This invention relates generally to security software, including antivirus and anti-spam software, and in particular to detecting malicious software and blocking unwanted visual displays using feedback from a user.
There are classes of malicious and/or annoying software programs (referred to herein collectively as malicious software or malicious code) that do not run silently. Rather, these programs cause the unwanted display of advertising pop-ups or other annoying user interface elements on the user's desktop. Examples of this type of malicious software include some adware programs and some downloaders. Traditional security software may fail to detect these types of malicious software for various reasons. For example, there has been a recent of server-size polymorphism, where an attacker polymorphs each threat on the server so each user receives a different executable threat. As a result, many threats and annoyances caused by malicious software may be missed by traditional antivirus and anti-spam detection methods used by security software.
When security software fails to detect and block malicious software that is causing the annoying or unwanted display of pop-ups, the security software is made to look particularly inept. This is because the failure of the security software is manifested in a visible display that is presented directly to the user. The experience may be particularly frustrating for users, since the security software is failing to catch and prevent pop-ups from malicious software, even though the existence of the malicious software is obvious to the user because the pop-ups are right in the user's face. This failure of the security software may be a significant driver causing users to change their security software.
Accordingly, what is needed is a mechanism to improve the detection and prevention of malicious software that generates unwanted pop-ups or other unwanted visible elements on a user's desktop.
Embodiments of the invention incorporate a self-service mechanism that allows a user to make decisions about whether to squelch and/or remove visible malicious software on the user's machine. The self-service mechanism is triggered when potentially malicious software causes the display of a suspicious display element, such as a pop-up. The user may then provide input as to whether the display element is unwanted, allowing the security software to catch the malicious code that may have previously avoided detection. The self-service mechanism thus enables users to prevent malicious and annoying software even when other security software techniques (e.g., signatures, heuristics, or behavioral detection) have failed to catch the threat.
In various embodiments of the invention, a user-assisted security software program alerts a user when a new pop-up is displayed from a suspicious source application. In one embodiment, the security system provides the alert only if the source application is deemed suspicious, and determining whether an application is suspicious may be based on a reputation for the application, determined for example based on information from an online community of users. The security software displays the alert in connection with the pop-up. The alert prompts the user to indicate whether the source application that generated the pop-up should be trusted. If, in response to the alert, the user indicates that the source application is not trusted, the security software declares the source application to be malicious. The malicious code can then be dealt with, such as by removing it from the computing system, preventing it from generating new pop-ups, and/or preventing it from making further network communications. The user's feedback about the source application may also be used to adjust the application's reputation, either positively or negatively.
By determining whether the source application is suspicious before prompting the user for feedback about the pop-up, embodiments of the security software avoid unnecessarily bothering of users. This can be thought of as a kind of filtering out of low-risk threats based on the likelihood that a source application is malicious. In addition, by presenting the prompt in an alert at the same time as the pop-up in question, in accordance with an embodiment of the invention, the user is being prompted for feedback while the user is viewing the pop-up. In this way, the user is in a good position to make a decision about whether the source application that caused the pop-up is to be trusted.
The figures depict various embodiments of the present invention for purposes of illustration only. One skilled in the art will readily recognize from the following discussion that alternative embodiments of the structures and methods illustrated herein may be employed without departing from the principles of the invention described herein.
In one embodiment, the client 100 executes a security software application 110 that monitors the client 100. In an embodiment, the security software application 110 monitors processes running on the client 100 that may comprise malicious code. For example, the security software application 110 may monitor actions on the client 100 such as the calling of graphics functions to display items on a display of the client 100. In addition to the security software application 110, the client 100 also executes one or more other source applications 120. The source applications 120 may comprise any type of executable file, library (such as a DLL), or any other file on the client 100 that includes executable code. Each source application 120 may include code to cause a pop-up or other graphical element to be displayed by the client 100. The client 100 may further include application data 130, stored for example in a storage memory within or accessible by the client 100. The application data 130 includes information about one or more source applications 120 on the client 100, as described in more detail below.
