BR112019001479A2 - detecção baseada em núcleo de funcionalidade de aplicação alvo utilizando mapeamento de endereços virtuais - Google Patents
detecção baseada em núcleo de funcionalidade de aplicação alvo utilizando mapeamento de endereços virtuaisInfo
- Publication number
- BR112019001479A2 BR112019001479A2 BR112019001479-9A BR112019001479A BR112019001479A2 BR 112019001479 A2 BR112019001479 A2 BR 112019001479A2 BR 112019001479 A BR112019001479 A BR 112019001479A BR 112019001479 A2 BR112019001479 A2 BR 112019001479A2
- Authority
- BR
- Brazil
- Prior art keywords
- application
- address mapping
- virtual address
- target application
- mapping table
- Prior art date
Links
- 238000013507 mapping Methods 0.000 title abstract 4
- 238000001514 detection method Methods 0.000 title 1
- 238000000034 method Methods 0.000 abstract 2
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/02—Addressing or allocation; Relocation
- G06F12/08—Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems
- G06F12/10—Address translation
- G06F12/1009—Address translation using page tables, e.g. page table structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/02—Addressing or allocation; Relocation
- G06F12/08—Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems
- G06F12/12—Replacement control
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/565—Static detection by checking file integrity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3604—Software analysis for verifying properties of programs
- G06F11/3612—Software analysis for verifying properties of programs by runtime analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2212/00—Indexing scheme relating to accessing, addressing or allocation within memory systems or architectures
- G06F2212/10—Providing a specific technical effect
- G06F2212/1052—Security improvement
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2212/00—Indexing scheme relating to accessing, addressing or allocation within memory systems or architectures
- G06F2212/65—Details of virtual memory and virtual address translation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/034—Test or assess a computer or a system
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Quality & Reliability (AREA)
- Storage Device Security (AREA)
- Devices For Executing Special Programs (AREA)
- Debugging And Monitoring (AREA)
- Stored Programmes (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Executing Machine-Instructions (AREA)
- Memory System Of A Hierarchy Structure (AREA)
Abstract
sistemas, métodos e programas de computador são apresentados para a detecção de uma funcionalidade de alto nível de uma aplicação que executa em um dispositivo de computação. um método compreende armazenar, em uma memória segura em um dispositivo de computação, uma tabela de mapeamento de endereços virtuais para uma aplicação. a tabela de mapeamento de endereços virtuais compreende uma pluralidade de endereços virtuais no código binário de aplicação mapeado para funcionalidades de aplicação alvo correspondentes. a aplicação é registrada com um sistema operacional de alto nível (hlos). durante a execução do código binário de aplicação, o hlos detecta quando um ou mais dos endereços virtuais correspondentes às funcionalidades de aplicação alvo são executados com base na tabela de mapeamento de endereços virtuais.
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201662368223P | 2016-07-29 | 2016-07-29 | |
US62/368,223 | 2016-07-29 | ||
US15/245,037 | 2016-08-23 | ||
US15/245,037 US10380342B2 (en) | 2016-07-29 | 2016-08-23 | Kernel-based detection of target application functionality using virtual address mapping |
PCT/US2017/040492 WO2018022255A1 (en) | 2016-07-29 | 2017-06-30 | Kernel-based detection of target application functionality using virtual address mapping |
Publications (1)
Publication Number | Publication Date |
---|---|
BR112019001479A2 true BR112019001479A2 (pt) | 2019-04-30 |
Family
ID=61009931
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
