DE60113844D1 - Verfahren zur feststellung böswilligen rechnerkodes - Google Patents
Verfahren zur feststellung böswilligen rechnerkodesInfo
- Publication number
- DE60113844D1 DE60113844D1 DE60113844T DE60113844T DE60113844D1 DE 60113844 D1 DE60113844 D1 DE 60113844D1 DE 60113844 T DE60113844 T DE 60113844T DE 60113844 T DE60113844 T DE 60113844T DE 60113844 D1 DE60113844 D1 DE 60113844D1
- Authority
- DE
- Germany
- Prior art keywords
- memory
- test data
- checksum
- value
- determine whether
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Virology (AREA)
- Health & Medical Sciences (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
- Detection And Correction Of Errors (AREA)
- Techniques For Improving Reliability Of Storages (AREA)
- Error Detection And Correction (AREA)
- Compression, Expansion, Code Conversion, And Decoders (AREA)
- Exchange Systems With Centralized Control (AREA)
- Detection And Prevention Of Errors In Transmission (AREA)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0016273 | 2000-07-01 | ||
GB0016273A GB2364404B (en) | 2000-07-01 | 2000-07-01 | Method of detecting malicious code |
PCT/GB2001/002955 WO2002003175A2 (en) | 2000-07-01 | 2001-07-02 | Method of detecting malicious code |
Publications (3)
Publication Number | Publication Date |
---|---|
DE60113844D1 true DE60113844D1 (de) | 2005-11-10 |
DE60113844T2 DE60113844T2 (de) | 2006-03-16 |
DE60113844T8 DE60113844T8 (de) | 2006-06-08 |
Family
ID=9894898
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
DE60113844T Active DE60113844T8 (de) | 2000-07-01 | 2001-07-02 | Verfahren zur feststellung böswilligen rechnerkodes |
Country Status (9)
Country | Link |
---|---|
US (1) | US7131036B2 (de) |
EP (1) | EP1299789B1 (de) |
JP (1) | JP4739644B2 (de) |
CN (1) | CN1205521C (de) |
AT (1) | ATE306099T1 (de) |
AU (2) | AU2001266228B2 (de) |
DE (1) | DE60113844T8 (de) |
GB (1) | GB2364404B (de) |
WO (1) | WO2002003175A2 (de) |
Families Citing this family (39)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7421587B2 (en) * | 2001-07-26 | 2008-09-02 | Mcafee, Inc. | Detecting computer programs within packed computer files |
US7676842B2 (en) * | 2002-04-13 | 2010-03-09 | Computer Associates Think, Inc. | System and method for detecting malicious code |
GB0212318D0 (en) * | 2002-05-28 | 2002-07-10 | Symbian Ltd | Tamper evident removable media storing executable code |
KR100503387B1 (ko) | 2003-03-14 | 2005-07-26 | 주식회사 안철수연구소 | 악성 암호화 스크립트에 대한 분석 및 해독 방법 |
KR100509650B1 (ko) * | 2003-03-14 | 2005-08-23 | 주식회사 안철수연구소 | 코드 삽입 기법을 이용한 악성 스크립트 감지 방법 |
KR100503386B1 (ko) * | 2003-03-14 | 2005-07-26 | 주식회사 안철수연구소 | 제어흐름과 자료흐름을 고려한 악성 행위 패턴 감지 방법 |
DE10324507A1 (de) * | 2003-05-28 | 2004-12-30 | Francotyp-Postalia Ag & Co. Kg | Verfahren zum Laden von Daten in eine Speichereinrichtung |
US7325185B1 (en) * | 2003-08-04 | 2008-01-29 | Symantec Corporation | Host-based detection and prevention of malicious code propagation |
JP2005100362A (ja) * | 2003-08-29 | 2005-04-14 | Canon Inc | プログラム書き換え可能な電子装置およびプログラム書き換え方法 |
US8621602B2 (en) * | 2004-06-09 | 2013-12-31 | Nxp B.V. | One-time authentication system |
