Due to their enormous code-base, client side network applications have become a significant risk to the operating system and their users. Unfortunately, signature based antivirus and intrusion detection systems are ineffective in preventing new attacks. In addition, current application sandboxing mechanisms are either not strong enough or hard to deploy to the end user's desktop.
Currently, network applications have become the new attack vector posing significant risk to end-user's computing environment. These applications increasingly operate on untrusted sources of data and code. For example, a typical user uses a web browser for multiple tasks such as: reading news, performing on-line banking, shopping on-line or playing on-line games, all in the same session. If any of the web sites visited by the user hosts malicious software, the web browser or the user's computer may become compromised. Once compromised, the user may lose control to a malicious remote controller who can use the computer as he wishes. Typical cases of malware can transform the infected computer into a remotely controlled bot as part of a larger bot collective. Spam, hosting malicious software, stealing personal and sensitive data including user IDs and passwords for banking sites are just a few among many observed uses of infected machines.
This kind of attack is called an intra-application attack because it uses just one application. Cross-site scripting attacks belong to this class and one recent example happened on Gmail. Drive-by downloading is another common intra-application attack for web browsers, and researchers from Google have found many malicious URLs containing drive-by downloads on the Internet.
Another kind of attack is inter-application attacks which utilizes more than one application. In this case, the attacker can put the malicious content in a video file and allure the user to open it. Since Windows Media player uses Internet Explorer (IE) as the browser, even if the user installed Firefox as the default browser, the malicious video file can exploit the vulnerabilities of IE without the user's knowledge.
Standard defenses against these Internet-borne attacks employ antivirus software, personal firewalls, spyware detectors, and intrusion detection systems. Anti-virus software and IDSs are normally signature based and can detect known attacks. However, they are inefficient in detecting new attacks and dealing with polymorphic viruses. Personal firewalls are susceptible to being disabled by kernel-level rootkits.
Sandboxing is another method to protect the end user's computer. Different levels of sandboxing are feasible, ranging from language software fault isolation, process level system call mediation, to hardware virtualization. Unfortunately, language and process level sandboxing are susceptible to bypass, and current hardware virtualization sandboxing, such as the Tahoma system, separates the applications as well as the data that they usually share, therefore sacrificing usability. In addition, the Tahoma browser needs help from the web server, only protects the browser applications and is hard to deploy.
What is needed is a clean and isolated environment for instances of network applications to run in combination with a detection mechanism that can detect, act upon and report unauthorized intrusions into the isolated environment.
Embodiments of the present invention provide a clean and isolated environment for network applications and instances of network applications by using two levels of virtualization technologies. Embodiments ensure the network applications always start in a clean environment and restore the environment to its pristine state once malicious software is detected. A detection mechanism runs outside of light-weight virtualization to detect the intrusions. Some embodiments support diverse network applications, such as web browser, email client, instant messaging and so on. Evaluations of realized embodiments have shown show that they can prevent network attacks with low overhead and that users do not need to sacrifice performance for security.
To protect intra and inter-application attacks from the Internet, embodiments of the present invention uses a system architecture, called Internet Cleanroom which creates a clean virtual environment, called a Cleanroom, on-demand for the applications and instances of applications with low overhead and acceptable performance. Internet Cleanroom was designed with the following properties in mind: being able to isolate every instance of applications; being able to isolate different applications; ensuring that the Cleanroom is always clean; and providing usage transparency.
Being able to isolate every instance of applications: Every instance of an application may have its own Cleanroom. This can prevent intra-application attacks. It can be especially important for web browsers, so that a user can run different web applications such as on-line banking and on-line gaming in different Cleanrooms. Even if the on-line gaming website contains some malicious contents, it will not affect the on-line banking session.
Being able to isolate different applications: This property prevents inter-application attacks. With Internet Cleanroom, different applications run in their own Cleanrooms. Embodiments build virtual environment for browser, office and email client respectively, and may add other applications. In the office Cleanroom, there is no browser installed, so that the risks for inter-application attacks are minimized.
Ensure the Cleanroom is always clean: This property may be achieved using a detection mechanism (such as an anomaly detection mechanism) to detect unauthorized changes to the Cleanroom. Since the initial state of the Cleanroom is provided, the system knows what the clean state is and may assume that anything else is potentially malicious. This method should detect day zero attacks that will be missed by signature based detection mechanism. Once unauthorized changes are detected, the Cleanroom may be restored to its pristine state to easily remove the malware. At the same time, persistent storage may be provided for the Cleanroom to let the user save data persistently. Semi-persistent storage may also be provided to keep normal configuration data automatically, such as browser bookmarks.
Provide usage transparency: This property may be achieved by deploying an Internet Cleanroom such that it is tightly integrated into the user's desktop. The user experience while using the system may be the same as or very close to the standard desktop environment.
These properties are intended to make sure that exploit to one application will not affect other applications and the host. Complex applications such as a browser may be divided into multiple instances and separated from each other. Also, the virtual environment may be initialized to a clean state and restored to this clean state once unauthorized changes are detected.
Contributions of current embodiments of the present invention include a system architecture which has the following properties: 1) a strong isolation between Internet applications and the host OS; 2) support the commercial Internet applications so that user can still use their favorite applications; 3) deployment on commercial operating systems; 4) a detection module to detect unauthorized changes, and 5) tight integrate into a users' desktop.
A prototype embodiment 200 was built to demonstrate an embodiment of the present invention. It used VMware workstation (available from VMWARE Inc. of Palo Alto, Calif. on Windows XP (available from Microsoft Corp. of Redmond, Wash.) as hardware level virtualization to separate applications from the host OS. It also used OpenVZ for Linux (available through on the web at “openvz dot org”) as light weight virtualization that runs on top of the VMware virtual machine to separate different applications and instances of applications. Thus, this prototype embodiment showed that the Internet Cleanroom not only provided a strong isolation between Internet applications and the user's desktop but also is scalable to a multitude of applications running at the same time. The prototype embodiment 200 also included an anomaly detection module to monitor the state of the Cleanroom. Once it detected unauthorized changes, it alerted the user to restore the Cleanroom to its pristine state. Security and performance of the Internet Cleanroom were evaluated. In 2000 malicious websites that compromised a normal Windows operating system, none of them compromised the prototype embodiment 200, and the performance of the prototype embodiment 200 was acceptable.
This section describes virtualization technologies that may be used to implement embodiments of the present invention, including: VMware workstation and OpenVZ, and stackable file system—aufs.
