JP2016534479A - マルウェアのランタイム中の自動検出 - Google Patents
マルウェアのランタイム中の自動検出 Download PDFInfo
- Publication number
- JP2016534479A JP2016534479A JP2016542827A JP2016542827A JP2016534479A JP 2016534479 A JP2016534479 A JP 2016534479A JP 2016542827 A JP2016542827 A JP 2016542827A JP 2016542827 A JP2016542827 A JP 2016542827A JP 2016534479 A JP2016534479 A JP 2016534479A
- Authority
- JP
- Japan
- Prior art keywords
- computer application
- model
- data
- security events
- runtime
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/565—Static detection by checking file integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Debugging And Monitoring (AREA)
- Computer And Data Communications (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US201361960209P | 2013-09-12 | 2013-09-12 | |
| US61/960,209 | 2013-09-12 | ||
| PCT/US2014/055469 WO2015038944A1 (en) | 2013-09-12 | 2014-09-12 | Automated runtime detection of malware |
Related Child Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2020048093A Division JP7046111B2 (ja) | 2013-09-12 | 2020-03-18 | マルウェアのランタイム中の自動検出 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| JP2016534479A true JP2016534479A (ja) | 2016-11-04 |
| JP2016534479A5 JP2016534479A5 (enExample) | 2017-10-19 |
Family
ID=51619322
Family Applications (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2016542827A Pending JP2016534479A (ja) | 2013-09-12 | 2014-09-12 | マルウェアのランタイム中の自動検出 |
| JP2020048093A Active JP7046111B2 (ja) | 2013-09-12 | 2020-03-18 | マルウェアのランタイム中の自動検出 |
Family Applications After (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2020048093A Active JP7046111B2 (ja) | 2013-09-12 | 2020-03-18 | マルウェアのランタイム中の自動検出 |
Country Status (7)
| Country | Link |
|---|---|
| US (2) | US10079841B2 (enExample) |
| EP (1) | EP3044719B1 (enExample) |
| JP (2) | JP2016534479A (enExample) |
| KR (1) | KR102368170B1 (enExample) |
| AU (3) | AU2014318585B2 (enExample) |
| CA (1) | CA2923231C (enExample) |
| WO (1) | WO2015038944A1 (enExample) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2019519056A (ja) * | 2016-06-16 | 2019-07-04 | ヴァーセック システムズ,インコーポレイテッド | コンピュータアプリケーション内のメモリ破損を修復するためのシステム及び方法 |
Families Citing this family (61)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8510596B1 (en) | 2006-02-09 | 2013-08-13 | Virsec Systems, Inc. | System and methods for run time detection and correction of memory corruption |
| WO2015038944A1 (en) | 2013-09-12 | 2015-03-19 | Virsec Systems, Inc. | Automated runtime detection of malware |
| EP3161715A1 (en) | 2014-06-24 | 2017-05-03 | Virsec Systems, Inc. | System and methods for automated detection of input and output validation and resource management vulnerability |
| US10114726B2 (en) | 2014-06-24 | 2018-10-30 | Virsec Systems, Inc. | Automated root cause analysis of single or N-tiered application |
| US10073972B2 (en) | 2014-10-25 | 2018-09-11 | Mcafee, Llc | Computing platform security methods and apparatus |
| US9690928B2 (en) | 2014-10-25 | 2017-06-27 | Mcafee, Inc. | Computing platform security methods and apparatus |
| US9516055B1 (en) * | 2015-05-29 | 2016-12-06 | Trend Micro Incorporated | Automatic malware signature extraction from runtime information |
| US10783241B2 (en) * | 2015-10-28 | 2020-09-22 | Qomplx, Inc. | System and methods for sandboxed malware analysis and automated patch development, deployment and validation |
