ATE505766T1 - Eindringdetektion während der programmausführung in einem computer - Google Patents
Eindringdetektion während der programmausführung in einem computerInfo
- Publication number
- ATE505766T1 ATE505766T1 AT05733789T AT05733789T ATE505766T1 AT E505766 T1 ATE505766 T1 AT E505766T1 AT 05733789 T AT05733789 T AT 05733789T AT 05733789 T AT05733789 T AT 05733789T AT E505766 T1 ATE505766 T1 AT E505766T1
- Authority
- AT
- Austria
- Prior art keywords
- computer
- processing device
- computer program
- program execution
- intrusion detection
- Prior art date
Links
- 238000001514 detection method Methods 0.000 title 1
- PWPJGUXAGUPAHP-UHFFFAOYSA-N lufenuron Chemical compound C1=C(Cl)C(OC(F)(F)C(C(F)(F)F)F)=CC(Cl)=C1NC(=O)NC(=O)C1=C(F)C=CC=C1F PWPJGUXAGUPAHP-UHFFFAOYSA-N 0.000 title 1
- 238000004590 computer program Methods 0.000 abstract 4
- 230000004075 alteration Effects 0.000 abstract 2
- 238000000034 method Methods 0.000 abstract 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/30—Arrangements for executing machine instructions, e.g. instruction decode
- G06F9/30145—Instruction analysis, e.g. decoding, instruction word fields
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/30—Arrangements for executing machine instructions, e.g. instruction decode
- G06F9/3017—Runtime instruction translation, e.g. macros
- G06F9/30178—Runtime instruction translation, e.g. macros of compressed or encrypted instructions
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US56647304P | 2004-04-29 | 2004-04-29 | |
PCT/IB2005/051416 WO2005106619A1 (en) | 2004-04-29 | 2005-04-29 | Intrusion detection during program execution in a computer |
Publications (1)
Publication Number | Publication Date |
---|---|
ATE505766T1 true ATE505766T1 (de) | 2011-04-15 |
Family
ID=34966194
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AT05733789T ATE505766T1 (de) | 2004-04-29 | 2005-04-29 | Eindringdetektion während der programmausführung in einem computer |
Country Status (7)
Country | Link |
---|---|
US (1) | US20070245419A1 (de) |
EP (1) | EP1745340B1 (de) |
JP (1) | JP2007535067A (de) |
CN (1) | CN1950775B (de) |
AT (1) | ATE505766T1 (de) |
DE (1) | DE602005027454D1 (de) |
WO (1) | WO2005106619A1 (de) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1995682A1 (de) | 2007-05-21 | 2008-11-26 | Stmicroelectronics Sa | Personalisierung eines Mikroprozessors und Datensicherungsverfahren |
CN100504905C (zh) * | 2007-11-16 | 2009-06-24 | 中国科学院软件研究所 | 数据库恶意事务处理方法及其系统 |
US9135442B1 (en) * | 2008-05-30 | 2015-09-15 | Symantec Corporation | Methods and systems for detecting obfuscated executables |
US20120159193A1 (en) * | 2010-12-18 | 2012-06-21 | Microsoft Corporation | Security through opcode randomization |
WO2016015049A2 (en) * | 2014-07-25 | 2016-01-28 | Trenchware, Inc. | Detection and remediation of malware within firmware of devices |
US11093603B2 (en) * | 2015-08-26 | 2021-08-17 | Robotic Research, Llc | System and method for protecting software from buffer overruns |
US10185550B2 (en) | 2016-09-28 | 2019-01-22 | Mcafee, Inc. | Device-driven auto-recovery using multiple recovery sources |
CN110050474A (zh) | 2016-12-30 | 2019-07-23 | 英特尔公司 | 用于物联网网络中的复合对象的子对象的类型命名和区块链 |
JP2022152497A (ja) * | 2021-03-29 | 2022-10-12 | 株式会社日立製作所 | 制御装置、不正命令検知方法及びプログラム |
Family Cites Families (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5528508A (en) * | 1993-02-19 | 1996-06-18 | International Business Machines Corporation | System and method for verifying a hierarchical circuit design |
US6006328A (en) * | 1995-07-14 | 1999-12-21 | Christopher N. Drake | Computer software authentication, protection, and security system |
US6446221B1 (en) * | 1999-05-19 | 2002-09-03 | Arm Limited | Debug mechanism for data processing systems |
US7117532B1 (en) * | 1999-07-14 | 2006-10-03 | Symantec Corporation | System and method for generating fictitious content for a computer |
US7430670B1 (en) * | 1999-07-29 | 2008-09-30 | Intertrust Technologies Corp. | Software self-defense systems and methods |
US6826697B1 (en) * | 1999-08-30 | 2004-11-30 | Symantec Corporation | System and method for detecting buffer overflow attacks |