There are different levels of virtualization technologies, from the lowest hardware level virtualization such as VMware Workstation and Xen (available on the web at “zen dot org”), to operating system virtualization as OpenVZ (available on the web at “openvz dot org”) and Solaris Zones (available from Sun Microsystems, Inc. of Santa Clara, Calif.), to process virtualization as Java virtual machine. Hardware level virtualization virtualizes hardware resources (CPU, memory and hard disk etc) so that it can run Linux on top of Windows OS. The software layer may provide virtualization called a virtual machine monitor or hypervisor. A hypervisor can run on bare hardware (Type 1 or native VM) or on top of an operating system (Type 2 or hosted VM). One embodiment uses VMware workstation, a Type 2 VM for Internet Cleanroom. The OS running inside the virtual machine is called the guest OS, and the original OS is called host OS. The virtual machine monitor provides the separation between the guest OS and the host OS. So even if the guest OS kernel is compromised, the malware will still need to penetrate the virtual machine monitor to infect the host OS. This property is called strong isolation.
The OS level virtualization virtualizes the resources on an operating system level. It may use a single OS kernel to provide an illusion of multiple operating systems for the user level applications. Each is called a virtual environment (VE) or a container. All the containers and the host may share the single kernel. The OS kernel may provide separation between different containers and between the containers and the host. An advantage of OpenVZ and other operating system virtualization solutions is the performance when compared to hardware virtualization, because they do not require a hypervisor instruction trapping or a separate kernel. A disadvantage may be that all the containers may share a single kernel and if the kernel crashes or is compromised, then all the VEs may be compromised.
Stackable file system, unionfs and aufs will now be discussed. Unionfs was first presented by researchers at Stony Brook University. It is a stackable file system on Linux that can merge a set of directories (called branches) into a single logical view. Each branch has a priority and may be read-only or read-write. While the highest priority branch is writable, Unionfs provides copy-on-write semantics for read-only branches. Aufs (available on the web at aufs “aufs dot sourceforge dot net”), is an open source project which shares the basic features of Unionfs but is re-designed and re-implemented to be more reliable.
For example, suppose there are three directories, named rr, ww and zz. Rr contains file r, ww contains file w and zz is empty. Next mount rr as read-only and ww as read-write to zz; the zz directory then contains r and w file (the union view of rr and ww directory). If a new file is created inside zz directory, it will also show up in ww directory too because it is read-write. If one writes to r file which is inside a read-only layer, unionfs (or aufs) system will copy it to read-writer layer (ww) and write to it.
Aufs may be used to create containers on-the-fly. Further details are discussed later in this disclosure.
A goal of embodiment(s) of the present invention is to seamlessly virtualize vulnerable network applications and their instances in pristine single-use operating systems, while providing data persistence as required. To achieve this, a virtual environment is provided for networked applications while re-directing local executions of networked applications to the virtual environment. The virtual environment may be pre-configured for each network application and instances of application. Requirements and a design of an embodiment will now be described.
There are different levels of virtualization technologies, from the lowest hardware level virtualization such as VMware Workstation and Xen, to operating system virtualization as OpenVZ and Solaris, to process virtualization as Java virtual machine. Normally, the lower the level is the stronger isolation it can provide. On the other hand, the higher level tends to have lower overhead than the lower level. For the currently described embodiment, it was desired to have both strong isolation properties to protect the user's desktop and applications 170 and also a low overhead to run a multiple of applications (161, 162, . . . 169) on one physical machine 110. (See
Referring to
The detection module 280 will now be discussed. The function of the detection module 280 is to detect any unauthorized changes inside a container (251, 252, 253, . . . , 259). Although strictly speaking, the detection module 280 may not be needed, it can be useful for providing information to the user if a container (251, 252, 253, . . . , 259) has been infected. Since the container (251, 252, 253, . . . , 259) for each application container (261, 262, 263, . . . , 269) may be preconfigured and customized, it is feasible to use anomaly detection to detect any unauthorized changes. Other types of change detection may be used. In addition, the detection module 280 may exclude legal changes such as the cache and cookies generated by the browser applications. Once unauthorized changes are detected, the user may be notified to discard the current container (251, 252, 253, . . . , 259) and create a new one. This step could be automated so that a user is not relied upon to keep a Cleanroom clean.
Persistent Storage 275 will now be discussed. Normally, the whole container (251, 252, 253, . . . , 259) is usually discarded after its usage, no information is kept for that container (251, 252, 253, . . . , 259) after it terminates. This may cause some problems if the user wants to save some data from the current session, such as downloaded documents from the browser. To address this issue, the concept of persistent storage 275 is introduced for temporary containers (251, 252, 253, . . . , 259). Persistent storage 275 may be set up as a shared directory on the file system of a host operating system 220 or a networked file system for the user to store documents linked to the temporary containers (251, 252, 253, . . . , 259). To address the security requirement that malicious code or intruders in the containers (251, 252, 253, . . . , 259) not be granted unfettered access to the host operating system 220, the portion of the host operating system 220 visible to the container (251, 252, 253, . . . , 259) may be restricted to only to the persistent storage directory 270. This should limit the access of a malicious or compromised container (251, 252, 253, . . . , 259) to only the persistent storage directory 275. However, since the container (251, 252, 253, . . . , 259) has visibility to this directory, the contents of this directory may be made to be short-lived by moving any files stored in the directory to permanent storage on the user's host machine 210, for example in the user's My Documents profile directory.
This approach ensures users can save documents from the temporary containers (251, 252, 253, . . . , 259) on to the host machine 210 in a temporary location while not exposing the rest of the host operating system 220 to untrusted containers (251, 252, 253, . . . , 259). Users define the locations of the temporary and permanent directories for persistent storage 275.
Browser containers and semi-persistent storage will now be discussed. Normally, one application corresponds to one container, such as email client, instant messaging and office applications. But some applications such as browser applications may be separated into multiple containers because the browser can be used for different purposes. Two classes of browser applications may be distinguished, one class is private or financial related, such as on-line banking. The other class is public and non-financial related, such as reading news. One container may be provided for all the public browsing activities while providing individual containers for every link belonging to private browsing. The private containers may be pre-configured and have their own directories for cookies, history and browser passwords. This process can prevent cross-site scripting on the client side, because the malicious links, which come from public containers, run in a different container from the private links and has no information about cookies and history of private links. These are called private links security bookmarks and may be used to ensure that the public containers do not visit these security bookmarks.
