Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Systems and methods for verifying trust of executable files

A technology for executing files and credibility, which is applied in transmission systems, digital transmission systems, electrical components, etc., and can solve problems such as document destruction of integrity verification, invalidation of initial credibility verification estimates, etc.

Active Publication Date: 2008-03-05
MICROSOFT TECH LICENSING LLC
View PDF1 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Worse, files whose integrity is verified at install time can be corrupted after installation, invalidating any initial confidence verification estimates
Furthermore, today's computer systems have no built-in mechanism for distinguishing between trusted and suspicious or malicious executable object code

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Systems and methods for verifying trust of executable files
  • Systems and methods for verifying trust of executable files
  • Systems and methods for verifying trust of executable files

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0010] Overview

[0011] Systems and methods for verifying the trustworthiness of executable files address conventional code integrity verification techniques and stand-alone (non-integrated) malware proofing techniques by providing a comprehensive trustworthiness verification tool integrated into an operating system (OS). test limits. The authenticity verification tool includes a plurality of authenticity verifiers that are automatically invoked when an executable file is loaded into the system, and when code is mapped into memory for execution. Each of these credibility verifiers determines whether the executable code is from a trusted source (e.g., code signed by a trusted certificate authority), and further evaluates the executable code to find out Trojan horses (code integrity), viruses, spies software, and / or other types of known malware. Known malware is malware associated with known malware signatures or other known malware characteristics.

[0012] The system and m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Systems and methods for validating integrity of an executable file are described. In one aspect, the systems and methods determine that an executable file is being introduced into a path of execution. The executable file is then automatically evaluated in view of multiple malware checks to detect if the executable file represents a type of malware. If the executable file represents a type of malware, a protection path is implemented.

Description

technical field [0001] This disclosure relates to data authentication and verification. Background technique [0002] Executable files (such as binary images, object code, portable executables (PE), macros, Visual Basic Scripting (VBS)-like scripts, etc.) are dangerous to run on a computer when the computer contains a virus or Trojan horse. A virus is a program or code that alters a binary image on a disc, especially against the user's will and without the user's knowledge. Viruses can also replicate themselves. Simple viruses that continuously replicate themselves are relatively easy to generate. Even simple viruses are dangerous because they can quickly use up all available memory and bring down the system. Some viruses can transmit themselves over a network and bypass security systems. Unlike viruses, Trojan horses do not replicate themselves but they can be destructive, often masquerading as benign applications that can be launched by trusted users. One type of Troj...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F11/00G06F15/18G06F12/14G06F11/30G06F12/16H04L9/00
CPCG06F21/56G06F21/51G06F12/14G06F9/00G06F16/17
Inventor M·卡拉莫K·D·雷P·英格兰S·A·费尔德J·D·舒沃茨
Owner MICROSOFT TECH LICENSING LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products