BR112019001479-9A BR112019001479A2 (pt) | 2016-07-29 | 2017-06-30 | detecção baseada em núcleo de funcionalidade de aplicação alvo utilizando mapeamento de endereços virtuais |
BR112019001506-0A BR112019001506A2 (pt) | 2016-07-29 | 2017-06-30 | atualização de endereços de memória virtual de funcionalidades de aplicação alvo para uma versão atualizada de código binário de aplicação |
BR112019001511-6A BR112019001511A2 (pt) | 2016-07-29 | 2017-06-30 | detecção baseada em núcleo de funcionalidade de aplicação alvo utilizando mapeamento de endereço virtual baseado em deslocamento |
Family Applications After (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
BR112019001506-0A BR112019001506A2 (pt) | 2016-07-29 | 2017-06-30 | atualização de endereços de memória virtual de funcionalidades de aplicação alvo para uma versão atualizada de código binário de aplicação |
BR112019001511-6A BR112019001511A2 (pt) | 2016-07-29 | 2017-06-30 | detecção baseada em núcleo de funcionalidade de aplicação alvo utilizando mapeamento de endereço virtual baseado em deslocamento |
Country Status (9)
Country | Link |
---|---|
US (3) | US10289847B2 (pt) |
EP (3) | EP3491569B1 (pt) |
JP (3) | JP6704504B2 (pt) |
KR (3) | KR102058326B1 (pt) |
CN (3) | CN109564608A (pt) |
BR (3) | BR112019001479A2 (pt) |
SG (3) | SG11201811211TA (pt) |
TW (3) | TW201807576A (pt) |
WO (3) | WO2018022256A1 (pt) |
Families Citing this family (38)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9754112B1 (en) * | 2014-11-24 | 2017-09-05 | Bluerisc, Inc. | Detection and healing of vulnerabilities in computer code |
US10289847B2 (en) | 2016-07-29 | 2019-05-14 | Qualcomm Incorporated | Updating virtual memory addresses of target application functionalities for an updated version of application binary code |
US10754988B2 (en) * | 2016-08-30 | 2020-08-25 | Winbond Electronics Corporation | Anti-rollback version upgrade in secured memory chip |
US10275596B1 (en) * | 2016-12-15 | 2019-04-30 | Symantec Corporation | Activating malicious actions within electronic documents |
WO2018208669A1 (en) * | 2017-05-08 | 2018-11-15 | KnowBe4, Inc. | Systems and methods for providing user interfaces based on actions associated with untrusted emails |
US10795659B1 (en) * | 2017-11-02 | 2020-10-06 | Virtuozzo International Gmbh | System and method for live patching processes in user space |
US10635602B2 (en) | 2017-11-14 | 2020-04-28 | International Business Machines Corporation | Address translation prior to receiving a storage reference using the address to be translated |
US10642757B2 (en) | 2017-11-14 | 2020-05-05 | International Business Machines Corporation | Single call to perform pin and unpin operations |
US10592164B2 (en) | 2017-11-14 | 2020-03-17 | International Business Machines Corporation | Portions of configuration state registers in-memory |
US10558366B2 (en) | 2017-11-14 | 2020-02-11 | International Business Machines Corporation | Automatic pinning of units of memory |
US10901738B2 (en) | 2017-11-14 | 2021-01-26 | International Business Machines Corporation | Bulk store and load operations of configuration state registers |
US10698686B2 (en) | 2017-11-14 | 2020-06-30 | International Business Machines Corporation | Configurable architectural placement control |
US10496437B2 (en) | 2017-11-14 | 2019-12-03 | International Business Machines Corporation | Context switch by changing memory pointers |
US10552070B2 (en) | 2017-11-14 | 2020-02-04 | International Business Machines Corporation | Separation of memory-based configuration state registers based on groups |
US10761983B2 (en) * | 2017-11-14 | 2020-09-01 | International Business Machines Corporation | Memory based configuration state registers |
US10761751B2 (en) | 2017-11-14 | 2020-09-01 | International Business Machines Corporation | Configuration state registers grouped based on functional affinity |
US10664181B2 (en) | 2017-11-14 | 2020-05-26 | International Business Machines Corporation | Protecting in-memory configuration state registers |
JP7013297B2 (ja) * | 2018-03-22 | 2022-01-31 | 株式会社セキュアブレイン | 不正検知装置、不正検知ネットワークシステム、及び不正検知方法 |
US11182283B2 (en) * | 2018-09-26 | 2021-11-23 | Apple Inc. | Allocation of memory within a data type-specific memory heap |
