The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
May. 13, 2025

Filed:

May. 26, 2022
Applicant:

Vmware Llc, Palo Alto, CA (US);

Inventors:

Rayanagouda Bheemanagouda Patil, Pune, IN;

Kedar Bhalchandra Chaudhari, Pune, IN;

Clemens Kolbitsch, Goleta, CA (US);

Laxmikant Vithal Gunda, San Jose, CA (US);

Vaibhav Kulkarni, Pune, IN;

Assignee:

VMware LLC, Palo Alto, CA (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
G06F 21/56 (2013.01); G06F 21/53 (2013.01);
U.S. Cl.
CPC ...
G06F 21/566 (2013.01); G06F 21/53 (2013.01); G06F 2221/034 (2013.01);
Abstract

The disclosure herein describes executing unknown processes while preventing sandbox-evading malware therein from performing malicious behavior. A process execution event associated with an executable is detected, wherein the executable is to be executed in a production environment. The executable is determined to be an unknown executable (e.g., an executable that has not been analyzed for malware) using signature data in the process execution event. A function call hook interface of a sandbox simulator is activated, and a process of the executable is executed in the production environment. Any function calls from the executing process are intercepted by the activated function call hook interface, and sandbox-style responses to the intercepted function call are generated using sandbox response data of the sandbox simulator. The generated sandbox responses are provided to the executing process, whereby malware included in the executable behaves as if the executing process is executing in a sandbox environment.


Find Patent Forward Citations

Loading…