| US12462016B2 (en) | 2015-10-28 | 2025-11-04 | Qomplx Llc | System and methods for sandboxed software analysis with automated vulnerability detection and patch development, deployment and validation |
| US10108798B1 (en) * | 2016-01-04 | 2018-10-23 | Smart Information Flow Technologies LLC | Methods and systems for defending against cyber-attacks |
| CN107545178B (zh) | 2016-06-23 | 2021-01-15 | 华为技术有限公司 | 一种云应用的检测方法及云应用检测装置 |
| US10289847B2 (en) * | 2016-07-29 | 2019-05-14 | Qualcomm Incorporated | Updating virtual memory addresses of target application functionalities for an updated version of application binary code |
| US10372909B2 (en) * | 2016-08-19 | 2019-08-06 | Hewlett Packard Enterprise Development Lp | Determining whether process is infected with malware |
| US9928365B1 (en) | 2016-10-31 | 2018-03-27 | International Business Machines Corporation | Automated mechanism to obtain detailed forensic analysis of file access |
| US10346625B2 (en) | 2016-10-31 | 2019-07-09 | International Business Machines Corporation | Automated mechanism to analyze elevated authority usage and capability |
| US10599845B2 (en) * | 2016-12-13 | 2020-03-24 | Npcore, Inc. | Malicious code deactivating apparatus and method of operating the same |
| US10303861B2 (en) * | 2017-01-26 | 2019-05-28 | Immunant, Inc. | Software diversification in external contexts |
| US10225273B2 (en) | 2017-01-27 | 2019-03-05 | International Business Machines Corporation | Secured event monitoring leveraging blockchain |
| US10783246B2 (en) | 2017-01-31 | 2020-09-22 | Hewlett Packard Enterprise Development Lp | Comparing structural information of a snapshot of system memory |
| US10650156B2 (en) | 2017-04-26 | 2020-05-12 | International Business Machines Corporation | Environmental security controls to prevent unauthorized access to files, programs, and objects |
| US10523694B2 (en) * | 2017-05-11 | 2019-12-31 | Bitdam Ltd | System and method for interception of malicious files |
| US11615338B2 (en) * | 2017-07-24 | 2023-03-28 | Bitdam Ltd. | System and method for generating a file execution record of address tuples |
| US10621348B1 (en) * | 2017-08-15 | 2020-04-14 | Ca, Inc. | Detecting a malicious application executing in an emulator based on a check made by the malicious application after making an API call |
| WO2019039617A1 (ko) * | 2017-08-21 | 2019-02-28 | 주식회사 스패로우 | 웹 애플리케이션의 동적 분석을 위한 api 호출 정보 제공 방법 및 장치 |
| US10990975B2 (en) | 2017-11-08 | 2021-04-27 | Paypal, Inc. | Detecting malware by monitoring client-side memory stacks |
| KR101976992B1 (ko) | 2017-11-16 | 2019-05-10 | 숭실대학교산학협력단 | 시그니처 추출을 이용한 분석회피기법 자동 인식 장치 및 그 방법 |
| CN107967328B (zh) * | 2017-11-24 | 2021-04-02 | 四川长虹电器股份有限公司 | 解决Hessian导致hibernate不兼容的方法 |
| US11392686B2 (en) * | 2018-01-02 | 2022-07-19 | Blackberry Limited | Detecting stack cookie utilization in a binary software component using binary static analysis |
| US11157611B2 (en) * | 2018-01-02 | 2021-10-26 | Blackberry Limited | Binary image stack cookie protection |
| CN108768648B (zh) * | 2018-03-15 | 2021-03-23 | 兴业数字金融服务(上海)股份有限公司 | 一种层层加密的区块链事件链安全存证实现方法及系统 |
| US11416612B2 (en) * | 2018-03-16 | 2022-08-16 | Acronis International Gmbh | Protecting against malware code injections in trusted processes |