Residual risks/mitigations will now be discussed. The disclosed approach depends on the assumption that malware won't escape the container and the virtual machine and execute on the host OS 220 directly. The OS level virtualization layer provides and enforces separation between processes (261, 262, 263, . . . , 269) assigned to the container (251, 252, 253, . . . , 259). The hardware level virtualization provides additional separation between the containers (251, 252, 253, . . . , 259) and the host operating system 220. If the implementation of the OS level virtualization is flawed, the malware may compromise other containers (251, 252, 253, . . . , 259) and the virtual machine 230, which is the host for all the containers (251, 252, 253, . . . , 259). If the implementation of hardware level virtualization is flawed, it may be possible for a guest process to access memory of host processes. As a result, the separation and memory management of the virtualization layer may be a lynchpin for the isolation properties of the virtualization. In a similar vein, many virtualization solutions offer a set of virtualization services, such as the ability to share directories, access hardware I/O devices, copy and paste between windows, among others. These services are the common target of malicious guest processes to obtain privileges on the host, also known as “escaping the VM.” In these cases, Internet Cleanroom may not protect the host.
What is important to consider in this discussion is the frequency of these vulnerabilities being found. A risk management approach is to deploy technologies that are not necessarily infallible, but less likely to be defeated. The attack surface area, or the space of vulnerabilities presented to attackers, attributable to the virtualization-based solution is significantly less than that presented by buggy applications and operating systems. The reason is the interface to the virtualization software is highly constrained compared to the interface presented by applications and the operating system. As a result, the frequency with which vulnerabilities will be presented to attackers will be significantly less in virtualization software compared to those of applications. Of course only time will reveal the actual frequency distribution. Prior history, however, shows orders of magnitude of differences in these two types of vulnerabilities, i.e., thousands of vulnerabilities of high severity in applications and operating systems per year vs. single digit vulnerabilities in virtualization software.
In this section, an embodiment is disclosed for a Microsoft® Windows XP host 220 and a Linux guest 240. VMware workstation may be used for Windows, and OpenVZ run for the Linux inside the VMware virtual machine. The three major components are the VM control console 292, detection module 280 and a container control module 291. The VM control console 292 runs on the Windows host 220 and is configured to start and stop the VMware VM 230. The container control module 291 does the similar thing for containers (251, 252, 253, . . . , 259), and is configured to create containers (251, 252, 253, . . . , 259) on-the-fly. The detection module 280 monitors file changes of a container (251, 252, 253, . . . , 259). It runs outside the container (251, 252, 253, . . . , 259) to resist the attacks inside the container (251, 252, 253, . . . , 259). Following are design details of each component.
The VM control module 292 uses VMware VIX API to start, stop and revert the VM. It accepts user input and communicates with container control module 291 when it is necessary to create a new container (251, 252, 253, . . . , 259). From the Windows host 220, VMware VM is just one process. Windows host 220 should not access the files in the VM directly. Next, Ubuntu and OpenVZ may be installed inside the VMware VM. Since OpenVZ is an operating system level virtualization, Linux host can easily use ls and ps command to access files and processes inside a container (251, 252, 253, . . . , 259).
Container control module 291 may be a perl script which receives message from VM control module 292 and use aufs to create containers (251, 252, 253, . . . , 259) on-the-fly.
The detection module 280 will now be discussed. Detection module 280 runs on the Linux host 240, outside the container. It may be another perl script which periodically scans the 101-cache directory and uses an exclusion list to exclude normal file changes such as when the container is booted up. Anything else may be treated as an unauthorized change. Once changes are detected, the detection module 280 may generate an alarm message and send it to the VM control console 292 to alarm the user.
Persistent storage 275 and semi-persistent storage will now be discussed. Persistent storage 275 may be used for the user to save file data persistently, such as downloaded files. To provide usage transparency, VMware shared folder feature may be used to allow the user access to files in the PS from the Windows host 220. All the containers (251, 252, 253, . . . , 259) may share the same PS directory, so that a document file downloaded by a Firefox container can be opened by an OpenOffice container.
Semi-persistent storage may also be used and is also persistent so that files in it will survive a container termination. The difference of SPS from PS is that SPS may be used for application specific configuration or preferences files which the user does not modify and save directly. Typical examples of SPS are the cookies, bookmarks, passwords and history of a Firefox browser. The user may add bookmarks and let the browser remember the passwords through the Firefox GUI. The files for these settings may be determined and then put it into SPS.
Public browsers and secure bookmarks will now be discussed. As mentioned earlier, private container(s) may be provided for link(s) in a secure bookmark folder and a public browser container for public browsing. All these browser containers may share a single PS. For SPS, each private container may have its own SPS, so that the sensitive cookies, history and password are not shared between containers. Special icons may be setup for each private link on the user's Windows desktop, to enable the user to just double click the special icon to ensure a private browsing session.
Experimental evaluation results of a prototype embodiment 200 are now disclosed. The evaluation contains two parts: 1) the overhead and performance and 2) the effectiveness of the prototype embodiment 200 against some common attacks for browsers.
The test-bed was a Dell Dimension 9200 workstation, with Dual-core 2.4 GHz CPU and 2 GB memory. For the prototype embodiment 200, it had one virtual machine installed with 256 MB virtual memory and 1 GB virtual hard disk. The host OS 220 was Window XP home edition, and the guest OS 240 was Ubuntu server 7.10. In the Ubuntu, OpenVZ was installed and two container templates 293 built, one for public browsing with Firefox, and the other for OpenOffice.
The prototype embodiment 200 was compared to a native application and a pure VMware VM (VVM) process which use a virtual machine for each application. For VVM process a basic virtual machine was first created that takes 719 MB disk space and 128 MB memory. A VMware linked clone process was then used to create a small clone of the basic operating system. Linked clone means the new virtual machine uses the original virtual hard disk and only saves the difference to a new virtual hard disk. This process did not need to copy the entire hard disk for every VM.
The overhead of hard disk. For the prototype embodiment 200, the initial VM took a 1G hard disk which contained Ubuntu, an OpenVZ template for the browser container and an OpenOffice container. Every new container consumed used very few bytes of hard disk on the Windows host because the prototype embodiment 200 used aufs to share the basic operating system as read-only among all the containers. The small increase such as new files generated as container bootups did not incur more hard disk usage on the Windows host.