CN109858239B (zh) * | 2019-01-16 | 2020-01-17 | 四川大学 | 一种动静态结合的容器内cpu漏洞攻击程序检测方法 |
US10936507B2 (en) * | 2019-03-28 | 2021-03-02 | Intel Corporation | System, apparatus and method for application specific address mapping |
US11468881B2 (en) * | 2019-03-29 | 2022-10-11 | Samsung Electronics Co., Ltd. | Method and system for semantic intelligent task learning and adaptive execution |
US11561814B2 (en) * | 2019-05-15 | 2023-01-24 | Vmware, Inc. | Browser-driven capture of application installations for application virtualization |
US11169930B2 (en) | 2019-05-28 | 2021-11-09 | Micron Technology, Inc. | Fine grain data migration to or from borrowed memory |
US11061819B2 (en) | 2019-05-28 | 2021-07-13 | Micron Technology, Inc. | Distributed computing based on memory as a service |
CN110598378B (zh) * | 2019-08-01 | 2023-07-18 | 华为技术有限公司 | 全局偏移表度量方法、动态度量方法及相关装置、设备 |
KR102693699B1 (ko) * | 2019-09-06 | 2024-08-12 | 삼성전자 주식회사 | 전자 장치에서 어플리케이션 업데이트 시 런타임 성능 개선 방법 및 장치 |
CN110888773B (zh) * | 2019-10-28 | 2023-06-06 | 北京字节跳动网络技术有限公司 | 一种获取线程标识的方法、装置、介质和电子设备 |
TWI728637B (zh) * | 2020-01-02 | 2021-05-21 | 中華電信股份有限公司 | 資訊安全防護方法及電腦可讀媒介 |
US11610020B2 (en) * | 2020-04-07 | 2023-03-21 | Mcafee, Llc | Securing sensitive user data stored locally by an application |
US11599342B2 (en) * | 2020-09-28 | 2023-03-07 | Red Hat, Inc. | Pathname independent probing of binaries |
CN113190448B (zh) * | 2021-05-06 | 2022-11-04 | 网易(杭州)网络有限公司 | 测试代码更新方法及装置、电子设备、存储介质 |
CN113190237B (zh) * | 2021-05-10 | 2024-01-19 | 北京百度网讯科技有限公司 | 数据处理方法、系统和装置 |
US11902398B2 (en) | 2021-06-22 | 2024-02-13 | Bizdata Inc. | System and method to integrate data from one application to another application |
US11934533B2 (en) | 2021-06-22 | 2024-03-19 | Microsoft Technology Licensing, Llc | Detection of supply chain-related security threats to software applications |
CN114268514B (zh) * | 2021-11-30 | 2022-11-08 | 国汽智控(北京)科技有限公司 | 车辆与上位机的通信方法、装置及系统 |
CN114448815B (zh) * | 2021-12-27 | 2023-11-03 | 天翼云科技有限公司 | 基于网络拓扑的cdn节点数据生成方法、装置及计算机设备 |
US11928460B2 (en) * | 2022-04-20 | 2024-03-12 | International Business Machines Corporation | Dynamic update of a computer program in memory |
Family Cites Families (37)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5572590A (en) * | 1994-04-12 | 1996-11-05 | International Business Machines Corporation | Discrimination of malicious changes to digital information using multiple signatures |
JP3011115B2 (ja) * | 1997-01-17 | 2000-02-21 | 日本電気株式会社 | デバッグシステム |
US6988271B2 (en) | 1998-10-02 | 2006-01-17 | Microsoft Corporation | Heavyweight and lightweight instrumentation |
US6681331B1 (en) | 1999-05-11 | 2004-01-20 | Cylant, Inc. | Dynamic software system intrusion detection |
US6785818B1 (en) | 2000-01-14 | 2004-08-31 | Symantec Corporation | Thwarting malicious registry mapping modifications and map-loaded module masquerade attacks |
US6477612B1 (en) | 2000-02-08 | 2002-11-05 | Microsoft Corporation | Providing access to physical memory allocated to a process by selectively mapping pages of the physical memory with virtual memory allocated to the process |
US20020178375A1 (en) * | 2001-01-31 | 2002-11-28 | Harris Corporation | Method and system for protecting against malicious mobile code |
US6598144B1 (en) * | 2001-12-12 | 2003-07-22 | Advanced Micro Devices, Inc. | Arrangement for limiting access to addresses by a consumer process instigating work in a channel adapter based on virtual address mapping |
US7213123B2 (en) * | 2002-10-24 | 2007-05-01 | International Business Machines Corporation | Method and apparatus for mapping debugging information when debugging integrated executables in a heterogeneous architecture |
GB0623276D0 (en) * | 2006-11-22 | 2007-01-03 | Transitive Ltd | Memory consistency protection in a multiprocessor computing system |
JP4763743B2 (ja) * | 2008-03-28 | 2011-08-31 | 日本電信電話株式会社 | プログラム動作比較装置及び方法及びプログラム |
CN101315602B (zh) * | 2008-05-09 | 2011-01-26 | 浙江大学 | 硬件化的进程内存管理核的方法 |
EP2151763A1 (en) | 2008-07-28 | 2010-02-10 | Nagravision S.A. | Method and apparatus for obfuscating virtual to physical memory mapping |