The client 100 communicates over a network 150 with a reputation server 160. The reputation server 160 may also communicate with a number of other client computing systems over the network 150, for example, to maintain an online community of users for tracking the reputation of various applications and other software entities with which client computing systems may interact. U.S. application Ser. No. 11/618,215, filed Dec. 29, 2006, incorporated by reference in its entirety, describes methods and systems for computing hygiene scores for various client computing systems, where the hygiene scores represent assessments of the trustworthiness of the clients, and for computing a reputation score for an entity (e.g., a potential malicious software) using those client hygiene scores. In this context, a client's trustworthiness may refer to the client's propensity for getting infected by malicious code and other computer related threats, and/or the ability of the user to avoid the threats. The reputation score may represent an assessment of whether the entity is malicious, or how likely the entity contains malicious code.
While the client 100 is running, any number of functional code modules, in addition to the security software application 110, may be executed by the client 100. This code may include instructions to draw one or more objects on the display of the client 100. As used herein, software code that attempts to draw or draws an object on the display is called a source application 120, as it is the source of the display object.
In one embodiment, a source application causes a pop-up to be drawn on the display of the client 100. The pop-up may comprise a window that includes a message to the user, possibly with an active region such as a link or a button the will cause a further action to be performed. An example of such a pop-up is illustrated in
The security software application 110 detects 210 the pop-up caused by the source application 120, noting the identity of the source application 120. If 220 this is the first time that the source application 120 is causing a pop-up to be displayed, the security software application 110 continues with the user-assisted detection process. If 220 this is not the first time, then the process has already been performed for the source application 120, and the security software application 110 will either allow or disallow the pop-up according to that prior determination. The security software application 110 may determine whether 220 this is the first time that the source application 120 is displaying a pop-up by accessing this information from the application data 130 on the client. The security software application 110 may also update the application data 130 to indicate that the source application 120 has now displayed a pop-up, so the process will not be performed again for subsequent pop-ups from the same source application 120.
Once the security software application determines that the user-assisted detection process should continue, it determines whether the source application 120 is sufficiently suspicious to alert the user. In one embodiment, the security software application 110 queries 230 for a measure of the reputation of the source application 230 from the reputation server 160, which responds to the security software application 110 by providing the requested information. The security software application 110 then determines whether 240 the reputation of the source application 120 is sufficiently low so that the source application 120 is suspicious. This determination may be performed many different ways, as desired, and based on empirical evidence that balances between the desire to avoid overly bothering users and the objective to catch (and not miss) malicious software. For example, the reputation may be based on the number of other users who trust or use the source application 120, a measure of hygiene of the users who trust or use the source application 120, and/or various other measures of reputation.
If 240 the reputation of the source application 120 is high enough that the source application 120 is not suspicious, the security software application 110 stops the detection process. In this way, the security software application 110 minimizes unnecessary hassle to the user in cases where there is a low likelihood that the source application 120 contains malicious code. The security software application 110 may further store this information in the application data 130, for example, to “white list” the source application 120 for future uses.
On the other hand, if 240 the reputation of the source application 120 is low enough so that it is suspicious, the security software application 110 prompts 250 the user for feedback about the pop-up.
The user's feedback about the pop-up can then be used as a proxy for whether the source application 120 itself should be trusted, or whether it contains malicious code. If 260 the user dos not provide negative feedback about the pop-up, the security software application 110 saves 270 the user's response. For example, the security software application 110 may update the application data 130 to indicate that the source application 120 should be trusted in the future. The user's positive feedback about the source application may also be used to update the reputation of that application. For example, the security software application 110 may forward that feedback to the reputation server 160, which may then update the reputation based on this additional information.
If 260 the user provided negative feedback about the pop-up, the security software application 110 declares 280 the source application 120 to be malicious software. This may be as innocent as an unwanted, annoying advertising application, or it may be a harmful computer virus. Regardless, the user has indicated that the source application 120 is causing unwanted pop-ups, so the security software application 110 takes 290 appropriate action in response to possible threats from the source application 120. The action taken may vary depending on the goal of the security software application 110. For example, the security software application 110 may remove the source application 120 from the client 100, or it may pass the source application 120 to an antivirus scanner to cleanse possible malicious code from the source application 120.
Alternatively, the security software application 110 may simply block the source application 120 from displaying future pop-ups. This may be desired when the threat from the malicious code is merely annoying advertising that is coupled with a useful application (e.g., in the case of adware as in kazaa), as it allows the useful application to be used while preventing the annoying pop-ups from it. Blocking the source application 120 may be accomplished by updating the application data 130 to indicate that the source application 120 should be blocked. When the source application subsequently attempts to display a pop-up, the security software application 110 may check the application data 130 (e.g., to implement step 220), and it will then see that the source application 120 should be prevented from displaying the pop-up.
