AU2014219077A1 - Systems and methods of risk based rules for application control - Google Patents
Systems and methods of risk based rules for application control Download PDFInfo
- Publication number
- AU2014219077A1 AU2014219077A1 AU2014219077A AU2014219077A AU2014219077A1 AU 2014219077 A1 AU2014219077 A1 AU 2014219077A1 AU 2014219077 A AU2014219077 A AU 2014219077A AU 2014219077 A AU2014219077 A AU 2014219077A AU 2014219077 A1 AU2014219077 A1 AU 2014219077A1
- Authority
- AU
- Australia
- Prior art keywords
- application
- rule
- module
- legitimate application
- legitimate
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer And Data Communications (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Stored Programmes (AREA)
- Debugging And Monitoring (AREA)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2019246773A AU2019246773B2 (en) | 2013-02-25 | 2019-10-08 | Systems and methods of risk based rules for application control |
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201361768809P | 2013-02-25 | 2013-02-25 | |
US61/768,809 | 2013-02-25 | ||
US14/156,375 | 2014-01-15 | ||
US14/156,375 US20140201843A1 (en) | 2013-01-15 | 2014-01-15 | Systems and methods for identifying and reporting application and file vulnerabilities |
PCT/US2014/016976 WO2014130472A1 (en) | 2013-02-25 | 2014-02-18 | Systems and methods of risk based rules for application control |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2019246773A Division AU2019246773B2 (en) | 2013-02-25 | 2019-10-08 | Systems and methods of risk based rules for application control |
Publications (1)
Publication Number | Publication Date |
---|---|
AU2014219077A1 true AU2014219077A1 (en) | 2015-09-17 |
Family
ID=51391742
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2014219077A Abandoned AU2014219077A1 (en) | 2013-02-25 | 2014-02-18 | Systems and methods of risk based rules for application control |
AU2019246773A Active AU2019246773B2 (en) | 2013-02-25 | 2019-10-08 | Systems and methods of risk based rules for application control |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2019246773A Active AU2019246773B2 (en) | 2013-02-25 | 2019-10-08 | Systems and methods of risk based rules for application control |
Country Status (7)
Families Citing this family (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10445505B2 (en) | 2014-09-22 | 2019-10-15 | Mcafee, Llc | Process vulnerability assessment |
RU2595511C2 (ru) * | 2014-12-05 | 2016-08-27 | Закрытое акционерное общество "Лаборатория Касперского" | Система и способ ограничения работы доверенных приложений при наличии подозрительных приложений |
US9858410B2 (en) * | 2015-10-26 | 2018-01-02 | Symantec Corporation | Techniques for automated application analysis |
CN106537344A (zh) * | 2016-03-30 | 2017-03-22 | 北京小米移动软件有限公司 | 一种应用程序调用管理的方法和装置 |
JP7091354B2 (ja) * | 2017-02-27 | 2022-06-27 | イヴァンティ,インコーポレイテッド | コンピュータセキュリティリスクのコンテキストベースの軽減のためのシステム及び方法 |
US11609984B2 (en) * | 2018-02-14 | 2023-03-21 | Digital Guardian Llc | Systems and methods for determining a likelihood of an existence of malware on an executable |
EP3591556A1 (en) * | 2018-07-07 | 2020-01-08 | 1830291 Ontario Inc. | Automated security assessment of information systems |
US11356449B2 (en) * | 2018-10-20 | 2022-06-07 | Walmart Apollo, Llc | Managing access to vulnerability data at scale |
US11481498B2 (en) * | 2019-01-28 | 2022-10-25 | Visa International Service Association | Continuous vulnerability management for modern applications |
WO2021079495A1 (ja) * | 2019-10-25 | 2021-04-29 | 日本電気株式会社 | 評価装置、評価システム、評価方法及びプログラム |
CN110929267A (zh) * | 2019-11-29 | 2020-03-27 | 深信服科技股份有限公司 | 代码漏洞检测方法、装置、设备及存储介质 |
JP7215525B2 (ja) * | 2020-04-08 | 2023-01-31 | 日本電気株式会社 | 端末、制御方法、及びプログラム |
WO2022000024A1 (en) * | 2020-06-29 | 2022-01-06 | Blue Eagle Technologies Pty Limited | A method for securing a software application |
