CN101573712A - 自动漏洞检测及响应 - Google Patents

自动漏洞检测及响应 Download PDF

Info

Publication number
CN101573712A
CN101573712A CNA2007800486253A CN200780048625A CN101573712A CN 101573712 A CN101573712 A CN 101573712A CN A2007800486253 A CNA2007800486253 A CN A2007800486253A CN 200780048625 A CN200780048625 A CN 200780048625A CN 101573712 A CN101573712 A CN 101573712A
Authority
CN
China
Prior art keywords
crash
interface
user
function
program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2007800486253A
Other languages
English (en)
Chinese (zh)
Inventor
J·罗杰斯
E·M·劳伦斯
H·F·布里奇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microsoft Technology Licensing LLC
Original Assignee
Microsoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Corp filed Critical Microsoft Corp
Publication of CN101573712A publication Critical patent/CN101573712A/zh
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0706Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment
    • G06F11/0748Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment in a remote unit communicating with a single-box computer node experiencing an error/fault
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/079Root cause analysis, i.e. error or fault diagnosis

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Quality & Reliability (AREA)
  • Computing Systems (AREA)
  • Debugging And Monitoring (AREA)
  • Radar Systems Or Details Thereof (AREA)
  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)
CNA2007800486253A 2006-12-29 2007-12-31 自动漏洞检测及响应 Pending CN101573712A (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US11/618,470 2006-12-29
US11/618,470 US8453245B2 (en) 2006-12-29 2006-12-29 Automatic vulnerability detection and response

Publications (1)

Publication Number Publication Date
CN101573712A true CN101573712A (zh) 2009-11-04

Family

ID=39586025

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2007800486253A Pending CN101573712A (zh) 2006-12-29 2007-12-31 自动漏洞检测及响应

Country Status (10)

Country Link
US (1) US8453245B2 (enExample)
EP (1) EP2118802A4 (enExample)
JP (1) JP2010515177A (enExample)
KR (1) KR20090117705A (enExample)
CN (1) CN101573712A (enExample)
AU (1) AU2007341952B2 (enExample)
BR (1) BRPI0720666A2 (enExample)
MX (1) MX2009007064A (enExample)
RU (1) RU2462754C2 (enExample)
WO (1) WO2008083382A1 (enExample)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103595708A (zh) * 2013-10-22 2014-02-19 北京奇虎科技有限公司 浏览器异常关闭的处理方法、系统、浏览器和服务器
CN103595765A (zh) * 2013-10-22 2014-02-19 北京奇虎科技有限公司 浏览器异常关闭的处理方法、系统、浏览器和服务器