US7296274B2 (en) * | 1999-11-15 | 2007-11-13 | Sandia National Laboratories | Method and apparatus providing deception and/or altered execution of logic in an information system |
US6983374B2 (en) * | 2000-02-14 | 2006-01-03 | Kabushiki Kaisha Toshiba | Tamper resistant microprocessor |
US6986046B1 (en) * | 2000-05-12 | 2006-01-10 | Groove Networks, Incorporated | Method and apparatus for managing secure collaborative transactions |
US20020138748A1 (en) * | 2001-03-21 | 2002-09-26 | Hung Andy C. | Code checksums for relocatable code |
US7487330B2 (en) * | 2001-05-02 | 2009-02-03 | International Business Machines Corporations | Method and apparatus for transferring control in a computer system with dynamic compilation capability |
US7392541B2 (en) * | 2001-05-17 | 2008-06-24 | Vir2Us, Inc. | Computer system architecture and method providing operating-system independent virus-, hacker-, and cyber-terror-immune processing environments |
GB2396930B (en) * | 2002-11-18 | 2005-09-07 | Advanced Risc Mach Ltd | Apparatus and method for managing access to a memory |
US7565551B2 (en) * | 2003-02-19 | 2009-07-21 | Microsoft Corporation | Enhancing software integrity through installation and verification |
US7555777B2 (en) * | 2004-01-13 | 2009-06-30 | International Business Machines Corporation | Preventing attacks in a data processing system |
-
2005
- 2005-04-29 DE DE602005027454T patent/DE602005027454D1/de active Active
- 2005-04-29 EP EP05733789A patent/EP1745340B1/de not_active Not-in-force
- 2005-04-29 WO PCT/IB2005/051416 patent/WO2005106619A1/en not_active Application Discontinuation
- 2005-04-29 AT AT05733789T patent/ATE505766T1/de not_active IP Right Cessation
- 2005-04-29 JP JP2007510227A patent/JP2007535067A/ja not_active Withdrawn
- 2005-04-29 US US11/578,882 patent/US20070245419A1/en not_active Abandoned
- 2005-04-29 CN CN200580013800.6A patent/CN1950775B/zh not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
CN1950775B (zh) | 2011-03-16 |
CN1950775A (zh) | 2007-04-18 |
EP1745340A1 (de) | 2007-01-24 |
EP1745340B1 (de) | 2011-04-13 |
DE602005027454D1 (de) | 2011-05-26 |
JP2007535067A (ja) | 2007-11-29 |
US20070245419A1 (en) | 2007-10-18 |
WO2005106619A1 (en) | 2005-11-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
ATE505766T1 (de) | Eindringdetektion während der programmausführung in einem computer | |
AU2019101570A4 (en) | Data storage, data check, and data linkage method and apparatus | |
EA201990251A1 (ru) | Система распределенной обработки транзакций и аутентификации | |
WO2015200510A8 (en) | Automated code lockdown to reduce attack surface for software | |
JP2016534479A5 (de) | ||
MX2016003190A (es) | Ejecucion de integridad de codigo selectivo facilitada por administrador de maquina virtual. | |
SG10201901732UA (en) | Sensitive information processing method, device, server and security determination system | |
EP1662379A4 (de) | Falschcode-verhinderungsverfahren und verhinderungsprogramm | |
EP1850265A3 (de) | Computerarchitektur für eine elektronische Vorrichtung zur Bereitstellung von SLS-Zugang auf MLS-Dateisysteme mit zuverlässigem Laden und Schützen des Programmausführungsspeichers | |
JP2007525774A5 (de) | ||
WO2008017796A8 (en) | Apparatus and method for performing integrity checks on software | |
EP3093768A3 (de) | Fehlerbehebungssysteme | |
JP2007188315A5 (de) | ||
GB201319170D0 (en) | Malware detection | |
RU2510075C2 (ru) | Способ обнаружения вредоносного программного обеспечения в ядре операционной системы | |
NZ560861A (en) | System and method for foreign code detection | |
BRPI0800444A (pt) | sistema de processamento de dados | |
JP2018534695A5 (de) | ||
JP2015523668A5 (de) | ||
PH12017500227A1 (en) | A system and method for security enhancement | |
MY191044A (en) | Permission control for contingent memory access program instruction | |
JP2016189201A5 (de) | ||
JP2016511484A5 (de) | ||
SG10201710656YA (en) | Program, information processing apparatus and method | |
JP2008186120A5 (de) |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
RER | Ceased as to paragraph 5 lit. 3 law introducing patent treaties |