GB2579070B - Computer implemented method - Google Patents
Computer implemented method Download PDFInfo
- Publication number
- GB2579070B GB2579070B GB1818791.4A GB201818791A GB2579070B GB 2579070 B GB2579070 B GB 2579070B GB 201818791 A GB201818791 A GB 201818791A GB 2579070 B GB2579070 B GB 2579070B
- Authority
- GB
- United Kingdom
- Prior art keywords
- implemented method
- computer implemented
- computer
- implemented
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB1818791.4A GB2579070B (en) | 2018-11-19 | 2018-11-19 | Computer implemented method |
PCT/GB2019/053227 WO2020104772A1 (en) | 2018-11-19 | 2019-11-14 | Computer implemented method |
EP19809559.8A EP3884412A1 (en) | 2018-11-19 | 2019-11-14 | Computer implemented method |
US17/294,967 US11836246B2 (en) | 2018-11-19 | 2019-11-14 | Computer implemented method |
US18/523,270 US20240095344A1 (en) | 2018-11-19 | 2023-11-29 | Computer implemented method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB1818791.4A GB2579070B (en) | 2018-11-19 | 2018-11-19 | Computer implemented method |
Publications (3)
Publication Number | Publication Date |
---|---|
GB201818791D0 GB201818791D0 (en) | 2019-01-02 |
GB2579070A GB2579070A (en) | 2020-06-10 |
GB2579070B true GB2579070B (en) | 2023-04-05 |
Family
ID=64740135
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB1818791.4A Active GB2579070B (en) | 2018-11-19 | 2018-11-19 | Computer implemented method |
Country Status (1)
Country | Link |
---|---|
GB (1) | GB2579070B (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101286191A (en) * | 2008-05-21 | 2008-10-15 | 华为技术有限公司 | Buffer overflow attack protection method, device and system |
GB2508441A (en) * | 2012-12-03 | 2014-06-04 | Inst Information Industry | Protecting a computer system from malicious program code |
-
2018
- 2018-11-19 GB GB1818791.4A patent/GB2579070B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101286191A (en) * | 2008-05-21 | 2008-10-15 | 华为技术有限公司 | Buffer overflow attack protection method, device and system |
GB2508441A (en) * | 2012-12-03 | 2014-06-04 | Inst Information Industry | Protecting a computer system from malicious program code |
Non-Patent Citations (2)
Title |
---|
Sun et al. "A Native APIs Protection Mechanism in the Kernel Mode against Malicious Code" in IEEE Transactions on Computers, vol. 60, no. 06, pp. 813-823, 2011. doi: 10.1109/TC.2011.46 * |
Xuxian et al. "RandSys: Thwarting Code Injection Attacks with System Service Interface Randomization," 2007 26th IEEE International Symposium on Reliable Distributed Systems (SRDS 2007), 2007, pp. 209-218, doi: 10.1109/SRDS.2007.36 * |
Also Published As
Publication number | Publication date |
---|---|
GB2579070A (en) | 2020-06-10 |
GB201818791D0 (en) | 2019-01-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
GB201800298D0 (en) | Method | |
GB201808474D0 (en) | Method | |
GB201807793D0 (en) | Method | |
GB201809323D0 (en) | Method | |
GB201808554D0 (en) | Method | |
GB201811813D0 (en) | Method | |
GB201811811D0 (en) | Method | |
GB201805876D0 (en) | Method | |
GB201811810D0 (en) | Method | |
GB201818715D0 (en) | Method | |
GB201800558D0 (en) | Method | |
GB201808663D0 (en) | Method | |
GB201804277D0 (en) | Method | |
GB201809403D0 (en) | Method | |
GB201806240D0 (en) | Method | |
GB201803750D0 (en) | Method | |
GB2579072B (en) | Computer implemented method | |
GB201808558D0 (en) | Method | |
GB201807788D0 (en) | Method | |
GB201807041D0 (en) | Method | |
GB201803183D0 (en) | Method | |
GB201802653D0 (en) | Method | |
GB201801169D0 (en) | Method | |
GB201800187D0 (en) | Method | |
GB2579070B (en) | Computer implemented method |