Remote Malware Scanning Capable of Static and Dynamic File Analysis

ABSTRACT

Measures for enabling resource-efficient remote malware scanning capable of static and dynamic file analysis. including, at a remote entity, obtaining metadata of an electronic file to be scanned for malware, said metadata including at least information for identification of one or more file items contained in the electronic file, identifying whether at least one file item of the electronic file is not pre-known at the remote entity, instructing delivery of any identified at least one file item of the electronic file, reconstructing the electronic file by assembling its file items, including any file item of the electronic file, which is not pre-known at the remote entity, and any remaining file item of the electronic file, which is pre-known at the remote entity, on the basis of the obtained metadata of the electronic file, and executing a dynamic malware analysis on a runtime behavior of the reconstructed electronic file.

FIELD

The present invention relates to remote malware scanning capable of static and dynamic file analysis. More specifically, the present invention relates to measures (including methods, apparatuses and computer program products) for enabling remote malware scanning which is capable of executing static and dynamic file analysis for malware scanning.

BACKGROUND

Nowadays, malware scanning is a vital issue in any kind of networks, and is generally directed to identify (and potentially also disinfect) any kind of malware on computer and/or communication systems, such as e.g. viruses, Trojans, worms, or the like. Malware scanning techniques can basically be distinguished in local and remote malware scanning techniques. In local techniques, malware scanning is performed by a dedicated program or application being locally installed on the system to be scanned (i.e. a host). In remote techniques, malware scanning is performed by a dedicated engine or application being arranged on a specific server or any other kind of entity (e.g. in a cloud implementation) which is remotely connected with the system to be scanned via a network (wherein such entity and the system to be scanned can but do not need to be located at different locations).

Remote malware scanning techniques have various advantages over local malware scanning techniques. For example, it is advantageous that only a limited number of remote malware scanning engines or applications needs to be implemented for enabling remote scanning of a greatly larger number of hosts. Further, it is advantageous that reverse engineering of locally installed malware scanning programs or applications at hosts e.g. by a malware author or any malicious entity (for recognizing underlying malware scanning mechanisms for the purpose of circumventing the same) is prevented (as no such local programs or applications are installed and used), thus improving security and reliability.

Yet, remote malware scanning techniques require the communication of data over the network from the system to be scanned to the remote entity performing the remote scanning. In conventional remote malware scanning techniques, it is typically required to upload the entire file to be scanned, thus incurring significant traffic over the network (when a large number of hosts are subject to remote malware scanning) and/or large computational effort and increased time and storage requirements for malware scanning at any remote entity (when a large number of hosts are handled by the same remote entity).

Accordingly, it is desirable to enable resource-efficient remote malware scanning, i.e. to reduce the amount of data to be sent over the network as well as to reduce computational effort and time and storage requirements for remote malware scanning.

In conventional techniques for reducing the amount of data to be sent over the network for enabling remote malware scanning, it is typically proposed that only a portion of the file to be scanned is uploaded. That is, only those parts of the file to be scanned can be uploaded, which are considered as relevant for malware scanning (e.g. because of being of a malware-susceptible type or format), while other parts of the file to be scanned are not uploaded. However, while an improvement in bandwidth, time and storage requirements could be achieved thereby, such conventional techniques are detrimental in that only the thus uploaded parts can be subject to malware scanning, i.e. a static analysis of these parts can be performed. However, since only a portion of the file to be scanned is available at the remote entity, it is not possible to perform a dynamic analysis of the entire file so as to analyze the runtime behavior of the file as such.

Accordingly, it is desirable to enable resource-efficient remote malware scanning which is capable of executing static and dynamic file analysis for malware scanning, thus impeding corruption of security and/or reliability.

SUMMARY

Various exemplifying embodiments of the present invention aim at addressing at least part of the above issues and/or problems.

Various aspects of exemplifying embodiments of the present invention are set out in the appended claims.

According to an example aspect of the present invention, there is provided a method of remote malware scanning, the method comprising: obtaining, at a second node, metadata of an electronic file to be scanned for malware from a first node, said metadata including at least information for identification of one or more file items contained in the electronic file, identifying, at the second node, whether at least one file item of the electronic file is not pre-known in a knowledge base of the second node on the basis of the obtained metadata of the electronic file, delivering an instruction indicating the identified at least one file item of the electronic file from the second node to the first node, if at least one file item is identified as being not pre-known in the knowledge base of the second node, reconstructing, at the second node, the electronic file by assembling its file items, including any file item of the electronic file, which is obtained from the first node in response to the instruction, and any remaining file item of the electronic file, which is pre-known in the knowledge base of the second node, on the basis of the obtained metadata of the electronic file, and executing, at the second node, a dynamic malware analysis on a runtime behavior of the reconstructed electronic file.

According to an example aspect of the present invention, there is provided a method of remote malware scanning, the method comprising: delivering metadata of an electronic file to be scanned for malware from a first node to a second node, said metadata including at least information for identification of one or more file items contained in the electronic file, extracting, at the first node, at least one file item of the electronic file on the basis of an instruction from the second node, said instruction indicating the at least one file item as being not pre-known at the second node, and delivering the extracted at least one file item of the electronic file for malware scanning from the first node to the second node for enabling the second node to reconstruct the electronic file by assembling its file items, including any file item of the electronic file, which is delivered by the first node in response to the instruction, and any remaining file item of the electronic file, which is pre-known in the knowledge base of the second node, on the basis of the obtained metadata of the electronic file.

According to an example aspect of the present invention, there is provided an apparatus, comprising a memory configured to store computer program code, and a processor configured to read and execute computer program code stored in the memory, wherein the processor is configured to cause the apparatus to perform: obtaining, at a second node, metadata of an electronic file to be scanned for malware from a first node, said metadata including at least information for identification of one or more file items contained in the electronic file, identifying, at the second node, whether at least one file item of the electronic file is not pre-known in a knowledge base of the second node on the basis of the obtained metadata of the electronic file, delivering an instruction indicating the identified at least one file item of the electronic file from the second node to the first node, if at least one file item is identified as being not pre-known in the knowledge base of the second node, reconstructing, at the second node, the electronic file by assembling its file items, including any file item of the electronic file, which is obtained from the first node in response to the instruction, and any remaining file item of the electronic file, which is pre-known in the knowledge base of the second node, on the basis of the obtained metadata of the electronic file, and executing, at the second node, a dynamic malware analysis on a runtime behavior of the reconstructed electronic file.

According to an example aspect of the present invention, there is provided an apparatus, comprising means for obtaining, at a second node, metadata of an electronic file to be scanned for malware from a first node, said metadata including at least information for identification of one or more file items contained in the electronic file, means for identifying, at the second node, whether at least one file item of the electronic file is not pre-known in a knowledge base of the second node on the basis of the obtained metadata of the electronic file, means for delivering an instruction indicating the identified at least one file item of the electronic file from the second node to the first node, if at least one file item is identified as being not pre-known in the knowledge base of the second node, means for reconstructing, at the second node, the electronic file by assembling its file items, including any file item of the electronic file, which is obtained from the first node in response to the instruction, and any remaining file item of the electronic file, which is pre-known in the knowledge base of the second node, on the basis of the obtained metadata of the electronic file, and means for executing, at the second node, a dynamic malware analysis on a runtime behavior of the reconstructed electronic file.

