MX2015010893A - Systems and methods of risk based rules for application control. - Google Patents

Systems and methods of risk based rules for application control.

Info

Publication number
MX2015010893A
MX2015010893A MX2015010893A MX2015010893A MX2015010893A MX 2015010893 A MX2015010893 A MX 2015010893A MX 2015010893 A MX2015010893 A MX 2015010893A MX 2015010893 A MX2015010893 A MX 2015010893A MX 2015010893 A MX2015010893 A MX 2015010893A
Authority
MX
Mexico
Prior art keywords
module
rule
application
risk information
systems
Prior art date
Application number
MX2015010893A
Other languages
Spanish (es)
Other versions
MX349569B (en
Inventor
Chris Silva
Brad Hibbert
Original Assignee
Beyondtrust Software Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US14/156,375 external-priority patent/US20140201843A1/en
Application filed by Beyondtrust Software Inc filed Critical Beyondtrust Software Inc
Publication of MX2015010893A publication Critical patent/MX2015010893A/en
Publication of MX349569B publication Critical patent/MX349569B/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software

Abstract

In various embodiments, an agent on a digital device may comprise a monitor module, an application identification module, a vulnerability module, a rules database, and a rule module. The monitor module may be configured to monitor a device for an instruction to execute a legitimate application. The application identification module may be configured to identify one or more attributes of the legitimate application. The vulnerability module may be configured to retrieve risk information based on the one or more attributes of the legitimate application. The risk information may be determined from known vulnerabilities of the legitimate application. The rules database may be for storing a rule associated with the risk information. The rule module may be configured to retrieve the rule from the rule database based on the risk information and to control the legitimate application based on the rule.
MX2015010893A 2013-02-25 2014-02-18 Systems and methods of risk based rules for application control. MX349569B (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201361768809P 2013-02-25 2013-02-25
US14/156,375 US20140201843A1 (en) 2013-01-15 2014-01-15 Systems and methods for identifying and reporting application and file vulnerabilities
PCT/US2014/016976 WO2014130472A1 (en) 2013-02-25 2014-02-18 Systems and methods of risk based rules for application control

Publications (2)

Publication Number Publication Date
MX2015010893A true MX2015010893A (en) 2016-05-05
MX349569B MX349569B (en) 2017-08-03

Family

ID=51391742

Family Applications (1)

Application Number Title Priority Date Filing Date
MX2015010893A MX349569B (en) 2013-02-25 2014-02-18 Systems and methods of risk based rules for application control.

Country Status (7)

Country Link
EP (1) EP2959418A4 (en)
JP (1) JP6134395B2 (en)
AU (2) AU2014219077A1 (en)
CA (1) CA2902110C (en)
MX (1) MX349569B (en)
SG (1) SG11201506642PA (en)
WO (1) WO2014130472A1 (en)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10445505B2 (en) * 2014-09-22 2019-10-15 Mcafee, Llc Process vulnerability assessment
RU2595511C2 (en) * 2014-12-05 2016-08-27 Закрытое акционерное общество "Лаборатория Касперского" System and method of trusted applications operation in the presence of suspicious applications
US9858410B2 (en) * 2015-10-26 2018-01-02 Symantec Corporation Techniques for automated application analysis
CN106537344A (en) * 2016-03-30 2017-03-22 北京小米移动软件有限公司 A method and apparatus for managing application calls
JP7091354B2 (en) * 2017-02-27 2022-06-27 イヴァンティ,インコーポレイテッド Systems and methods for context-based mitigation of computer security risks
US11609984B2 (en) * 2018-02-14 2023-03-21 Digital Guardian Llc Systems and methods for determining a likelihood of an existence of malware on an executable
EP3591556A1 (en) * 2018-07-07 2020-01-08 1830291 Ontario Inc. Automated security assessment of information systems
US11356449B2 (en) * 2018-10-20 2022-06-07 Walmart Apollo, Llc Managing access to vulnerability data at scale
JP7294441B2 (en) * 2019-10-25 2023-06-20 日本電気株式会社 Evaluation device, evaluation system, evaluation method and program
CN110929267A (en) * 2019-11-29 2020-03-27 深信服科技股份有限公司 Code vulnerability detection method, device, equipment and storage medium
JP7215525B2 (en) * 2020-04-08 2023-01-31 日本電気株式会社 Terminal, control method and program
WO2022000024A1 (en) * 2020-06-29 2022-01-06 Blue Eagle Technologies Pty Limited A method for securing a software application