TWI254883B (en) | 2004-10-15 | 2006-05-11 | Hon Hai Prec Ind Co Ltd | Method and system for checking the bios rom data |
CN100356337C (zh) * | 2004-10-16 | 2007-12-19 | 鸿富锦精密工业(深圳)有限公司 | 基本输入输出系统只读存储器数据检测系统及方法 |
KR100670005B1 (ko) | 2005-02-23 | 2007-01-19 | 삼성전자주식회사 | 모바일 플랫폼을 위한 메모리의 무결성을 원격으로 확인하는 확인장치 및 그 시스템 그리고 무결성 확인 방법 |
US7725735B2 (en) * | 2005-03-29 | 2010-05-25 | International Business Machines Corporation | Source code management method for malicious code detection |
US8272058B2 (en) | 2005-07-29 | 2012-09-18 | Bit 9, Inc. | Centralized timed analysis in a network security system |
US7895651B2 (en) | 2005-07-29 | 2011-02-22 | Bit 9, Inc. | Content tracking in a network security system |
US8984636B2 (en) | 2005-07-29 | 2015-03-17 | Bit9, Inc. | Content extractor and analysis system |
US9177153B1 (en) | 2005-10-07 | 2015-11-03 | Carnegie Mellon University | Verifying integrity and guaranteeing execution of code on untrusted computer platform |
US7996901B2 (en) * | 2006-03-31 | 2011-08-09 | Lenovo (Singapore) Pte. Ltd. | Hypervisor area for email virus testing |
US8151352B1 (en) * | 2006-07-14 | 2012-04-03 | Bitdefender IPR Managament Ltd. | Anti-malware emulation systems and methods |
WO2008055156A2 (en) | 2006-10-30 | 2008-05-08 | The Trustees Of Columbia University In The City Of New York | Methods, media, and systems for detecting an anomalous sequence of function calls |
US8286133B2 (en) * | 2007-12-19 | 2012-10-09 | Microsoft Corporation | Fuzzing encoded data |
US8136095B2 (en) * | 2007-12-19 | 2012-03-13 | Microsoft Corporation | Relations in fuzzing data |
CN101304409B (zh) * | 2008-06-28 | 2011-04-13 | 成都市华为赛门铁克科技有限公司 | 恶意代码检测方法及系统 |
JP5378883B2 (ja) * | 2009-05-28 | 2013-12-25 | 株式会社ソニー・コンピュータエンタテインメント | 画像処理装置および画像処理方法 |
US8918575B2 (en) * | 2009-09-14 | 2014-12-23 | Broadcom Corporation | Method and system for securely programming OTP memory |
CN101763481B (zh) * | 2010-01-15 | 2011-07-27 | 北京工业大学 | 基于lzw压缩算法的未知恶意代码检测方法 |
KR101138748B1 (ko) * | 2010-01-22 | 2012-04-24 | 주식회사 안철수연구소 | 악성 코드 차단 장치, 시스템 및 방법 |
US20120222083A1 (en) * | 2011-02-28 | 2012-08-30 | Nokia Corporation | Method and apparatus for enforcing data privacy |
DE102012217743B4 (de) * | 2012-09-28 | 2018-10-31 | Siemens Ag | Überprüfung einer Integrität von Eigenschaftsdaten eines Gerätes durch ein Prüfgerät |
US9852290B1 (en) * | 2013-07-12 | 2017-12-26 | The Boeing Company | Systems and methods of analyzing a software component |
US9202057B2 (en) * | 2013-08-30 | 2015-12-01 | Symantec Corporation | Systems and methods for identifying private keys that have been compromised |
US9479521B2 (en) | 2013-09-30 | 2016-10-25 | The Boeing Company | Software network behavior analysis and identification system |
GB2554096B (en) * | 2016-09-20 | 2019-03-20 | Advanced Risc Mach Ltd | Handling of inter-element address hazards for vector instructions |
WO2018160341A1 (en) * | 2017-03-03 | 2018-09-07 | Google Llc | Secure code jump and execution gating |
US10248577B2 (en) | 2017-04-07 | 2019-04-02 | International Business Machines Corporation | Using a characteristic of a process input/output (I/O) activity and data subject to the I/O activity to determine whether the process is a suspicious process |