According to an example aspect of the present invention, there is provided an apparatus, comprising a memory configured to store computer program code, and a processor configured to read and execute computer program code stored in the memory, wherein the processor is configured to cause the apparatus to perform: delivering metadata of an electronic file to be scanned for malware from a first node to a second node, said metadata including at least information for identification of one or more file items contained in the electronic file, extracting, at the first node, at least one file item of the electronic file on the basis of an instruction from the second node, said instruction indicating the at least one file item as being not pre-known at the second node, and delivering the extracted at least one file item of the electronic file for malware scanning from the first node to the second node for enabling the second node to reconstruct the electronic file by assembling its file items, including any file item of the electronic file, which is delivered by the first node in response to the instruction, and any remaining file item of the electronic file, which is pre-known in the knowledge base of the second node, on the basis of the obtained metadata of the electronic file.

According to an example aspect of the present invention, there is provided an apparatus, comprising means for delivering metadata of an electronic file to be scanned for malware from a first node to a second node, said metadata including at least information for identification of one or more file items contained in the electronic file, means for extracting, at the first node, at least one file item of the electronic file on the basis of an instruction from the second node, said instruction indicating the at least one file item as being not pre-known at the second node, and means for delivering the extracted at least one file item of the electronic file for malware scanning from the first node to the second node for enabling the second node to reconstruct the electronic file by assembling its file items, including any file item of the electronic file, which is delivered by the first node in response to the instruction, and any remaining file item of the electronic file, which is pre-known in the knowledge base of the second node, on the basis of the obtained metadata of the electronic file.

According to further developments and/or modifications of any one of the aforementioned example aspects of the present invention, for example, one or more of the following can apply:

-   -   the identifying may comprise checking the knowledge base for         presence of information on the one or more file items contained         in the electronic file, for which information for identification         is included in the metadata, on the basis of the obtained         metadata of the electronic file, and determining, as the         identified at least one file item of the electronic file, all of         the one or more file items subject to the knowledge base         checking, for which no information is present in the knowledge         base,     -   the operability may comprise executing a static malware analysis         of any file item of the electronic file, which is obtained from         the first node in response to the instruction, and/or retrieving         a result of a static malware analysis of any remaining file item         of the electronic file, which is pre-known in the knowledge base         of the second node, from the knowledge base,     -   a result of the dynamic malware analysis and/or a result of the         static malware may be registered in the knowledge base,     -   an overall malware scanning result of the electronic file may be         constructed on the basis of the results of the malware analysis         of any one of the reconstructed electronic file, any file item         of the electronic file, which is obtained from the first node in         response to the instruction, and any remaining file item of the         electronic file, which is pre-known in the knowledge base of the         second node, and the constructed overall malware scanning result         may be delivered from the second node to the first node,     -   the operability may comprise performing a malware property query         for the electronic file and the one or more file items contained         in the electronic file, wherein the operations of delivering         metadata, extracting at least one file item and delivering the         extracted at least one file item may be initiated when the         malware property query for at least one of the electronic file         and the one or more file items contained in the electronic file         yields a non-conclusive result,     -   the metadata may further include information for identification         of the electronic file itself,     -   the information for identification may comprise a secure hash         value,     -   the knowledge base may comprise a database of a reputation         service, and any information in the knowledge base indicates a         reputation of a subject file item and/or a subject electronic         file, such as clean, infected or potentially unwanted,     -   the electronic file to be scanned may comprise a file of at         least one of an Android Application Package (APK), a Portable         Executable (PE), a Microsoft Soft Installer (MSI) or any other         format capable of distributing and/or installing application         software or middleware on a computer,     -   the first node may comprise a malware scanning agent,     -   the second node may comprise a malware scanning engine or         application.

According to an example aspect of the present invention, there is provided a computer program product, comprising computer-executable computer program code which, when the computer program code is executed on a computer (such as or included in an apparatus according to any one of the aforementioned apparatus-related example aspects of the present invention), is configured to cause the computer to carry out a method according to the aforementioned method-related example aspect of the present invention, including any developments and/or a modifications thereof.

The computer program product may comprise or may be embodied as a (tangible/non-transitory) computer-readable (storage) medium or the like, on which the computer-executable computer program code is stored, and/or the program is directly loadable into an internal memory of the computer or a processor thereof.

Further developments and/or modifications of the aforementioned example aspects of the present invention are set out herein with reference to the drawings and exemplifying embodiments of the present invention.

By way of exemplifying embodiments of the present invention, remote malware scanning is enabled, which is capable of reducing required traffic and bandwidth (and speeding up remote malware scanning) and/or impeding corruption of security and reliability.

BRIEF DESCRIPTION OF THE DRAWINGS

In the following, the present invention will be described in greater detail by way of non-limiting examples with reference to the accompanying drawings, in which

FIG. 1 shows a schematic diagram illustrating a system configuration, for which exemplifying embodiments of the present invention are applicable,

FIG. 2 shows a flowchart illustrating an example of a method, operable at a remote entity (server), according to exemplifying embodiments of the present invention,

FIG. 3 shows a flowchart illustrating an example of a method, operable at a local entity (host), according to exemplifying embodiments of the present invention,

FIG. 4 shows a diagram illustrating an example of a procedure of remote malware scanning according to exemplifying embodiments of the present invention,

FIG. 5 shows a diagram illustrating another example of a procedure of remote malware scanning according to exemplifying embodiments of the present invention, and

FIG. 6 shows a schematic diagram illustrating an example of a structure of an apparatus according to exemplifying embodiments of the present invention.

DETAILED DESCRIPTION

The present invention is described herein with reference to particular non-limiting examples and to what are presently considered to be conceivable embodiments of the present invention. A person skilled in the art will appreciate that the present invention is by no means limited to these examples, and may be more broadly applied.

Hereinafter, various exemplifying embodiments and implementations of the present invention and its aspects are described using several variants and/or alternatives. It is generally noted that, according to certain needs and constraints, all of the described variants and/or alternatives may be provided alone or in any conceivable combination (also including combinations of individual features of the various variants and/or alternatives). In this description, the words “comprising” and “including” should be understood as not limiting the described exemplifying embodiments and implementations to consist of only those features that have been mentioned, and such exemplifying embodiments and implementations may also contain features, structures, units, modules etc. that have not been specifically mentioned.

In the drawings, it is noted that lines/arrows interconnecting individual blocks or entities are generally meant to illustrate an operational coupling there-between, which may be a physical and/or logical coupling, which on the one hand is implementation-independent (e.g. wired or wireless) and on the other hand may also comprise an arbitrary number of intermediary functional blocks or entities not shown.

According to exemplifying embodiments of the present invention, in general terms, there are provided measures and mechanisms for enabling resource-efficient remote malware scanning which is capable of executing static and dynamic file analysis for malware scanning, as described in more details below.

