CA2902110C - Systems and methods of risk based rules for application control - Google Patents

Systems and methods of risk based rules for application control Download PDF

Info

Publication number
CA2902110C
CA2902110C CA2902110A CA2902110A CA2902110C CA 2902110 C CA2902110 C CA 2902110C CA 2902110 A CA2902110 A CA 2902110A CA 2902110 A CA2902110 A CA 2902110A CA 2902110 C CA2902110 C CA 2902110C
Authority
CA
Canada
Prior art keywords
application
legitimate application
module
rule
risk
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CA2902110A
Other languages
English (en)
French (fr)
Other versions
CA2902110A1 (en
Inventor
Brad Hibbert
Chris Silva
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BeyondTrust Software Inc
Original Assignee
BeyondTrust Software Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US14/156,375 external-priority patent/US20140201843A1/en
Application filed by BeyondTrust Software Inc filed Critical BeyondTrust Software Inc
Publication of CA2902110A1 publication Critical patent/CA2902110A1/en
Application granted granted Critical
Publication of CA2902110C publication Critical patent/CA2902110C/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer And Data Communications (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Stored Programmes (AREA)
  • Debugging And Monitoring (AREA)
CA2902110A 2013-02-25 2014-02-18 Systems and methods of risk based rules for application control Active CA2902110C (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US201361768809P 2013-02-25 2013-02-25
US61/768,809 2013-02-25
US14/156,375 2014-01-15
US14/156,375 US20140201843A1 (en) 2013-01-15 2014-01-15 Systems and methods for identifying and reporting application and file vulnerabilities
PCT/US2014/016976 WO2014130472A1 (en) 2013-02-25 2014-02-18 Systems and methods of risk based rules for application control

Publications (2)

Publication Number Publication Date
CA2902110A1 CA2902110A1 (en) 2014-08-28
CA2902110C true CA2902110C (en) 2018-07-31

Family

ID=51391742

Family Applications (1)

Application Number Title Priority Date Filing Date
CA2902110A Active CA2902110C (en) 2013-02-25 2014-02-18 Systems and methods of risk based rules for application control

Country Status (7)

Country Link
EP (1) EP2959418A4 (enrdf_load_stackoverflow)
JP (1) JP6134395B2 (enrdf_load_stackoverflow)
AU (2) AU2014219077A1 (enrdf_load_stackoverflow)
CA (1) CA2902110C (enrdf_load_stackoverflow)
MX (1) MX349569B (enrdf_load_stackoverflow)
SG (1) SG11201506642PA (enrdf_load_stackoverflow)
WO (1) WO2014130472A1 (enrdf_load_stackoverflow)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11609984B2 (en) * 2018-02-14 2023-03-21 Digital Guardian Llc Systems and methods for determining a likelihood of an existence of malware on an executable

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10445505B2 (en) 2014-09-22 2019-10-15 Mcafee, Llc Process vulnerability assessment
RU2595511C2 (ru) * 2014-12-05 2016-08-27 Закрытое акционерное общество "Лаборатория Касперского" Система и способ ограничения работы доверенных приложений при наличии подозрительных приложений
US9858410B2 (en) * 2015-10-26 2018-01-02 Symantec Corporation Techniques for automated application analysis
CN106537344A (zh) * 2016-03-30 2017-03-22 北京小米移动软件有限公司 一种应用程序调用管理的方法和装置
JP7091354B2 (ja) * 2017-02-27 2022-06-27 イヴァンティ,インコーポレイテッド コンピュータセキュリティリスクのコンテキストベースの軽減のためのシステム及び方法
EP3591556A1 (en) * 2018-07-07 2020-01-08 1830291 Ontario Inc. Automated security assessment of information systems
US11356449B2 (en) * 2018-10-20 2022-06-07 Walmart Apollo, Llc Managing access to vulnerability data at scale
US11481498B2 (en) * 2019-01-28 2022-10-25 Visa International Service Association Continuous vulnerability management for modern applications
WO2021079495A1 (ja) * 2019-10-25 2021-04-29 日本電気株式会社 評価装置、評価システム、評価方法及びプログラム
CN110929267A (zh) * 2019-11-29 2020-03-27 深信服科技股份有限公司 代码漏洞检测方法、装置、设备及存储介质
JP7215525B2 (ja) * 2020-04-08 2023-01-31 日本電気株式会社 端末、制御方法、及びプログラム
WO2022000024A1 (en) * 2020-06-29 2022-01-06 Blue Eagle Technologies Pty Limited A method for securing a software application
IT202000025771A1 (it) * 2020-10-29 2022-04-29 Beatcode S R L Metodo per certificare l’autenticità di file digitali generati da un dispositivo di comunicazione