For the VVM process, each virtual machine generated a .vmem file with the same size as the physical memory (128 MB in this test) of the virtual machine, so it took 144M (128+16) for each virtual machine. The 16 MB disk space was the new virtual hard disk. This number could have increased if the virtual machines keep using and the user downloads big files. The result is shown in
Second, the memory usage was measured. The result is shown in
Third, the maximum number of concurrent Firefox applications was tested with each of Firefox applications residing in its own container in the prototype embodiment 200 or VM in the VVM process. For the prototype embodiment 200, twenty containers, each of them running a Firefox browser, were started. The memory usage on the host remained the same at 297 MB. As more memory was allocated to the underlying VM, more containers and Firefox could be started. For the VVM process, it was possible to start fifteen virtual machines with Firefox at the same time and the memory usage on the host was almost exhausted.
The startup delay for starting the Firefox browser in different setups was measured, the results of which are shown in the table labeled
For the VVM process, the warm-start Firefox meant that the virtual machine was running and that the user wanted a new clean virtual machine for Firefox. The VVM process then reverted the virtual machine and started a new Firefox. This took an average of 9.1 seconds, which was 3 times longer than specializing a pre-configured browser. For a cold-start Firefox, the file cache was not warm and took an average of 23.2 seconds, which was 1.6 times longer than to revert the VM and start a browser in the prototype embodiment 200.
The last two rows in the
To measure network throughput, a 3 GB large file was downloaded and the output redirected to /dev/null to remove the bottle neck of the relatively slow hard disk. The tests were repeated three times and the results averaged. Also, to minimize the effect of variability in network traffic between tests, the server and the client were both on a local network. The results are shown in the table labeled
To evaluate the security of the prototype embodiment 200, both a browser running on the prototype embodiment 200 and a native Firefox browser on Windows were run to visit a set of potential malicious websites. For the prototype embodiment 200, the detection module 280 was used to detect whether there was a malicious download. For native Firefox on Windows, Capture honey client was used to detect unauthorized changes. The results are shown in the table labeled
So far, a system to protect the network applications by running each application or instance of application in its own virtual environment sandbox was disclosed. A prototype which uses two levels of virtualizations and provides both a strong isolation and a small running overhead was built and described. By running OS level virtualization (OpenVZ) on top of hardware level virtualization (VMware workstation), the disk and memory overhead for hardware level virtualization was significantly reduced. In addition, a detection module was used to detect the unauthorized changes for each container so that it was possible to know when to destroy the sandbox and start a new one. The overhead and performance of the prototype embodiment 200 was compared with a pure virtual machine based process and the native application. The results show that the prototype embodiment 200 is more scalable in number of sandboxes than a pure virtual machine process and that the performance is acceptable.
Additionally, the detection module may be to detect malicious process and memory-only changes. Addition, connections between private browsers and the public browser may be restricted.
Each of the distributed application processors 810 include virtualized network applications such as a web browser. The user drives these applications. When it is determined that a virtualized application has been compromised, the activity that lead to that compromise may be recorded and the application killed (i.e. the canary dies) and may then be restored to a pristine state. The recorded activity 820 (shown individually as activity reports 921, 922, 923, . . . , 929) is sent through the network 901 to a central collection network appliance 830 where they can be stored in a repository of activities for infected devices 840. This system, when operated with a large number of distributed application processors 810 should enable the collection of statically significant results, including malicious URL's.
The central collection network appliance 830 may be configured to analyzes activity report(s) 820. Among other items, the analysis may be determine many types of useful data points, metrics and other information such as new trigger events and filter data 845. These new trigger events and filter data 845 may be downloaded for use by distributed application processor(s) 810. This collected information 845 may be used to update more traditional cyber security mechanisms throughout the network 901 such as firewalls, virus protection software or network traffic appliances. Examples of network traffic appliances include TPC/IP filters and routers, hardware firewalls and network intrusion systems.
The virtual machine monitor is configured to operate on a hardware computing machine under control of a host operating system.
Containers (951, 952, . . . , 959) are preferably configured to operate in a protected memory space (941, 942, . . . , 949) under control of a guest operating system virtual machine 932. When created each of the containers (951, 952, . . . , 959) may be initialized with a copy of a network application template 920. Each of the network application template(s) preferably includes a modifiable section 922 and a non-modifiable section 924. Additionally, each of the containers (951, 952, . . . , 959) may be configured to have a file system (971, 972, . . . , 979) and a network address (961, 962, . . . , 969).
There can be several types of containers. For example container may be private or public. Private containers may be configured to have private semi-persistent storage. Public containers may be configured to access persistent storage.
Container(s) (951, 952, . . . , 959) may reside in many locations. For example, Container(s) (951, 952, . . . , 959) may reside locally on the computing hardware 910, or on external storage mediums such as a flash drive.
To minimize the probability of a successful attack on the application processor, it may be advantageous to configure the guest operating system 918 and host operating system 912 differently. For example, in one embodiment, the host operating system 912 may be windows and the guest operating system 918 may be Linux. Likewise, another embodiment may use OSX as the host operating system 912 and windows as the guest operating system 918.
The detection module 930 is preferably configured to operate under control of the guest operating system virtual machine 932.
The trigger detection module 1020 is preferably configured to monitor activity 1010 from container(s) for a trigger event 1030. Trigger events may include, but not limited to: unauthorized changes to the a non-modifiable section; registry writes; the start of new processes; web sites visited; redirected URL's; infection details; event timelines; network connections; file system writes; and configuration changes.
The logging module 1040 is preferably configured to write activity 1010 to an activity report(s) 1050 in response to the trigger event 1030. Activity report(s) 1050 may include, but are not limited to: unauthorized changes to the a non-modifiable section; registry writes; the start of new processes; web sites visited; redirected URL's; infection details; event timelines; network connections; file system writes; and configuration changes. The logging may correlate unauthorized events with URLs. The logging module 1040 may correlate changes to the current opening or last visited URL(s). The activity report may be searchable by many variables including, but not limited to: MD5 hash values; time intervals; web sites; hosts; process names; and remote connections.
The container command module 934 is preferably configured to conditionally issue container commands 1060 in response to the trigger event(s) 1030. The container commands 1060 include, but are not limited to, container stop commands, container revert commands and container start commands.
The virtual machine control console 914 is preferably configured to operate under control of the host operating system 912 and to start and stop the hardware virtual machine monitor 916.
To make the application processor 900 user friendly, it may be advantageous to make several configurations to minimize the fact that applications (981, 982, . . . , 989) are being run in containers (951, 952, . . . , 959). For example, the application processor 900 may be configured to have the container output displayed by the host operating system 912. Likewise, virtual machine windows may be hidden.