| US11494491B2 (en) * | 2018-03-16 | 2022-11-08 | Acronis International Gmbh | Systems and methods for protecting against malware code injections in trusted processes by a multi-target injector |
| US10984110B2 (en) | 2018-03-20 | 2021-04-20 | ReFirm Labs, Inc. | Evaluation of security of firmware |
| US10943015B2 (en) * | 2018-03-22 | 2021-03-09 | ReFirm Labs, Inc. | Continuous monitoring for detecting firmware threats |
| US11962606B2 (en) | 2018-04-04 | 2024-04-16 | Twistlock Ltd. | Protecting serverless applications |
| US11146590B2 (en) * | 2018-04-19 | 2021-10-12 | Ncr Corporation | Omni-channel end-point security |
| US10735262B1 (en) * | 2018-04-26 | 2020-08-04 | Intuit Inc. | System and method for self-orchestrated canary release deployment within an API gateway architecture |
| US10740457B2 (en) * | 2018-06-20 | 2020-08-11 | International Business Machines Corporation | System for preventing malicious operator placement in streaming applications |
| US10897483B2 (en) * | 2018-08-10 | 2021-01-19 | International Business Machines Corporation | Intrusion detection system for automated determination of IP addresses |
| US10929536B2 (en) * | 2018-09-14 | 2021-02-23 | Infocyte, Inc. | Detecting malware based on address ranges |
| JP2022502723A (ja) | 2018-10-18 | 2022-01-11 | スターナム リミテッドSternum Ltd. | スタック破損のエクスプロイトに対する中間コードファイルにおけるセキュリティ緩和手段の適用 |
| US10983923B2 (en) | 2018-10-29 | 2021-04-20 | Sternum Ltd. | Dynamic memory protection |
| US10705814B2 (en) * | 2018-11-30 | 2020-07-07 | Grammatech, Inc. | Systems and/or methods for generating reassemblable disassemblies of binaries using declarative logic |
| US20200293654A1 (en) * | 2019-03-12 | 2020-09-17 | Universal City Studios Llc | Security appliance extension |
| CN110046504B (zh) * | 2019-04-22 | 2021-04-06 | 北京智游网安科技有限公司 | 基于Linker的SO文件隐藏方法、储存介质及装置 |
| US11108790B1 (en) * | 2019-04-30 | 2021-08-31 | Rapid7, Inc. | Attack signature generation |
| US11770388B1 (en) * | 2019-12-09 | 2023-09-26 | Target Brands, Inc. | Network infrastructure detection |
| US12093414B1 (en) * | 2019-12-09 | 2024-09-17 | Amazon Technologies, Inc. | Efficient detection of in-memory data accesses and context information |
| KR20210112923A (ko) | 2020-03-06 | 2021-09-15 | 삼성전자주식회사 | 시스템 온 칩 및 이의 동작 방법 |
| DE102020205993B3 (de) * | 2020-05-13 | 2021-09-16 | Volkswagen Aktiengesellschaft | Konzept zum Austausch von kryptographischen Schlüsselinformationen |
| US11768933B2 (en) * | 2020-08-11 | 2023-09-26 | Saudi Arabian Oil Company | System and method for protecting against ransomware without the use of signatures or updates |
| US12124561B2 (en) * | 2020-10-23 | 2024-10-22 | Red Hat, Inc. | Embedding security requirements in container images |
| US12050681B2 (en) | 2020-12-16 | 2024-07-30 | Virsec Systems, Inc. | Software build system protection engine |
| US11455388B1 (en) * | 2021-04-26 | 2022-09-27 | Weeve.Network | System and method for end-to-end data trust management with real-time attestation |
| US20220366048A1 (en) * | 2021-04-29 | 2022-11-17 | Dipankar Dasgupta | Ai-powered advanced malware detection system |
| US12430440B2 (en) * | 2021-05-10 | 2025-09-30 | Insyde Software Corp. | System and method for firmware security event mitigation |
| LU500189B1 (en) * | 2021-05-21 | 2022-11-21 | Microsoft Technology Licensing Llc | Using entropy to prevent inclusion of payload data in code execution log data |
