AU1598601A - Method and system for intercepting an application program interface - Google Patents
Method and system for intercepting an application program interfaceInfo
- Publication number
- AU1598601A AU1598601A AU15986/01A AU1598601A AU1598601A AU 1598601 A AU1598601 A AU 1598601A AU 15986/01 A AU15986/01 A AU 15986/01A AU 1598601 A AU1598601 A AU 1598601A AU 1598601 A AU1598601 A AU 1598601A
- Authority
- AU
- Australia
- Prior art keywords
- intercepting
- application program
- program interface
- interface
- application
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1416—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights
- G06F12/1425—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights the protection being physical, e.g. cell, word, block
- G06F12/1441—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights the protection being physical, e.g. cell, word, block for a range
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/448—Execution paradigms, e.g. implementations of programming paradigms
- G06F9/4482—Procedural
- G06F9/4484—Executing subprograms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2209/00—Indexing scheme relating to G06F9/00
- G06F2209/54—Indexing scheme relating to G06F9/54
- G06F2209/542—Intercept
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Debugging And Monitoring (AREA)
Applications Claiming Priority (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IL132916 | 1999-11-14 | ||
IL13291699A IL132916A (en) | 1999-11-14 | 1999-11-14 | Method and system for intercepting an application program interface |
US09561395 | 2000-04-28 | ||
US09/561,395 US6823460B1 (en) | 1999-11-14 | 2000-04-28 | Method and system for intercepting an application program interface |
PCT/US2000/031032 WO2001037095A1 (en) | 1999-11-14 | 2000-11-10 | Method and system for intercepting an application program interface |
CA002386100A CA2386100A1 (en) | 1999-11-14 | 2002-05-13 | Method and system for intercepting application program interface |
Publications (1)
Publication Number | Publication Date |
---|---|
AU1598601A true AU1598601A (en) | 2001-05-30 |
Family
ID=72714002
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU15986/01A Abandoned AU1598601A (en) | 1999-11-14 | 2000-11-10 | Method and system for intercepting an application program interface |
AU48883/02A Expired AU768758B2 (en) | 1999-11-14 | 2002-06-20 | Method and system for intercepting an application program interface |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU48883/02A Expired AU768758B2 (en) | 1999-11-14 | 2002-06-20 | Method and system for intercepting an application program interface |
Country Status (5)
Country | Link |
---|---|
EP (1) | EP1236114A1 (en) |
JP (1) | JP2003515219A (en) |
AU (2) | AU1598601A (en) |
CA (1) | CA2386100A1 (en) |
WO (1) | WO2001037095A1 (en) |
Families Citing this family (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7155741B2 (en) | 2002-05-06 | 2006-12-26 | Symantec Corporation | Alteration of module load locations |
WO2004075060A1 (en) * | 2003-02-21 | 2004-09-02 | Tabei, Hikaru | Computer virus detection device |
JPWO2005029328A1 (en) * | 2003-09-18 | 2007-11-15 | 有限会社 電机本舗 | Operating system and recording medium recording the same |
US7624449B1 (en) | 2004-01-22 | 2009-11-24 | Symantec Corporation | Countering polymorphic malicious computer code through code optimization |
US7698731B2 (en) * | 2004-10-25 | 2010-04-13 | Panasonic Corporation | Security architecture and mechanism to access and use security components in operating system |
CN100346611C (en) * | 2005-06-30 | 2007-10-31 | 西安交通大学 | Invading detection method based on stack pattern in Linux environment |
US7739740B1 (en) | 2005-09-22 | 2010-06-15 | Symantec Corporation | Detecting polymorphic threats |
KR100843701B1 (en) * | 2006-11-07 | 2008-07-04 | 소프트캠프(주) | Confirmation method of API by the information at Call-stack |
US8079039B2 (en) * | 2007-03-09 | 2011-12-13 | Microsoft Corporation | Isolating, managing and communicating with user interface elements |
ES2439804B1 (en) * | 2012-04-19 | 2014-10-29 | Universitat Politècnica De Catalunya | Procedure, system and piece of executable code to virtualize a hardware resource associated with a computer system |