US10282543B2 (en) | 2017-05-03 | 2019-05-07 | International Business Machines Corporation | Determining whether to destage write data in cache to storage based on whether the write data has malicious data |
US10445497B2 (en) * | 2017-05-03 | 2019-10-15 | International Business Machines Corporation | Offloading processing of writes to determine malicious data from a first storage system to a second storage system |
WO2021185447A1 (en) * | 2020-03-19 | 2021-09-23 | Huawei Technologies Co., Ltd. | Code integrity protection in devices having limited computing resources |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5050212A (en) * | 1990-06-20 | 1991-09-17 | Apple Computer, Inc. | Method and apparatus for verifying the integrity of a file stored separately from a computer |
US5475625A (en) * | 1991-01-16 | 1995-12-12 | Siemens Nixdorf Informationssysteme Aktiengesellschaft | Method and arrangement for monitoring computer manipulations |
US5454000A (en) * | 1992-07-13 | 1995-09-26 | International Business Machines Corporation | Method and system for authenticating files |
JPH06242957A (ja) * | 1993-02-16 | 1994-09-02 | Fujitsu Ltd | プログラム実行制御装置 |
JPH07146788A (ja) * | 1993-11-22 | 1995-06-06 | Fujitsu Ltd | ウイルス診断機構の作成システムと作成方法並びにウイルス診断機構と診断方法 |
US5493649A (en) * | 1994-06-21 | 1996-02-20 | Microsoft Corporation | Detecting corruption in a computer program at execution time using a checksum |
US5613002A (en) * | 1994-11-21 | 1997-03-18 | International Business Machines Corporation | Generic disinfection of programs infected with a computer virus |
US5608801A (en) * | 1995-11-16 | 1997-03-04 | Bell Communications Research, Inc. | Efficient cryptographic hash functions and methods for amplifying the security of hash functions and pseudo-random functions |
US5768372A (en) * | 1996-03-13 | 1998-06-16 | Altera Corporation | Method and apparatus for securing programming data of a programmable logic device |
TW313642B (en) * | 1996-06-11 | 1997-08-21 | Ibm | A uniform mechanism for using signed content |
US5974250A (en) * | 1996-12-13 | 1999-10-26 | Compaq Computer Corp. | System and method for secure information transmission over a network |
JPH11143840A (ja) * | 1997-11-05 | 1999-05-28 | Hitachi Ltd | 分散オブジェクトシステムおよびその方法 |
EP1056010A1 (de) | 1999-05-28 | 2000-11-29 | Hewlett-Packard Company | Datenintegritätsüberwachung in einer vertrauten Rechnereinheit |
-
2000
- 2000-07-01 GB GB0016273A patent/GB2364404B/en not_active Revoked
-
2001
- 2001-07-02 AT AT01943695T patent/ATE306099T1/de not_active IP Right Cessation
- 2001-07-02 WO PCT/GB2001/002955 patent/WO2002003175A2/en active IP Right Grant
- 2001-07-02 DE DE60113844T patent/DE60113844T8/de active Active
- 2001-07-02 CN CNB01814666XA patent/CN1205521C/zh not_active Expired - Fee Related
- 2001-07-02 JP JP2002508176A patent/JP4739644B2/ja not_active Expired - Fee Related
- 2001-07-02 AU AU2001266228A patent/AU2001266228B2/en not_active Ceased
- 2001-07-02 EP EP01943695A patent/EP1299789B1/de not_active Expired - Lifetime
- 2001-07-02 AU AU6622801A patent/AU6622801A/xx active Pending