FIG. 1 shows a schematic diagram illustrating a system configuration, for which exemplifying embodiments of the present invention are applicable.

As shown in FIG. 1, exemplifying embodiments of the present invention generally relate to a system configuration in which a local entity or host 1 and a remote entity or server 2 are connected via a network 3. Here, the host 1 exemplifies any computer or communication system (including a single device or a combination of devices), on which malware scanning is to be performed (remotely at/by the server). For example, the host 1 may include a personal computer, a personal communication device, a network-enabled device, a client, a firewall, a mail server, a proxy server, a database server, or the like. The server 2 exemplifies any computer or communication system (including a single device or a combination of devices), on which malware scanning is performed (of/for the host 1). For example, the server 2 may include a security entity or a backend entity of a security provider, or the like, and the server 2 may be realized in a cloud implementation or the like.

According to exemplifying embodiments of the present invention, remote malware scanning of/for the host 1 at/by the server 3 can be realized using a malware scanning agent (such as e.g. a (lightweight) anti-virus client or the like) being installed/arranged at the host 1 (like e.g. an anti-virus client function) and a malware scanning engine or application being installed/arranged at the server 3 (like e.g. an anti-virus server function).

The network 2 exemplifies any computer or communication network, including e.g. a (wired or wireless) local area network like LAN, WLAN, Ethernet, or the like, a (wired or wireless) wide area network like WiMAX, GSM, UMTS, LTE, or the like, and so on. Hence, the host 1 and the server 2 can but do not need to be located at different locations. For example, the network 3 may be any kind of TCP/IP-based network. Insofar, communication between the host 1 and the server 2 over the network 3 can be realized using for example any standard or proprietary protocol carried over TCP/IP, and in such protocol the malware scanning agent at the host 1 and the malware scanning engine or application at the server 3 can be represented on/as the application layer.

FIG. 2 shows a flowchart illustrating an example of a method, operable at a second node, according to exemplifying embodiments of the present invention. The thus illustrated method is for example operable at the remote entity or server as illustrated in FIG. 1 (e.g. by or using the malware scanning engine or application thereof).

As shown in FIG. 2, a method according to exemplifying embodiments of the present invention, which is operable at a second node such as a remote entity or server, and which could be referred to as method of remote malware scanning, comprises an operation (S210) of obtaining (receiving) metadata of an electronic file to be scanned for malware from a first node (such as the local entity of host as illustrated in FIG. 1), said metadata including at least information for identification of one or more file items contained in the electronic file (and optionally also information for identification the electronic file itself), and an operation (S220) of identifying whether at least one file item of the electronic file is not pre-known in a knowledge base of the second node (i.e. at the second node), on the basis of the obtained (received) metadata of the electronic file. If at least one file item is identified as being not pre-known in the knowledge base of the second node (YES in S220), which means that the second node does not have available all information/data required for reconstructing the electronic file, the method further comprises an operation (S230) of delivering (transferring) an instruction indicating the identified at least one file item of the electronic file from the second node to the first node (i.e. an operation of instructing delivery (transfer) of the identified at least one file item). This instruction serves to acquire any previously unavailable information/data required for reconstructing the electronic file so as to enable reconstruction of the electronic file. If no file item is identified as being not pre-known in the knowledge base of the second node (NO in S220), which means that the second node has available all information/data required for reconstructing the electronic file, no such instruction is delivered (transferred) from the second node to the first node. Then, the method proceeds with a malware scanning operation. In such malware scanning operation, the method comprises and an operation (S240) of reconstructing the electronic file by assembling its file items, wherein the thus assembled file items include any file item of the electronic file, which is obtained (received) from the first node in response to the instruction, and any remaining file item of the electronic file, which is pre-known in the knowledge base of the second node (i.e. at the second node), on the basis of the obtained metadata of the electronic file, and an operation (S250) of executing, at the second node, a dynamic malware analysis on a runtime behavior of the reconstructed electronic file.

FIG. 3 shows a flowchart illustrating an example of a method, operable at a first node, according to exemplifying embodiments of the present invention. The thus illustrated method is for example operable at the local entity or host as illustrated in FIG. 1 (e.g. by or using the malware scanning agent thereof).

As shown in FIG. 3, a method according to exemplifying embodiments of the present invention, which is operable at a first node such as a local entity or host, and which could be referred to as method of remote malware scanning, comprises the following operations: an operation (S310) of delivering (transferring) metadata of an electronic file to be scanned for malware to a second node (such as the remote entity or server as illustrated in FIG. 1), said metadata including at least information for identification of one or more file items contained in the electronic file, an operation (S320) of extracting at least one file item of the electronic file on the basis of an instruction from the second node, said instruction indicating the at least one file item as being not pre-known at the second node (or, stated in other word, instructing delivery (transfer) of the identified at least one file item), and an operation (S330) of delivering (transferring) the extracted at least one file item of the electronic file for malware scanning to the second node. By way of delivering (transferring) the extracted at least one file item of the electronic file for malware scanning to the second node, the first node enables the second node to reconstruct the electronic file by assembling its file items, wherein the thus to-be-assembled file items include any file item of the electronic file, which is delivered (transferred) by the first node in response to the instruction, and any remaining file item of the electronic file, which is pre-known in the knowledge base of the second node (i.e. at the second node), on the basis of the obtained metadata of the electronic file.

According to exemplifying embodiments of the present invention, the electronic file to be scanned for malware can be any electronic file, particularly encompassing any electronic file including a runnable/executable part, such as any kind of application file. Insofar, exemplifying embodiments of the present invention are applicable to any such electronic file, including for example a file of an Android Application Package (APK), a Portable Executable (PE), a Microsoft Soft Installer (MSI) or any other format capable of distributing and/or installing application software or middleware on a computer. The electronic file referred to herein may be understood as sort of file container with (un-/compressed) files representing file items thereof, or may equally be understood as sort of file with (n-/compressed) portions representing file items thereof.

According to exemplifying embodiments of the present invention, it is assumed that the second node has or has access to a knowledge base usable for malware scanning. The knowledge base stores (a pointer to and/or copy of) any file item (and potentially also any file) which has previously been subject to malware scanning at the second node (or which has previously been subject to malware scanning at another node which reported the result thereof to the second node), and/or information on a malware property (corresponding to a malware scanning result) of any such file item (and potentially also any file). That is, the knowledge base includes information regarding malware scanning for any file item (or file) which is known at the second node or, more specifically, the malware property of which is known at the second node. For example, the knowledge base may comprise a database of a reputation service, and any information in the knowledge base indicates a reputation of a subject file item, such as clean, infected or potentially unwanted (e.g. PUA: potentially unwanted application). The knowledge base may be queried by using any arbitrary identification of file items (or files). For example, a secure hash value, e.g. a SHA1 checksum, of a file item (or file) may be used for identification/query purposes, and the metadata described herein thus includes corresponding information for identification of one or more file items contained in the electronic file, which is suitable for identification/query purposes for the knowledge base.