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040225877A1 (en) * 2003-05-09 2004-11-11 Zezhen Huang Method and system for protecting computer system from malicious software operation
EP1583013A1 (en) * 2004-03-31 2005-10-05 Swiss Reinsurance Company Computer-based system and method for detecting risks
JP4688472B2 (en) * 2004-11-01 2011-05-25 株式会社エヌ・ティ・ティ・ドコモ Terminal control apparatus and terminal control method
US8006088B2 (en) * 2005-08-18 2011-08-23 Beyondtrust Corporation Methods and systems for network-based management of application security
US20070169199A1 (en) * 2005-09-09 2007-07-19 Forum Systems, Inc. Web service vulnerability metadata exchange system
US20070094735A1 (en) * 2005-10-26 2007-04-26 Cohen Matthew L Method to consolidate and prioritize web application vulnerabilities
US20070180509A1 (en) * 2005-12-07 2007-08-02 Swartz Alon R Practical platform for high risk applications
US20070174824A1 (en) * 2006-01-23 2007-07-26 Microsoft Corporation Techniques for generating and executing browser-hosted applications
WO2008014800A1 (en) * 2006-07-31 2008-02-07 Telecom Italia S.P.A. A system for implementing security on telecommunications terminals
JP4751431B2 (en) * 2008-09-12 2011-08-17 株式会社東芝 Vulnerability determination device and program
US8473508B2 (en) * 2009-10-01 2013-06-25 Oracle International Corporation Dynamic rule creation and caching
JP5585303B2 (en) * 2010-08-25 2014-09-10 日本電気株式会社 Library execution management system, library execution management method and program
US8738906B1 (en) * 2011-11-30 2014-05-27 Juniper Networks, Inc. Traffic classification and control on a network node

Also Published As

Publication number Publication date
AU2019246773A1 (en) 2019-10-31
JP6134395B2 (en) 2017-05-24
SG11201506642PA (en) 2015-09-29
EP2959418A4 (en) 2016-10-05
JP2016513324A (en) 2016-05-12
CA2902110C (en) 2018-07-31
MX349569B (en) 2017-08-03
WO2014130472A1 (en) 2014-08-28
AU2019246773B2 (en) 2020-10-08
EP2959418A1 (en) 2015-12-30
AU2014219077A1 (en) 2015-09-17
CA2902110A1 (en) 2014-08-28

Similar Documents

Publication Publication Date Title
MX349569B (en) Systems and methods of risk based rules for application control.
AU2018383439B2 (en) Contextual risk monitoring
PH12019550067A1 (en) Iot security service
MX370367B (en) Systems and methods for security and risk assessment and testing of applications.
TW201614501A (en) Systems and methods for segmenting data structures in a memory system
GB2525719A8 (en) Method and system for providing a vulnerability management and verification service
MX2015012671A (en) Systems and methods for defining attributes of attended delivery/pickup locations.
EP4277317A3 (en) Sequencing the validity of access control keys
EP4242892A3 (en) Code pointer authentication for hardware flow control
MX2017012016A (en) User communications with a merchant through a social networking system.
WO2014186713A3 (en) Semantic naming model
WO2015177647A3 (en) Technologies for protecting systems and data to prevent cyber-attacks
EP3005202A4 (en) System and method for biometric authentication with device attestation
WO2014016695A3 (en) Presence-based credential updating
WO2014140926A3 (en) Systems, methods, and computer-readable media for identifying when a subject is likely to be affected by a medical condition
WO2018075388A3 (en) Improved logistical management system
BR112016007759A2 (en) "Systems and methods for collecting, tracking and storing system performance and event data for computing devices."
MX346915B (en) Systems and methods for secure processing with embedded cryptographic unit.
EP3398091A4 (en) System, method, and device for unified access control on federated database
GB2555340A (en) Protection of sensitive data
MX2016016009A (en) Systems and methods for a credential including multiple access privileges.
EP3197090A4 (en) Management system, portable terminal device, management method, information processing method and program
BR112014030582A2 (en) information processing device, server, information processing method, and program.
WO2018117968A8 (en) Systems and methods for automated bulk user registration spanning both a content management system and any software applications embedded therein
MX2014008970A (en) Control method, system and device.

Legal Events

Date Code Title Description
FG Grant or registration