In one embodiment, not only does the security software application 110 block attempts by the source application 120 to display further pop-ups, it blocks attempts by executable code that may be produced by the source application to display pop-ups. This prevents identified malicious code from avoiding the security system by merely dropping new modules of malicious code. Accordingly, the security software application may include a lineage tracking module to track code that comes from the identified malicious code and thereby block any executable code that came from the identified malicious code.
Beneficially, embodiments of the invention described herein enable the user to assist the security software in detecting and dealing with potential malicious code, which may be a computer virus or merely spam software that causes annoying pop-ups to be displayed on the user's machine. Whereas antivirus and/or anti-spam programs may fail to detect and remove threats from new malicious software, resulting in unwanted pop-ups and other display elements, embodiments of the invention enable users to remove the threats themselves. Since the user is making this decision while the user is directly observing the pop-up, the user is in a good position to determine whether the software application that causes the pop-up should be trusted. More particularly, the user can make a more educated decision about whether to trust the source application because the prompt from the security software is directly associated with the specific pop-up in question.
The foregoing description of the embodiments of the invention has been presented for the purpose of illustration; it is not intended to be exhaustive or to limit the invention to the precise forms disclosed. Persons skilled in the relevant art can appreciate that many modifications and variations are possible in light of the above disclosure.
Some portions of this description describe the embodiments of the invention in terms of algorithms and symbolic representations of operations on information. These algorithmic descriptions and representations are commonly used by those skilled in the data processing arts to convey the substance of their work effectively to others skilled in the art. These operations, while described functionally, computationally, or logically, are understood to be implemented by computer programs or equivalent electrical circuits, microcode, or the like. Furthermore, it has also proven convenient at times, to refer to these arrangements of operations as modules, without loss of generality. The described operations and their associated modules may be embodied in software, firmware, hardware, or any combinations thereof.
Any of the steps, operations, or processes described herein may be performed or implemented with one or more hardware or software modules, alone or in combination with other devices. In one embodiment, a software module is implemented with a computer program product comprising a computer-readable medium containing computer program code, which can be executed by a computer processor for performing any or all of the steps, operations, or processes described.
Embodiments of the invention may also relate to an apparatus for performing the operations herein. This apparatus may be specially constructed for the required purposes, and/or it may comprise a general-purpose computing device selectively activated or reconfigured by a computer program stored in the computer. Such a computer program may be stored in a tangible computer readable storage medium or any type of media suitable for storing electronic instructions, and coupled to a computer system bus. Furthermore, any computing systems referred to in the specification may include a single processor or may be architectures employing multiple processor designs for increased computing capability.
Embodiments of the invention may also relate to a computer data signal embodied in a carrier wave, where the computer data signal includes any embodiment of a computer program product or other data combination described herein. The computer data signal is a product that is presented in a tangible medium or carrier wave and modulated or otherwise encoded in the carrier wave, which is tangible, and transmitted according to any suitable transmission method.
Finally, the language used in the specification has been principally selected for readability and instructional purposes, and it may not have been selected to delineate or circumscribe the inventive subject matter. It is therefore intended that the scope of the invention be limited not by this detailed description, but rather by any claims that issue on an application based hereon. Accordingly, the disclosure of the embodiments of the invention is intended to be illustrative, but not limiting, of the scope of the invention, which is set forth in the following claims.
