发明名称 Method and system for automatic detection and analysis of malware
摘要 A method of detecting malicious software (malware) includes receiving a file and storing a memory baseline for a system. The method also includes copying the file to the system, executing the file on the system, terminating operation of the system, and storing a post-execution memory map. The method further includes analyzing the memory baseline and the post-execution memory map and determining that the file includes malware.
申请公布号 US9245114(B2) 申请公布日期 2016.01.26
申请号 US201113219208 申请日期 2011.08.26
申请人 VERISIGN, INC. 发明人 Thomas Ralph;Ligh Michael
分类号 G06F21/56;G06F21/55;H04L29/06 主分类号 G06F21/56
代理机构 MH2 Technology Law Group, LLP 代理人 MH2 Technology Law Group, LLP
主权项 1. A method of detecting malicious software, the method comprising: storing, by an analysis system, a memory baseline for a first system, the memory baseline including information stored in volatile memory of the first system and non-volatile memory of the first system; providing, by the analysis system, a file to the first system; executing, by the analysis system, the file on the first system using an operating system of the first system after the storing the memory baseline; terminating, by the analysis system, operation of the operating system of the first system after executing the file; storing, by the analysis system, a post-execution memory map of the first system while operation of the operating system of the first system is terminated, the post-execution memory map including information stored in the volatile memory of the first system and the non-volatile memory of the first system after the executing the file; analyzing, by the analysis system, the memory baseline and the post-execution memory map, wherein analyzing comprises: determining the presence of one or more processes that changed from the memory baseline to the post-execution memory map,determining timestamps associated with the one or more processes, andidentifying behaviors that indicate attempts to conceal a rootkit during the operation of the operating system; determining that the file comprises malicious software based on the analyzing; determining a timeline of activities performed by the malicious software based on the timestamps; and providing a report of the malicious software including a list of the one or more processes that changed and the timeline.
地址 Reston VA US