[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

WO2005114414A1 - Methods and systems for computer security - Google Patents

Methods and systems for computer security Download PDF

Info

Publication number
WO2005114414A1
WO2005114414A1 PCT/US2004/012626 US2004012626W WO2005114414A1 WO 2005114414 A1 WO2005114414 A1 WO 2005114414A1 US 2004012626 W US2004012626 W US 2004012626W WO 2005114414 A1 WO2005114414 A1 WO 2005114414A1
Authority
WO
WIPO (PCT)
Prior art keywords
file
database
entry
software
unfamiliar
Prior art date
Application number
PCT/US2004/012626
Other languages
French (fr)
Inventor
Paul A. Gassoway
Original Assignee
Computer Associates Think, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Computer Associates Think, Inc. filed Critical Computer Associates Think, Inc.
Priority to PCT/US2004/012626 priority Critical patent/WO2005114414A1/en
Priority to EP04822016A priority patent/EP1743228A1/en
Publication of WO2005114414A1 publication Critical patent/WO2005114414A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability

Definitions

  • the present disclosure relates generally to security and, more particularly, to methods and systems for computer security.
  • Computer security attempts to ensure the reliable operation of networking and computing resources and attempts to protect information on the computer or network from unauthorized corruption, access or disclosure.
  • Computer system(s) as referred to herein may include(s) individual computers, servers, computing resources, networks, etc., and combinations thereof.
  • Computer viruses are programs that can infect other programs by modifying them in such a way as to include a copy of themselves. Unlike computer viruses, worms do not need to infect other programs. Wo ⁇ ns are independent programs that are capable of reproducing
  • a Trojan horse may be an executable program that appears to be desirable but is merely disguised as "friendly” and actually contains harmful code, allowing an attacker lo come in through a "back door' ' and perform malicious actions on the computer system.
  • Trojans prey on system vulnerabilities and may be extremely destructive, allowing attackers to monitor, administer, and/or perform any action on a computer system that the user can, jusi as if they were right in front of it.
  • the user may first be induced to install the Trojan. For example, this may be done through the offering of anything that a user might find desirable via email, instant messengers, or file sharing tools (i.e..
  • a user may download a Trojan horse program that appears to be a calculator, performing the functions of a simple pocket calculator.
  • the Trojan horse may appear to be performing calculations and nothing more. However, it may also be performing a number of harmful actions, such as deleting files, stealing passwords, adding files, disrupting system operation. etc.
  • the Trojan horse may be an e-mail attachment disguised as a document file, readme file. etc. If a user launches the infected file, the Trojan may initiate installation procedures and/or propagation routines.
  • Trojan horse programs can be introduced to a computer system by initially being planted in software repositories that many people can access, such as software bulletin boards, publicly accessible directories, file-sharing systems, such as the KaZaA network, etc. Users accessing these repositories are then tricked into copying the Trojan horse program into their own computer systems. These users then can further spread the Trojan horse by sharing the infected program with other users, most especially if the program performs a useful function and causes no immediate or obvious damage. Users may utilize anti-virus programs in order to protect their computer systems from security threats such as Trojan horses. Anti-virus programs operate to protect from the spread of viruses by detecting the vims and isolating or removing the viral code.
  • anti-virus software may include activity monitoring programs, scanning programs, and/or integrity checking programs.
  • Activity monitoring programs attempt to prevent the infection of computer systems by searching for "virus-like' " activity, such as. attempts to delete a file. or 10 wriie 10 an executable file, and may then attempt to prevent this activity from taking place.
  • Virus scanning programs may contain a list of previously defined virus signatures, containing the binary patterns of a virus, each associated with a virus and scan the various files of a system looking for a match to a particular virus signature. If a virus is detected, the user may be notified and further steps may be taken to rid the system of the malicious code.
  • Integrity checking programs compute a checksum value for all of the u ⁇ infected, executable files residing on the computer system and compare the computed checksum values to checksum values generated at a later time to determine if anything has changed in the file. If the checksums match, then the executable file is uninfected. However, if the checksums do not match, then the executable file may possibly be infected and steps may be taken to remove the infected file.
  • Anti-virus software programs may not provide a computer user with comprehensive protection against Trojans. For example, activity monitoring programs may not adequately prevent Trojan horses because it is hard for them to distinguish between a Trojan horse that, for example, is maliciously deleting a system's file, and a regular program that is supposed to delete a system's file.
  • Virus scanning software may detect viruses present in the system, but it may do nothing to prevent them from infiltrating the system in the first place.
  • the virus scanning software should be continuously updated, in order to be effective in detecting new and modified Trojans. This not only proves to be a very tedious and time consuming task for computer users, but also may not happen often enough to provide adequate safeguards against foreign intrusions.
