HK1243513A1 - 多威脅分析器陣列系統和使用方法 - Google Patents

多威脅分析器陣列系統和使用方法

Info

Publication number
HK1243513A1
HK1243513A1 HK18102780.0A HK18102780A HK1243513A1 HK 1243513 A1 HK1243513 A1 HK 1243513A1 HK 18102780 A HK18102780 A HK 18102780A HK 1243513 A1 HK1243513 A1 HK 1243513A1
Authority
HK
Hong Kong
Prior art keywords
array system
threat analyzer
analyzer array
threat
array
Prior art date
Application number
HK18102780.0A
Other languages
English (en)
Inventor
Lior Kohavi
Ido Rosner
Geffen Tzur
Michael Kajiloti
Friðrik Skúlason
Original Assignee
Cyren Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cyren Inc filed Critical Cyren Inc
Publication of HK1243513A1 publication Critical patent/HK1243513A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
HK18102780.0A 2016-02-25 2018-02-27 多威脅分析器陣列系統和使用方法 HK1243513A1 (zh)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US201662299758P 2016-02-25 2016-02-25

Publications (1)

Publication Number Publication Date
HK1243513A1 true HK1243513A1 (zh) 2018-07-13

Family

ID=58669474

Family Applications (1)

Application Number Title Priority Date Filing Date
HK18102780.0A HK1243513A1 (zh) 2016-02-25 2018-02-27 多威脅分析器陣列系統和使用方法

Country Status (4)

Country Link
US (1) US10482243B2 (zh)
EP (1) EP3211558B1 (zh)
HK (1) HK1243513A1 (zh)
IL (1) IL250797B (zh)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10320810B1 (en) 2016-10-31 2019-06-11 Palo Alto Networks, Inc. Mitigating communication and control attempts
US10621348B1 (en) * 2017-08-15 2020-04-14 Ca, Inc. Detecting a malicious application executing in an emulator based on a check made by the malicious application after making an API call
US11275833B2 (en) * 2018-05-10 2022-03-15 Endgame, Inc. System and method for detecting a malicious file using image analysis prior to execution of the file
US20190362075A1 (en) * 2018-05-22 2019-11-28 Fortinet, Inc. Preventing users from accessing infected files by using multiple file storage repositories and a secure data transfer agent logically interposed therebetween
US11138313B2 (en) * 2018-08-13 2021-10-05 Juniper Networks, Inc. Malware detection based on user interactions
US11036856B2 (en) 2018-09-16 2021-06-15 Fortinet, Inc. Natively mounting storage for inspection and sandboxing in the cloud
US11416611B2 (en) * 2019-12-05 2022-08-16 Vmware, Inc. Countering malware detection evasion techniques
US11829467B2 (en) * 2019-12-18 2023-11-28 Zscaler, Inc. Dynamic rules engine in a cloud-based sandbox
US11349863B2 (en) * 2020-04-27 2022-05-31 WootCloud Inc. Assessing computer network risk
US20230229761A1 (en) * 2021-04-20 2023-07-20 Assured Information Security, Inc. Prevention and remediation of malware based on selective presentation of files to processes
CN116471123B (zh) * 2023-06-14 2023-08-25 杭州海康威视数字技术股份有限公司 针对智能设备安全威胁的智能分析方法、装置及设备

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9152789B2 (en) 2008-05-28 2015-10-06 Zscaler, Inc. Systems and methods for dynamic cloud-based malware behavior analysis
US9609015B2 (en) * 2008-05-28 2017-03-28 Zscaler, Inc. Systems and methods for dynamic cloud-based malware behavior analysis
US9213838B2 (en) * 2011-05-13 2015-12-15 Mcafee Ireland Holdings Limited Systems and methods of processing data associated with detection and/or handling of malware
US8713674B1 (en) 2010-12-17 2014-04-29 Zscaler, Inc. Systems and methods for excluding undesirable network transactions
US8990948B2 (en) * 2012-05-01 2015-03-24 Taasera, Inc. Systems and methods for orchestrating runtime operational integrity
US9455993B2 (en) 2013-03-13 2016-09-27 Lookingglass Cyber Solutions, Inc. Computer network attribute bilateral inheritance
US10084817B2 (en) 2013-09-11 2018-09-25 NSS Labs, Inc. Malware and exploit campaign detection system and method
US9171160B2 (en) * 2013-09-30 2015-10-27 Fireeye, Inc. Dynamically adaptive framework and method for classifying malware using intelligent static, emulation, and dynamic analyses
US9350747B2 (en) 2013-10-31 2016-05-24 Cyberpoint International Llc Methods and systems for malware analysis
US9223972B1 (en) 2014-03-31 2015-12-29 Fireeye, Inc. Dynamically remote tuning of a malware content detection system

Also Published As

Publication number Publication date
IL250797A0 (en) 2017-04-30
EP3211558B1 (en) 2021-09-22
US10482243B2 (en) 2019-11-19
US20180046799A1 (en) 2018-02-15
EP3211558A1 (en) 2017-08-30
IL250797B (en) 2020-04-30

Similar Documents

Publication Publication Date Title
HK1243513A1 (zh) 多威脅分析器陣列系統和使用方法
HK1257310A1 (zh) 抗-cd47抗體及使用方法
IL250282A0 (en) High-throughput sample processing systems and methods for use
EP3224969A4 (en) Systems and methods for mobility testing of mu-mimo
EP3155640A4 (en) Sample analysis systems and methods of use thereof
HK1256912A1 (zh) 聚糖陣列以及使用方法
HK1252032A1 (zh) 測試系統和測試方法
ZA201707504B (en) System and method for measuring hair diameter
IL274772B (en) Test system and test method
PL3285636T3 (pl) Układ foroptera i sposób jego użycia
GB2573692B (en) Analysis system and analysis method
GB201717399D0 (en) Proteogenomic analysis system and methods
EP3636876C0 (en) MECHANICAL INTEGRITY TESTING SYSTEM AND METHODS OF USE THEREOF
EP3358349A4 (en) Analysis device and analysis method
PL3440364T3 (pl) Układ i sposób do badania materiałów
GB201704007D0 (en) System and method for secure analysis of datasets
SG10201701053VA (en) Analyte Concentrator System And Methods Of Use
SG10201702547QA (en) Methods of vibro-treating and vibro-treating apparatus
GB201718732D0 (en) Measurement system and method
GB2540533B (en) Sampling pod system and method
GB201516544D0 (en) Spraying device and method of using same
GB2552823B (en) Skinprint analysis method and apparatus
GB201602076D0 (en) Sampling apparatus and method of use thereof
PT3165907T (pt) Métodos e sistemas para testes não destrutivos
TWI562757B (en) Scalp inspection system and scalp inspection method