US9235704B2 (en) | 2008-10-21 | 2016-01-12 | Lookout, Inc. | System and method for a scanning API |
CN101430662B (zh) * | 2008-12-09 | 2010-10-06 | 东信和平智能卡股份有限公司 | Java语言程序与虚拟机程序共同调试的方法 |
US8117422B2 (en) | 2009-02-05 | 2012-02-14 | Texas Instruments Incorporated | Fast address translation for linear and circular modes |
US8271450B2 (en) * | 2009-10-01 | 2012-09-18 | Vmware, Inc. | Monitoring a data structure in a virtual machine and determining if memory pages containing the data structure are swapped into or out of guest physical memory |
TWI432987B (zh) | 2011-03-15 | 2014-04-01 | Phison Electronics Corp | 記憶體儲存裝置、其記憶體控制器與病毒掃描方法 |
US8943330B2 (en) | 2011-05-10 | 2015-01-27 | Qualcomm Incorporated | Apparatus and method for hardware-based secure data processing using buffer memory address range rules |
US8566935B2 (en) | 2011-05-12 | 2013-10-22 | At&T Intellectual Property I, L.P. | Balancing malware rootkit detection with power consumption on mobile devices |
US9032526B2 (en) | 2011-05-12 | 2015-05-12 | Microsoft Technology Licensing, Llc | Emulating mixed-code programs using a virtual machine instance |
CN102243595B (zh) * | 2011-08-03 | 2014-02-19 | 浙江大学 | 基于MMU架构的Java Card系统组件更新方法 |
US8897762B2 (en) * | 2012-02-28 | 2014-11-25 | Qualcomm Incorporated | Optimizing signaling load overhead and battery consumption for background applications |
IL219597A0 (en) | 2012-05-03 | 2012-10-31 | Syndrome X Ltd | Malicious threat detection, malicious threat prevention, and a learning systems and methods for malicious threat detection and prevention |
US9124419B2 (en) * | 2012-05-08 | 2015-09-01 | Discretix Technologies Ltd. | Method, device, and system of secure entry and handling of passwords |
US8819772B2 (en) | 2012-06-25 | 2014-08-26 | Appthority, Inc. | In-line filtering of insecure or unwanted mobile device software components or communications |
US9268936B2 (en) | 2012-07-27 | 2016-02-23 | Mandiant, Llc | Physical memory forensics system and method |
US9092327B2 (en) * | 2012-12-10 | 2015-07-28 | Qualcomm Incorporated | System and method for allocating memory to dissimilar memory devices using quality of service |
US9311011B2 (en) * | 2013-08-07 | 2016-04-12 | Qualcomm Incorporated | Dynamic address negotiation for shared memory regions in heterogenous multiprocessor systems |
JP2016534479A (ja) * | 2013-09-12 | 2016-11-04 | ヴァーセック・システムズ・インコーポレーテッドVirsec Systems,Inc. | マルウェアのランタイム中の自動検出 |
US9489313B2 (en) | 2013-09-24 | 2016-11-08 | Qualcomm Incorporated | Conditional page fault control for page residency |
CN104572046B (zh) * | 2013-10-16 | 2019-01-11 | 腾讯科技(深圳)有限公司 | 一种堆栈还原方法和计算机系统 |
US9721212B2 (en) | 2014-06-04 | 2017-08-01 | Qualcomm Incorporated | Efficient on-device binary analysis for auto-generated behavioral models |
US9721660B2 (en) * | 2014-10-24 | 2017-08-01 | Microsoft Technology Licensing, Llc | Configurable volatile memory without a dedicated power source for detecting a data save trigger condition |
CN104461905A (zh) * | 2014-12-30 | 2015-03-25 | 东信和平科技股份有限公司 | 一种智能卡虚拟机、api库与上层应用同时调试的方法及系统 |
CN105117648A (zh) * | 2015-07-29 | 2015-12-02 | 杭州安恒信息技术有限公司 | 一种基于虚拟机的0day/恶意文档检测系统及方法 |
US10289847B2 (en) | 2016-07-29 | 2019-05-14 | Qualcomm Incorporated | Updating virtual memory addresses of target application functionalities for an updated version of application binary code |
-
2016
- 2016-08-23 US US15/245,041 patent/US10289847B2/en active Active
- 2016-08-23 US US15/245,037 patent/US10380342B2/en active Active
-
2017
- 2017-03-21 US US15/465,515 patent/US10360383B2/en active Active
- 2017-06-30 SG SG11201811211TA patent/SG11201811211TA/en unknown
- 2017-06-30 BR BR112019001479-9A patent/BR112019001479A2/pt active Search and Examination
- 2017-06-30 WO PCT/US2017/040495 patent/WO2018022256A1/en active Search and Examination
- 2017-06-30 EP EP17742335.7A patent/EP3491569B1/en active Active
- 2017-06-30 CN CN201780046239.4A patent/CN109564608A/zh active Pending
- 2017-06-30 BR BR112019001506-0A patent/BR112019001506A2/pt not_active IP Right Cessation