According to exemplifying embodiments of the present invention, the malware scanning of the electronic file at the remote entity particularly involves dynamic malware analysis, but may also involve static malware analysis, on the basis of the (i.e. all (relevant) file items of the electronic file, namely any file item which is obtained from the first node in response to the instruction for delivery (also referred to as the previously unknown file items) and any remaining which is pre-known in the knowledge base of the second node (also referred to as previously known file items)).

According to exemplifying embodiments of the present invention, (a copy of) all (relevant) file items for dynamic (and static) malware analysis will eventually be in the possession of the remote entity.

For the dynamic malware analysis, the electronic file is reconstructed by assembling the previously unknown file items and the previously known file items on the basis of the metadata of the electronic file, which is obtained from the first node, and a dynamic malware analysis on a runtime behavior of the reconstructed electronic file is executed for the thus the reconstructed electronic file.

For the static malware analysis, the individual file items of the electronic file to be scanned for malware are used. More specifically, for the previously known file items (for which information is already stored in the knowledge base), a result of a static malware analysis can be retrieved from the knowledge base, and, for the previously unknown file items (for which no information is already stored in the knowledge base), a static malware analysis can be executed so as to obtain a result of a static malware analysis.

Generally, it is noted that the malware scanning may typically be performed on, for or with all file items of the electronic file to be scanned for malware. Yet, it may also be sufficient or expedient to perform the malware scanning on, for or with (relevant) file items of the electronic file only. In this case, the one or more file items contained in the electronic file, for which information for identification is included in the metadata delivered from the first node to the second node may comprise only those file items of the electronic file, which are relevant for malware scanning and/or susceptible to malware. If so, the identification of the previously unknown file item at the second node is carried out for these with (relevant) file items of the electronic file only.

FIG. 4 shows a diagram illustrating an example of a procedure of remote malware scanning according to exemplifying embodiments of the present invention.

Basically, FIG. 4 illustrates the cooperation or interrelation between the operation of the first node, i.e. the method of/at the host illustrated in FIG. 3, and the operation of the second node, i.e. the method of/at the server illustrated in FIG. 2. Accordingly, reference is made to the above description of FIGS. 2 and 3 for details.

It is noted that the operations of delivering the instruction for delivery of identified file item/s, extracting identified file item/s and delivering extracted file/items, as illustrated in FIG. 4, are optional and occur only in the event that the preceding identifying operation identifies (that there is) at least one previously unknown file item, which is required for reconstruction of the electronic file.

FIG. 5 shows a diagram illustrating another example of a procedure of remote malware scanning according to exemplifying embodiments of the present invention.

Basically, FIG. 5 illustrates, by way of dashed lines, arrows and blocks, various optional operations in the procedure of FIG. 4, which are independently useful, and which can be individually incorporated in the procedure of FIG. 4 independent from each other. Further, FIG. 5 schematically illustrates a knowledge base accessible by the second node, wherein the knowledge base, as indicated above, may for example be a database of a reputation service, which may be located locally or remotely with respect to the second node.

As illustrated in FIG. 5, the following operations, variants or implementations are practicable.

Before start of the above-described procedure, the first node may perform a malware property query for the electronic file and the one or more file items contained in the electronic file. Such malware property query may be a reputation query at a reputation database, such as the knowledge base of the second node. Then, the above-described procedure, including the respective operations at the first and second nodes, as illustrated in any one of FIGS. 4 and 5, are initiated when the malware property query (reputation query) for at least one of the electronic file and the one or more file items contained in the electronic file yields a non-conclusive result. Otherwise, the above-described procedure can be skipped, and the conclusive result of the malware property query (reputation query) may be used as or for constructing a malware scanning result with respect to the electronic file, and processing of the electronic file may be based on such malware scanning result.

In the operation of identifying the at least one file item (which is not pre-known at the second node and thus has to be requested for enabling malware scanning of the electronic file at the second node), the second node may utilize the knowledge base. More specifically, the second node may check the knowledge base for presence of information on the one or more file items contained in the electronic file, for which information for identification is included in the metadata delivered by the first node. Accordingly, such check may be performed with the knowledge base on the basis of the obtained metadata of the electronic file. Based on such check, the second node may determine, as the identified at least one file item of the electronic file, all of the one or more file items subject to the knowledge base checking, for which no information is present in the knowledge base. That is, any file item, for which no (relevant or conclusive) information can be retrieved in the knowledge base, is identified as previously unknown file item.

In the operation of performing malware scanning, although not illustrated in FIG. 5, the second node reconstructs the electronic file by assembling any file item of the electronic file, which is obtained from the first node in response to the delivery instruction, if any, and/or any remaining file item of the electronic file, which is pre-known in the knowledge base of the second node, if any, on the basis of the obtained metadata of the electronic file. That is, the second node gathers all of the (relevant) file items of the electronic file from the knowledge base (as regards the previously known file items) and the present delivery by the first node (as regards the previously unknown file items), and constructs/assembles the electronic file using the thus gathered file items. The thus constructed/assembled electronic file is runnable/executable, and the second node then executes a dynamic malware analysis on a runtime behavior of the reconstructed electronic file by running/executing the thus constructed/assembled electronic file.

In the operation of performing malware scanning, the second node may execute a static malware analysis of any one of any file item of the electronic file, which is obtained from the first node in response to the delivery instruction, i.e. for the previously unknown file items, if any, and/or retrieve a result of a static malware analysis of any remaining file item of the electronic file, which is pre-known in the knowledge base of the second node, from the knowledge base, i.e. for the previously known file items, if any.

In the operation of performing malware scanning, the second node may construct an overall malware scanning result of the electronic file on the basis of the results of the malware analysis of any one of the reconstructed electronic file, the at least one file item of the electronic file, which is obtained from the first node in response to the instruction, and the remaining at least one file item of the electronic file, which is pre-known in the knowledge base of the second node, i.e. the individual results of the static and dynamic malware analyses. The second node may then register (store) the overall malware scanning result of the electronic file in the knowledge base and/or deliver (transfer) the overall malware scanning result of the electronic file to the first node.

In the operation of performing malware scanning, i.e. as a result of the malware scanning, the second node may register (store) a result of the dynamic malware analysis of the reconstructed electronic file and/or a result of the static malware analysis of any one of the at least one file item of the electronic file, which is obtained from the first node in response to the instruction, is registered in the knowledge base.

At the end of the above-described procedure, the first node may obtain (receive) an overall malware scanning result of the electronic file from the second node, and may process the electronic file based on such overall malware scanning result.

In the following, a non-limiting exemplary use case according to exemplifying embodiments of the present invention will be described for explanatory purposes, with reference to the exemplary procedure of FIG. 5 (while it is noted that corresponding operations are equally practicable in the procedure of FIG. 4 as well).

For such exemplary use case, it is exemplarily assumed that the electronic file to be scanned for malware is an APK file including two files f1 and f2. Among the APK files, (a copy of) file f1 is registered in the knowledge base of the server (i.e. file f1 is a previously known file item of the subject APK file for the server), and (a copy of) file, f2 is not registered in the knowledge of the server (i.e. file f2 is a previously unknown file item of the APK file for the server). The reasons for file f2 being not pre-known at the server may be manifold, e.g. that file f2 has been updated or otherwise changed/modified or has been tampered since the preceding malware scan of the APK file. Further, it is exemplarily assumed that any file or file item is identified by its SHA1 checksum representing a non-limiting example of a secure hash value.