IT202000025771A1 (it) * | 2020-10-29 | 2022-04-29 | Beatcode S R L | Metodo per certificare l’autenticità di file digitali generati da un dispositivo di comunicazione |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040225877A1 (en) * | 2003-05-09 | 2004-11-11 | Zezhen Huang | Method and system for protecting computer system from malicious software operation |
EP1583013A1 (en) * | 2004-03-31 | 2005-10-05 | Swiss Reinsurance Company | Computer-based system and method for detecting risks |
JP4688472B2 (ja) * | 2004-11-01 | 2011-05-25 | 株式会社エヌ・ティ・ティ・ドコモ | 端末制御装置及び端末制御方法 |
US8006088B2 (en) * | 2005-08-18 | 2011-08-23 | Beyondtrust Corporation | Methods and systems for network-based management of application security |
US20070169199A1 (en) * | 2005-09-09 | 2007-07-19 | Forum Systems, Inc. | Web service vulnerability metadata exchange system |
US20070094735A1 (en) * | 2005-10-26 | 2007-04-26 | Cohen Matthew L | Method to consolidate and prioritize web application vulnerabilities |
US20070180509A1 (en) * | 2005-12-07 | 2007-08-02 | Swartz Alon R | Practical platform for high risk applications |
US20070174824A1 (en) * | 2006-01-23 | 2007-07-26 | Microsoft Corporation | Techniques for generating and executing browser-hosted applications |
EP2050242A1 (en) * | 2006-07-31 | 2009-04-22 | Telecom Italia S.p.A. | A system for implementing security on telecommunications terminals |
JP4751431B2 (ja) * | 2008-09-12 | 2011-08-17 | 株式会社東芝 | 脆弱性判定装置及びプログラム |
US8473508B2 (en) * | 2009-10-01 | 2013-06-25 | Oracle International Corporation | Dynamic rule creation and caching |
JP5585303B2 (ja) * | 2010-08-25 | 2014-09-10 | 日本電気株式会社 | ライブラリ実行管理システム、ライブラリ実行管理方法およびプログラム |
US8738906B1 (en) * | 2011-11-30 | 2014-05-27 | Juniper Networks, Inc. | Traffic classification and control on a network node |
-
2014
- 2014-02-18 JP JP2015558911A patent/JP6134395B2/ja active Active
- 2014-02-18 MX MX2015010893A patent/MX349569B/es active IP Right Grant
- 2014-02-18 CA CA2902110A patent/CA2902110C/en active Active
- 2014-02-18 EP EP14754482.9A patent/EP2959418A4/en not_active Withdrawn
- 2014-02-18 AU AU2014219077A patent/AU2014219077A1/en not_active Abandoned
- 2014-02-18 WO PCT/US2014/016976 patent/WO2014130472A1/en active Application Filing
- 2014-02-18 SG SG11201506642PA patent/SG11201506642PA/en unknown
-
2019
- 2019-10-08 AU AU2019246773A patent/AU2019246773B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
JP6134395B2 (ja) | 2017-05-24 |
AU2019246773A1 (en) | 2019-10-31 |
MX2015010893A (es) | 2016-05-05 |
AU2019246773B2 (en) | 2020-10-08 |
CA2902110C (en) | 2018-07-31 |
SG11201506642PA (en) | 2015-09-29 |
WO2014130472A1 (en) | 2014-08-28 |
JP2016513324A (ja) | 2016-05-12 |
MX349569B (es) | 2017-08-03 |
EP2959418A4 (en) | 2016-10-05 |
CA2902110A1 (en) | 2014-08-28 |
EP2959418A1 (en) | 2015-12-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2019246773B2 (en) | Systems and methods of risk based rules for application control | |
US9467465B2 (en) | Systems and methods of risk based rules for application control | |
US11343280B2 (en) | System and method for identifying and controlling polymorphic malware | |
US12309200B2 (en) | Detecting phishing attacks | |
US20140201843A1 (en) | Systems and methods for identifying and reporting application and file vulnerabilities | |
US9846776B1 (en) | System and method for detecting file altering behaviors pertaining to a malicious attack | |
BR112013004345B1 (pt) | sistema e método para evitar malware acoplado a um servidor | |
Powers et al. | Whitelist malware defense for embedded control system devices | |
Lakshmi | Beginning Security with Microsoft Technologies | |
US12292966B2 (en) | Systems and methods for folder and file sequestration | |
US20250175473A1 (en) | Active verification of security infrastructure | |
CN120263435A (zh) | 漏洞防护方法、装置、电子设备、程序产品及存储介质 | |
HK1185174A (en) | System and method for server-coupled malware prevention |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
MK5 | Application lapsed section 142(2)(e) - patent request and compl. specification not accepted |