CN102799493A (en) * | 2012-06-21 | 2012-11-28 | 北京伸得纬科技有限公司 | Method for intercepting target progress with self-protection |
KR101244731B1 (en) * | 2012-09-11 | 2013-03-18 | 주식회사 안랩 | Apparatus and method for detecting malicious shell code by using debug event |
CN103970559B (en) * | 2013-02-05 | 2017-09-29 | 北京壹人壹本信息科技有限公司 | A kind of equipment loading method and device based on android system |
JP7036106B2 (en) * | 2017-02-22 | 2022-03-15 | 日本電気株式会社 | Information processing equipment, information processing system, monitoring method, and program |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5577209A (en) * | 1991-07-11 | 1996-11-19 | Itt Corporation | Apparatus and method for providing multi-level security for communication among computers and terminals on a network |
US5826014A (en) * | 1996-02-06 | 1998-10-20 | Network Engineering Software | Firewall system for protecting network elements connected to a public network |
US6067620A (en) * | 1996-07-30 | 2000-05-23 | Holden; James M. | Stand alone security device for computer networks |
US5832228A (en) * | 1996-07-30 | 1998-11-03 | Itt Industries, Inc. | System and method for providing multi-level security in computer devices utilized with non-secure networks |
US5974549A (en) * | 1997-03-27 | 1999-10-26 | Soliton Ltd. | Security monitor |
US6088804A (en) * | 1998-01-12 | 2000-07-11 | Motorola, Inc. | Adaptive system and method for responding to computer network security attacks |
US6185689B1 (en) * | 1998-06-24 | 2001-02-06 | Richard S. Carson & Assoc., Inc. | Method for network self security assessment |
-
2000
- 2000-11-10 AU AU15986/01A patent/AU1598601A/en not_active Abandoned
- 2000-11-10 WO PCT/US2000/031032 patent/WO2001037095A1/en not_active Application Discontinuation
- 2000-11-10 EP EP00978530A patent/EP1236114A1/en not_active Withdrawn
- 2000-11-10 JP JP2001539121A patent/JP2003515219A/en not_active Withdrawn
-
2002
- 2002-05-13 CA CA002386100A patent/CA2386100A1/en not_active Abandoned
- 2002-06-20 AU AU48883/02A patent/AU768758B2/en not_active Expired
Also Published As
Publication number | Publication date |
---|---|
EP1236114A1 (en) | 2002-09-04 |
WO2001037095A1 (en) | 2001-05-25 |
JP2003515219A (en) | 2003-04-22 |
CA2386100A1 (en) | 2003-11-13 |
AU4888302A (en) | 2002-12-05 |
AU768758B2 (en) | 2004-01-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
IL132916A (en) | Method and system for intercepting an application program interface | |
AU7857300A (en) | Method and system for developing software | |
AU7331700A (en) | Software rehosting system and method | |
AU2726601A (en) | Method and system for employment placement | |
AU6167700A (en) | Introspective editor system, program, and method for software translation | |
AU5445600A (en) | Graphical system and method for debugging computer programs | |
AU4357000A (en) | System and method for testing computer software | |
AU2001245598A1 (en) | Application program interface for message-routing and management system | |
AU5441101A (en) | System and method for providing individualized dosing | |
AU2001297701A1 (en) | System and method for intercepting telecommunications | |
AU1175500A (en) | Software language translation system and method | |
AU4197200A (en) | System and method for dimensioning objects | |
AU2002357858A1 (en) | Method and system for preloading resources | |
AU2001255698A1 (en) | Network enabled application software system and method | |
AU5074601A (en) | Combustion control method and system | |
AU2089001A (en) | Method and system for data demultiplexing | |
AU2578301A (en) | Mounting system and method | |
AU2001268056A1 (en) | System and method for e-commerce interface with controlled e-commerce interactions | |
AU1991201A (en) | Testing system and method for testing an object | |
WO2000065773A8 (en) | Portal system and method | |
AU5878200A (en) | External system interface method and system | |
AU1598601A (en) | Method and system for intercepting an application program interface | |
AU1663000A (en) | Method and system for performing electronic auctions | |
AU2105101A (en) | Method and system for conducting an auction for resources | |
AU4236100A (en) | Method and system for serving software applications |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
MK6 | Application lapsed section 142(2)(f)/reg. 8.3(3) - pct applic. not entering national phase |