Initially, the host (e.g. an Android Ultralight SDK at the host) may calculate SHA1 checksums for all (relevant) files inside the APK file (e.g. files f1 and f2), and query (look up) reputations for the whole APK file and the (relevant) files of the APK file. In case the decision on reputation, i.e. whether the whole APK file and the (relevant) files of the APK file are clean or malware, cannot be made in a conclusive manner by way of such reputation query (lookup), the host initiates the further procedure as described below.

The host gets (at least) the (relevant) metadata of the APK file, i.e. those APK metadata which are required for the server to identify/assess and (re-) construct/assemble the APK file, and sends this APK metadata to the server.

Such metadata may relate to files f1 and f2 only, and optionally also to the APK file itself. For any files of the APK file (and the APK file itself), the APK metadata could contain their respective paths and a SHA1 checksum of each path. Such transmission of APK metadata may be regarded as a preview request.

In this regard, it is assumed that the server knows or gets to know that the APK file, for which the metadata is sent from the host, is to be scanned for malware. Such knowledge may be given in any conceivable manner, either implicitly (e.g. by the mere reception of metadata from a (potentially registered) host and/or for a (potentially) malware-susceptible file) or explicitly (e.g. by a corresponding indication in or before the transmission of the metadata).

The server receives the APK metadata for files f1 and f2 (and the APK file). Based thereon, the server may check the knowledge base and determine that file f1 is registered and thus known, while file f2 is not registered and thus unknown. Hence, file f2 is identified as a previously unknown file item, i.e. a file item which is not pre-known and is thus missing for enabling malware scanning of the overall APK file.

Based on the metadata of the APK file, the server may check the knowledge base and determine whether (a copy of) the APK file itself is registered or not. If the APK file itself is not registered, this may be due to the fact that it is a new APK file or a previously known APK file has been changed. These cases may be differentiated using the APK metadata for its files, e.g. files f1 and f2. For a new APK file, all file items are previously unknown file items. For a changed APK file, only the changed file items are previously unknown file items. For example, when a previously known APK file has been changed by deletion of one of more file items, this can be recognized using the metadata of the APK file (and the APK metadata for its files, e.g. files f1 and f2), delivery of missing file item/s for enabling malware scanning of the overall APK file is only caused, if any one of the still included file item/s is identified as a previously unknown file item.

In the present exemplary use case, as the server cannot perform malware scanning, thus being unable to make a decision on the malware property of the APK file, on the basis of the available information, the server requests provision of the missing information. In this case, the server instructs the host to deliver the missing file item/s, namely file f2. To this end, the server sends a corresponding instruction to the host, which may be regarded as a command or directive for extracting the missing file item/s from the APK file or as a recipe of/for the APK file to be (re-) constructed/assembled.

In response to such request or instruction from the server, the host extracts the APK file accordingly. More specifically, the host extracts the requested missing file item/s, namely file f2, from the APK file, and send the thus extracted file item/s, namely file f2, back to the server, in accordance with the command/directive or recipe from the server. At this point, (relevant) metadata of or relating to the thus delivered file item/s, namely file f2, can also be provided. It is noted that, according to certain constraints, the host may deliver only a subset of requested missing file item/s to the server.

Upon receipt of the requested missing file item/s, namely file f2, the server performs malware scanning of the APK file. Namely, the server now has available all required information/data, namely (copies of) files f1 and f2 (and related metadata). Based thereon, the server (re-) constructs/assembles the APK file using the meanwhile available files f1 and f2 in connection with the accompanying metadata, and executes a dynamic malware analysis on a runtime behavior of the reconstructed APK file. The thus (re-)constructed/assembled APK file corresponds to the (original) APK file to be scanned for malware, at least as far as expedient for performing appropriate malware scanning. That is, the (re-) constructed/assembled APK file may be identical or at least similar to the (original) APK file in that a potential difference resides only in irrelevant/negligible points such as signature/s, date/s or the like. Also, the server may perform static malware analysis for the individual files of the APK file, in the present case including e.g. execution of a static malware analysis of/for previously unknown file f2, and retrieval of for previously known file f1 from the knowledge base.

As a result of the thus performed malware scanning, the server may register the result of the dynamic malware analysis of the APK file and/or the result of the static malware analysis of the file F2 in the knowledge base, since such results for this file and this file item are newly derived. Also, the server may construct an overall malware scanning result for the APK file (and its files f1 and f2), and sent this overall malware scanning result to the host, where the overall malware scanning result may be used for the further processing of the APK file.

For example, if file f2 is assessed as being infected and/or the reconstructed APK file is assessed as exhibiting an infected or suspicious behavior, the server may register and inform the host that file f2 is infected and/or the

APK file exhibits infected or suspicious behavior, or—in a summary—that the APK file is infected or suspicious, i.e. not clean. Incidentally, the server may assess that file f1 as being infected already upon initial reception of the APK metadata (on the basis of a query of the knowledge base, if such query yields that file f1 is infected); in such case, the subsequent operations up to the and including the malware scanning may be skipped, and a corresponding (negative) overall malware scanning result may be constructed and provided accordingly.

In view of the above illustration of procedures, it is noted that any block may represent a single or multiple operations, and that any arrow may represent a single or multiple transmissions or operations. For example, although a single transmission of metadata and a single transmission of extracted file item/s are illustrated in FIGS. 4 and 5, the metadata and the extracted file item/s may also be transmitted in more than one transmission, respectively.

By virtue of exemplifying embodiments of the present invention, as described above, resource-efficient remote malware scanning is enabled, which is capable of executing static and dynamic file analysis for malware scanning.

In a nutshell, the technical effects of exemplifying embodiments of the present invention can be achieved as follows.

-   -   Resource efficiency can be achieved in that initially only         metadata for a file to be malware-scanned is transmitted and         subsequently only the missing file item/s is/are transmitted         upon request (rather than initially transmitting the entire file         to be malware-scanned). Resource efficiency can also be achieved         in that only actually required data is transmitted, stored and         processed (rather than requiring the handling of multiple copies         of the same data in various executions of the same procedure).     -   Capability of executing dynamic (and static) file analysis for         malware scanning, i.e. a comprehensive malware scan of the file         to be malware-scanned, can be achieved in that initially missing         file item/s are provided upon request such that complete         information for the file to be malware-scanned, enabling not         only static but also dynamic (behavioral or runtime) analysis,         is eventually available at the remote malware scanning entity         (rather than merely omitting certain parts of information for         reducing resource requirements).

