DE60113844D1 - Verfahren zur feststellung böswilligen rechnerkodes - Google Patents

Verfahren zur feststellung böswilligen rechnerkodes

Info

Publication number
DE60113844D1
DE60113844D1 DE60113844T DE60113844T DE60113844D1 DE 60113844 D1 DE60113844 D1 DE 60113844D1 DE 60113844 T DE60113844 T DE 60113844T DE 60113844 T DE60113844 T DE 60113844T DE 60113844 D1 DE60113844 D1 DE 60113844D1
Authority
DE
Germany
Prior art keywords
memory
test data
checksum
value
determine whether
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
DE60113844T
Other languages
English (en)
Other versions
DE60113844T2 (de
DE60113844T8 (de
Inventor
William John Sparry
Stuart Charles Wray
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ericsson AB
Original Assignee
MARCONI UK INTELLECTUAL PROPERTY Ltd COVENTRY
Marconi UK Intellectual Property Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by MARCONI UK INTELLECTUAL PROPERTY Ltd COVENTRY, Marconi UK Intellectual Property Ltd filed Critical MARCONI UK INTELLECTUAL PROPERTY Ltd COVENTRY
Publication of DE60113844D1 publication Critical patent/DE60113844D1/de
Publication of DE60113844T2 publication Critical patent/DE60113844T2/de
Application granted granted Critical
Publication of DE60113844T8 publication Critical patent/DE60113844T8/de
Active legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Virology (AREA)
  • Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)
  • Detection And Correction Of Errors (AREA)
  • Techniques For Improving Reliability Of Storages (AREA)
  • Error Detection And Correction (AREA)
  • Compression, Expansion, Code Conversion, And Decoders (AREA)
  • Exchange Systems With Centralized Control (AREA)
  • Detection And Prevention Of Errors In Transmission (AREA)
DE60113844T 2000-07-01 2001-07-02 Verfahren zur feststellung böswilligen rechnerkodes Active DE60113844T8 (de)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
GB0016273 2000-07-01
GB0016273A GB2364404B (en) 2000-07-01 2000-07-01 Method of detecting malicious code
PCT/GB2001/002955 WO2002003175A2 (en) 2000-07-01 2001-07-02 Method of detecting malicious code

Publications (3)

Publication Number Publication Date
DE60113844D1 true DE60113844D1 (de) 2005-11-10
DE60113844T2 DE60113844T2 (de) 2006-03-16
DE60113844T8 DE60113844T8 (de) 2006-06-08

Family

ID=9894898

Family Applications (1)

Application Number Title Priority Date Filing Date
DE60113844T Active DE60113844T8 (de) 2000-07-01 2001-07-02 Verfahren zur feststellung böswilligen rechnerkodes

Country Status (9)

Country Link
US (1) US7131036B2 (de)
EP (1) EP1299789B1 (de)
JP (1) JP4739644B2 (de)
CN (1) CN1205521C (de)
AT (1) ATE306099T1 (de)
AU (2) AU2001266228B2 (de)
DE (1) DE60113844T8 (de)
GB (1) GB2364404B (de)
WO (1) WO2002003175A2 (de)