  • Integrity checking programs not only do not know which viruses they are in fact detecting: but in cases where a file has been legitimately modified, they may also require the user to verify whether or not the detected executable file contains a virus.
  • a method for maintaining computer security comprises providing a database of known good software, opening a file, identifying the file being opened, determining whether an entry exists in the* database of known good software for the identified file and performing at least one of allowing and preventing the opening of the file from continuing based on the result of the determination.
  • a system for maintaining computer security comprises a database of known good software, a system for opening a file, a system for identifying the file being opened, a system for determining whether an entry exists in the database of known good software for the identified file and a system for performing at least one of allowing and preventing the opening of the file from continuing based on the result of the determination.
  • a computer recording medium including computer executable code for maintaining computer security comprises code for providing a database of known good software, code for opening a file, code for identifying the file being opened, code for dete ⁇ nining whether an entry exists in the database of known good software for the identified file and code for performing at least one of allowing and preventing the opening of the file from continuing based on the result of the determination.
  • Figure 1 shows a block diagram of an exemplary computer system capable of implementing the method and system of the present application:
  • Figure 2 shows a flow chart of a method for maintaining computer security, according to an embodiment of the present disclosure;
  • Figures 3 A and 3B show a flow chart and schematic diagram respectively illustrating a system and method for maintaining computer security, according to an embodiment of the present disclosure;
  • Figure 4 shows a schematic diagram illustrating the functioning of a call hook, according to an embodiment of the present disclosure.
  • the present disclosure provides tools (in the form of methodologies, apparatuses, and systems) for maintaining computer security.
  • the tools may be embodied in one or more computer programs stored on a computer readable medium or program storage device and/or transmitted via a computer network or other transmission medium.
  • the following exemplary embodiments are set forth to aid in an understanding of the subject matter of this disclosure, but are not intended, and should not be construed, to limit in any way the claims which follow thereaftei . Therefore, while specific terminology is employed Jor the sake of clarity in describing some exemplary embodiments, the present disclosure is not intended to be limited to the specific terminology so selected, and it is to be understood that each specific element includes all technical equivalents which operate in a similar manner.
  • Software as the term is used herein may include executable instructions (e.g., one or more programs) and/or data that can be stored electronically.
  • An application is a program or group of programs designed for end users and may include systems software and applications software. Virtually all infonnation stored in a computer is stored in a file. There are many different types of files, including data files, text files, program files, directoiy files, etc.
  • a file is a collection of instructions and/or data that has a name associated to it, called a file name.
  • Figure ] shows an example of a computer system 100 which may implement the method and system of the present disclosure.
  • the system and method of the present disclosure may be implemented in the form of a program running on a computer system, for example, a mainframe, personal computer (PC), handheld computer, server, etc.
  • the program may be stored on a recording media locally accessible by the computer system, for example, floppy disk, compact disk, hard disk, etc., or may be remote from the computer system and accessible via a hard wired or wireless connection to a network, for example, a local area network, or the Internet.
  • the computer system 100 can include a central processing unit (CPU) 102, program and data storage devices 104. a printer interface 106, a display unit 108. a (LAN) local area network data transmission controller 110, a LAN interface 112, a network controller 114, an internal bus 116, and one or more input devices 118 (for example, a keyboard, mouse etc.).
  • the system 100 may be connected to a database 120, via a link 122.
  • a list of known good software is maintained. The list may be in the form of one or more databases provided remotely and/or locally on the computer system.
  • the system identifies the file and checks to determine whether an entry for the file exists in the list of known good software.
  • the system is allowed to proceed opening the file without interference. For example, if the file is an executable program file, the program is allowed to execute. However, if an entry for the files does not exist in the list, the system can monitor the execution of the program so that if the program attempts to perform a suspect action, such as a change to the operating system registry, settings, and/or change of another executable's file, etc., the user can be prompted before the program is allowed to continue. The user is thus able to prevent the process from doing damage to the system. If a program has been allowed to run on the system for some time, the system can automatically add an entry for the file to the list of known good software.
  • a suspect action such as a change to the operating system registry, settings, and/or change of another executable's file, etc.
  • a list (e.g.. one or more databases) of known good software is provided (Step S21).
  • the database may include entries uniquely identifying each piece of software listed in the database.