| CN114328703A (zh) * | 2021-12-29 | 2022-04-12 | 南京民基悠步信息技术有限公司 | 一种基于分布式架构的综合数据分析管理系统 |
| CN114338806B (zh) * | 2022-02-28 | 2022-06-21 | 湖南云畅网络科技有限公司 | 一种同步消息处理方法及系统 |
| US20240386093A1 (en) * | 2023-05-17 | 2024-11-21 | Arm Limited | Automated deployment of relocatable code blocks as an attack countermeasure in software |
| US20240394361A1 (en) * | 2023-05-23 | 2024-11-28 | Arm Limited | Reconfigurable attack countermeasures deployed in software |
Citations (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2003330736A (ja) * | 2002-05-08 | 2003-11-21 | Nippon Telegr & Teleph Corp <Ntt> | 不正リソース利用防止システム及びその方法並びにプログラム |
| JP2004287810A (ja) * | 2003-03-20 | 2004-10-14 | Nec Corp | 不正アクセス防止システム、不正アクセス防止方法、および不正アクセス防止プログラム |
| JP2005276185A (ja) * | 2004-02-24 | 2005-10-06 | Microsoft Corp | ソフトウェアの脆弱性の悪用を防止するように通信をフィルタ処理するための方法およびシステム |
| JP2008129714A (ja) * | 2006-11-17 | 2008-06-05 | Univ Of Tsukuba | 異常検知方法、異常検知装置及び異常検知用プログラム並びに学習モデル生成方法 |
| JP2009031859A (ja) * | 2007-07-24 | 2009-02-12 | Nippon Telegr & Teleph Corp <Ntt> | 情報収集システムおよび情報収集方法 |
| JP2011059930A (ja) * | 2009-09-09 | 2011-03-24 | Nec Computertechno Ltd | 電源ユニット |
| JPWO2010067703A1 (ja) * | 2008-12-08 | 2012-05-17 | 日本電気株式会社 | データ依存関係解析装置、情報処理装置、データ依存関係解析方法、及びプログラム |
| JP2014531647A (ja) * | 2011-09-09 | 2014-11-27 | ヒューレット−パッカード デベロップメント カンパニー エル.ピー.Hewlett‐Packard Development Company, L.P. | 基準ベースラインに基づき、イベントシーケンス中の時間的位置に従ってイベントを評価するシステム及び方法 |
Family Cites Families (211)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US4215406A (en) | 1972-08-22 | 1980-07-29 | Westinghouse Electric Corp. | Digital computer monitored and/or operated system or process which is structured for operation with an improved automatic programming process and system |
| US4080650A (en) | 1976-07-28 | 1978-03-21 | Bell Telephone Laboratories, Incorporated | Facilitating return from an on-line debugging program to a target program breakpoint |
| US4466077A (en) | 1981-09-25 | 1984-08-14 | International Business Machines Corporation | Method and apparatus for division employing associative memory |
| JPS59216249A (ja) | 1983-05-23 | 1984-12-06 | Toshiba Corp | 集積回路装置 |
| GB8511995D0 (en) | 1985-05-11 | 1985-06-19 | Ross S R | Software protection |
| US4803720A (en) | 1986-09-22 | 1989-02-07 | International Business Machines Corporation | Dual plane cross point switch architecture for a micro-PBX |
| US5224160A (en) * | 1987-02-23 | 1993-06-29 | Siemens Nixdorf Informationssysteme Ag | Process for securing and for checking the integrity of the secured programs |
| US5222220A (en) | 1989-11-16 | 1993-06-22 | Mehta Hemang S | Microprocessor stack built-in guards |
| JP2839201B2 (ja) | 1990-07-30 | 1998-12-16 | 株式会社日立製作所 | 仮想計算機システム |
| US5235551A (en) | 1991-01-08 | 1993-08-10 | Pacific Data Products, Inc. | Memory addressing scheme |
| US5297274A (en) | 1991-04-15 | 1994-03-22 | International Business Machines Corporation | Performance analysis of program in multithread OS by creating concurrently running thread generating breakpoint interrupts to active tracing monitor |
| US5321828A (en) | 1991-06-07 | 1994-06-14 | Step Engineering | High speed microcomputer in-circuit emulator |
| US5359659A (en) | 1992-06-19 | 1994-10-25 | Doren Rosenthal | Method for securing software against corruption by computer viruses |
