US 12,079,340 B2
Cloud based just in time memory analysis for malware detection
Aleksandr Dubrovsky, Los Altos, CA (US); Soumyadipta Das, Bangalor (IN); and Senthilkumar Gopinathan Cheetancheri, Fremont, CA (US)
Assigned to SONICWALL INC., Milpitas, CA (US)
Filed by SONICWALL INC., Milpitas, CA (US)
Filed on Sep. 19, 2023, as Appl. No. 18/369,926.
Application 18/369,926 is a continuation of application No. 17/584,152, filed on Jan. 25, 2022, granted, now 11,797,677.
Application 17/584,152 is a continuation of application No. 16/055,958, filed on Aug. 6, 2018, granted, now 11,232,201, issued on Jan. 25, 2022.
Claims priority of provisional application 62/671,293, filed on May 14, 2018.
Prior Publication US 2024/0012907 A1, Jan. 11, 2024
Int. Cl. G06F 21/56 (2013.01); G06F 21/53 (2013.01)
CPC G06F 21/566 (2013.01) [G06F 21/53 (2013.01); G06F 21/561 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method of performing analysis in a cloud computing environment, the method comprising:
receiving a data set including program code from a first computing device via a computer network interface;
collecting information regarding execution of a portion of the program code by a processor, wherein the collected information includes a first set of context information relating to one or more behaviors of the executed portion of the program code;
identifying that the first set of context information indicates one or more states associated with suspicious behavior;
monitoring the executed portion of the program code to identify a trigger based on one or more indicators that the executed portion of the program code has been previously identified as suspicious;
identifying via a deep packet inspection (DPI) that the executed portion of the program code matches a signature of a known set of malware based on the first set of context information matching a second set of context information associated with the known set of malware stored at a second computing device; and
blocking a remaining portion of the program code based on the match to the signature of the known set of malware.