Families Citing this family (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8453245B2 (en) 2006-12-29 2013-05-28 Microsoft Corporation Automatic vulnerability detection and response
US8627475B2 (en) * 2010-04-08 2014-01-07 Microsoft Corporation Early detection of potential malware
US20120311715A1 (en) * 2011-05-30 2012-12-06 Yaron Tal System and method for protecting a website from hacking attacks
US10445505B2 (en) 2014-09-22 2019-10-15 Mcafee, Llc Process vulnerability assessment
US10089473B2 (en) 2014-12-24 2018-10-02 Sap Se Software nomenclature system for security vulnerability management
KR101619691B1 (ko) 2015-01-22 2016-05-10 주식회사 엔씨소프트 프로그램 오류 분석 방법 및 시스템
US10176329B2 (en) * 2015-08-11 2019-01-08 Symantec Corporation Systems and methods for detecting unknown vulnerabilities in computing processes
JP6721775B2 (ja) * 2017-02-24 2020-07-15 株式会社Fuji 不具合情報共有システム
CN110096873B (zh) 2018-01-31 2025-03-25 开利公司 通过补丁变换的自动诱饵推导
US11886390B2 (en) 2019-04-30 2024-01-30 JFrog Ltd. Data file partition and replication
US11340894B2 (en) 2019-04-30 2022-05-24 JFrog, Ltd. Data file partition and replication
US11386233B2 (en) 2019-04-30 2022-07-12 JFrog, Ltd. Data bundle generation and deployment
WO2021014326A2 (en) 2019-07-19 2021-01-28 JFrog Ltd. Software release verification
US10999314B2 (en) * 2019-07-19 2021-05-04 JFrog Ltd. Software release tracking and logging
US11307920B2 (en) 2019-11-26 2022-04-19 Disney Enterprises, Inc. Automated crash recovery
RU2739867C1 (ru) * 2019-11-27 2020-12-29 Акционерное общество "Лаборатория Касперского" Способ определения модуля приложения, связанного с причиной неполадки, возникшей при работе приложения
RU2739831C1 (ru) * 2019-11-27 2020-12-28 Акционерное общество "Лаборатория Касперского" Способ устранения неполадки, возникшей при работе приложения
US11860680B2 (en) 2020-11-24 2024-01-02 JFrog Ltd. Software pipeline and release validation
US12061889B2 (en) 2021-10-29 2024-08-13 JFrog Ltd. Software release distribution across a hierarchical network
US12158959B2 (en) * 2022-10-19 2024-12-03 Dell Products, L.P. Systems and methods for vulnerability proofing when updating an IHS
US12169568B2 (en) * 2022-10-19 2024-12-17 Dell Products, L.P. Systems and methods for vulnerability proofing when booting an IHS
US12174968B2 (en) * 2022-10-19 2024-12-24 Dell Products, L.P. Systems and methods for vulnerability proofing when adding and replacing IHS hardware
US12141294B2 (en) * 2022-10-20 2024-11-12 Dell Products, L.P. Systems and methods for context-aware vulnerability risk scores
US12153685B2 (en) * 2022-10-20 2024-11-26 Dell Products, L.P. Systems and methods for vulnerability proofing when using a bootable image
US12135794B2 (en) * 2022-10-20 2024-11-05 Dell Products, L.P. Systems and methods for validated vulnerability proofing
US12137112B2 (en) * 2022-10-20 2024-11-05 Dell Products, L.P. Systems and methods for vulnerability proofed cluster management
US12223059B2 (en) * 2022-10-21 2025-02-11 Dell Products, L.P. Systems and methods for vulnerability proofing when configuring an IHS
US12130931B2 (en) * 2022-10-21 2024-10-29 Dell Products, L.P. Systems and methods for vulnerability proofing interdependent IHS components
US12235970B2 (en) * 2022-10-21 2025-02-25 Dell Products, L.P. Systems and methods for aggregated vulnerability proofing of an IHS
US12141295B2 (en) * 2022-10-21 2024-11-12 Dell Products, L.P. Systems and methods for vulnerability proofing machine learning recommendations
US12147544B2 (en) * 2022-10-21 2024-11-19 Dell Products, L.P. Systems and methods for vulnerability proofing during IHS provisioning

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6629267B1 (en) * 2000-05-15 2003-09-30 Microsoft Corporation Method and system for reporting a program failure
CN1821975A (zh) * 2005-02-17 2006-08-23 微软公司 用于防护所标识的漏洞的系统和方法

Family Cites Families (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2693019B2 (ja) 1990-05-30 1997-12-17 株式会社東芝 プログラマブル・コントローラのプログラム監視装置
US6874084B1 (en) * 2000-05-02 2005-03-29 International Business Machines Corporation Method and apparatus for establishing a secure communication connection between a java application and secure server
US6675295B1 (en) * 2000-06-19 2004-01-06 Microsoft Corporation Method and computer system for detecting and correcting a failure in a computer application program during startup
US6708333B1 (en) * 2000-06-23 2004-03-16 Microsoft Corporation Method and system for reporting failures of a program module in a corporate environment
US20020124172A1 (en) * 2001-03-05 2002-09-05 Brian Manahan Method and apparatus for signing and validating web pages
JP2002264455A (ja) * 2001-03-07 2002-09-18 Canon Inc 画像形成装置および画像形成装置管理装置および画像形成装置の制御方法および画像形成装置管理装置の制御方法および記憶媒体
US7313822B2 (en) 2001-03-16 2007-12-25 Protegrity Corporation Application-layer security method and system
US7096362B2 (en) * 2001-06-01 2006-08-22 International Business Machines Corporation Internet authentication with multiple independent certificate authorities
US7231659B2 (en) * 2001-07-31 2007-06-12 Verisign, Inc. Entity authentication in a shared hosting computer network environment
US7562222B2 (en) * 2002-05-10 2009-07-14 Rsa Security Inc. System and method for authenticating entities to users
KR100777938B1 (ko) 2003-09-04 2007-11-21 싸이언스 파크 가부시키가이샤 부정 코드 실행의 방지 방법, 및 부정 코드 실행의 방지용 프로그램의 기록매체
US7437764B1 (en) * 2003-11-14 2008-10-14 Symantec Corporation Vulnerability assessment of disk images
RU2261470C1 (ru) * 2004-03-01 2005-09-27 Федеральное государственное унитарное предприятие "Научно-производственное предприятие "Полет" Устройство программного управления
US7413085B2 (en) * 2004-09-07 2008-08-19 Iconix, Inc. Techniques for displaying emails listed in an email inbox
JP2006094046A (ja) * 2004-09-22 2006-04-06 Fuji Xerox Co Ltd 複合機および複合機の管理システム
JP4688472B2 (ja) 2004-11-01 2011-05-25 株式会社エヌ・ティ・ティ・ドコモ 端末制御装置及び端末制御方法
US7979889B2 (en) * 2005-01-07 2011-07-12 Cisco Technology, Inc. Methods and apparatus providing security to computer systems and networks
US7743254B2 (en) * 2005-03-23 2010-06-22 Microsoft Corporation Visualization of trust in an address bar
US7735136B2 (en) * 2005-04-18 2010-06-08 Vmware, Inc. 0-touch and 1-touch techniques for improving the availability of computer programs under protection without compromising security
US8453245B2 (en) 2006-12-29 2013-05-28 Microsoft Corporation Automatic vulnerability detection and response