| US5440723A (en) * | 1993-01-19 | 1995-08-08 | International Business Machines Corporation | Automatic immune system for computers and computer networks |
| US5784552A (en) | 1993-07-28 | 1998-07-21 | Digital Equipment Corporation | Debugging a computer program by simulating execution forwards and backwards in a main history log and alternative history logs |
| US5611043A (en) | 1994-03-18 | 1997-03-11 | Borland International, Inc. | Debugger system and method for controlling child processes |
| US5630048A (en) | 1994-05-19 | 1997-05-13 | La Joie; Leslie T. | Diagnostic system for run-time monitoring of computer operations |
| JP3360933B2 (ja) | 1994-06-01 | 2003-01-07 | 富士通株式会社 | 情報処理システムにおける記憶制御方法および記憶制御装置 |
| US5826012A (en) | 1995-04-21 | 1998-10-20 | Lettvin; Jonathan D. | Boot-time anti-virus and maintenance facility |
| US5684948A (en) | 1995-09-01 | 1997-11-04 | National Semiconductor Corporation | Memory management circuit which provides simulated privilege levels |
| US6151618A (en) | 1995-12-04 | 2000-11-21 | Microsoft Corporation | Safe general purpose virtual machine computing system |
| US5909580A (en) | 1996-02-08 | 1999-06-01 | Inprise Corporation | Development system and methods with direct compiler support for detecting invalid use and management of resources and memory at runtime |
| US6119206A (en) | 1996-02-12 | 2000-09-12 | Sun Microsystems, Inc. | Design of tags for lookup of non-volatile registers |
| DE69704004T2 (de) | 1996-06-19 | 2001-06-07 | Matsushita Electric Industrial Co., Ltd. | Vorrichtung zur Programmfehlerbeseitigung |
| US5850559A (en) | 1996-08-07 | 1998-12-15 | Compaq Computer Corporation | Method and apparatus for secure execution of software prior to a computer system being powered down or entering a low energy consumption mode |
| US6314558B1 (en) | 1996-08-27 | 2001-11-06 | Compuware Corporation | Byte code instrumentation |
| GB9626401D0 (en) | 1996-12-19 | 1997-02-05 | Sgs Thomson Microelectronics | Diagnostic procedures in an integrated circuit device |
| US5873124A (en) | 1997-02-06 | 1999-02-16 | Microsoft Corporation | Virtual memory scratch pages |
| US5890005A (en) | 1997-06-02 | 1999-03-30 | Nokia Mobile Phones Limited | Low power, low interconnect complexity microprocessor and memory interface |
| JP2001515244A (ja) | 1997-09-05 | 2001-09-18 | サン・マイクロシステムズ・インコーポレーテッド | スケーリング可能な共用メモリ・マルチプロセッサ・システム |
| US5983348A (en) * | 1997-09-10 | 1999-11-09 | Trend Micro Incorporated | Computer network malicious code scanner |
| US6237137B1 (en) | 1997-10-15 | 2001-05-22 | Dell Usa, L.P. | Method and system for preventing unauthorized access to a computer program |
| US6263489B1 (en) | 1998-04-30 | 2001-07-17 | Hewlett-Packard Company | Method and apparatus for debugging of optimized code |
| US6077312A (en) | 1998-05-06 | 2000-06-20 | International Business Machines Corporation | Apparatus, program product and method of debugging utilizing a context sensitive breakpoint |
| US6178522B1 (en) | 1998-06-02 | 2001-01-23 | Alliedsignal Inc. | Method and apparatus for managing redundant computer-based systems for fault tolerant computing |
| US6553429B1 (en) | 1998-06-05 | 2003-04-22 | Microsoft Corporation | Fast conditional thunk utility |