- 2017-06-30 CN CN201780045936.8A patent/CN109478217B/zh active Active
- 2017-06-30 KR KR1020197002552A patent/KR102058326B1/ko active IP Right Grant
- 2017-06-30 JP JP2019503727A patent/JP6704504B2/ja active Active
- 2017-06-30 KR KR1020197002550A patent/KR102097256B1/ko active IP Right Grant
- 2017-06-30 SG SG11201811213XA patent/SG11201811213XA/en unknown
- 2017-06-30 JP JP2019503726A patent/JP6704503B2/ja active Active
- 2017-06-30 BR BR112019001511-6A patent/BR112019001511A2/pt not_active Application Discontinuation
- 2017-06-30 EP EP17742336.5A patent/EP3491570A1/en not_active Withdrawn
- 2017-06-30 JP JP2019503720A patent/JP2019528515A/ja active Pending
- 2017-06-30 KR KR1020197002551A patent/KR20190038543A/ko not_active Application Discontinuation
- 2017-06-30 SG SG11201811216WA patent/SG11201811216WA/en unknown
- 2017-06-30 EP EP17742334.0A patent/EP3491568B1/en active Active
- 2017-06-30 WO PCT/US2017/040492 patent/WO2018022255A1/en active Search and Examination
- 2017-06-30 CN CN201780045934.9A patent/CN109643343B/zh active Active
- 2017-06-30 WO PCT/US2017/040502 patent/WO2018022257A1/en active Search and Examination
- 2017-07-28 TW TW106125433A patent/TW201807576A/zh unknown
- 2017-07-28 TW TW106125395A patent/TWI696950B/zh not_active IP Right Cessation
- 2017-07-28 TW TW106125587A patent/TWI686744B/zh not_active IP Right Cessation
Also Published As
Similar Documents
Publication | Publication Date | Title |
---|---|---|
BR112019001479A2 (pt) | detecção baseada em núcleo de funcionalidade de aplicação alvo utilizando mapeamento de endereços virtuais | |
JP2019526123A5 (pt) | ||
JP2019527892A5 (pt) | ||
BR112017027915A2 (pt) | método e aparelho de processamento de dados e dispositivo flash | |
BR112014017156A8 (pt) | prevenção de execução dinâmica para impedir programação orientada para retorno | |
BR112018014982A8 (pt) | Conduzir transações usando dispositivos eletrônicos com credenciais não nativas | |
BR112018008990A2 (pt) | sistema computacional em um veículo, e, método | |
CA2953788C (en) | Automated code lockdown to reduce attack surface for software | |
BR102014011433A8 (pt) | sistema, método e aparelho para processamento de dados | |
BR112016023578A2 (pt) | sistema de posicionamento de dispositivo médico e um método para seu uso | |
BR112017003426A8 (pt) | Fluxo de dados construído para processamento de evento intensificado | |
BR112018006098A2 (pt) | sistemas e métodos para processamento de vídeo | |
GB2493861A (en) | Debugging multithreaded code | |
GB2503470A9 (en) | Memory protection | |
BR112018010437A8 (pt) | proteção do código básico de entrada/saída (bios) | |
BR112018068611A2 (pt) | acesso com base em prioridade de linhas de memória comprimidas em memória em um sistema com base em processador | |
BR112015032790A2 (pt) | sistema e método para fornecimento de controle de acesso a uma unidade de processamento gráfica | |
RU2018118828A (ru) | Системы и способы обнаружения вредоносных программ с алгоритмом генерации доменов (dga) | |
BR112017025625A2 (pt) | reordenação de transação e tradução com multi-thread para unidades de gerenciamento de memória | |
BR112019007914A2 (pt) | método de controle de iniciação de aplicativo e dispositivo de computador, mídia de armazenamento não-transitória, método de controle de aplicativo, dispositivo de computador e mídia de armazenamento não-transitória | |
MX2018002776A (es) | Ejecutar aplicaciones en dispositivo de computo. | |
BR112019007600A2 (pt) | seleção de recurso de energia externo dinâmico | |
BR112018000463A2 (pt) | uso de capacitância para detectar pressão de toque | |
BR112016004553A8 (pt) | renderização baseada na atenção e fidelidade | |
RU2015134102A (ru) | Общий способ построения виртуального pci-устройства и виртуального mmio-устройства |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
B06W | Patent application suspended after preliminary examination (for patents with searches from other patent authorities) chapter 6.23 patent gazette] | ||
B06A | Patent application procedure suspended [chapter 6.1 patent gazette] | ||
B09A | Decision: intention to grant [chapter 9.1 patent gazette] |