  • Step S22 When a file is going to be opened (Step S22) it is identified (Step S23) and compared with entries in the list of known good software (Step S24). Appropriate operations may then be performed on the file (Step S25) depending on whether an entry for the file is in the database for known good software. For example, if the file is a program file, if it is determined that the file corresponds to an entry in the database for known good software (Yes. Step S25).
  • the program can be allowed to freely execute (Step S27). If there is no entry in the database for known good software (No. Step S25), the system can perform an appropriate operation on the file (Step S26) which may include monitoring the program for suspicious activities. For example, as will be described in more detail below, one or more operating system call hooks can be placed and used to monitor the program.
  • the file when the file is opened the file may be identified by determining a unique value for the file.
  • the unique value may be a hash value generated in accordance with a number of existing methods and technologies, such as one-way hashing techniques (for example, MD5, SHA, etc.), etc.
  • a database of unfamiliar software may be provided.
  • OS operating system
  • the database of unfamiliar software may include timestamp information indicating, for example, how long an entry for each unfamiliar file has been in the database of unfamiliar software (e.g., a date stamp), the number of times an unfamiliar file has been opened and/or the number of times an unfamiliar piece of software has been executed, etc.
  • timestamp information indicating, for example, how long an entry for each unfamiliar file has been in the database of unfamiliar software (e.g., a date stamp), the number of times an unfamiliar file has been opened and/or the number of times an unfamiliar piece of software has been executed, etc.
  • the operating system 300 opens the file (Step S30) and device driver 301 reads and identifies the file (Step S31). Once the file is identified, checking device 302 queries the database of known good software 303 (Step S32) and dete ⁇ nines if there is a corresponding entry in the database of known good software 303.
  • Step S34 If it is determined that there is an entry for the file in the database of known good software 303 (Yes, Step S33), operating system 300 is allowed to continue opening and utilizing the contents of the file (Step S34). For example, if the file contains an executable, the operating system 300 is allowed to let the executable begin. If it is determined that there is no corresponding entry in the database of known good software 303 (No, Step S33), checking device 302 queries the database of unfamiliar software 304 (Step S35) and determines if there is a corresponding entry in the database of unfamiliar software 304. If an entry is not found (No, Step S36), an appropriate action can be performed (Step S37). For example, a new entry for the file, can be made in the database of unfamiliar software 304.
  • the entry may include information indicating the date the entry was added to the database. If it is determined that there is an entry for the file in the database of unfamiliar software 304 (Yes, Step S36), the operating system is allowed to continue opening the file. However, the system monitors it for suspicious activity. For example, if the file contains an executable, when the process starts, one or more operating system call hooks 305 may be placed and the process is allowed to continue. In addition, if an entry was found in the database of unfamiliar software 304, the date stamp for the file entry can be retrieved (Step S38) and compared with the current date (Step S39). If it is determined that the entry has been in the database for unfamiliar software 304 for a sufficient period of time (e.g.. a month or more) (Yes.
  • a sufficient period of time e.g.. a month or more
  • Step S40 then the entry information can be moved from the database of unfamiliar software 304 to the database for known good software 303 (Step S42) and the system is allowed to continue opening and utilizing the contents of the file (Step S34). If the entry has not been in the database for unfamiliar software 304 for a sufficient period of time (No, Step S40), an appropriate action can be performed (Step S37).
  • entries in the database of unfamiliar software may include the number of times the unfamiliar file has been opened and/or the number of times the unfamiliar piece of software has been executed. These values can be compared with baseline values. If the number is (are) greater than the baseline values, the entry information for the file can be moved from the database of unfamiliar software to the database for known good software.
  • performing an operating system call hook includes notifying a Trojan notification service that the file corresponds to an entry in the database for unfamiliar processes and prompting the user for input about whether the operating system call should be passed along or should fail. If the operating system call is passed along, then the operating system is allowed to proceed with opening the ' file.
  • the OS call hook exists in kemal space and cannot interact with the user. Therefore.
  • a service such as a Trojan notification service may be notified when the call hook occurs. The service may then notify the user via any suitable manner (e.g., email) of the action that is being perfonned. When the user then decides to allow or not allow the action, the user can notify the Trojan notification service.
  • FIG. 4 is a schematic diagram illustrating the functioning of a call hook, according to an embodiment of the present disclosure.
  • Performing an operating system call hook 305 involves "hooking' " a file's operating system calls 401 (e.g., updating the registry, opening files, etc.) and not allowing the operation to continue until allowed.
  • the Trojan notification service 402 is notified.
  • Trojan notification service 402 then perfo ⁇ ns a user prompt 403, prompting the user of the system for input about whether the operating system call should be allowed.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