| US6275893B1 (en) | 1998-09-14 | 2001-08-14 | Compaq Computer Corporation | Method and apparatus for providing seamless hooking and intercepting of selected kernel and HAL exported entry points in an operating system |
| US6665316B1 (en) | 1998-09-29 | 2003-12-16 | Agilent Technologies, Inc. | Organization of time synchronization in a distributed system |
| EP0992906B1 (en) | 1998-10-06 | 2005-08-03 | Texas Instruments Inc. | Apparatus and method for software breakpoint in a delay slot |
| US7380245B1 (en) | 1998-11-23 | 2008-05-27 | Samsung Electronics Co., Ltd. | Technique for detecting corruption associated with a stack in a storage device |
| US6782478B1 (en) | 1999-04-28 | 2004-08-24 | Thomas Probert | Techniques for encoding information in computer code |
| US6981176B2 (en) | 1999-05-10 | 2005-12-27 | Delphi Technologies, Inc. | Secured microcontroller architecture |
| US7430670B1 (en) * | 1999-07-29 | 2008-09-30 | Intertrust Technologies Corp. | Software self-defense systems and methods |
| WO2001022228A1 (en) | 1999-09-17 | 2001-03-29 | Nortel Networks Limited | System and method for producing a verification system for verifying procedure interfaces |
| US6745160B1 (en) | 1999-10-08 | 2004-06-01 | Nec Corporation | Verification of scheduling in the presence of loops using uninterpreted symbolic simulation |
| US20020009198A1 (en) | 2000-01-18 | 2002-01-24 | Lipton Richard J. | Method and systems for data security |
| JP3552627B2 (ja) | 2000-02-04 | 2004-08-11 | インターナショナル・ビジネス・マシーンズ・コーポレーション | スタック保護システム、コンピュータシステム、コンパイラ、スタック保護方法および記憶媒体 |
| US6775780B1 (en) | 2000-03-16 | 2004-08-10 | Networks Associates Technology, Inc. | Detecting malicious software by analyzing patterns of system calls generated during emulation |
| US7376820B2 (en) | 2000-03-16 | 2008-05-20 | Fujitsu Limited | Information processing unit, and exception processing method for specific application-purpose operation instruction |
| US6973577B1 (en) | 2000-05-26 | 2005-12-06 | Mcafee, Inc. | System and method for dynamically detecting computer viruses through associative behavioral analysis of runtime state |
| US7539875B1 (en) | 2000-06-27 | 2009-05-26 | Microsoft Corporation | Secure repository with layers of tamper resistance and system and method for providing same |
| US6895508B1 (en) | 2000-09-07 | 2005-05-17 | International Business Machines Corporation | Stack memory protection |
| US6832373B2 (en) | 2000-11-17 | 2004-12-14 | Bitfone Corporation | System and method for updating and distributing information |
| US7260845B2 (en) | 2001-01-09 | 2007-08-21 | Gabriel Kedma | Sensor for detecting and eliminating inter-process memory breaches in multitasking operating systems |
| US6848044B2 (en) | 2001-03-08 | 2005-01-25 | International Business Machines Corporation | Circuits and methods for recovering link stack data upon branch instruction mis-speculation |
| US20020138554A1 (en) | 2001-03-26 | 2002-09-26 | Motorola, Inc. | Method for remotely verifying software integrity |
| US6993751B2 (en) | 2001-05-14 | 2006-01-31 | Microsoft Corporation | Placing exception throwing instructions in compiled code |
| JP3702815B2 (ja) | 2001-07-12 | 2005-10-05 | 日本電気株式会社 | プロセッサ間レジスタ継承方法及びその装置 |
| US20030014667A1 (en) | 2001-07-16 | 2003-01-16 | Andrei Kolichtchak | Buffer overflow attack detection and suppression |
| US7421587B2 (en) | 2001-07-26 | 2008-09-02 | Mcafee, Inc. | Detecting computer programs within packed computer files |