The container control module 934 is preferably configured to operate under control of the guest operating system virtual machine 932. This module should execute the container commands. For example, it should start a container in response to a container start command, stop a container in response to a container stop command and to revert a container in response to the container revert command Container commands can come from multiple sources including the detection module 930 or the host operating system 912. The source of commands may be explicitly limited to enhance security.
The network communications module 936 is preferably configured to transmit activity reports (such as 921, 922, . . . , 929) over network 901.
Additionally, the application processor 900 may include a shared persistent directory 938 configured to operate under control of the host operating system 912. This shared directory may be set to accessible by select container(s) (951, 952, . . . , 959). In some embodiments, access to the shared directory 938 may be limited.
In this specification, “a” and “an” and similar phrases are to be interpreted as “at least one” and “one or more.”
Many of the elements described in the disclosed embodiments may be implemented as modules. A module is defined here as an isolatable element that performs a defined functions and has a defined interface to other elements. The modules described in this disclosure may be implemented in hardware, software, firmware, wetware (i.e. hardware with a biological element) or a combination thereof, all of which are behaviorally equivalent. For example, modules may be implemented as a software routine written in a computer language (such as C, C++, FORTRAN, Java, Basic, Malta or the like) or a modeling/simulation program such as SimuLink, Stateflow, GNU Octave, or LabVIEW MathScript. Additionally, it may be possible to implement modules using physical hardware that incorporates discrete or programmable analog, digital and/or quantum hardware. Examples of programmable hardware include: computers, microcontrollers, microprocessors, application-specific integrated circuits (ASICs); field programmable gate arrays (FPGAs); and complex programmable logic devices (CPLDs). Computers, microcontrollers and microprocessors are programmed using languages such as assembly, C, C++ or the like. FPGAs, ASICs and CPLDs are often programmed using hardware description languages (HDL) such as VHSIC hardware description language (VHDL) or Verilog that configure connections between internal hardware modules with lesser functionality on a programmable device. Finally, it needs to be emphasized that the above mentioned technologies are often used in combination to achieve the result of a functional module.
The disclosure of this patent document incorporates material which is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, as it appears in the Patent and Trademark Office patent file or records, for the limited purposes required by law, but otherwise reserves all copyright rights whatsoever.
While various embodiments have been described above, it should be understood that they have been presented by way of example, and not limitation. It will be apparent to persons skilled in the relevant art(s) that various changes in form and detail can be made therein without departing from the spirit and scope. In fact, after reading the above description, it will be apparent to one skilled in the relevant art(s) how to implement alternative embodiments. Thus, the present embodiments should not be limited by any of the above described exemplary embodiments.
In addition, it should be understood that any figures which highlight the functionality and advantages, are presented for example purposes only. The disclosed architecture is sufficiently flexible and configurable, such that it may be utilized in ways other than that shown. For example, the steps listed in any flowchart may be re-ordered or only optionally used in some embodiments.
Further, the purpose of the Abstract of the Disclosure is to enable the U.S. Patent and Trademark Office and the public generally, and especially the scientists, engineers and practitioners in the art who are not familiar with patent or legal terms or phraseology, to determine quickly from a cursory inspection the nature and essence of the technical disclosure of the application. The Abstract of the Disclosure is not intended to be limiting as to the scope in any way.
Finally, it is the applicant's intent that only claims that include the express language “means for” or “step for” be interpreted under 35 U.S.C. 112, paragraph 6. Claims that do not expressly include the phrase “means for” or “step for” are not to be interpreted under 35 U.S.C. 112, paragraph 6.
This application is a continuation of U.S. patent application Ser. No. 12/558,841, entitled “Methods and Apparatus for Application Isolation,” filed Sep. 14, 2009, now U.S. Pat. No. 9,098,698, which claims the benefit of U.S. Provisional Application No. 61/096,591, filed Sep. 12, 2008, entitled “Large-Scale Distributed Sensor for Detecting Malicious Web Sites via a Virtualized Web Browser,” each of which is incorporated herein by reference in its entirety.
This invention was made with government support under Grant Number W31P4Q-07-C-0244 awarded by Defense Advanced Research Projects Agency (DARPA). The government has certain rights in the invention.
Number | Name | Date | Kind |
---|---|---|---|