A method for maintaining computer security, includes providing a database of known good software, opening a file, identifying the file being opened, determining whether an entry exists in the database of known good software for the identified file and performing at least one of allowing and preventing the opening of the file from continuing based on the result of the determination.

Description

METHODS AND SYSTEMS FOR COMPUTER SECURITY
BACKGROUND
1. TECHNICAL FIELD
, 10 The present disclosure relates generally to security and, more particularly, to methods and systems for computer security.
2. DESCRIPTION OF THE RELATED ART With the growth of the Internet, the increased use of computers and the exchange of 15 information between individual users poses a threat to the security of computers. Computer security attempts to ensure the reliable operation of networking and computing resources and attempts to protect information on the computer or network from unauthorized corruption, access or disclosure. Computer system(s) as referred to herein may include(s) individual computers, servers, computing resources, networks, etc., and combinations thereof.
20 Among the various security threats that present increasingly difficult challenges to the secure operation of computer systems are computer viruses, worms, Trojan horses, etc. Computer viruses are programs that can infect other programs by modifying them in such a way as to include a copy of themselves. Unlike computer viruses, worms do not need to infect other programs. Woπns are independent programs that are capable of reproducing
25 themselves, spreading from machine to machine across network connections, often via email. A Trojan horse may be an executable program that appears to be desirable but is merely disguised as "friendly" and actually contains harmful code, allowing an attacker lo come in through a "back door'' and perform malicious actions on the computer system. Trojans prey on system vulnerabilities and may be extremely destructive, allowing attackers to monitor, administer, and/or perform any action on a computer system that the user can, jusi as if they were right in front of it. For a Trojan to gain access to the computer system, the user may first be induced to install the Trojan. For example, this may be done through the offering of anything that a user might find desirable via email, instant messengers, or file sharing tools (i.e.. free games, movies, system enhancements, etc.). A user may download a Trojan horse program that appears to be a calculator, performing the functions of a simple pocket calculator. When the user launches the infected file, it may appear to be performing calculations and nothing more. However, it may also be performing a number of harmful actions, such as deleting files, stealing passwords, adding files, disrupting system operation. etc. In addition, the Trojan horse may be an e-mail attachment disguised as a document file, readme file. etc. If a user launches the infected file, the Trojan may initiate installation procedures and/or propagation routines. Trojan horse programs can be introduced to a computer system by initially being planted in software repositories that many people can access, such as software bulletin boards, publicly accessible directories, file-sharing systems, such as the KaZaA network, etc. Users accessing these repositories are then tricked into copying the Trojan horse program into their own computer systems. These users then can further spread the Trojan horse by sharing the infected program with other users, most especially if the program performs a useful function and causes no immediate or obvious damage. Users may utilize anti-virus programs in order to protect their computer systems from security threats such as Trojan horses. Anti-virus programs operate to protect from the spread of viruses by detecting the vims and isolating or removing the viral code. Examples of anti-virus software may include activity monitoring programs, scanning programs, and/or integrity checking programs. Activity monitoring programs attempt to prevent the infection of computer systems by searching for "virus-like'" activity, such as. attempts to delete a file. or 10 wriie 10 an executable file, and may then attempt to prevent this activity from taking place. Virus scanning programs may contain a list of previously defined virus signatures, containing the binary patterns of a virus, each associated with a virus and scan the various files of a system looking for a match to a particular virus signature. If a virus is detected, the user may be notified and further steps may be taken to rid the system of the malicious code. Integrity checking programs compute a checksum value for all of the uπinfected, executable files residing on the computer system and compare the computed checksum values to checksum values generated at a later time to determine if anything has changed in the file. If the checksums match, then the executable file is uninfected. However, if the checksums do not match, then the executable file may possibly be infected and steps may be taken to remove the infected file. Anti-virus software programs may not provide a computer user with comprehensive protection against Trojans. For example, activity monitoring programs may not adequately prevent Trojan horses because it is hard for them to distinguish between a Trojan horse that, for example, is maliciously deleting a system's file, and a regular program that is supposed to delete a system's file. Virus scanning software may detect viruses present in the system, but it may do nothing to prevent them from infiltrating the system in the first place. The virus scanning software should be continuously updated, in order to be effective in detecting new and modified Trojans. This not only proves to be a very tedious and time consuming task for computer users, but also may not happen often enough to provide adequate safeguards against foreign intrusions. Integrity checking programs not only do not know which viruses they are in fact detecting: but in cases where a file has been legitimately modified, they may also require the user to verify whether or not the detected executable file contains a virus. There is a window of time between when a new attack is released to the public, and when anti-virus products have signatures to detect the attack. During this window of time, the attack is given the opportunity to do its damage. Therefore, just because a user has installed and is running an anti-virus program does not necessarily mean that the user's system is no longer vulnerable to security threats.