| US20030188160A1 (en) | 2001-08-02 | 2003-10-02 | Singam Sunder | Method and system to securely update files via a network |
| US7257763B1 (en) | 2001-08-03 | 2007-08-14 | Netlogic Microsystems, Inc. | Content addressable memory with error signaling |
| GB2378778B (en) | 2001-08-13 | 2005-03-23 | Ibm | Computer system with heap and card table |
| EP1246033A1 (de) | 2001-08-23 | 2002-10-02 | Siemens Aktiengesellschaft | Verfahren zur Überwachung konsistenter Speicherinhalte in redundanten Systemen |
| US7853803B2 (en) | 2001-09-28 | 2010-12-14 | Verizon Corporate Services Group Inc. | System and method for thwarting buffer overflow attacks using encrypted process pointers |
| US7526654B2 (en) | 2001-10-16 | 2009-04-28 | Marc Charbonneau | Method and system for detecting a secure state of a computer system |
| US20030079158A1 (en) | 2001-10-23 | 2003-04-24 | Tower James Brian | Secured digital systems and a method and software for operating the same |
| US6832302B1 (en) | 2001-10-24 | 2004-12-14 | At&T Corp. | Methods and apparatus for detecting heap smashing |
| US6668313B2 (en) | 2001-12-21 | 2003-12-23 | Agere Systems, Inc. | Memory system for increased bandwidth |
| US7076629B2 (en) | 2001-12-26 | 2006-07-11 | Bonola Thomas J | Method for providing concurrent non-blocking heap memory management for fixed sized blocks |
| US7168008B2 (en) | 2002-01-18 | 2007-01-23 | Mobitv, Inc. | Method and system for isolating and protecting software components |
| ATE263391T1 (de) | 2002-03-26 | 2004-04-15 | Soteres Gmbh | Verfahren zum schutz der integrität von programmen |
| US7228426B2 (en) | 2002-04-03 | 2007-06-05 | Microsoft Corporation | Integrity ordainment and ascertainment of computer-executable instructions with consideration for execution context |
| US6948091B2 (en) | 2002-05-02 | 2005-09-20 | Honeywell International Inc. | High integrity recovery from multi-bit data failures |
| GB2383444B (en) | 2002-05-08 | 2003-12-03 | Gfi Software Ltd | System and method for detecting a potentially malicious executable file |
| US7007159B2 (en) | 2002-05-10 | 2006-02-28 | Intel Corporation | System and method for loading and integrating a firmware extension onto executable base system firmware during initialization |
| US7086088B2 (en) | 2002-05-15 | 2006-08-01 | Nokia, Inc. | Preventing stack buffer overflow attacks |
| US7000095B2 (en) | 2002-09-06 | 2006-02-14 | Mips Technologies, Inc. | Method and apparatus for clearing hazards using jump instructions |
| US7386839B1 (en) | 2002-11-06 | 2008-06-10 | Valery Golender | System and method for troubleshooting software configuration problems using application tracing |
| US6996677B2 (en) | 2002-11-25 | 2006-02-07 | Nortel Networks Limited | Method and apparatus for protecting memory stacks |
| US20040157639A1 (en) | 2002-11-27 | 2004-08-12 | Morris Roy D. | Systems and methods of mobile restore |
| US20040168078A1 (en) | 2002-12-04 | 2004-08-26 | Brodley Carla E. | Apparatus, system and method for protecting function return address |
| US7058838B2 (en) | 2002-12-17 | 2006-06-06 | Hewlett-Packard Development Company, L.P. | System and method for synchronizing a plurality of processors in a multiprocessor computer platform employing a global clock counter |