| Number | Name | Date | Kind |
|---|---|---|---|
| 6088803 | Tso et al. | Jul 2000 | A |
| 6108799 | Boulay et al. | Aug 2000 | A |
| 6968507 | Pennell et al. | Nov 2005 | B2 |
| 7197539 | Cooley | Mar 2007 | B1 |
| 7412516 | Brown et al. | Aug 2008 | B1 |
| 7448084 | Apap et al. | Nov 2008 | B1 |
| 7546349 | Cooley | Jun 2009 | B1 |
| 7559086 | Sobko et al. | Jul 2009 | B2 |
| 7571483 | Bascle et al. | Aug 2009 | B1 |
| 7587367 | Mengerink | Sep 2009 | B2 |
| 7594272 | Kennedy et al. | Sep 2009 | B1 |
| 7712132 | Ogilvie | May 2010 | B1 |
| 7783741 | Hardt | Aug 2010 | B2 |
| 7831840 | Love et al. | Nov 2010 | B1 |
| 7870608 | Shraim et al. | Jan 2011 | B2 |
| 8019689 | Nachenberg | Sep 2011 | B1 |
| 20020046041 | Lang | Apr 2002 | A1 |
| 20020194490 | Halperin et al. | Dec 2002 | A1 |
| 20030167308 | Schran | Sep 2003 | A1 |
| 20030177394 | Dozortsev | Sep 2003 | A1 |
| 20040054661 | Cheung | Mar 2004 | A1 |
| 20040205354 | Gabriel et al. | Oct 2004 | A1 |
| 20040215977 | Goodman et al. | Oct 2004 | A1 |
| 20050039082 | Nachenberg | Feb 2005 | A1 |
| 20050050335 | Liang et al. | Mar 2005 | A1 |
| 20050060581 | Chebolu et al. | Mar 2005 | A1 |
| 20050066290 | Chebolu et al. | Mar 2005 | A1 |
| 20050120238 | Choi | Jun 2005 | A1 |
| 20050182924 | Sauve et al. | Aug 2005 | A1 |
| 20050268090 | Saw et al. | Dec 2005 | A1 |
| 20050283837 | Olivier et al. | Dec 2005 | A1 |
| 20060026123 | Moore et al. | Feb 2006 | A1 |
| 20060048225 | Gomez et al. | Mar 2006 | A1 |
| 20060085328 | Cohen et al. | Apr 2006 | A1 |
| 20060212270 | Shiu et al. | Sep 2006 | A1 |
| 20060212925 | Shull et al. | Sep 2006 | A1 |
| 20060212930 | Shull et al. | Sep 2006 | A1 |
| 20060212931 | Shull et al. | Sep 2006 | A1 |
| 20060230039 | Shull et al. | Oct 2006 | A1 |
| 20060253458 | Dixon et al. | Nov 2006 | A1 |
| 20060253581 | Dixon et al. | Nov 2006 | A1 |
| 20060253583 | Dixon et al. | Nov 2006 | A1 |
| 20060253584 | Dixon et al. | Nov 2006 | A1 |
| 20060277469 | Chaudhri et al. | Dec 2006 | A1 |
| 20070011739 | Zamir et al. | Jan 2007 | A1 |
| 20070050444 | Costea et al. | Mar 2007 | A1 |
| 20070107053 | Shraim et al. | May 2007 | A1 |
| 20070124579 | Haller | May 2007 | A1 |
| 20070143629 | Hardjono et al. | Jun 2007 | A1 |
| 20070156886 | Srivastava | Jul 2007 | A1 |
| 20070162349 | Silver | Jul 2007 | A1 |
| 20070174911 | Kronenberg et al. | Jul 2007 | A1 |
| 20070192855 | Hulten et al. | Aug 2007 | A1 |
| 20070233782 | Tali | Oct 2007 | A1 |
| 20070256133 | Garbow et al. | Nov 2007 | A1 |
| 20080005223 | Flake et al. | Jan 2008 | A1 |
| 20080028463 | Dagon et al. | Jan 2008 | A1 |
| 20080046975 | Boss et al. | Feb 2008 | A1 |
| 20080082662 | Dandliker et al. | Apr 2008 | A1 |
| 20080104180 | Gabe | May 2008 | A1 |
| 20080109244 | Gupta | May 2008 | A1 |
| 20080109473 | Dixon et al. | May 2008 | A1 |
| 20080109491 | Gupta | May 2008 | A1 |
| 20080114709 | Dixon et al. | May 2008 | A1 |
| 20080133540 | Hubbard et al. | Jun 2008 | A1 |
| 20080140442 | Warner | Jun 2008 | A1 |
| 20080140820 | Snyder et al. | Jun 2008 | A1 |
| 20080141366 | Cross et al. | Jun 2008 | A1 |
| 20080189788 | Bahl | Aug 2008 | A1 |
| 20090077664 | Hsu et al. | Mar 2009 | A1 |
| 20090125382 | Delepet | May 2009 | A1 |
| 20090254993 | Leone | Oct 2009 | A1 |
| 20090282476 | Nachenberg et al. | Nov 2009 | A1 |
| 20090328209 | Nachenberg | Dec 2009 | A1 |
| Number | Date | Country |
|---|---|---|
| 1971102 | Sep 2008 | EP |