ATE288596T1 - Generisches verfahren zum erkennen von in datenketten verborgenen attackenprogrammen - Google Patents
Generisches verfahren zum erkennen von in datenketten verborgenen attackenprogrammenInfo
- Publication number
- ATE288596T1 ATE288596T1 AT02800619T AT02800619T ATE288596T1 AT E288596 T1 ATE288596 T1 AT E288596T1 AT 02800619 T AT02800619 T AT 02800619T AT 02800619 T AT02800619 T AT 02800619T AT E288596 T1 ATE288596 T1 AT E288596T1
- Authority
- AT
- Austria
- Prior art keywords
- generic method
- program
- data
- data chains
- detecting attack
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Virology (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Debugging And Monitoring (AREA)
- Executing Machine-Instructions (AREA)
- Storage Device Security (AREA)
- Computer And Data Communications (AREA)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| FR0113063A FR2830638A1 (fr) | 2001-10-05 | 2001-10-05 | Procede de detection generique de programmes d'attaque caches dans des chaines de donnees |
| PCT/FR2002/003217 WO2003032134A1 (fr) | 2001-10-05 | 2002-09-20 | Procede de detection generique de programmes d'attaque caches dans des chaines de donnees |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| ATE288596T1 true ATE288596T1 (de) | 2005-02-15 |
Family
ID=8868144
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| AT02800619T ATE288596T1 (de) | 2001-10-05 | 2002-09-20 | Generisches verfahren zum erkennen von in datenketten verborgenen attackenprogrammen |
Country Status (7)
| Country | Link |
|---|---|
| US (1) | US7891002B2 (de) |
| EP (1) | EP1433045B1 (de) |
| AT (1) | ATE288596T1 (de) |
| DE (1) | DE60202887T2 (de) |
| ES (1) | ES2235115T3 (de) |
| FR (1) | FR2830638A1 (de) |
| WO (1) | WO2003032134A1 (de) |
Families Citing this family (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7251735B2 (en) * | 2003-07-22 | 2007-07-31 | Lockheed Martin Corporation | Buffer overflow protection and prevention |
| US7653518B2 (en) * | 2005-03-14 | 2010-01-26 | Autodesk, Inc. | System and method for generating matched contour profiles |
| US20080134326A2 (en) * | 2005-09-13 | 2008-06-05 | Cloudmark, Inc. | Signature for Executable Code |
Family Cites Families (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5319776A (en) * | 1990-04-19 | 1994-06-07 | Hilgraeve Corporation | In transit detection of computer virus with safeguard |
| US5442699A (en) * | 1994-11-21 | 1995-08-15 | International Business Machines Corporation | Searching for patterns in encrypted data |
| US5826013A (en) * | 1995-09-28 | 1998-10-20 | Symantec Corporation | Polymorphic virus detection module |
| US5765030A (en) * | 1996-07-19 | 1998-06-09 | Symantec Corp | Processor emulator module having a variable pre-fetch queue size for program execution |
| US5696822A (en) * | 1995-09-28 | 1997-12-09 | Symantec Corporation | Polymorphic virus detection module |
| US5951698A (en) * | 1996-10-02 | 1999-09-14 | Trend Micro, Incorporated | System, apparatus and method for the detection and removal of viruses in macros |
| IL120632A0 (en) * | 1997-04-08 | 1997-08-14 | Zuta Marc | Multiprocessor system and method |
| US5964889A (en) * | 1997-04-16 | 1999-10-12 | Symantec Corporation | Method to analyze a program for presence of computer viruses by examining the opcode for faults before emulating instruction in emulator |
| US20030079158A1 (en) * | 2001-10-23 | 2003-04-24 | Tower James Brian | Secured digital systems and a method and software for operating the same |