Accordingly, exemplifying embodiments of the present invention are able to minimize the amount of data sent via a network for static scanning and behavioral analysis, and/or to save bandwidth from end user's (host's) and security provider's (server's) perspective, and/or to reduce time, computational and/or storage requirements for remote malware scanning. Specifically, it can be said that exemplifying embodiments of the present invention can save bandwidth, time and processing load by preventing uploading and processing redundant files to the remote malware scanning entity, yet still being able to analyze behavior of the file (e.g. the application) instead of relying only on static analysis of the components of the file (e.g. the application).

The technical effects of exemplifying embodiments of the present invention are generally beneficial for remote malware scanning of any tape of electronic file, especially any electronic file configured for or capable of distributing and/or installing application software or middleware on a computer. Stated in other words, exemplifying embodiments of the present invention are specifically effective for any electronic file including at least one runnable/executable file item, since a dynamic (behavioral) analysis is typically expedient for such type of electronic file (and such dynamic (behavioral) analysis can oftentimes not be accomplished at by a (lightweight) malware scanning agent of e.g. a mobile device).

The technical effects of exemplifying embodiments of the present invention are particularly beneficial for files or file types/formats subject to frequent changes (of minor extent). This is for example the case for APK files. Namely, e.g. for Android-running mobile devices, software vendors update their applications every now and then, and this leads to a situation that basically all new versions of applications would conventionally be uploaded to a remote malware canning entity even if there is only a minor change in the application itself. For example, a change in an application's colors/fonts, etc. makes that application look new when e.g. using a secure hash values such as SHA1 checksums for file and file item identification. Accordingly, the entire APK file would conventionally have to be uploaded and subject to remote malware scanning again every time, but only the actually changed/modified part thereof is sufficient to be uploaded and subject to remote malware scanning with embodiments of the present invention.

Especially, certificates and fairly large libraries are commonly contributing a significant portion of APK size, and upload and processing thereof can be avoided with embodiments of the present invention. This applies to all self-contained application and file formats, as many parts thereof are typically reused, and embodiments of the present invention facilitate handling of only the changed part/s, including e.g. updated part/s, tampered part/s or otherwise changed/modified part/s.

The above-described methods, procedures and functions may be implemented by respective functional elements, entities, modules, units, processors, or the like, as described below.

While in the foregoing exemplifying embodiments of the present invention are described mainly with reference to methods, procedures and functions, corresponding exemplifying embodiments of the present invention also cover respective apparatuses, entities, modules, units, nodes and systems, including both software and/or hardware thereof.

Respective exemplifying embodiments of the present invention are described below referring to FIG. 6, while for the sake of brevity reference is made to the detailed description of respective corresponding configurations/setups, schemes, methods and functionality, principles and operations according to FIGS. 1 to 5.

In FIG. 6, the solid line blocks are basically configured to perform respective methods, procedures and/or functions as described above. The entirety of solid line blocks are basically configured to perform the methods, procedures and/or functions as described above, respectively. With respect to FIG. 6, it is to be noted that the individual blocks are meant to illustrate respective functional blocks implementing a respective function, process or procedure, respectively. Such functional blocks are implementation-independent, i.e. may be implemented by means of any kind of hardware or software or combination thereof, respectively.

Further, in FIG. 6, only those functional blocks are illustrated, which relate to any one of the above-described methods, procedures and/or functions. A skilled person will acknowledge the presence of any other conventional functional blocks required for an operation of respective structural arrangements, such as e.g. a power supply, a central processing unit, respective memories, a display, or the like. Among others, one or more memories are provided for storing programs or program instructions for controlling or enabling the individual functional entities or any combination thereof to operate as described herein in relation to exemplifying embodiments.

In general terms, respective devices/apparatuses (and/or parts thereof) may represent means for performing respective operations and/or exhibiting respective functionalities, and/or the respective devices (and/or parts thereof) may have functions for performing respective operations and/or exhibiting respective functionalities.

In view of the above, the thus illustrated devices/apparatuses are suitable for use in practicing one or more of the exemplifying embodiments of the present invention, as described herein.

FIG. 6 shows a schematic diagram illustrating an example of a structure of an apparatus according to exemplifying embodiments of the present invention.

As indicated in FIG. 6, an apparatus 610 according to exemplifying embodiments of the present invention may comprise at least one processor 611 and at least one memory 612 (and possibly also at least one interface 613), which may be operationally connected or coupled, for example by a bus 614 or the like, respectively.

The processor 611 of the apparatus 610 is configured to read and execute computer program code stored in the memory 612. The processor may be represented by a CPU (Central Processing Unit), a MPU (Micro Processor Unit), etc., or a combination thereof. The memory 612 of the apparatus 610 is configured to store computer program code, such as respective programs, computer/processor-executable instructions, macros or applets, etc. or parts of them. Such computer program code, when executed by the processor 611, enables the apparatus 610 to operate in accordance with exemplifying embodiments of the present invention. The memory 612 may be represented by a RAM (Random Access Memory), a ROM (Read Only Memory), a hard disk, a secondary storage device, etc., or a combination of two or more of these. The interface 613 of the apparatus 610 is configured to interface with another apparatus and/or the user of the apparatus 610. That is, the interface 613 may represent a communication interface (including e.g. a modem, an antenna, a transmitter, a receiver, a transceiver, or the like) and/or a user interface (such as a display, touch screen, keyboard, mouse, signal light, loudspeaker, or the like).

The apparatus 610 may, for example, represent a (part of a) first node, such as local entity or host 1 in FIG. 1, or may represent a (part of a) second node, such as remote entity or server 2 in FIG. 1. The apparatus 610 may be configured to perform a procedure and/or exhibit a functionality as described in any one of FIGS. 2 to 5.

When representing a (part of a) first node, such as local entity or host 1 in FIG. 1, the apparatus 610 or its processor 611 (possibly together with computer program code stored in the memory 612), in its most basic form, is configured to deliver metadata of an electronic file to be scanned for malware to a second node, said metadata including at least information for identification of one or more file items contained in the electronic file, to extract at least one file item of the electronic file on the basis of an instruction from the second node, said instruction indicating the at least one file item as being not pre-known at the second node, and to deliver the extracted at least one file item of the electronic file for malware scanning to the second node for enabling the second node to reconstruct the electronic file by assembling its file items, including any file item of the electronic file, which is delivered by the first node in response to the instruction, and any remaining file item of the electronic file, which is pre-known in the knowledge base of the second node, on the basis of the obtained metadata of the electronic file.

When representing a (part of a) second node, such as remote entity or server 2 in FIG. 1, the apparatus 610 or its processor 611 (possibly together with computer program code stored in the memory 612), in its most basic form, is configured to obtain metadata of an electronic file to be scanned for malware from a first node, said metadata including at least information for identification of one or more file items contained in the electronic file, to identify whether at least one file item of the electronic file is not pre-known in a knowledge base of the second node, on the basis of the obtained metadata of the electronic file, to deliver an instruction indicating the identified at least one file item of the electronic file to the first node, if at least one file item is identified as being not pre-known in the knowledge base of the second node, to reconstruct the electronic file by assembling its file items, including any file item of the electronic file, which is obtained from the first node in response to the instruction, and any remaining file item of the electronic file, which is pre-known in the knowledge base of the second node, on the basis of the obtained metadata of the electronic file, and to execute a dynamic malware analysis on a runtime behavior of the reconstructed electronic file.

Accordingly, any one of the above-described schemes, methods, procedures, principles and operations may be realized in a computer-implemented manner.

Any apparatus according to exemplifying embodiments of the present invention may be structured by comprising respective units or means for performing corresponding operations, procedures and/or functions. For example, such means may be implemented/realized on the basis of an apparatus structure, as exemplified in FIG. 6 above, i.e. by one or more processors 611, one or more memories 612, one or more interfaces 613, or any combination thereof.

An apparatus according to exemplifying embodiments of the present invention, which represents a (part of a) first node, such as local entity or host 1 in FIG. 1, may comprise (at least) a unit or means for delivering metadata of an electronic file to be scanned for malware to a second node, said metadata including at least information for identification of one or more file items contained in the electronic file, a unit or means for extracting at least one file item of the electronic file on the basis of an instruction from the second node, said instruction indicating the at least one file item as being not pre-known at the second node, and a unit or means for delivering the extracted at least one file item of the electronic file for malware scanning to the second node for enabling the second node to reconstruct the electronic file by assembling its file items, including any file item of the electronic file, which is delivered by the first node in response to the instruction, and any remaining file item of the electronic file, which is pre-known in the knowledge base of the second node, on the basis of the obtained metadata of the electronic file.

An apparatus according to exemplifying embodiments of the present invention, which represents a (part of a) first node, such as remote entity or server 2 in FIG. 1, may comprise (at least) a unit or means for obtaining metadata of an electronic file to be scanned for malware from a first node, said metadata including at least information for identification of one or more file items contained in the electronic file, a unit or means for identifying whether at least one file item of the electronic file is not pre-known in a knowledge base of the second node, on the basis of the obtained metadata of the electronic file, a unit or means for delivering an instruction indicating the identified at least one file item of the electronic file to the first node, if at least one file item is identified as being not pre-known in the knowledge base of the second node, a unit or means for reconstructing the electronic file by assembling its file items, including any file item of the electronic file, which is obtained from the first node in response to the instruction, and any remaining file item of the electronic file, which is pre-known in the knowledge base of the second node, on the basis of the obtained metadata of the electronic file, and a unit or means for executing a dynamic malware analysis on a runtime behavior of the reconstructed electronic file.

For further details regarding the operability/functionality of the individual elements according to exemplifying embodiments of the present invention, reference is made to the above description in connection with any one of FIGS. 1 to 5, respectively.

According to exemplifying embodiments of the present invention, any one of the processor, the memory and the interface may be implemented as individual modules, chips, chipsets, circuitries or the like, or one or more of them can be implemented as a common module, chip, chipset, circuitry or the like, respectively.

According to exemplifying embodiments of the present invention, a system may comprise any conceivable combination of the thus depicted devices/apparatuses and other network elements, which are configured to cooperate as described above.

In general, it is to be noted that respective functional blocks or elements according to above-described aspects can be implemented by any known means, either in hardware and/or software, respectively, if it is only adapted to perform the described functions of the respective parts. The mentioned method steps can be realized in individual functional blocks or by individual devices, or one or more of the method steps can be realized in a single functional block or by a single device.

Generally, any method step is suitable to be implemented as software or by hardware without changing the idea of the present invention. Such software may be software code independent and can be specified using any known or future developed programming language, such as e.g. Java, C++, C, and Assembler, as long as the functionality defined by the method steps is preserved. Such hardware may be hardware type independent and can be implemented using any known or future developed hardware technology or any hybrids of these, such as MOS (Metal Oxide Semiconductor), CMOS (Complementary MOS), BiMOS (Bipolar MOS), BiCMOS (Bipolar CMOS), ECL (Emitter Coupled Logic), TTL (Transistor-Transistor Logic), etc., using for example ASIC (Application Specific IC (Integrated Circuit)) components, FPGA (Field-programmable Gate Arrays) components, CPLD (Complex Programmable Logic Device) components or DSP (Digital Signal Processor) components. A device/apparatus may be represented by a semiconductor chip, a chipset, or a (hardware) module comprising such chip or chipset; this, however, does not exclude the possibility that a functionality of a device/apparatus or module, instead of being hardware implemented, be implemented as software in a (software) module such as a computer program or a computer program product comprising executable software code portions for execution/being run on a processor. A device may be regarded as a device/apparatus or as an assembly of more than one device/apparatus, whether functionally in cooperation with each other or functionally independently of each other but in a same device housing, for example.

Apparatuses and/or units, means or parts thereof can be implemented as individual devices, but this does not exclude that they may be implemented in a distributed fashion throughout the system, as long as the functionality of the device is preserved. Such and similar principles are to be considered as known to a skilled person.

Software in the sense of the present description comprises software code as such comprising code means or portions or a computer program or a computer program product for performing the respective functions, as well as software (or a computer program or a computer program product) embodied on a tangible or non-transitory medium such as a computer-readable (storage) medium having stored thereon a respective data structure or code means/portions or embodied in a signal or in a chip, potentially during processing thereof. A computer program product encompasses a computer memory encoded with executable instructions representing a computer program for operating/driving a computer connected to a network.

The present invention also covers any conceivable combination of method steps and operations described above, and any conceivable combination of nodes, apparatuses, modules or elements described above, as long as the above-described concepts of methodology and structural arrangement are applicable.

In view of the above, there are provided measures for enabling resource-efficient remote malware scanning capable of static and dynamic file analysis. Such measures could exemplarily comprise, at a remote entity, obtaining metadata of an electronic file to be scanned for malware, said metadata including at least information for identification of one or more file items contained in the electronic file, identifying whether at least one file item of the electronic file is not pre-known at the remote entity, instructing delivery of any identified at least one file item of the electronic file, reconstructing the electronic file by assembling its file items, including any file item of the electronic file, which is not pre-known at the remote entity, and any remaining file item of the electronic file, which is pre-known at the remote entity, on the basis of the obtained metadata of the electronic file, and executing a dynamic malware analysis on a runtime behavior of the reconstructed electronic file.

Even though the invention is described above with reference to the examples and exemplifying embodiments with reference to the accompanying drawings, it is to be understood that the present invention is not restricted thereto. Rather, it is apparent to those skilled in the art that the above description of examples and exemplifying embodiments is for illustrative purposes and is to be considered to be exemplary and non-limiting in all respects, and the present invention can be modified in many ways without departing from the scope of the inventive idea as disclosed herein. 

