Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees

Patent application title: EMULATOR UPDATING SYSTEM AND METHOD

Inventors:  Igor Muttik (Berkhamsted, GB)  Igor Muttik (Berkhamsted, GB)  Duncan V. Long (Tring, GB)
IPC8 Class: AG06F944FI
USPC Class: 703 22
Class name: Data processing: structural design, modeling, simulation, and emulation simulating electronic device or electrical system software program (i.e., performance prediction)
Publication date: 2013-09-19
Patent application number: 20130246038



Abstract:

One embodiment includes a method and computer program product for distributing and/or receiving a first emulator extension with respect to an emulator capable of performing an emulation using emulation code. The first emulator extension includes program instructions that aid in the process of emulating in order to detect potentially unwanted computer software. Such program instructions of the first emulator extension are additional beyond that associated with the emulator code, for assisting the emulator code in the emulation by patching the additional program instructions into the emulator in order to aid in detecting the potentially unwanted computer software within the suspect code. In use, an emulation is performed using the first emulator extension and the suspect code. The emulation is performed within an insulated environment in a computer system so that the computer system is insulated from potentially unwanted actions of the suspect code.

Claims:

1. A method for emulating computer viruses and/or malicious software that operates by patching additional program instructions into an emulator in order to aid in detecting a computer virus and/or malicious software within suspect code, the method comprising: receiving suspect code; loading the suspect code into an emulator buffer within a data space of a computer system; loading a first emulator extension into an emulator that performs an emulation using emulation code and the first emulator extension, the first emulator extension including program instructions that aid in a process of emulating the suspect code in order to detect a computer virus and/or malicious software, wherein the program instructions of the first emulator extension are additional beyond that associated with the emulation code, for assisting the emulation code in the emulation; performing the emulation using the first emulator extension, the emulation code and the suspect code, the emulation being performed within an insulated environment in the computer system so that the computer system is insulated from malicious actions of the suspect code; and determining whether the suspect code is likely to exhibit malicious behavior based upon the emulation.

2. The method of claim 1, wherein loading the first emulator extension into the emulator includes loading the first emulator extension into the emulator buffer within the emulator; and wherein performing the emulation includes emulating the program instructions that comprise the first emulator extension.

3. The method of claim 2, wherein emulating the program instructions that comprise the first emulator extension causes the emulator to examine the suspect code looking for patterns that indicate that the suspect code is likely to exhibit malicious behavior.

4. The method of claim 2, wherein emulating the program instructions that comprise the first emulator extension causes the program instructions within the first emulator extension to facilitate emulation of the suspect code.

5. The method of claim 1, further comprising emulating the suspect code prior to loading the first emulator extension into the emulator buffer.

6. The method of claim 1, further comprising: loading a second emulator extension into the emulator; and performing a second emulation using the second emulator extension and the suspect code.

7. The method of claim 6, wherein the first emulator extension and the second emulator extension provide support for conflicting emulator environments.

8. The method of claim 1, wherein loading the first emulator extension involves loading the first emulator extension from a database containing a plurality of different emulator extensions.

9. The method of claim 1, wherein the first emulator extension includes code for decrypting an encrypted computer virus and other encrypted malicious code.

10. The method of claim 1, further comprising if a computer virus or other malicious software is detected within the suspect code, disinfecting the suspect code.

11. The method of claim 1, wherein the first emulator extension facilitates emulating a non-standard computer instruction opcode.

12. The method of claim 1, wherein the first emulator extension facilitates emulating an uncommonly used operating system call.

13. A tangible computer-readable storage medium storing a computer program product, the computer program product comprising: computer code for receiving suspect code; computer code for loading the suspect code into an emulator buffer within a data space of a computer system; computer code for loading a first emulator extension into an emulator that performs an emulation using emulation code and the first emulator extension, the first emulator extension including program instructions that aid in a process of emulating the suspect code in order to detect a computer virus and/or malicious software, wherein the program instructions of the first emulator extension are additional beyond that associated with the emulation code, for assisting the emulation code in the emulation; computer code for performing the emulation using the first emulator extension, the emulation code and the suspect code, the emulation being performed within an insulated environment in the computer system so that the computer system is insulated from malicious actions of the suspect code; and computer code for determining whether the suspect code is likely to exhibit malicious behavior based upon the emulation.