SUMMARY A method for maintaining computer security, comprises providing a database of known good software, opening a file, identifying the file being opened, determining whether an entry exists in the* database of known good software for the identified file and performing at least one of allowing and preventing the opening of the file from continuing based on the result of the determination. A system for maintaining computer security, comprises a database of known good software, a system for opening a file, a system for identifying the file being opened, a system for determining whether an entry exists in the database of known good software for the identified file and a system for performing at least one of allowing and preventing the opening of the file from continuing based on the result of the determination. A computer recording medium including computer executable code for maintaining computer security, comprises code for providing a database of known good software, code for opening a file, code for identifying the file being opened, code for deteπnining whether an entry exists in the database of known good software for the identified file and code for performing at least one of allowing and preventing the opening of the file from continuing based on the result of the determination.
BRIEF DESCRIPTION OF THE DRAWINGS A more complete appreciation of the present disclosure and many of the attendant advantages thereof will be readily obtained as the same becomes better understood by reference to the following detailed description when considered in connection with the accompanying drawings, wherein: Figure 1 shows a block diagram of an exemplary computer system capable of implementing the method and system of the present application: Figure 2 shows a flow chart of a method for maintaining computer security, according to an embodiment of the present disclosure; Figures 3 A and 3B show a flow chart and schematic diagram respectively illustrating a system and method for maintaining computer security, according to an embodiment of the present disclosure; and Figure 4 shows a schematic diagram illustrating the functioning of a call hook, according to an embodiment of the present disclosure.
DETAILED DESCRIPTION The present disclosure provides tools (in the form of methodologies, apparatuses, and systems) for maintaining computer security. The tools may be embodied in one or more computer programs stored on a computer readable medium or program storage device and/or transmitted via a computer network or other transmission medium. The following exemplary embodiments are set forth to aid in an understanding of the subject matter of this disclosure, but are not intended, and should not be construed, to limit in any way the claims which follow thereaftei . Therefore, while specific terminology is employed Jor the sake of clarity in describing some exemplary embodiments, the present disclosure is not intended to be limited to the specific terminology so selected, and it is to be understood that each specific element includes all technical equivalents which operate in a similar manner. The specific embodiments described herein are illustrative, and many variations can be introduced on these embodiments without departing from the spirit of the disclosure or from the scope of the appended claims. Elements and/or features of different illustrative embodiments may be combined with each other and/or substituted for each other within the scope of this disclosure and appended claims. Software as the term is used herein may include executable instructions (e.g., one or more programs) and/or data that can be stored electronically. An application is a program or group of programs designed for end users and may include systems software and applications software. Virtually all infonnation stored in a computer is stored in a file. There are many different types of files, including data files, text files, program files, directoiy files, etc. In effect, a file is a collection of instructions and/or data that has a name associated to it, called a file name. Figure ] shows an example of a computer system 100 which may implement the method and system of the present disclosure. The system and method of the present disclosure may be implemented in the form of a program running on a computer system, for example, a mainframe, personal computer (PC), handheld computer, server, etc. The program may be stored on a recording media locally accessible by the computer system, for example, floppy disk, compact disk, hard disk, etc., or may be remote from the computer system and accessible via a hard wired or wireless connection to a network, for example, a local area network, or the Internet. The computer system 100 can include a central processing unit (CPU) 102, program and data storage devices 104. a printer interface 106, a display unit 108. a (LAN) local area network data transmission controller 110, a LAN interface 112, a network controller 114, an internal bus 116, and one or more input devices 118 (for example, a keyboard, mouse etc.). As shown, the system 100 may be connected to a database 120, via a link 122. According to an embodiment of the present disclosure, a list of known good software is maintained. The list may be in the form of one or more databases provided remotely and/or locally on the computer system. When a file is opened, the system identifies the file and checks to determine whether an entry for the file exists in the list of known good software. If an entry exists, the system is allowed to proceed opening the file without interference. For example, if the file is an executable program file, the program is allowed to execute. However, if an entry for the files does not exist in the list, the system can monitor the execution of the program so that if the program attempts to perform a suspect action, such as a change to the operating system registry, settings, and/or change of another executable's file, etc., the user can be prompted before the program is allowed to continue. The user is thus able to prevent the process from doing damage to the system. If a program has been allowed to run on the system for some time, the system can automatically add an entry for the file to the list of known good software. A more detailed description of a method for maintaining computer security, according to an embodiment of the present disclosure, will be described with reference to Figure 2. A list (e.g.. one or more databases) of known good software is provided (Step S21). The database may include entries uniquely identifying each piece of software listed in the database. When a file is going to be opened (Step S22) it is identified (Step S23) and compared with entries in the list of known good software (Step S24). Appropriate operations may then be performed on the file (Step S25) depending on whether an entry for the file is in the database for known good software. For example, if the file is a program file, if it is determined that the file corresponds to an entry in the database for known good software (Yes. Step S25). the program can be allowed to freely execute (Step S27). If there is no entry in the database for known good software (No. Step S25), the system can perform an appropriate operation on the file (Step S26) which may include monitoring