5297269 | Donaldson et al. | Mar 1994 | A |
5394555 | Hunter et al. | Feb 1995 | A |
5696822 | Nachenberg | Dec 1997 | A |
5842002 | Schnurer et al. | Nov 1998 | A |
5854916 | Nachenberg | Dec 1998 | A |
5895467 | Ubell et al. | Apr 1999 | A |
5974549 | Golan | Oct 1999 | A |
6067410 | Nachenberg | May 2000 | A |
6157721 | Shear et al. | Dec 2000 | A |
6211871 | Himmel et al. | Apr 2001 | B1 |
6377959 | Carlson | Apr 2002 | B1 |
6496847 | Bugnion et al. | Dec 2002 | B1 |
6584495 | Bisset et al. | Jun 2003 | B1 |
6718482 | Sato et al. | Apr 2004 | B2 |
6832120 | Frank et al. | Dec 2004 | B1 |
6845464 | Gold | Jan 2005 | B2 |
6859889 | Matsuura et al. | Feb 2005 | B2 |
6880110 | Largman et al. | Apr 2005 | B2 |
6883098 | Roman et al. | Apr 2005 | B1 |
6944785 | Gadir et al. | Sep 2005 | B2 |
7058822 | Edery et al. | Jun 2006 | B2 |
7086090 | Dawson, Jr. et al. | Aug 2006 | B1 |
7096381 | Largman et al. | Aug 2006 | B2 |
7100075 | Largman et al. | Aug 2006 | B2 |
7111201 | Largman et al. | Sep 2006 | B2 |
7137034 | Largman et al. | Nov 2006 | B2 |
7363264 | Doughty et al. | Apr 2008 | B1 |
7392541 | Largman et al. | Jun 2008 | B2 |
7536598 | Largman et al. | May 2009 | B2 |
7552479 | Conover et al. | Jun 2009 | B1 |
7571353 | Largman et al. | Aug 2009 | B2 |
7577871 | Largman et al. | Aug 2009 | B2 |
7584503 | Palmer et al. | Sep 2009 | B1 |
7633864 | Johnson | Dec 2009 | B2 |
7693991 | Greenlee et al. | Apr 2010 | B2 |
7788699 | Largman et al. | Aug 2010 | B2 |
7840801 | Berger et al. | Nov 2010 | B2 |
7849360 | Largman et al. | Dec 2010 | B2 |
7899867 | Sherstinsky et al. | Mar 2011 | B1 |
7904797 | Wong | Mar 2011 | B2 |
7979889 | Gladstone et al. | Jul 2011 | B2 |
8001606 | Spertus | Aug 2011 | B1 |
8078740 | Franco et al. | Dec 2011 | B2 |
8196205 | Gribble et al. | Jun 2012 | B2 |
8290763 | Zhang | Oct 2012 | B1 |
8356352 | Wawda et al. | Jan 2013 | B1 |
8370931 | Chien et al. | Feb 2013 | B1 |
8401982 | Satish et al. | Mar 2013 | B1 |
8447880 | Johnson | May 2013 | B2 |
8468600 | Kaskel et al. | Jun 2013 | B1 |
8479286 | Dalcher et al. | Jul 2013 | B2 |
8572735 | Ghosh et al. | Oct 2013 | B2 |
8578345 | Kennedy et al. | Nov 2013 | B1 |
8719924 | Williamson et al. | May 2014 | B1 |
8775369 | Largman et al. | Jul 2014 | B2 |
8793787 | Ismael et al. | Jul 2014 | B2 |
8839422 | Ghosh et al. | Sep 2014 | B2 |
8856782 | Ghosh et al. | Oct 2014 | B2 |
8881284 | Gabriel | Nov 2014 | B1 |
9081959 | Ghosh et al. | Jul 2015 | B2 |
9111089 | Bhatia et al. | Aug 2015 | B1 |
20020004799 | Gorelik et al. | Jan 2002 | A1 |
20020013802 | Mori et al. | Jan 2002 | A1 |
20020138701 | Suzuoki et al. | Sep 2002 | A1 |
20030023895 | Sinha et al. | Jan 2003 | A1 |
20040008652 | Tanzella et al. | Jan 2004 | A1 |
20040025158 | Traut | Feb 2004 | A1 |
20040064735 | Frazier et al. | Apr 2004 | A1 |
20040093372 | Chen et al. | May 2004 | A1 |
20050160133 | Greenlee et al. | Jul 2005 | A1 |
20060021029 | Brickell et al. | Jan 2006 | A1 |
20060136720 | Armstrong et al. | Jun 2006 | A1 |
20060168156 | Bae et al. | Jul 2006 | A1 |
20060206904 | Watkins | Sep 2006 | A1 |
20060271661 | Qi et al. | Nov 2006 | A1 |
20060277433 | Largman et al. | Dec 2006 | A1 |
20060294519 | Hattori et al. | Dec 2006 | A1 |
20070044151 | Whitmore | Feb 2007 | A1 |
20070079307 | Dhawan et al. | Apr 2007 | A1 |
20070106993 | Largman et al. | May 2007 | A1 |
20070107058 | Schuba et al. | May 2007 | A1 |
20070192866 | Sagoo et al. | Aug 2007 | A1 |
20070240212 | Matalytski | Oct 2007 | A1 |
20070250833 | Araujo, Jr. | Oct 2007 | A1 |
20070271610 | Grobman | Nov 2007 | A1 |
20070289019 | Lowrey | Dec 2007 | A1 |
20080016339 | Shukla | Jan 2008 | A1 |
20080059556 | Greenspan et al. | Mar 2008 | A1 |
20080082976 | Steinwagner et al. | Apr 2008 | A1 |
20080098465 | Ramakrishna | Apr 2008 | A1 |
20080127348 | Largman et al. | May 2008 | A1 |
20080141266 | Hunt et al. | Jun 2008 | A1 |
20080175246 | Kunhappan | Jul 2008 | A1 |
20080215852 | Largman et al. | Sep 2008 | A1 |
20080235764 | Cohen et al. | Sep 2008 | A1 |
20080244743 | Largman et al. | Oct 2008 | A1 |
20080244747 | Gleichauf et al. | Oct 2008 | A1 |
20080271019 | Stratton | Oct 2008 | A1 |
20080271025 | Gross | Oct 2008 | A1 |
20080320594 | Jiang | Dec 2008 | A1 |
20090025009 | Brunswig | Jan 2009 | A1 |
20090044265 | Ghosh et al. | Feb 2009 | A1 |
20090125902 | Ghosh et al. | May 2009 | A1 |
20090158432 | Zheng et al. | Jun 2009 | A1 |
20090172662 | Liu | Jul 2009 | A1 |
20090300599 | Piotrowski | Dec 2009 | A1 |
20090300739 | Nice et al. | Dec 2009 | A1 |
20090328008 | Mital et al. | Dec 2009 | A1 |
20100005531 | Largman et al. | Jan 2010 | A1 |
20100037235 | Larimore | Feb 2010 | A1 |
20100064039 | Ginter et al. | Mar 2010 | A9 |
20100115621 | Staniford et al. | May 2010 | A1 |
20100122342 | El-Moussa et al. | May 2010 | A1 |
20100122343 | Ghosh et al. | May 2010 | A1 |
20100125903 | Devarajan et al. | May 2010 | A1 |
20100138639 | Shah et al. | Jun 2010 | A1 |
20100146523 | Brigaut et al. | Jun 2010 | A1 |
20100192011 | Largman et al. | Jul 2010 | A1 |
20100223613 | Schneider | Sep 2010 | A1 |
20100235830 | Shukla et al. | Sep 2010 | A1 |
20110047620 | Mahaffey et al. | Feb 2011 | A1 |
20110083180 | Mashevsky et al. | Apr 2011 | A1 |
20110099620 | Stavrou et al. | Apr 2011 | A1 |
20110145923 | Largman et al. | Jun 2011 | A1 |
20110167492 | Ghosh et al. | Jul 2011 | A1 |
20110191851 | Largman et al. | Aug 2011 | A1 |
20120297457 | Schulte et al. | Nov 2012 | A1 |
20120317645 | Fortier | Dec 2012 | A1 |
