/or writing system registry data. Telemetry data and/or a sample of the file may be sent to an antimalware service, and malware remediation may be performed. Data (e.g., the collected events) may be distributed to other nodes for use in antimalware detection, e.g., to block execution of a similar file.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_US2012297488A1 |
source | esp@cenet |
subjects | CALCULATING COMPUTING COUNTING ELECTRIC COMMUNICATION TECHNIQUE ELECTRIC DIGITAL DATA PROCESSING ELECTRICITY PHYSICS TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
title | Discovering Malicious Input Files and Performing Automatic and Distributed Remediation |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-28T13%3A52%3A35IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=THOMAS%20ANIL%20FRANCIS&rft.date=2012-11-22&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2012297488A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |