GB2436442B - Method for preventing malicious software from execution within a computer system - Google Patents

Method for preventing malicious software from execution within a computer system

Info

Publication number
GB2436442B
GB2436442B GB0702890A GB0702890A GB2436442B GB 2436442 B GB2436442 B GB 2436442B GB 0702890 A GB0702890 A GB 0702890A GB 0702890 A GB0702890 A GB 0702890A GB 2436442 B GB2436442 B GB 2436442B
Authority
GB
United Kingdom
Prior art keywords
execution
computer system
malicious software
preventing malicious
preventing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
GB0702890A
Other versions
GB2436442A (en
GB0702890D0 (en
Inventor
David Carroll Challener
Mark C Davis
Peter Dirk Hortensius
Rod D Waltermann
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Singapore Pte Ltd
Original Assignee
Lenovo Singapore Pte Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US11/353,893 external-priority patent/US8694797B2/en
Priority claimed from US11/353,896 external-priority patent/US8041958B2/en
Application filed by Lenovo Singapore Pte Ltd filed Critical Lenovo Singapore Pte Ltd
Publication of GB0702890D0 publication Critical patent/GB0702890D0/en
Publication of GB2436442A publication Critical patent/GB2436442A/en
Priority to GB0802749A priority Critical patent/GB2443764B/en
Application granted granted Critical
Publication of GB2436442B publication Critical patent/GB2436442B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/561Virus type analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Virology (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Devices For Executing Special Programs (AREA)
  • Storage Device Security (AREA)
  • Retry When Errors Occur (AREA)
GB0702890A 2006-02-14 2007-02-14 Method for preventing malicious software from execution within a computer system Active GB2436442B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB0802749A GB2443764B (en) 2006-02-14 2008-02-14 Method for preventing malicious software from execution within a computer system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US11/353,893 US8694797B2 (en) 2006-02-14 2006-02-14 Method for preventing malicious software from execution within a computer system
US11/353,896 US8041958B2 (en) 2006-02-14 2006-02-14 Method for preventing malicious software from execution within a computer system

Publications (3)

Publication Number Publication Date
GB0702890D0 GB0702890D0 (en) 2007-03-28
GB2436442A GB2436442A (en) 2007-09-26
GB2436442B true GB2436442B (en) 2008-04-16

Family

ID=37908644

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0702890A Active GB2436442B (en) 2006-02-14 2007-02-14 Method for preventing malicious software from execution within a computer system

Country Status (5)

Country Link
JP (1) JP4575350B2 (en)
DE (1) DE102007005887B4 (en)
FR (1) FR2897452B1 (en)
GB (1) GB2436442B (en)
SG (1) SG135173A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2982867A1 (en) * 2015-04-07 2016-10-13 RunSafe Security, Inc. System and method of obfuscation through binary and memory diversity

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2377795A (en) * 2000-03-31 2003-01-22 Intel Corp Isolated instructions for isolated execution
US6715142B1 (en) * 1999-12-21 2004-03-30 Fuji Xerox Co., Ltd. Execution program generation method, execution program generation apparatus, execution program execution method, and computer-readable storage medium

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000056966A (en) * 1998-08-07 2000-02-25 Nippon Telegr & Teleph Corp <Ntt> Micro processor system, and micro processor operation analysis preventing method
FR2841997B1 (en) * 2002-07-08 2005-11-11 Gemplus Card Int SECURING APPLICATION DOWNLOADED IN PARTICULAR IN A CHIP CARD
JP4568489B2 (en) * 2003-09-11 2010-10-27 富士通株式会社 Program protection method, program protection program, and program protection apparatus
US7424620B2 (en) 2003-09-25 2008-09-09 Sun Microsystems, Inc. Interleaved data and instruction streams for application program obfuscation
US7363620B2 (en) 2003-09-25 2008-04-22 Sun Microsystems, Inc. Non-linear execution of application program instructions for application program obfuscation
US7493483B2 (en) 2004-02-19 2009-02-17 International Business Machines Corporation Method to prevent vulnerability to virus and worm attacks through instruction remapping

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6715142B1 (en) * 1999-12-21 2004-03-30 Fuji Xerox Co., Ltd. Execution program generation method, execution program generation apparatus, execution program execution method, and computer-readable storage medium
GB2377795A (en) * 2000-03-31 2003-01-22 Intel Corp Isolated instructions for isolated execution

Also Published As

Publication number Publication date
IE20070090A1 (en) 2007-09-19
IE20080383A1 (en) 2008-08-20
SG135173A1 (en) 2007-09-28
FR2897452B1 (en) 2016-12-09
JP4575350B2 (en) 2010-11-04
DE102007005887A1 (en) 2007-08-30
GB2436442A (en) 2007-09-26
JP2007220091A (en) 2007-08-30
FR2897452A1 (en) 2007-08-17
GB0702890D0 (en) 2007-03-28
DE102007005887B4 (en) 2019-06-13

Similar Documents

Publication Publication Date Title
EP1998269A4 (en) Program execution control system, execution control method, execution control computer program
TWI373227B (en) System and method for operating system installation on a diskless computing platform
GB0822749D0 (en) Method and system for installing programs on a computer system
GB2443071B (en) Method and process for using common preinstallation environment for heterogeneous operating systems
GB2430781B (en) Security for computer software
HK1181484A1 (en) Method, system and computer system for managing data
WO2007084402A8 (en) Computer based system for training workers
HK1114931A1 (en) Method for accessing an information source via a computer system
EP2064603A4 (en) Apparatus, system and computer program for controlling a tool
EP2208303A4 (en) Method and system for protecting a computer against malicious software
GB0810855D0 (en) Method system and computer program for improving a communication system
GB0405410D0 (en) Method for computer booting
EP2106582A4 (en) Method and system for securely protecting data during software application usage
GB2478878B (en) System and method for booting a computer system using preboot data
GB0612673D0 (en) Computer system
DE602007012511D1 (en) An image forming system, an image forming apparatus, a computer program and an image forming method
IL183959A0 (en) A method for detecting computer viruses
EP2232362A4 (en) A method and system for setting up a computer system at startup
GB2436442B (en) Method for preventing malicious software from execution within a computer system
GB2443764B (en) Method for preventing malicious software from execution within a computer system
EP1979803A4 (en) System, method and computer program for controlling a cursor
GB2432088B (en) Method for controlling data transfers through a computer system
EP2030463A4 (en) A method, a system and a computer program product for troubleshooting
IL176685A0 (en) Method for performing a system shutdown
IL176348A0 (en) A method for the distribution of software processes to a plurality of computers