Families Citing this family (39)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7421587B2 (en) * 2001-07-26 2008-09-02 Mcafee, Inc. Detecting computer programs within packed computer files
US7676842B2 (en) * 2002-04-13 2010-03-09 Computer Associates Think, Inc. System and method for detecting malicious code
GB0212318D0 (en) * 2002-05-28 2002-07-10 Symbian Ltd Tamper evident removable media storing executable code
KR100503387B1 (ko) 2003-03-14 2005-07-26 주식회사 안철수연구소 악성 암호화 스크립트에 대한 분석 및 해독 방법
KR100509650B1 (ko) * 2003-03-14 2005-08-23 주식회사 안철수연구소 코드 삽입 기법을 이용한 악성 스크립트 감지 방법
KR100503386B1 (ko) * 2003-03-14 2005-07-26 주식회사 안철수연구소 제어흐름과 자료흐름을 고려한 악성 행위 패턴 감지 방법
DE10324507A1 (de) * 2003-05-28 2004-12-30 Francotyp-Postalia Ag & Co. Kg Verfahren zum Laden von Daten in eine Speichereinrichtung
US7325185B1 (en) * 2003-08-04 2008-01-29 Symantec Corporation Host-based detection and prevention of malicious code propagation
JP2005100362A (ja) * 2003-08-29 2005-04-14 Canon Inc プログラム書き換え可能な電子装置およびプログラム書き換え方法
US8621602B2 (en) * 2004-06-09 2013-12-31 Nxp B.V. One-time authentication system
TWI254883B (en) 2004-10-15 2006-05-11 Hon Hai Prec Ind Co Ltd Method and system for checking the bios rom data
CN100356337C (zh) * 2004-10-16 2007-12-19 鸿富锦精密工业(深圳)有限公司 基本输入输出系统只读存储器数据检测系统及方法
KR100670005B1 (ko) 2005-02-23 2007-01-19 삼성전자주식회사 모바일 플랫폼을 위한 메모리의 무결성을 원격으로 확인하는 확인장치 및 그 시스템 그리고 무결성 확인 방법
US7725735B2 (en) * 2005-03-29 2010-05-25 International Business Machines Corporation Source code management method for malicious code detection
US8272058B2 (en) 2005-07-29 2012-09-18 Bit 9, Inc. Centralized timed analysis in a network security system
US7895651B2 (en) 2005-07-29 2011-02-22 Bit 9, Inc. Content tracking in a network security system
US8984636B2 (en) 2005-07-29 2015-03-17 Bit9, Inc. Content extractor and analysis system
US9177153B1 (en) 2005-10-07 2015-11-03 Carnegie Mellon University Verifying integrity and guaranteeing execution of code on untrusted computer platform
US7996901B2 (en) * 2006-03-31 2011-08-09 Lenovo (Singapore) Pte. Ltd. Hypervisor area for email virus testing
US8151352B1 (en) * 2006-07-14 2012-04-03 Bitdefender IPR Managament Ltd. Anti-malware emulation systems and methods
WO2008055156A2 (en) 2006-10-30 2008-05-08 The Trustees Of Columbia University In The City Of New York Methods, media, and systems for detecting an anomalous sequence of function calls
US8286133B2 (en) * 2007-12-19 2012-10-09 Microsoft Corporation Fuzzing encoded data
US8136095B2 (en) * 2007-12-19 2012-03-13 Microsoft Corporation Relations in fuzzing data
CN101304409B (zh) * 2008-06-28 2011-04-13 成都市华为赛门铁克科技有限公司 恶意代码检测方法及系统
JP5378883B2 (ja) * 2009-05-28 2013-12-25 株式会社ソニー・コンピュータエンタテインメント 画像処理装置および画像処理方法
US8918575B2 (en) * 2009-09-14 2014-12-23 Broadcom Corporation Method and system for securely programming OTP memory
CN101763481B (zh) * 2010-01-15 2011-07-27 北京工业大学 基于lzw压缩算法的未知恶意代码检测方法
KR101138748B1 (ko) * 2010-01-22 2012-04-24 주식회사 안철수연구소 악성 코드 차단 장치, 시스템 및 방법
US20120222083A1 (en) * 2011-02-28 2012-08-30 Nokia Corporation Method and apparatus for enforcing data privacy
DE102012217743B4 (de) * 2012-09-28 2018-10-31 Siemens Ag Überprüfung einer Integrität von Eigenschaftsdaten eines Gerätes durch ein Prüfgerät
US9852290B1 (en) * 2013-07-12 2017-12-26 The Boeing Company Systems and methods of analyzing a software component
US9202057B2 (en) * 2013-08-30 2015-12-01 Symantec Corporation Systems and methods for identifying private keys that have been compromised
US9479521B2 (en) 2013-09-30 2016-10-25 The Boeing Company Software network behavior analysis and identification system
GB2554096B (en) * 2016-09-20 2019-03-20 Advanced Risc Mach Ltd Handling of inter-element address hazards for vector instructions
WO2018160341A1 (en) * 2017-03-03 2018-09-07 Google Llc Secure code jump and execution gating
US10248577B2 (en) 2017-04-07 2019-04-02 International Business Machines Corporation Using a characteristic of a process input/output (I/O) activity and data subject to the I/O activity to determine whether the process is a suspicious process
US10282543B2 (en) 2017-05-03 2019-05-07 International Business Machines Corporation Determining whether to destage write data in cache to storage based on whether the write data has malicious data
US10445497B2 (en) * 2017-05-03 2019-10-15 International Business Machines Corporation Offloading processing of writes to determine malicious data from a first storage system to a second storage system
WO2021185447A1 (en) * 2020-03-19 2021-09-23 Huawei Technologies Co., Ltd. Code integrity protection in devices having limited computing resources

