scispace - formally typeset
Patent

Malware Target Recognition

Reads0
Chats0
TLDR
In this article, a method, apparatus and program product are provided to recognize malware in a computing environment having at least one computer, and an automatic determination is made by the computer to determine if the sample is malware using static analysis methods.
Abstract
A method, apparatus and program product are provided to recognize malware in a computing environment having at least one computer. A sample is received. An automatic determination is made by the at least one computer to determine if the sample is malware using static analysis methods. If the static analysis methods determine the sample is malware, dynamic analysis methods are used by the at least one computer to automatically determine if the sample is malware. If the dynamic analysis methods determine the sample is malware, the sample is presented to a malware analyst to adjudicate the automatic determinations of the static and dynamic analyses. If the adjudication determines the sample is malware, a response action is initiated to recover from or mitigate a threat of the sample.

read more

Citations
More filters
Patent

Automated behavioral and static analysis using an instrumented sandbox and machine learning classification for mobile security

TL;DR: In this paper, the authors present a system that allows mobile subscribers, and others, to submit mobile applications to be analyzed for anomalous and malicious behavior using data acquired during the execution of the application within a highly instrumented and controlled environment for which the analysis relies on per-execution as well as comparative aggregate data across many such executions from one or more subscribers.
Patent

Electronic message analysis for malware detection

TL;DR: In this paper, an electronic message is analyzed for malware contained in the message and the analysis may include replaying the suspicious URL in a virtual environment which simulates the intended computing device to receive the electronic message, if the replayed URL is determined to be malicious, the malicious URL is added to a black list which is updated throughout the computer system.
Patent

Systems and methods for using reputation scores in network services and transactions to calculate security risks to computer systems and platforms

TL;DR: In this article, a security orchestration service generates runtime operational integrity profiles representing and identifying a level of threat or contextual trustworthiness, at near real time, of subjects and applications on the instrumented target platform.
Patent

Systems and methods for orchestrating runtime operational integrity

TL;DR: In this article, the authors present a data center-level runtime operational integrity dashboard and remediation controls for infected systems in a display of a platform having a network trust agent, an endpoint trust agent and a trust orchestrator.
Patent

Optimized resource allocation for virtual machines within a malware content detection system

TL;DR: In this article, a virtual machine instance provides a first virtual operating environment while the second VM instance is adapted to share the resources allocated to the first VM instance, which is further adapted to allocate additional resources upon conducting Copy-On Write operation.
References
More filters
Journal ArticleDOI

Design and evaluation for situation awareness enhancement

TL;DR: A discussion of the SA construct, important considerations facing designers of aircraft systems, and current research in the area of SA measurement are presented.
Proceedings ArticleDOI

Data mining methods for detection of new malicious executables

TL;DR: This work presents a data mining framework that detects new, previously unseen malicious executables accurately and automatically and more than doubles the current detection rates for new malicious executable.
Proceedings ArticleDOI

Learning to detect malicious executables in the wild

TL;DR: A fielded application for detecting malicious executables in the wild is described using techniques from machine learning and data mining, and boosted decision trees outperformed other methods with an area under the roc curve of 0.996.
Book

Malware Detection

TL;DR: This book captures the state of the art research in the area of malicious code detection, prevention and mitigation and introduces novel techniques for creating services that protect their own integrity and safety, plus the data they manage.
Patent

Anti-virus agent for use with databases and mail servers

TL;DR: In this paper, a software agent for detecting and removing computer viruses located in attachments to e-mail messages is proposed, which can operate both on a real-time basis and at preset period intervals.
Related Papers (5)