| US7409717B1 (en) * | 2002-05-23 | 2008-08-05 | Symantec Corporation | Metamorphic computer virus detection |
-
2001
- 2001-10-05 FR FR0113063A patent/FR2830638A1/fr active Pending
-
2002
- 2002-09-20 ES ES02800619T patent/ES2235115T3/es not_active Expired - Lifetime
- 2002-09-20 AT AT02800619T patent/ATE288596T1/de not_active IP Right Cessation
- 2002-09-20 WO PCT/FR2002/003217 patent/WO2003032134A1/fr not_active Ceased
- 2002-09-20 DE DE60202887T patent/DE60202887T2/de not_active Expired - Lifetime
- 2002-09-20 EP EP02800619A patent/EP1433045B1/de not_active Expired - Lifetime
- 2002-09-20 US US10/491,851 patent/US7891002B2/en not_active Expired - Fee Related
Also Published As
| Publication number | Publication date |
|---|---|
| EP1433045A1 (de) | 2004-06-30 |
| WO2003032134A1 (fr) | 2003-04-17 |
| US20050091528A1 (en) | 2005-04-28 |
| FR2830638A1 (fr) | 2003-04-11 |
| US7891002B2 (en) | 2011-02-15 |
| ES2235115T3 (es) | 2005-07-01 |
| DE60202887T2 (de) | 2005-07-14 |
| DE60202887D1 (de) | 2005-03-10 |
| EP1433045B1 (de) | 2005-02-02 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| ATE426858T1 (de) | System und verfahren zum erkennen von bísartigem code | |
| ATE515741T1 (de) | Verfahren und system zum analysieren von stream- trap-daten | |
| WO2007025279A3 (en) | Apparatus and method for analyzing and supplementing a program to provide security | |
| JP5507699B2 (ja) | 悪性サイト検出装置及び方法 | |
| CN104778413B (zh) | 一种基于模拟攻击的软件漏洞检测方法 | |
| KR100870140B1 (ko) | 악성 코드가 숨겨진 파일 탐지 장치 및 방법 | |
| DE60233142D1 (de) | Verfahren und reagentien zum nachweis von endotoxin | |
| ATE232616T1 (de) | Verfahren zur überwachung des programmablaufs | |
| DE60333631D1 (de) | Verhaltensbasierte anpassung von computersystemen | |
| ATE412949T1 (de) | Verfahren, datenverarbeitungseinrichtung und computerprogrammprodukt zur datenverarbeitung | |
| JPWO2021130897A5 (ja) | 分析装置、分析方法及び分析プログラム | |
| DE602004007754D1 (de) | Verfahren und Vorrichtung zur Feststellung einer Prozessorenbelastung | |
| TW200517964A (en) | Inter-processor interrupts | |
| ATE508360T1 (de) | Verfahren, vorrichtungen und computerprogramme zum verifizieren der integrität einer sonde | |
| DE602004032466D1 (de) | Durchführung von prüfungen an der betriebsmittelbenutzung von computerprogrammen | |
| ATE425503T1 (de) | Wasserzeichenmarkierung eines computerprogrammcodes | |
| EP4570429A4 (de) | Anomalieerkennungssystem, anomalieerkennungsvorrichtung, anomalieerkennungsverfahren und computerprogramm | |
| KR20170079961A (ko) | 소프트웨어 유사도 측정 방법 및 장치 | |
| WO2007124420A3 (en) | Method and system for detecting a compressed pestware executable object | |
| DE602005015600D1 (de) | Vorrichtung, system und verfahren zum testen eines geräts mit eingeschränkten ressourcen | |
| ATE288596T1 (de) | Generisches verfahren zum erkennen von in datenketten verborgenen attackenprogrammen | |
| DE60237494D1 (de) | Vorrichtung, Verfahren und Rechnerprogramm zum Anzeigen von Signalverarbeitungsdaten | |
| DE602005027454D1 (de) | Eindringdetektion während der programmausführung in einem computer | |
| ATE424003T1 (de) | Verfahren und gerät zum verarbeiten von transaktionen in einem datenverarbeitungssystem | |
| WO2002037379A3 (en) | Method, apparatus, and article of manufacture for performance analysis using semantic knowledge |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| RER | Ceased as to paragraph 5 lit. 3 law introducing patent treaties |