14. The computer-readable storage medium of claim 13, wherein loading the first emulator extension into the emulator includes loading the first emulator extension into the emulator buffer within the emulator; and wherein performing the emulation includes emulating the program instructions that comprise the first emulator extension.

15. The computer-readable storage medium of claim 14, wherein emulating the program instructions that comprise the first emulator extension causes the emulator to examine the suspect code looking for patterns that indicate that the suspect code is likely to exhibit malicious behavior.

16. The computer-readable storage medium of claim 14, wherein emulating the program instructions that comprise the first emulator extension causes the program instructions within the first emulator extension to facilitate emulation of the suspect code.

17. The computer-readable storage medium of claim 13, wherein the method further comprises emulating the suspect code prior to loading the first emulator extension into the emulator buffer.

18. The computer-readable storage medium of claim 13, wherein the method further comprises: loading a second emulator extension into the emulator; and performing a second emulation using the second emulator extension and the suspect code.

19. The computer-readable storage medium of claim 18, wherein the first emulator extension and the second emulator extension provide support for conflicting emulator environments.

20. An apparatus that emulates computer viruses and/or malicious software that operates by patching additional program instructions into an emulator in order to aid in detecting a computer virus and/or malicious software within suspect code, the apparatus comprising: a processor; a loading mechanism that is configured to load suspect code into an emulator buffer within a data space of a computer system; wherein the loading mechanism is additionally configured to load a first emulator extension into an emulator that performs an emulation using emulation code and the first emulator extension, the first emulator extension including program instructions that aid in a process of emulating the suspect code in order to detect a computer virus and/or malicious software, wherein the program instructions of the first emulator extension are additional beyond that associated with the emulator code, for assisting the emulator code in the emulation; an emulation mechanism that is configured to perform the emulation using the first emulator extension, the emulation code and the suspect code, the emulation being performed within an insulated environment in the computer system so that the computer system is insulated from malicious actions of the suspect code; and a determination mechanism that is configured to determine whether the suspect code is likely to exhibit malicious behavior based upon the emulation.

Description:

RELATED APPLICATION(S)

[0001] The present application is a continuation of a patent application filed Feb. 18, 2005 under Ser. No. 11/062,185 which is, in turn, a continuation of an application filed Jun. 1, 2000 under Ser. No. 09/586,671, now U.S. Pat. No. 6,907,396, both of which are incorporated herein by reference.

BACKGROUND

[0002] 1. Field of the Invention

[0003] The present invention relates to systems for detecting unwanted software. More specifically, the present invention relates to a method and an apparatus for emulating unwanted software that operates by patching additional instructions into an emulator in order to aid in the process of detecting, decrypting or disinfecting code containing unwanted software.

[0004] 2. Related Art

[0005] Malicious software, such as a computer virus, can enter a computer system in a number of ways. It can be introduced on a disk or a CD-ROM that is inserted into the computer system. It can also enter from a computer network, for example, within an email message.

[0006] If malicious software is executed by a computer system, it can cause a number of problems. The software can compromise security, by stealing passwords; by creating a "back door" into the computer system; or by otherwise accessing sensitive information. The software can also cause damage to the computer system, for example, by deleting files or by causing the computer system to fail.

[0007] Some types of malicious programs can be easily detected using simple detection techniques, such as scanning for a search string. However, this type of detection process can be easily subverted by converting a malicious algorithm into program code in different ways.