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6629267B1 (en) * 2000-05-15 2003-09-30 Microsoft Corporation Method and system for reporting a program failure
CN1821975A (zh) * 2005-02-17 2006-08-23 微软公司 用于防护所标识的漏洞的系统和方法

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103595708A (zh) * 2013-10-22 2014-02-19 北京奇虎科技有限公司 浏览器异常关闭的处理方法、系统、浏览器和服务器
CN103595765A (zh) * 2013-10-22 2014-02-19 北京奇虎科技有限公司 浏览器异常关闭的处理方法、系统、浏览器和服务器
CN103595765B (zh) * 2013-10-22 2016-11-09 北京奇虎科技有限公司 浏览器异常关闭的处理方法、系统、浏览器和服务器

Also Published As

Publication number Publication date
BRPI0720666A2 (pt) 2014-01-14
US8453245B2 (en) 2013-05-28
MX2009007064A (es) 2009-07-09
RU2009129132A (ru) 2011-02-10
EP2118802A4 (en) 2012-08-22
WO2008083382A1 (en) 2008-07-10
US20080163374A1 (en) 2008-07-03
AU2007341952B2 (en) 2011-10-13
KR20090117705A (ko) 2009-11-12
AU2007341952A1 (en) 2008-07-10
EP2118802A1 (en) 2009-11-18
JP2010515177A (ja) 2010-05-06
RU2462754C2 (ru) 2012-09-27

Similar Documents

Publication Publication Date Title
CN101573712A (zh) 自动漏洞检测及响应
JP6949951B2 (ja) コンピュータアプリケーション内のメモリ破損を修復するためのシステム及び方法
CN103890771B (zh) 用户定义的对抗措施
US7845006B2 (en) Mitigating malicious exploitation of a vulnerability in a software application by selectively trapping execution along a code path
EP3039608B1 (en) Hardware and software execution profiling
CN112541178B (zh) 控制流完整性实施的设备和方法
US8719935B2 (en) Mitigating false positives in malware detection
EP3123311B1 (en) Malicious code protection for computer systems based on process modification
US7665139B1 (en) Method and apparatus to detect and prevent malicious changes to tokens
US20170171229A1 (en) System and method for determining summary events of an attack
AU2018229557A1 (en) Methods and apparatus for identifying and removing malicious applications
JP2008547070A (ja) アプリケーションを修理するための方法及びシステム
JP6370098B2 (ja) 情報処理装置、情報処理監視方法、プログラム、及び記録媒体
Sekar et al. A specification-based approach for building survivable systems
US20070072661A1 (en) Windows message protection
JPWO2004075060A1 (ja) コンピュータウィルス判断方法
Seifert et al. Capture–A behavioral analysis tool for applications and documents
US10198309B2 (en) Unexpected event detection during execution of an application
CN111177726A (zh) 一种系统漏洞检测方法、装置、设备及介质
US20090144828A1 (en) Rapid signatures for protecting vulnerable browser configurations
US10880316B2 (en) Method and system for determining initial execution of an attack
JP2025508439A (ja) 機械学習を用いたアンチランサムウェア
US9003236B2 (en) System and method for correct execution of software based on baseline and real time information
CN110443043B (zh) 一种对安卓应用程序的漏洞检测方法以及设备
CN112269996A (zh) 一种面向区块链主节点的主动免疫可信计算平台的动态度量方法

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
ASS Succession or assignment of patent right

Owner name: MICROSOFT TECHNOLOGY LICENSING LLC

Free format text: FORMER OWNER: MICROSOFT CORP.

Effective date: 20150803

C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20150803

Address after: Washington State

Applicant after: Micro soft technique license Co., Ltd

Address before: Washington State

Applicant before: Microsoft Corp.

C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20091104