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5050212A (en) * 1990-06-20 1991-09-17 Apple Computer, Inc. Method and apparatus for verifying the integrity of a file stored separately from a computer
US5475625A (en) * 1991-01-16 1995-12-12 Siemens Nixdorf Informationssysteme Aktiengesellschaft Method and arrangement for monitoring computer manipulations
US5454000A (en) * 1992-07-13 1995-09-26 International Business Machines Corporation Method and system for authenticating files
JPH06242957A (ja) * 1993-02-16 1994-09-02 Fujitsu Ltd プログラム実行制御装置
JPH07146788A (ja) * 1993-11-22 1995-06-06 Fujitsu Ltd ウイルス診断機構の作成システムと作成方法並びにウイルス診断機構と診断方法
US5493649A (en) * 1994-06-21 1996-02-20 Microsoft Corporation Detecting corruption in a computer program at execution time using a checksum
US5613002A (en) * 1994-11-21 1997-03-18 International Business Machines Corporation Generic disinfection of programs infected with a computer virus
US5608801A (en) * 1995-11-16 1997-03-04 Bell Communications Research, Inc. Efficient cryptographic hash functions and methods for amplifying the security of hash functions and pseudo-random functions
US5768372A (en) * 1996-03-13 1998-06-16 Altera Corporation Method and apparatus for securing programming data of a programmable logic device
TW313642B (en) * 1996-06-11 1997-08-21 Ibm A uniform mechanism for using signed content
US5974250A (en) * 1996-12-13 1999-10-26 Compaq Computer Corp. System and method for secure information transmission over a network
JPH11143840A (ja) * 1997-11-05 1999-05-28 Hitachi Ltd 分散オブジェクトシステムおよびその方法
EP1056010A1 (de) 1999-05-28 2000-11-29 Hewlett-Packard Company Datenintegritätsüberwachung in einer vertrauten Rechnereinheit

Also Published As

Publication number Publication date
JP4739644B2 (ja) 2011-08-03
JP2004503006A (ja) 2004-01-29
GB2364404A (en) 2002-01-23
CN1449515A (zh) 2003-10-15
DE60113844T2 (de) 2006-03-16
DE60113844T8 (de) 2006-06-08
WO2002003175A3 (en) 2002-08-01
CN1205521C (zh) 2005-06-08
AU6622801A (en) 2002-01-14
EP1299789B1 (de) 2005-10-05
ATE306099T1 (de) 2005-10-15
GB0016273D0 (en) 2000-08-23
WO2002003175A2 (en) 2002-01-10
US7131036B2 (en) 2006-10-31
US20030159090A1 (en) 2003-08-21
EP1299789A2 (de) 2003-04-09
AU2001266228B2 (en) 2007-06-07
GB2364404B (en) 2002-10-02

Similar Documents

Publication Publication Date Title
DE60113844T8 (de) Verfahren zur feststellung böswilligen rechnerkodes
WO2003091880A3 (en) Enhancements to data integrity verification mechanism
TW200502755A (en) Method and system for comparing multiple bytes of data to stored string segments
ATE474393T1 (de) Verfahren und vorrichtung zur authentifikation eines physischen gegenstandes
DK0835489T3 (da) Fremgangsmåde og system til at detektere forvrængede data ved anvendelse af spejlede data
ATE426858T1 (de) System und verfahren zum erkennen von bísartigem code
DE60112890D1 (de) Verfahren zur überwachung von dokumenten
DE50108456D1 (de) Verfahren zur überwachung eines filterelements
EP1223578A3 (de) Datenverarbeitungsverfahren mit Fehlerkorrekturkodes und ein Gerät, welches dasselbe Verfahren benutzt
ATE472129T1 (de) System und verfahren zur überprüfung der integrität von in einem elektronischen gerät gespeicherten informationen
TW200734868A (en) Reconfigurable system with corruption detection and recovery
WO2001053909A3 (en) Method and systems for data security
ATE408200T1 (de) Verfahren und system zur durchführung von prüfungen in einer einrichtung und einrichtung
WO2003001380A3 (en) Method and apparatus for preservation of failure state in a read destructive memory
WO2001098872A3 (en) A method of checking eeprom data with an embedded crc
HUP0001254A1 (hu) Eljárás válaszjeladók azonosítására, analizáló berendezés, válaszjeladó az eljárás megvalósítására
ATE468672T1 (de) Speicherverwaltungsverfahren und einrichtung
JP4196770B2 (ja) データ処理方法、データ検査方法
WO2005062480A8 (en) Determination of correlation in the frequency domain
CN108196975B (zh) 基于多校验和的数据验证方法、装置及存储介质
TW200611274A (en) Method and system for testing memory using hash algorithm
TW200515132A (en) Checksum determination
SG54509A1 (en) A method and apparatus for detecting and concealing data errors in stored digital data
KR970072796A (ko) 데이터 샘플링 회로 및 휴대용 무선 단말 장치
TW200508633A (en) Pattern generator and testing device

Legal Events

Date Code Title Description
8364 No opposition during term of opposition
8327 Change in the person/name/address of the patent owner

Owner name: ERICSSON AB, STOCKHOLM, SE

8328 Change in the person/name/address of the agent

Representative=s name: 2K PATENTANWAELTE BLASBERG KEWITZ & REICHEL, PARTN