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040225877A1 (en) * 2003-05-09 2004-11-11 Zezhen Huang Method and system for protecting computer system from malicious software operation
EP1583013A1 (en) * 2004-03-31 2005-10-05 Swiss Reinsurance Company Computer-based system and method for detecting risks
JP4688472B2 (ja) * 2004-11-01 2011-05-25 株式会社エヌ・ティ・ティ・ドコモ 端末制御装置及び端末制御方法
US8006088B2 (en) * 2005-08-18 2011-08-23 Beyondtrust Corporation Methods and systems for network-based management of application security
US20070169199A1 (en) * 2005-09-09 2007-07-19 Forum Systems, Inc. Web service vulnerability metadata exchange system
US20070094735A1 (en) * 2005-10-26 2007-04-26 Cohen Matthew L Method to consolidate and prioritize web application vulnerabilities
US20070180509A1 (en) * 2005-12-07 2007-08-02 Swartz Alon R Practical platform for high risk applications
US20070174824A1 (en) * 2006-01-23 2007-07-26 Microsoft Corporation Techniques for generating and executing browser-hosted applications
EP2050242A1 (en) * 2006-07-31 2009-04-22 Telecom Italia S.p.A. A system for implementing security on telecommunications terminals
JP4751431B2 (ja) * 2008-09-12 2011-08-17 株式会社東芝 脆弱性判定装置及びプログラム
US8473508B2 (en) * 2009-10-01 2013-06-25 Oracle International Corporation Dynamic rule creation and caching
JP5585303B2 (ja) * 2010-08-25 2014-09-10 日本電気株式会社 ライブラリ実行管理システム、ライブラリ実行管理方法およびプログラム
US8738906B1 (en) * 2011-11-30 2014-05-27 Juniper Networks, Inc. Traffic classification and control on a network node

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11609984B2 (en) * 2018-02-14 2023-03-21 Digital Guardian Llc Systems and methods for determining a likelihood of an existence of malware on an executable

Also Published As

Publication number Publication date
JP6134395B2 (ja) 2017-05-24
AU2019246773A1 (en) 2019-10-31
MX2015010893A (es) 2016-05-05
AU2019246773B2 (en) 2020-10-08
SG11201506642PA (en) 2015-09-29
WO2014130472A1 (en) 2014-08-28
JP2016513324A (ja) 2016-05-12
MX349569B (es) 2017-08-03
EP2959418A4 (en) 2016-10-05
CA2902110A1 (en) 2014-08-28
EP2959418A1 (en) 2015-12-30
AU2014219077A1 (en) 2015-09-17

Similar Documents

Publication Publication Date Title
AU2019246773B2 (en) Systems and methods of risk based rules for application control
US9467465B2 (en) Systems and methods of risk based rules for application control
US11343280B2 (en) System and method for identifying and controlling polymorphic malware
US12309200B2 (en) Detecting phishing attacks
US20140201843A1 (en) Systems and methods for identifying and reporting application and file vulnerabilities
Powers et al. Whitelist malware defense for embedded control system devices
Lakshmi Beginning Security with Microsoft Technologies
US12292966B2 (en) Systems and methods for folder and file sequestration
US20250175473A1 (en) Active verification of security infrastructure
HK1185174A (en) System and method for server-coupled malware prevention

Legal Events

Date Code Title Description
EEER Examination request

Effective date: 20150821