the program for suspicious activities. For example, as will be described in more detail below, one or more operating system call hooks can be placed and used to monitor the program. According to an embodiment of the present disclosure, when the file is opened the file may be identified by determining a unique value for the file. For example, the unique value may be a hash value generated in accordance with a number of existing methods and technologies, such as one-way hashing techniques (for example, MD5, SHA, etc.), etc. According to another embodiment of the present disclosure, a database of unfamiliar software may be provided. When a file is being opened, the file is identified. It is then determined whether the file is listed in the database of unfamiliar software. Appropriate operations may then be performed on the file depending on whether the file is listed in the database. For example, if it is determined that the file is listed in the database for unfamiliar software and the file is a program file, one or more operating system (OS) call hooks can be placed in the program. Several OS calls may be hooked, including but not limited to, updating the registry, opening files, etc. When the call hook occurs, the execution of the program is halted until it is granted permission to proceed. The operation system call hooks will be described more detail below. According to another embodiment of the present disclosure, the database of unfamiliar software may include timestamp information indicating, for example, how long an entry for each unfamiliar file has been in the database of unfamiliar software (e.g., a date stamp), the number of times an unfamiliar file has been opened and/or the number of times an unfamiliar piece of software has been executed, etc. An embodiment of the present disclosure will be described with reference to Figs 3A and 3B. The operating system 300 opens the file (Step S30) and device driver 301 reads and identifies the file (Step S31). Once the file is identified, checking device 302 queries the database of known good software 303 (Step S32) and deteπnines if there is a corresponding entry in the database of known good software 303. If it is determined that there is an entry for the file in the database of known good software 303 (Yes, Step S33), operating system 300 is allowed to continue opening and utilizing the contents of the file (Step S34). For example, if the file contains an executable, the operating system 300 is allowed to let the executable begin. If it is determined that there is no corresponding entry in the database of known good software 303 (No, Step S33), checking device 302 queries the database of unfamiliar software 304 (Step S35) and determines if there is a corresponding entry in the database of unfamiliar software 304. If an entry is not found (No, Step S36), an appropriate action can be performed (Step S37). For example, a new entry for the file, can be made in the database of unfamiliar software 304. The entry may include information indicating the date the entry was added to the database. If it is determined that there is an entry for the file in the database of unfamiliar software 304 (Yes, Step S36), the operating system is allowed to continue opening the file. However, the system monitors it for suspicious activity. For example, if the file contains an executable, when the process starts, one or more operating system call hooks 305 may be placed and the process is allowed to continue. In addition, if an entry was found in the database of unfamiliar software 304, the date stamp for the file entry can be retrieved (Step S38) and compared with the current date (Step S39). If it is determined that the entry has been in the database for unfamiliar software 304 for a sufficient period of time (e.g.. a month or more) (Yes. Step S40), then the entry information can be moved from the database of unfamiliar software 304 to the database for known good software 303 (Step S42) and the system is allowed to continue opening and utilizing the contents of the file (Step S34). If the entry has not been in the database for unfamiliar software 304 for a sufficient period of time (No, Step S40), an appropriate action can be performed (Step S37). In addition, as mentioned above, entries in the database of unfamiliar software may include the number of times the unfamiliar file has been opened and/or the number of times the unfamiliar piece of software has been executed. These values can be compared with baseline values. If the number is (are) greater than the baseline values, the entry information for the file can be moved from the database of unfamiliar software to the database for known good software. According to various embodiments of the present disclosure, performing an operating system call hook includes notifying a Trojan notification service that the file corresponds to an entry in the database for unfamiliar processes and prompting the user for input about whether the operating system call should be passed along or should fail. If the operating system call is passed along, then the operating system is allowed to proceed with opening the ' file. The OS call hook exists in kemal space and cannot interact with the user. Therefore. according to an embodiment of the present disclosure, a service such as a Trojan notification service may be notified when the call hook occurs. The service may then notify the user via any suitable manner (e.g., email) of the action that is being perfonned. When the user then decides to allow or not allow the action, the user can notify the Trojan notification service. The Trojan notification service can then return this information to the computer system. In response, the operating system can allow the call to pass along or fail accordingly. Figure 4 is a schematic diagram illustrating the functioning of a call hook, according to an embodiment of the present disclosure. Performing an operating system call hook 305 involves "hooking'" a file's operating system calls 401 (e.g., updating the registry, opening files, etc.) and not allowing the operation to continue until allowed. When the operating system call hook 305 occurs, the Trojan notification service 402 is notified. Trojan notification service 402 then perfoπns a user prompt 403, prompting the user of the system for input about whether the operating system call should be allowed. Once the user decides whether to allow or not allow the action, the result is passed back through the Trojan notification service 402 to the operating system call hook 305 which then allows the operating system call to proceed or prevents the operating system from performing the hooked call. Numerous additional modifications and variations of the present disclosure are possible in view of the above-teachings. It is therefore to be understood that within the scope
-3 1 - of the appended claims, the present disclosure may be practiced other than as specifically described herein.
-32-