20130145463 | Ghosh et al. | Jun 2013 | A1 |
20150324586 | Ghosh et al. | Nov 2015 | A1 |
Number | Date | Country |
---|---|---|
WO 0221274 | Mar 2002 | WO |
WO 03067435 | Aug 2003 | WO |
WO 2005074433 | Aug 2005 | WO |
WO 2005074434 | Aug 2005 | WO |
WO 2005116804 | Dec 2005 | WO |
WO 2007048062 | Apr 2007 | WO |
WO 2008027563 | Mar 2008 | WO |
WO 2008027564 | Mar 2008 | WO |
WO 2008092031 | Jul 2008 | WO |
Entry |
---|
Office Action for U.S. Appl. No. 14/797,847, mailed Nov. 23, 2015, 22 pages. |
Office Action for U.S. Appl. No. 12/757,675, mailed May 15, 2013. |
Office Action for U.S. Appl. No. 13/296,319, mailed Sep. 5, 2013. |
Office Action for U.S. Appl. No. 13/296,319, mailed Dec. 17, 2012. |
Morales et al., “Building malware infection trees,” Malicious and unwanted Software (Malware), Oct. 2011, 6th International Conference on (pp. 50-57), IEEE 2011. |
Wang, et al., Web Canary: A Virtualized Web Browser to Support Large-Scale Silent Collaboration in Detecting Malicious Web Sites (Web Canary), Nov. 15, 2008. |
Jiang Wang, et al., “SafeFox: a Safe Lightweight Virtual Browsing Environment”, Proceedings of the 43rd Hawaii International Conference on System Sciences, 2010. |
Capture Communication Protocol, Sep. 22, 2007, Victoria University of Wellington, New Zealand. |
Seifert, et al., Capture-HPC, About Capture Honeypot/Honeyclient, Sep. 22, 2008, Victoria University of Wellington, New Zealand. |
Capture-HPC Client Honeypot/Honeyclient, Sep. 2, 2008, Victoria University of Wellington, New Zealand. |
Know you Enemy: Malicious Web Servers, Aug. 9, 2007, http://www.honeypot.org. |
Tzi-cker Chiueh et al., Spout: a transparent distributed execution engine for Java applets, Computer Science Department, State University of New York at Stony Brook, http://www.ecsl.cs.sunyb.edu/spout.html Apr. 2000. |
Sushil Jajodia, et al., Application-Level Isolation to Cope With Malicious Database Users, The MITRE Corporation, Center for Secure Information Systems, and Department of Information and Software Engineering George Mason University, Dec. 1998. |
Peng Liu, et al., Intrusion Confinement by Isolation in Information Systems, Department of Information Systems, University of Maryland, Baltimore County, The MITRE Corporation, Center for Secure Information Systems, and Department of Information and Software Engineering George Mason University, vol. 43, The International Federation for Information Processing (IFIP), pp. 3-18, Jul. 25-28, 1999. |
Dahlia Malkhi, et al., Secure Execution of Java Applets using a Remote Playground, AT&T Labs Research, IEEE Transactions on Software Engineering, vol. 26, Issue 12, Dec. 2000, pp. 1197-1209. |
R. Sekar, et al., A Specification-Based Approach for Building Survivable Systems, 21st National Information Systems Security Conference, Oct. 1998. |
Software for the Secure Management and deployment of Java, Digitivity, Inc., Aug. 6, 1998, http://www.digitivity.com/html/body—products.html. |
Tarek Dehni, et al., Intelligent Networks and the HP OpenCall Technology, Aug. 1997, Article 6, Hewlett-Packard Journal, pp. 1-14. |
Thomas C. Bressoud, TFT: A Software System for Application-Transparent Fault Tolerance, Twenty-Eight Annual International Symposium on Fault-Tolerant Computing, 1998. |
Arbaugh, et al., Automated Recovery in a Secure Bootstrap Process, University of Pennsylvania, Distributed Systems Laboratory, Aug. 1, 1997. |
Thomas C. Bressoud, et al., Hypervisor-Based Fault-Tolerance, ACM Transactions on Computer Systems, vol. 14, No. 1, Feb. 1996, pp. 80-107. |
Jonback, et al., Open architecture in the Core of AXE, Ericsson Review No. 1, 2001. |
Solstice DiskSuite 4.2.1 Reference Guide, Sun Microsystems, Inc., Feb. 2000. |
Jieh-Sheng Lee at al., A Generic Virus Detection Agent on the Internet, Proceedings of the Thirtieth Annual Hawaii International Conference on System Sciences 1997. |
Grzegorz Czajkowski, Application Isolation in the Java Virtual Machine, Sun Microsystems Laboratories, Proceedings of the 15th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications vol. 35, Issue 10, Oct. 2000, pp. 354-366. |
Lenny Zeltser, Reverse Engineering Malware, May 2001. |
The Symantec Enterprise Papers, Understanding and Managing Polymorphic Viruses, vol. XXX, copyright 1996. |
Jeremy Sugerman, et al., Virtualizing I/O Devices on VMware Workstation's Hosted Virtual Machine Monitor, Proceedings of the 2001 USENIX Annual Technical Conference, Jun. 2001. |
Constantine Sapuntzakis, et al., “Virtual Appliances for Deploying and Maintaining Software”, Computer Systems Laboratory, Stanford University, Oct. 2003. |
JMunro, Virtual Machines & VMware, Part 1, Dec. 21, 2001, http://www.extremetech.com/computing/72186-virtual-machines-vmware-part-i. |
JMunro, Virtual Machines & VMware, Part II, Dec. 28, 2001, http://www.extremetech.com/computing/72268-virtual-machines-vmware-part-ii. |
J. Steven Fritzinger, et al., Java Security, Sun Microsystems, Inc. 1996. |
U.S. Appl. No. 61/221,749, filed Jun. 30, 2009. |
http://collaboratecom.org/2008/program.php—Orlando, FL, Nov. 2008. |
CollaborateComm 2008 Selected Publications Table of Contents, Nov. 2008. |
CollaborateComm 2008 Registration Policy, Orlando, FL, Nov. 13-16, 2008, 3 pages. |
Timeline-Capture HPC, Nov. 13, 2008, 2 pages https://projects.honeynet.org/capture-hpc/timeline?from=20081113T21%3A15%3A49Z&precision=second. |
Timeline Capture HPC, Apr. 15, 2008, 4 pages https://projects.honeynet.org/capturehpc/timeline?from=20080415T13%3A53%3A08Z&precision=second. |