[0008] Another approach to detecting malicious software is to run a program on a real machine while attempting to intercept malicious actions. This technique, which is known as "behavior blocking," has a number of disadvantages. In spite of the attempt to intercept malicious actions, the program may nevertheless cause harm to the computer system. Furthermore, the behavior blocking mechanism typically cannot view an entire log of actions in making a blocking determination. Hence, the behavior blocking mechanism may make sub-optimal blocking decisions, which means harmless programs may be blocked or harmful programs may be allowed to execute.

[0009] Yet another approach to detecting malicious software is to "emulate" suspect code within an insulated environment in a computer system so that the computer system is protected from malicious actions of the suspect code.

[0010] One disadvantage to emulation is that it is almost impossible to provide complete emulation for all program instructions, all operating system calls and operating system environments that may be accessed by a piece of code being emulated without replicating the entire operating system in the process. Hence, in practice, emulators are typically able to emulate only commonly occurring program instructions and system calls.

[0011] This problem can be overcome by updating and recompiling an emulator to implement new system calls and new program instructions as different pieces of malicious software are encountered that make use of these new system calls and new program instructions. However, doing so can lead to logistical problems in keeping emulation programs up to date.

[0012] Another problem with current emulators is that they cannot deal with conflicting emulator environments. For example, one virus may be triggered by a system call returning the year 1999, while another virus is triggered by the same system call returning the year 2000.

[0013] What is needed is a method and an apparatus for emulating suspect code that can be easily reconfigured to accommodate new program instructions, system calls and emulation environments.

SUMMARY

[0014] One embodiment includes a method and computer program product for distributing and/or receiving a first emulator extension with respect to an emulator capable of performing an emulation using emulation code. The first emulator extension includes program instructions that aid in the process of emulating in order to detect potentially unwanted computer software. Such program instructions of the first emulator extension are additional beyond that associated with the emulator code, for assisting the emulator code in the emulation by patching the additional program instructions into the emulator in order to aid in detecting the potentially unwanted computer software within the suspect code. In use, an emulation is performed using the first emulator extension and the suspect code. The emulation is performed within an insulated environment in a computer system so that the computer system is insulated from potentially unwanted actions of the suspect code.

BRIEF DESCRIPTION OF THE FIGURES

[0015] FIG. 1 illustrates a computer system in accordance with an embodiment of the present invention.

[0016] FIG. 2 illustrates the internal structure of an emulator for emulating and analyzing code for malicious behavior in accordance with an embodiment of the present invention.

[0017] FIG. 3 is a flow chart illustrating the process of emulating and analyzing code for malicious behavior using emulator extensions in accordance with an embodiment of the present invention.

DETAILED DESCRIPTION

[0018] The following description is presented to enable any person skilled in the art to make and use the invention, and is provided in the context of a particular application and its requirements. Various modifications to the disclosed embodiments will be readily apparent to those skilled in the art, and the general principles defined herein may be applied to other embodiments and applications without departing from the spirit and scope of the present invention. Thus, the present invention is not intended to be limited to the embodiments shown, but is to be accorded the widest scope consistent with the principles and features disclosed herein.

[0019] The data structures and code described in this detailed description are typically stored on a computer readable storage medium, which may be any device or medium that can store code and/or data for use by a computer system. This includes, but is not limited to, magnetic and optical storage devices such as disk drives, magnetic tape, CDs (compact discs) and DVDs (digital video discs), and computer instruction signals embodied in a transmission medium (with or without a carrier wave upon which the signals are modulated). For example, the transmission medium may include a communications network, such as the Internet.

Computer System

[0020] FIG. 1 illustrates a computer system 106 in accordance with an embodiment of the present invention. Computer system 106 may include any type of computer system, including, but not limited to, a computer system based on a microprocessor, a mainframe computer, a digital signal processor, a personal organizer, a device controller, and a computational engine within an appliance.

[0021] Computer system 106 can receive suspect code 108 (which can potentially be malicious) from a number of different sources. Suspect code 108 may be introduced into computer system 106 by a remote host 101 across a network 102. For example, suspect code 108 may be included within an electronic mail (email) message from remote host 101 to computer system 106. Remote host 101 can include any entity that is capable of sending suspect code 108 across network 102 to computer system 106. Network 102 can include any type of wire or wireless communication channel capable of coupling together computing nodes. This includes, but is not limited to, a local area network, a wide area network, or a combination of networks. In one embodiment of the present invention, network 102 includes the Internet.