- 2001-07-02 US US10/312,303 patent/US7131036B2/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
JP4739644B2 (ja) | 2011-08-03 |
JP2004503006A (ja) | 2004-01-29 |
GB2364404A (en) | 2002-01-23 |
CN1449515A (zh) | 2003-10-15 |
DE60113844T2 (de) | 2006-03-16 |
DE60113844T8 (de) | 2006-06-08 |
WO2002003175A3 (en) | 2002-08-01 |
CN1205521C (zh) | 2005-06-08 |
AU6622801A (en) | 2002-01-14 |
EP1299789B1 (de) | 2005-10-05 |
ATE306099T1 (de) | 2005-10-15 |
GB0016273D0 (en) | 2000-08-23 |
WO2002003175A2 (en) | 2002-01-10 |
US7131036B2 (en) | 2006-10-31 |
US20030159090A1 (en) | 2003-08-21 |
EP1299789A2 (de) | 2003-04-09 |
AU2001266228B2 (en) | 2007-06-07 |
GB2364404B (en) | 2002-10-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE60113844T8 (de) | Verfahren zur feststellung böswilligen rechnerkodes | |
WO2003091880A3 (en) | Enhancements to data integrity verification mechanism | |
TW200502755A (en) | Method and system for comparing multiple bytes of data to stored string segments | |
ATE474393T1 (de) | Verfahren und vorrichtung zur authentifikation eines physischen gegenstandes | |
DK0835489T3 (da) | Fremgangsmåde og system til at detektere forvrængede data ved anvendelse af spejlede data | |
ATE426858T1 (de) | System und verfahren zum erkennen von bísartigem code | |
DE60112890D1 (de) | Verfahren zur überwachung von dokumenten | |
DE50108456D1 (de) | Verfahren zur überwachung eines filterelements | |
EP1223578A3 (de) | Datenverarbeitungsverfahren mit Fehlerkorrekturkodes und ein Gerät, welches dasselbe Verfahren benutzt | |
ATE472129T1 (de) | System und verfahren zur überprüfung der integrität von in einem elektronischen gerät gespeicherten informationen | |
TW200734868A (en) | Reconfigurable system with corruption detection and recovery | |
WO2001053909A3 (en) | Method and systems for data security | |
ATE408200T1 (de) | Verfahren und system zur durchführung von prüfungen in einer einrichtung und einrichtung | |
WO2003001380A3 (en) | Method and apparatus for preservation of failure state in a read destructive memory | |
WO2001098872A3 (en) | A method of checking eeprom data with an embedded crc | |
HUP0001254A1 (hu) | Eljárás válaszjeladók azonosítására, analizáló berendezés, válaszjeladó az eljárás megvalósítására | |
ATE468672T1 (de) | Speicherverwaltungsverfahren und einrichtung | |
JP4196770B2 (ja) | データ処理方法、データ検査方法 | |
WO2005062480A8 (en) | Determination of correlation in the frequency domain | |
CN108196975B (zh) | 基于多校验和的数据验证方法、装置及存储介质 | |
TW200611274A (en) | Method and system for testing memory using hash algorithm | |
TW200515132A (en) | Checksum determination | |
SG54509A1 (en) | A method and apparatus for detecting and concealing data errors in stored digital data | |
KR970072796A (ko) | 데이터 샘플링 회로 및 휴대용 무선 단말 장치 | |
TW200508633A (en) | Pattern generator and testing device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
8364 | No opposition during term of opposition | ||
8327 | Change in the person/name/address of the patent owner |
Owner name: ERICSSON AB, STOCKHOLM, SE |
|
8328 | Change in the person/name/address of the agent |
Representative=s name: 2K PATENTANWAELTE BLASBERG KEWITZ & REICHEL, PARTN |