WikiStart (history) Capture—HPC, https://projects.honeynet.org/capture-hpc/wiki/WikiStart?action=history , Nov. 20, 2015. |
https://www.microsoft.com/resources/documentaion/windows/xp/all/proddocs/enus/shutdown.mspx?mfr=true , Microsoft Windows XP—Shutdown, Feb. 23, 2016. |
Vir2us, Inc. v. Invincea, Inc. and Invincea Labs, LLC—Civil Action No. 2:15-cv-00162HCM-LRL—Vir2us' Opening Claim Construction Brief—Document 48, Dec. 23, 2015, 31 pages. |
Vir2us, Inc. v. Invincea, Inc. and Invincea Labs, LLC—Civil Action No. 2:15-cv-00162HCM-LRL—Krein Decl in Support Document 50, Dec. 23, 2015, 18 pages. |
Vir2us, Inc. v. Invincea, Inc. and Invincea Labs, LLC—Civil Action No. 2:15-cv-00162HCM-LRL—Invincea's Opening Claim Construction Brief—Document 51, Dec. 23, 2015, 31 pages. |
Vir2us, Inc. v. Invincea, Inc. and Invincea Labs, LLC—Civil Action No. 2:15-cv-00162HCM-LRL—Document 52, Dec. 23, 2015, 34 pages. |
Vir2us, Inc. v. Invincea, Inc. and Invincea Labs, LLC—Civil Action No. 2:15-cv-00162HCM-LRL—Invincea's Responsive Claim Construction Brief—Document 57, Jan. 11, 2016, 31 pages. |
Vir2us, Inc. v. Invincea, Inc. and Invincea Labs, LLC—Civil Action No. 2:15-cv-00162HCM-LRL—Supp Decl of Rubin in Support of Invincea's Responsive Claim Construction Brief—Document 57-1, Jan. 11, 2016, 13 pages. |
Vir2us, Inc. v. Invincea, Inc. and Invincea Labs, LLC—Civil Action No. 2:15-cv-00162HCM-LRL—Vir2us' Responsive Claim Construction Brief—Document 58, Jan. 11, 2016, 31 pages. |
Vir2us, Inc. v. Invincea, Inc. and Invincea Labs, LLC—Civil Action No. 2:15-cv-00162HCM-LRL—Rebuttal Declaration of Krein in Support of Vir2us' Responsive Claim Construction Brief—Document 59, Jan. 11, 2016, 18 pages. |
Vir2us, Inc. v. Invincea, Inc. and Invincea Labs, LLC—Civil Action No. 2:15-cv-00162HCM-LRL—Exhibit 2—Joint Claim Construction and Prehearing Statement, Document 61-2, Jan. 18, 2016, 4 pages. |
Vir2us, Inc. v. Invincea, Inc. and Invincea Labs, LLC—Civil Action No. 2:15-cv-00162HCM-LRL—Exhibit 3—Joint Claim Construction and Prehearing Statement—Document 61-3, Jan. 18, 2016, 9 pages. |
Vir2us, Inc. v. Invincea, Inc. and Invincea Labs, LLC—Civil Action No. 2:15-cv-00162HCM-LRL—Claim Construction Memorandum and Order, Document 69, Feb. 5, 2016, 16 pages. |
Vir2us, Inc. v. Invincea, Inc. and Invincea Labs, LLC—Civil Action No. 2:15-cv-00162HCM-LRL—Vir2us Preliminary Invalidity Contentions, Exhibits, and Supporting Documents, Nov. 23, 2015. |
Office Action for U.S. Appl. No. 13/690,452, mailed Nov. 8, 2013. |
Office Action for U.S. Appl. No. 13/690,452, mailed Jun. 12, 2014. |
Office Action for U.S. Appl. No. 13/690,452, mailed Jan. 30, 2015, 21 pages. |
International Search Report and Written Opinion mailed Mar. 12, 2013 for International Application No. PCT/US2012/067311. |
Office Action for U.S. Appl. No. 12/558,841, mailed Apr. 3, 2012. |
Office Action for U.S. Appl. No. 12/558,841, mailed Jan. 30, 2013. |
Office Action for U.S. Appl. No. 12/558,841, mailed Jan. 9, 2014. |
Office Action for U.S. Appl. No. 12/558,841, mailed Sep. 30, 2014. |
Office Action for U.S. Appl. No. 12/037,412, mailed Aug. 16, 2013. |
Final Office Action for U.S. Appl. No. 12/037,412, mailed Apr. 23, 2012. |
Office Action for U.S. Appl. No. 12/037,412, mailed Oct. 27, 2011. |
Office Action for U.S. Appl. No. 12/059,454, mailed Feb. 2, 2011. |
Final Office Action for U.S. Appl. No. 12/059,454, mailed Oct. 12, 2011. |
Office Action for U.S. Appl. No. 12/757,675, mailed Aug. 2, 2012. |
Office Action for U.S. Appl. No. 12/827,203, mailed Jan. 15 2013. |
Office Action for U.S. Appl. No. 12/827,203, mailed Apr. 17, 2014. |
Adabala et al, From virtualized resources to vritual computing grids: the In-VIGO system. [online] (Nov. 11, 2003), Elsevier, pp. 1-14. Retrieved from the Internet: <http://users.cis.fiu.edu/-zhaom/research/fgcs.pdf>. |
Huang, Y. et al., Efficiently tracking application interactions using lightweight virtualization, ACM, Oct. 31, 2008, 9 pages. |
Peterson et al., “A Flexible Containment Mechanism for Executing Untrusted Code,” [online] (2002). University of California, pp. 207-225. Retrieved from the Internet: <http://mse.uk.distfiles.macports.org/sites/ftp.wiretapped.net/pub/security/development/secure-programming/peterson-et-al-2002-a-flexible-containment-mechanism-for-executing-untrusted>. |
Royal et al., “PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware”. Computer Security Application Conference, 2006. ACSAC '06. 22nd Annual [online], Dec. 2006.[retrieved Apr. 4, 2014], Retrieved from the internet:<URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4041175>. |
Sapuntzakis, C. et al., “Virtual Appliances for Deploying and Maintaining Software,” [online] (2003), ACM, Retrieved from the Internet <URL: http://dl.acm.org/citation.cfm?id=1051965>, 15 pages. |
Ugurlu, “Stealth Sandbox Analysis of Malware,” PhD Thesis, Bilkent University (Ankara, Turkey) [online], Published Aug. 2009 [retrieved on Feb. 7, 2013] Retrieved from the Internet <URL:http://www.thesis.bilkent.edu.tr/0003921.pdf>. |
Office Action for U.S. Appl. No. 14/482,786, mailed Jan. 21, 2016. |
Final Office Action for U.S. Appl. No. 14/797,847, mailed May 17, 2016. |
Office Action for U.S. Appl. No. 14/482,786, mailed Oct. 25, 2016. |
Number | Date | Country | |
---|---|---|---|
20160182540 A1 | Jun 2016 | US |
Number | Date | Country | |
---|---|---|---|
61096591 | Sep 2008 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 12558841 | Sep 2009 | US |
Child | 14808681 | US |