[0022] Suspect code 108 may additionally be introduced into computer system 106 by encoding suspect code 108 on a computer-readable storage medium, such as disk 104, and introducing disk 104 into computer system 106. Note that disk 104 can generally include any type of computer-readable storage medium, such as a magnetic disk, a magnetic tape and a CD-ROM.

[0023] Before executing suspect code 108, computer system 106 uses emulator 110 to analyze suspect code 108. Emulator 110 analyzes suspect code 108 by executing emulator code 203 and emulator extensions 204 as is described below with reference to FIGS. 2 and 3.

Emulator Structure

[0024] FIG. 2 illustrates the internal structure of an emulator 110 for emulating and analyzing suspect code 108 for malicious behavior in accordance with an embodiment of the present invention. Emulator 110 includes emulator code 203, emulator buffer 201 and database 206. Emulator code 203 includes code to perform the emulation.

[0025] Emulator buffer 201 is a protected region of memory (also known as a sandbox or a working space) in which suspect code 108 is stored and emulated. Emulator buffer 201 stores suspect code 108 as well as emulator extension 204. Emulator buffer 201 and emulator code 203 are designed so that while suspect code 108 that is executing within emulator buffer 201, suspect code 108 cannot damage or compromise computer system 106. Emulator extension 204 includes additional program instructions that assist emulator code 203 in the emulation process.

[0026] Note that emulator buffer 201 is not within the program space of computer system 106, but is instead in the data space. Hence, instructions within emulator extension 204 must themselves be emulated by emulator code 203. In an alternative embodiment of the present invention, emulator extension 204 is loaded as a patch into the program space of computer system 106. In this alternative embodiment, emulator extension can be executed directly on computer system 106.

[0027] Emulator extension 204 is retrieved from database 206, which contains a plurality of emulator extensions 208, which can be successively loaded into emulator buffer 201 during the emulation process. Database 206 can include any type of volatile or non-volatile memory or storage device that can be used to store emulator extensions 208. Database 206 can reside within computer system 106, or alternatively, can reside on an external database server that is separate from computer system 106.

[0028] During the emulation process, emulator extension 204 can read suspect code 108 looking for patterns indicating the suspect code 108 contains a virus or other type of malicious software. Alternatively, emulator extension 204 can set up an environment that is conducive to emulating suspect code 108. For example, emulator extension 204 can configure the system to emulate uncommonly used system calls or opcodes. This enables emulator code 203 and/or emulator extension 204 to determine of suspect code 108 exhibits malicious behavior. Emulator code 203 (working with emulator extension 204) ultimately outputs a decision 212 indicating whether suspect code 108 is malicious or not.

[0029] Note that emulator extension 204 can be emulated in a number of different ways. (1) Emulator extension 204 can be emulated as part of suspect code 108 by patching the emulator extension 204 into suspect code 108, possibly replacing, overlapping or overwriting portions of suspect code 108. In this case, the location where the patching occurs is defined in the database 206. (2) Emulator extension 204 can be executed before the suspect code 108 is executed, which enables emulator extension 204 to set up the environment that emulator extension 204 is responsible for handling. After this environment is set up, emulator extension 204 passes control suspect code 108. (3) Emulator extension 204 can replace suspect code 108 entirely. In this case, the suspect code 108 is not emulated at all, and emulator extension 204 produces decision 212 after analyzing the suspect code 108 as data. (4) Emulator extension 204 can be emulated after the suspect code 108 is emulated. This allows emulator extension 204 to analyze the results of running the suspect code 108 in order to produce decision 212.