Claims

What is claimed is:
1 . A method for maintaining computer security, comprising: providing a database of known good software. 5 opening a file: identifying the file being opened; determining whether an entry exists in the database of known good software for the identified file: and performing at least one of allowing and preventing the opening of the file from ] 0 continuing based on the result of the determination.
2. The method of claim 1 , wherein the file comprises an executable file.
3. The method of claim 2, wherein the executable file comprises an application.
15 4. The method of claim 1 , wherein identifying the file being opened comprises determining a unique value of the file, the unique value being a hash value generated according to a hashing algorithm and comparing the unique value to entries in the database of known good software. 0 5. The method of claim 4, wherein the performing at least one of allowing and preventing the opening of the file from continuing comprises allowing the file to continue to be opened if it is determined that the determined unique value corresponds to an entry in the database of known good software.
6. The method of claim 1 , further comprising providing a database of unfamiliar software and determining whether an entry exists in the database of unfamiliar software for the identified file.
7. The method of claim 6, further comprising providing date stamp information for each entry in the database for unfamiliar processes indicating a date on which the entry was first made.
8. The method of claim 6. further comprising providing a value for each entry in the database for unfamiliar software indicating a number of times a file corresponding to the entry was opened.
9. The method of claim 8, wherein the value comprises the number of times an executable in a file has been executed.
10. The method of claim 7, further comprising determining an amount of time an entry has been in the database for unfamiliar processes by comparing the date stamp information with a current date.
1 1 . The method of claim 10, further comprising moving an entry from the database for unfamiliar software to the database for known good software if it is detennined that the entry has been in the database for unfamiliar software for a sufficient period of time.
12. The method of claim 6, further comprising adding an entry to the database of unfamiliar software if an entry for the file being opened is not found in at least one of the database for known good software and the database for unfamiliar software.
13. The method of claim 6, further comprising placing at least one operating system call hook if it is detennined that an entry exists in the database for unfamiliar software.
14. The method of claim 13, wherein the operating system call hook notifies a Trojan notification service that a file conesponds to an entry in the database for unfamiliar software.
15. The method of claim 14, wherein the Trojan notification service prompts a user for input regarding whether the operating system call should be passed along..
16. The method of claim 15, wherein opening of the file is allowed to proceed if the operating system call is passed along.
17. A system for maintaining computer security, comprising: a database of known good software; a system for opening a file; a system for identifying the file being opened: a system for determining whether an entry exists in the database of known good software for the identified file; and a system for performing at least one of allowing and preventing the opening of the file from continuing based on the result of the detennination.
1 8. The system of claim 17, wherein the file comprises an executable file.
19. The system of claim 18, wherein the executable file comprises an application.
20. The system of claim 17, wherein the system for identifying the file being opened comprises a system for detennining a unique value of the file, the unique value being a hash value generated according to a hashing algorithm and a system for comparing the unique value to entries in the database of known good software.
21. The system of claim 20, wherein the system for perfonning at least one of allowing and preventing the opening of the file from continuing comprises a system for allowing the file to continue to be opened if it is determined that the determined unique value corresponds to an entry in the database of known good software.
22. The system of claim 17, further comprising a database of unfamiliar software; and a system for detennining whether an entry exists in the database of unfamiliar software for the identified file.
23. The system of claim 22, further comprising a system for providing date stamp infonnation for each entry in the database for unfamiliar processes indicating a date on which the entry was first made.
24. The system of claim 22, further comprising a system for providing a value for each entry in the database for unfamiliar software indicating a number of times a file corresponding to the entry was opened.
25. The system of claim 24, wherein the value comprises the number of times an executable in a file has been executed.
26. The system of claim 23, further comprising a system for determining an amount of time an entry has been in the database for unfamiliar processes by comparing the date stamp infonnation with a current date.
27. The system of claim 26, further comprising a system for moving an entry from the database for unfamiliar software to the database for known good software if it is detennined that the entry has been in the database for unfamiliar software for a sufficient period of time.
28. The system of claim 22, further comprising a system for adding an entry to the database of unfamiliar software if an entry for the file being opened is not found in at least one of the database for known good software and the database for unfamiliar software.
29. The system of claim 22, further comprising a system for placing at least one operating system call hook if it is detennined that an entry exists in the database for unfamiliar software.
30. The system of claim 29, wherein the operating system call hook notifies a Trojan notification service that a file corresponds to an entry in the database for unfamiliar software.
31 . The system of claim 30, wherein the Trojan notification service prompts a user for input regarding whether the operating system call should be passed along..
32. The system of claim 31, wherein opening of the file is allowed to proceed if the operating system call is passed along.
33. A computer recording medium including computer executable code for maintaining computer security, comprising: code for providing a database of known good software; code for opening a file: code for identifying the file being opened; code for detennining whether an entry exists in the database of known good software for the identified file: and code for perfonning at least one of allowing and preventing the opening of the file from continuing based on the result of the determination.
34. The computer recording medium of claim 33, wherein the file comprises an executable file.
35. The computer recording medium of claim 34, wherein the executable file comprises an application.
36. The computer recording medium of claim 33, wherein the code for identifying the file being opened comprises code for determining a unique value of the file, the unique value being a hash value generated according to a hashing algorithm and code for comparing the unique value to entries in the database of known good software.
37. The computer recording medium of claim 36, wherein the code for performing at least one of allowing and preventing the opening of the file from continuing comprises code. for allowing the file to continue to be opened if it is detennined that the detennined unique value conesponds to an entry in the database of known good software.
38. The computer recording medium of claim 33, further comprising code for providing a database of unfamiliar software and code for determining whether an entry exists in the database of unfamiliar software for the identified file.
39. The computer recording medium of claim. 38, further comprising code for providing date stamp infonnation for each entry in the database for unfamiliar processes indicating a date on which the entry was first made.
40. The computer recording medium of claim 38. further comprising code for providing a value for each entry in the database for unfamiliar software indicating a number of times a file conesponding to the entry was opened.
41 . The computer recording medium of claim 40, wherein the value comprises the number of times an executable in a file has been executed.
42. The computer recording medium of claim 39, further comprising code for detennining an amount of time an entry has been in the database for unfamiliar processes by comparing the date stamp infonnation with a current date.
43. The computer recording medium of claim 42, further comprising code for moving an entry from the database for unfamiliar software to the database for known good software if it is determined that the entry has been in the database for unfamiliar software for a sufficient period of time.
44. The computer recording medium of claim 38, further comprising code for adding an entry to the database of unfamiliar software if an entry for the file being opened is not found in at least one of the database for known good software and the database for unfamiliar software.
45. The computer recording medium of claim 38, further comprising code for placing at least one operating system call hook if it is detennined that an entry exists in the database for unfamiliar software.
46. The computer recording medium of claim 45, wherein the operating system call hook notifies a Trojan notification service that a file corresponds to an entry in the database for unfamiliar software.
47. The computer recording medium of claim 46, wherein the Trojan notification service prompts a user for input regarding whether the operating system call should be passed along..
48. The computer recording medium of claim 47, wherein opening of the file is allowed to proceed if the operating system call is passed along.
PCT/US2004/012626 2004-04-22 2004-04-22 Methods and systems for computer security WO2005114414A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/US2004/012626 WO2005114414A1 (en) 2004-04-22 2004-04-22 Methods and systems for computer security
EP04822016A EP1743228A1 (en) 2004-04-22 2004-04-22 Methods and systems for computer security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/US2004/012626 WO2005114414A1 (en) 2004-04-22 2004-04-22 Methods and systems for computer security

Publications (1)

Publication Number Publication Date
WO2005114414A1 true WO2005114414A1 (en) 2005-12-01

Family

ID=34957702

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2004/012626 WO2005114414A1 (en) 2004-04-22 2004-04-22 Methods and systems for computer security

Country Status (2)

