The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Jul. 29, 2014

Filed:

Jan. 23, 2009
Applicants:

Osman Abdoul Ismael, Palo Alto, CA (US);

Samuel Yie, Fremont, CA (US);

Jayaraman Manni, San Jose, CA (US);

Muhammad Amin, Fremont, CA (US);

Bahman Mahbod, Saratoga, CA (US);

Inventors:

Osman Abdoul Ismael, Palo Alto, CA (US);

Samuel Yie, Fremont, CA (US);

Jayaraman Manni, San Jose, CA (US);

Muhammad Amin, Fremont, CA (US);

Bahman Mahbod, Saratoga, CA (US);

Assignee:

FireEye, Inc., Milpitas, CA (US);

Attorney:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
H04L 29/06 (2006.01); G06F 21/56 (2013.01);
U.S. Cl.
CPC ...
H04L 63/145 (2013.01); G06F 21/566 (2013.01); H04L 63/1408 (2013.01); H04L 2463/144 (2013.01); H04L 63/1416 (2013.01);
Abstract

Malicious network content is identified based on the behavior of one or more virtual environment components which process network content in a virtual environment. Network content can be monitored and analyzed using a set of heuristics. The heuristics identify suspicious network content communicated over a network. The suspicious network content can further be analyzed in a virtual environment that includes one or more virtual environment components. Each virtual environment component is configured to mimic live environment components, for example a browser application component or an operating system component. The suspicious network content is replayed in the virtual environment using one or more of the virtual environment components. The virtual environment component behavior is analyzed in view of an expected behavior to identify malicious network content. The malicious network content is then identified and processed.

Published as:

Find Patent Forward Citations

Loading…