Process of Emulation

[0030] FIG. 3 is a flow chart illustrating the process of emulating and analyzing code for malicious behavior using emulator extensions in accordance with an embodiment of the present invention. The system starts by receiving suspect code 108 from one of a number of possible sources as is described above with reference to FIG. 1 (step 302). The system loads this suspect code into emulator buffer 201 (step 304).

[0031] Next, the system runs emulator 110 (step 306). This causes suspect code 108 to be examined and/or emulated by emulator code 203. During the emulation process, the system determines whether or not suspect code 108 contains code that is likely to exhibit malicious behavior (step 308). If so, the system reports the malicious code to a system user or system administrator (step 310).

[0032] If no malicious code is detected, the system determines if there are any emulator extensions remaining in database 206 that have not already been used (step 312). If not, the system proceeds to the next file containing suspect code to repeat the entire process (step 314).

[0033] Otherwise, if there are emulator extensions remaining, the system loads the next emulator extension into emulator 110 (step 315). In one embodiment of the present invention, this involves loading emulator extension 204 into emulator buffer 201 within emulator 110. In an alternative embodiment, this involves loading emulator extension 204 into the program space of computer system 106 so that it can work in concert with emulator code 203 in performing a subsequent emulation.

[0034] Next, the system sets up emulator 110 to run emulator extension 204 (step 316). This may involve configuring emulator code 203 to initially run emulator extension 204. Next, the system returns to step 306 to continue with the emulation process using the new emulator extension.

[0035] Note that by using multiple emulator extensions it is possible to deal with conflicting emulator environments. For example, a first emulator extension can configure emulator 110 to detect a virus that is triggered by a system call returning the year 1999, while a second emulator extension can configure emulator 110 to detect a virus that is triggered by the same system call returning the year 2000.

[0036] The foregoing descriptions of embodiments of the invention have been presented for purposes of illustration and description only. They are not intended to be exhaustive or to limit the present invention to the forms disclosed. Accordingly, many modifications and variations will be apparent to practitioners skilled in the art. Additionally, the above disclosure is not intended to limit the present invention. The scope of the present invention is defined by the appended claims.


Patent applications by Igor Muttik, Berkhamsted GB

Patent applications in class Software program (i.e., performance prediction)

Patent applications in all subclasses Software program (i.e., performance prediction)


User Contributions:

Comment about this patent or add new information about this topic:

CAPTCHA
Images included with this patent application:
EMULATOR UPDATING SYSTEM AND METHOD diagram and imageEMULATOR UPDATING SYSTEM AND METHOD diagram and image
EMULATOR UPDATING SYSTEM AND METHOD diagram and image
Similar patent applications:
DateTitle
2014-04-03Prespacetime model for generating energy-momentum-mass relationship, self-referential matrix rules and elementary particles
2014-04-03Apparatus system and method of depicting plume arrival times
2014-04-03Method, apparatus and system for customizing a building via a virtual environment
2014-04-03Optical rule checking for detecting at risk structures for overlay issues
2014-04-03Pdc drill bit with cutter design optimized with dynamic centerline analysis and having dynamic centerline trajectory
New patent applications in this class:
DateTitle
2019-05-16Operation model generator and operation model generation method
2017-08-17Simulation server capable of configuring events of a lesson plan through interactions with a computing device
2016-07-07System and method for emulation of unprivileged code in a simulated environment
2016-06-30Method and device for determining program performance interference model
2016-06-16System and method for simulating internet browsing system for user without graphical user interface
New patent applications from these inventors:
DateTitle
2017-02-16Real-time code and data protection via cpu transactional memory suppport
2016-06-30Encryption key retrieval
2016-06-30Memory access protection using processor transactional memory support
2016-06-09User driven emulation of applications
2016-05-26Protecting user identity and personal information by sharing a secret between personal iot devices
Top Inventors for class "Data processing: structural design, modeling, simulation, and emulation"
RankInventor's name
1Dorin Comaniciu
2Charles A. Taylor
3Bogdan Georgescu
4Jiun-Der Yu
5Rune Fisker
Website © 2025 Advameg, Inc.