Country Link
EP (1) EP1743228A1 (en)
WO (1) WO2005114414A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007015946A2 (en) * 2005-07-28 2007-02-08 Advanced Micro Devices, Inc. Verifier computing environment for personal internet communicator
EP2157525A1 (en) * 2008-08-21 2010-02-24 Siemens Enterprise Communications GmbH & Co. KG Method for recognising malware
WO2011112348A1 (en) * 2010-03-08 2011-09-15 Raytheon Company System and method for host-level malware detection
US8863279B2 (en) 2010-03-08 2014-10-14 Raytheon Company System and method for malware detection
US9009820B1 (en) 2010-03-08 2015-04-14 Raytheon Company System and method for malware detection using multiple techniques

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1227386A1 (en) * 2001-01-30 2002-07-31 International Business Machines Corporation Access control for computers
US20020174359A1 (en) * 2001-02-14 2002-11-21 Haltmeyer John M. Thorough operation restriction
US20030163510A1 (en) * 2002-02-28 2003-08-28 Bob Janssen Method of administering user access to application programs on a computer system
US20030217352A1 (en) * 2002-03-22 2003-11-20 Kouji Ueno Script processing apparatus, script processing method, and script processing program
US20040039921A1 (en) * 2000-10-17 2004-02-26 Shyne-Song Chuang Method and system for detecting rogue software

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040039921A1 (en) * 2000-10-17 2004-02-26 Shyne-Song Chuang Method and system for detecting rogue software
EP1227386A1 (en) * 2001-01-30 2002-07-31 International Business Machines Corporation Access control for computers
US20020174359A1 (en) * 2001-02-14 2002-11-21 Haltmeyer John M. Thorough operation restriction
US20030163510A1 (en) * 2002-02-28 2003-08-28 Bob Janssen Method of administering user access to application programs on a computer system
US20030217352A1 (en) * 2002-03-22 2003-11-20 Kouji Ueno Script processing apparatus, script processing method, and script processing program

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
SANDHU R S ET AL: "ACCESS CONTROL: PRINCIPLES AND PRACTICE", IEEE COMMUNICATIONS MAGAZINE, IEEE SERVICE CENTER. PISCATAWAY, N.J, US, vol. 32, no. 9, 1 September 1994 (1994-09-01), pages 40 - 48, XP000476554, ISSN: 0163-6804 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007015946A2 (en) * 2005-07-28 2007-02-08 Advanced Micro Devices, Inc. Verifier computing environment for personal internet communicator
WO2007015946A3 (en) * 2005-07-28 2007-05-18 Advanced Micro Devices Inc Verifier computing environment for personal internet communicator
GB2442918A (en) * 2005-07-28 2008-04-16 Advanced Micro Devices Inc Verifier computing environment for personal internet communicator
US7636780B2 (en) 2005-07-28 2009-12-22 Advanced Micro Devices, Inc. Verified computing environment for personal internet communicator
EP2157525A1 (en) * 2008-08-21 2010-02-24 Siemens Enterprise Communications GmbH & Co. KG Method for recognising malware
WO2011112348A1 (en) * 2010-03-08 2011-09-15 Raytheon Company System and method for host-level malware detection
US8468602B2 (en) 2010-03-08 2013-06-18 Raytheon Company System and method for host-level malware detection
US8863279B2 (en) 2010-03-08 2014-10-14 Raytheon Company System and method for malware detection
US9009820B1 (en) 2010-03-08 2015-04-14 Raytheon Company System and method for malware detection using multiple techniques

Also Published As

Publication number Publication date
EP1743228A1 (en) 2007-01-17

Similar Documents

Publication Publication Date Title
US10291634B2 (en) System and method for determining summary events of an attack
US8001606B1 (en) Malware detection using a white list
US8239944B1 (en) Reducing malware signature set size through server-side processing
US9467465B2 (en) Systems and methods of risk based rules for application control
AU2019246773B2 (en) Systems and methods of risk based rules for application control
US9092823B2 (en) Internet fraud prevention
US8381298B2 (en) Malware detention for suspected malware
EP2754081B1 (en) Dynamic cleaning for malware using cloud technology
US8719924B1 (en) Method and apparatus for detecting harmful software
US9015829B2 (en) Preventing and responding to disabling of malware protection software
US20140020104A1 (en) System and Method of Opportunistically Protecting a Computer from Malware
US20060130144A1 (en) Protecting computing systems from unauthorized programs
US20150163234A1 (en) System and methods for protecting computing devices from malware attacks
Patyal et al. Multi-layered defense architecture against ransomware
US8239946B2 (en) Methods and systems for computer security
WO2005114414A1 (en) Methods and systems for computer security
Dai et al. Mapmon: A host-based malware detection tool
Wu et al. Self-healing spyware: detection, and remediation
Kaur Network Security: Anti-virus.
US20230229792A1 (en) Runtime risk assessment to protect storage systems from data loss
US20230418933A1 (en) Systems and methods for folder and file sequestration
Wu et al. Examining Web-based spyware invasion with stateful behavior monitoring
Major A Taxonomic Evaluation of Rootkit Deployment, Behavior and Detection
Mishra How do Viruses Attack Anti-Virus Programs
Heasman Rootkit threats

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): BW GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

WWW Wipo information: withdrawn in national office

Country of ref document: DE

WWE Wipo information: entry into national phase

Ref document number: 2004822016

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 2004822016

Country of ref document: EP