1. A method of remote malware scanning, the method comprising: obtaining, at a second node, metadata of an electronic file to be scanned for malware from a first node, said metadata including at least information for identification of one or more file items contained in the electronic file, identifying, at the second node, whether at least one file item of the electronic file is not pre-known in a knowledge base of the second node on the basis of the obtained metadata of the electronic file, delivering an instruction indicating the identified at least one file item of the electronic file from the second node to the first node, if at least one file item is identified as being not pre-known in the knowledge base of the second node, reconstructing, at the second node, the electronic file by assembling its file items, including any file item of the electronic file, which is obtained from the first node in response to the instruction, and any remaining file item of the electronic file, which is pre-known in the knowledge base of the second node, on the basis of the obtained metadata of the electronic file, and executing, at the second node, a dynamic malware analysis on a runtime behavior of the reconstructed electronic file.
 2. The method according to claim 1, wherein identifying comprises: checking the knowledge base for presence of information on the one or more file items contained in the electronic file, for which information for identification is included in the metadata, on the basis of the obtained metadata of the electronic file, and determining, as the identified at least one file item of the electronic file, all of the one or more file items subject to the knowledge base checking, for which no information is present in the knowledge base.
 3. The method according to claim 1, further comprising: executing a static malware analysis of any file item of the electronic file, which is obtained from the first node in response to the instruction, and/or retrieving a result of a static malware analysis of any remaining file item of the electronic file, which is pre-known in the knowledge base of the second node, from the knowledge base.
 4. The method according to claim 1, wherein a result of the dynamic malware analysis and/or a result of the static malware is registered in the knowledge base, and/or an overall malware scanning result of the electronic file is constructed on the basis of the results of the malware analysis of any one of the reconstructed electronic file, any file item of the electronic file, which is obtained from the first node in response to the instruction, and any remaining file item of the electronic file, which is pre-known in the knowledge base of the second node, and the constructed overall malware scanning result is delivered from the second node to the first node.
 5. The method according to claim 1, wherein the metadata further include information for identification of the electronic file itself, and/or the information for identification comprises a secure hash value, and/or the knowledge base comprises a database of a reputation service, and any information in the knowledge base indicates a reputation of a subject file item and/or a subject electronic file, such as clean, infected or potentially unwanted.
 6. The method according to claim 1, wherein the electronic file to be scanned comprises a file of at least one of an Android Application Package (APK), a Portable Executable (PE), a Microsoft Soft Installer (MSI) or any other format capable of distributing and/or installing application software or middleware on a computer.
 7. The method according to claim 1, wherein the first node comprises a malware scanning agent, and the second node comprises a malware scanning engine or application.
 8. A method of remote malware scanning, the method comprising: delivering metadata of an electronic file to be scanned for malware from a first node to a second node, said metadata including at least information for identification of one or more file items contained in the electronic file, extracting, at the first node, at least one file item of the electronic file on the basis of an instruction from the second node, said instruction indicating the at least one file item as being not pre-known at the second node, and delivering the extracted at least one file item of the electronic file for malware scanning from the first node to the second node for enabling the second node to reconstruct the electronic file by assembling its file items, including any file item of the electronic file, which is delivered by the first node in response to the instruction, and any remaining file item of the electronic file, which is pre-known in the knowledge base of the second node, on the basis of the obtained metadata of the electronic file.
 9. The method according to claim 8, further comprising: performing a malware property query for the electronic file and the one or more file items contained in the electronic file, wherein the operations of delivering metadata, extracting at least one file item and delivering the extracted at least one file item are initiated when the malware property query for at least one of the electronic file and the one or more file items contained in the electronic file yields a non-conclusive result.
 10. The method according to claim 8, wherein the metadata further include information for identification of the electronic file itself, and/or the information for identification comprises a secure hash value, and/or an overall malware scanning result of the electronic file is obtained from the second node.
 11. The method according to claim 8, wherein the electronic file to be scanned comprises a file of at least one of an Android Application Package (APK), a Portable Executable (PE), a Microsoft Soft Installer (MSI) or any other format capable of distributing and/or installing application software or middleware on a computer.
 12. The method according to claim 8, wherein the first node comprises a malware scanning agent, and the second node comprises a malware scanning engine or application.
 13. An apparatus, comprising a memory configured to store computer program code, and a processor configured to read and execute computer program code stored in the memory, wherein the processor is configured to cause the apparatus to perform: obtaining, at a second node, metadata of an electronic file to be scanned for malware from a first node, said metadata including at least information for identification of one or more file items contained in the electronic file, identifying, at the second node, whether at least one file item of the electronic file is not pre-known in a knowledge base of the second node on the basis of the obtained metadata of the electronic file, delivering an instruction indicating the identified at least one file item of the electronic file from the second node to the first node, if at least one file item is identified as being not pre-known in the knowledge base of the second node, reconstructing, at the second node, the electronic file by assembling its file items, including any file item of the electronic file, which is obtained from the first node in response to the instruction, and any remaining file item of the electronic file, which is pre-known in the knowledge base of the second node, on the basis of the obtained metadata of the electronic file, and executing, at the second node, a dynamic malware analysis on a runtime behavior of the reconstructed electronic file.
 14. The apparatus according to claim 13, wherein the processor is configured to cause the apparatus to perform: checking the knowledge base for presence of information on the one or more file items contained in the electronic file, for which information for identification is included in the metadata, on the basis of the obtained metadata of the electronic file, and determining, as the identified at least one file item of the electronic file, all of the one or more file items subject to the knowledge base checking, for which no information is present in the knowledge base.
 15. The apparatus according to claim 13, wherein the processor is configured to cause the apparatus to perform: executing a static malware analysis of any file item of the electronic file, which is obtained from the first node in response to the instruction, and/or retrieving a result of a static malware analysis of any remaining file item of the electronic file, which is pre-known in the knowledge base of the second node, from the knowledge base.
 16. The apparatus according to claim 13, wherein the processor is configured to cause the apparatus to perform: registering a result of the dynamic malware analysis and/or a result of the static malware in the knowledge base, and/or constructing an overall malware scanning result of the electronic file on the basis of the results of the malware analysis of any one of the reconstructed electronic file, any file item of the electronic file, which is obtained from the first node in response to the instruction, and any remaining file item of the electronic file, which is pre-known in the knowledge base of the second node, and delivering the constructed overall malware scanning result from the second node to the first node.
 17. An apparatus, comprising a memory configured to store computer program code, and a processor configured to read and execute computer program code stored in the memory, wherein the processor is configured to cause the apparatus to perform: delivering metadata of an electronic file to be scanned for malware from a first node to a second node, said metadata including at least information for identification of one or more file items contained in the electronic file, extracting, at the first node, at least one file item of the electronic file on the basis of an instruction from the second node, said instruction indicating the at least one file item as being not pre-known at the second node, and delivering the extracted at least one file item of the electronic file for malware scanning from the first node to the second node for enabling the second node to reconstruct the electronic file by assembling its file items, including any file item of the electronic file, which is delivered by the first node in response to the instruction, and any remaining file item of the electronic file, which is pre-known in the knowledge base of the second node, on the basis of the obtained metadata of the electronic file.
 18. The apparatus according to claim 17, wherein the processor is configured to cause the apparatus to perform: performing a malware property query for the electronic file and the one or more file items contained in the electronic file, wherein the operations of delivering metadata, extracting at least one file item and delivering the extracted at least one file item are initiated when the malware property query for at least one of the electronic file and the one or more file items contained in the electronic file yields a non-conclusive result.
 19. A non-transitory computer storage medium having stored thereon computer program code for implementing the method of claim
 1. 