Patent classifications
G06F21/568
Threat prevention by selective feature deprivation
A method of preventing exploitation of a vulnerability of a computing system includes generating a deprivation token to cause disabling of a selected one or more features of a component of the computing system to prevent an exploit of a vulnerability affecting the selected one or more features; and publishing the derivation token to at least one of a computing system manufacturer computing system and an enterprise information technology (IT) computing system for distribution to affected computing systems.
Automated malware monitoring and data extraction
A malware monitoring method includes: obtaining a malware sample; extracting operational parameters corresponding to the malware sample; configuring an emulator application corresponding to the malware sample using the operational parameters; executing a plurality of instances of the configured emulator application; collecting output data from each of the plurality of instances; and generating indicators of compromise (IOCs) based on the collected output data.
Security scanning of image for virtual machine creation
Embodiments provide automated security scanning of incoming images for use in creating containers such as a Virtual Machines. Based upon attribute(s) of metadata of the incoming image, a security engine chooses from amongst stored scripts for mounting and execution by installation logic. Such scripts can relate to the scanning itself, and/or pre-scanning considerations (such as scan frequency). In one example, the meta data attribute identifies a relevant Operating System (OS) of the incoming image. Other meta data attributes such as •scan frequency, •most recent passed scan, •log information, and •contact information (for issuance of a possible alert), may also be considered as part of the processing of an incoming image. Embodiments may enhance security by avoiding introduction of vulnerabilities through image instantiation. Embodiments may also impart flexibility to conserve resources by selectively scanning according to a frequency and/or date of last successful passage of the image.
System and method of categorization of an application on a computing device using a classifier
Disclosed herein are systems and methods for categorizing an application on a computing device including gathering a set of attributes of an application. The set of attributes of the application includes at least one of: a number of files in an application package of the application; a number of executable files in the application package; numbers and types of permissions being requested; a number of classes in the executable files in the application package; and a number of methods in the executable files in the application package. sending the gathered set of attributes to a trained classification model. The application is classified, using the classification model, based on the gathered set of attributes by generating one or more probabilities of the application belonging to respective one or more categories of applications. A category of the application is determined based on the generated one or more probabilities.
SYSTEMS AND METHODS FOR RANSOMWARE DETECTION
Systems and methods are provided to detect ransomware and ransomware-like behavior.
DETECTION OF AND PROTECTION FROM MALWARE AND STEGANOGRAPHY
A method for real-time detection of and protection from steganography in a kernel mode comprises detecting transmission of a file via a firewall, an operating system, or an e-mail system. A size of the file is determined. From a file system, a stored filesize of the file is retrieved. The determined size of the file is compared to the stored filesize of the file. Responsive to the determined size of the file being larger than the stored filesize of the file, steganography detection analytics are executed on the file. Responsive to the steganography detection analytics indicating presence of steganography in the file, a steganography remediation action is executed, and information is transmitted describing the steganography to a client device.
Storage System Based Threat Detection and Remediation for Containers
A storage system, associated with a container system, may be configured to perform a method that includes: providing, by a storage system, storage services to a container system; determining, by the storage system and based on the providing the storage services to the container system, a potential security threat; and performing, by the storage system, a remedial action based on the potential security threat.
System and method of inspecting archive slices for malware using empty sparse files
Disclosed herein are systems and method for inspecting archived slices for malware using empty spare files. In one exemplary aspect, the method comprises generating a backup slice and a virtual volume comprising a list of files in the backup slice and associated file information. The method comprises mounting the virtual volume to a disk. The method comprises creating, in the virtual volume, empty sparse files that are placeholders of the files reference in the list of files. The method comprises detecting a change between a respective empty sparse file and a corresponding file in a previous backup slice and accordingly storing the actual content of the file in the virtual volume in place of the respective empty sparse file. The method comprises scanning the virtual volume for malicious software and generating a cured slice that replaces the backup slice in the backup archive upon detection.
DATA PROCESSING METHOD FOR COPING WITH RANSOMWARE, PROGRAM FOR EXECUTING THE METHOD, AND COMPUTER-READABLE RECORDING MEDIUM STORING THE PROGRAM
The present disclosure provides a data processing method for coping with ransomware, which encrypts data with a malicious intent and blocks an access to the data, to protect the data, and a program for executing the data processing method. In a computer apparatus that loads an application program stored in a memory onto a processor and carries out a predetermined processing according to the application program, on an operating system (OS) kernel which controls an access of the application program to hardware components of the computer apparatus, the processor reads the data stored in the memory, performs the predetermined processing at the request of the application program, determines whether a ransomware attack occurred for the data before storing the processed data back to the memory, and stores the processed data to the memory according to a determination result, thereby preventing the damage caused by the ransomware attack.
METHOD FOR SECURING AN ELECTRONIC DEVICE
A method for securing the functioning of an electronic device, which comprises an electronic board and one or more peripheral units connected to or integrated with the electronic board, an integrated storage unit being provided on the electronic board, in which a management program is stored which, when executed, manages, by means of a set of management instructions, the functioning of the electronic board and of the peripheral units.