| US7594111B2 (en) | 2002-12-19 | 2009-09-22 | Massachusetts Institute Of Technology | Secure execution of a computer program |
| US7603704B2 (en) | 2002-12-19 | 2009-10-13 | Massachusetts Institute Of Technology | Secure execution of a computer program using a code cache |
| US7237172B2 (en) | 2002-12-24 | 2007-06-26 | Micron Technology, Inc. | Error detection and correction in a CAM |
| US9503470B2 (en) | 2002-12-24 | 2016-11-22 | Fred Herz Patents, LLC | Distributed agent based model for security monitoring and response |
| US7043509B2 (en) | 2003-02-19 | 2006-05-09 | Sun Microsystems, Inc. | Parallel non-contiguous allocation and card parsing |
| CA2426619A1 (en) | 2003-04-25 | 2004-10-25 | Ibm Canada Limited - Ibm Canada Limitee | Defensive heap memory management |
| US20050108562A1 (en) | 2003-06-18 | 2005-05-19 | Khazan Roger I. | Technique for detecting executable malicious code using a combination of static and dynamic analyses |
| US7480919B2 (en) | 2003-06-24 | 2009-01-20 | Microsoft Corporation | Safe exceptions |
| US8250565B2 (en) | 2003-06-27 | 2012-08-21 | Hewlett-Packard Development Company, L.P. | System and method for downloading update packages into a mobile handset in a carrier network |
| US7322027B2 (en) | 2003-06-27 | 2008-01-22 | Microsoft Corporation | Detecting termination and providing information related to termination of a computer system process |
| US20040268095A1 (en) | 2003-06-30 | 2004-12-30 | Tatiana Shpeisman | Efficient implementation of null reference check |
| US7707548B2 (en) | 2003-07-22 | 2010-04-27 | Verizon Business Global Llc | Integration of information distribution systems |
| US7137038B2 (en) | 2003-07-29 | 2006-11-14 | Hitachi Global Storage Technologies Netherlands, B.V. | System and method for autonomous data scrubbing in a hard disk drive |
| US7530103B2 (en) | 2003-08-07 | 2009-05-05 | Microsoft Corporation | Projection of trustworthiness from a trusted environment to an untrusted environment |
| DE60321972D1 (de) | 2003-08-11 | 2008-08-14 | Telecom Italia Spa | Verfahren und system zur erkennung einer unbefugten benutzung eines kommunikationsnetzes |
| US20070169075A1 (en) | 2003-09-05 | 2007-07-19 | David Lill | Synchronizing and controlling software downloads, such as for utility meter-reading data collection and processing |
| US7467202B2 (en) | 2003-09-10 | 2008-12-16 | Fidelis Security Systems | High-performance network content analysis platform |
| US7644441B2 (en) | 2003-09-26 | 2010-01-05 | Cigital, Inc. | Methods for identifying malicious software |
| US7290253B1 (en) | 2003-09-30 | 2007-10-30 | Vmware, Inc. | Prediction mechanism for subroutine returns in binary translation sub-systems of computers |
| US7360097B2 (en) | 2003-09-30 | 2008-04-15 | Check Point Software Technologies, Inc. | System providing methodology for securing interfaces of executable files |
| WO2005036831A1 (ja) | 2003-10-07 | 2005-04-21 | Fujitsu Limited | フレーム中継装置 |
| US7500245B2 (en) | 2005-07-08 | 2009-03-03 | Microsoft Corporation | Changing code execution path using kernel mode redirection |
| US7526755B2 (en) | 2003-10-08 | 2009-04-28 | Microsoft Corporation | Plug-in pre- and postconditions for static program analysis |
| US7237267B2 (en) | 2003-10-16 | 2007-06-26 | Cisco Technology, Inc. | Policy-based network security management |
| CN100391180C (zh) | 2003-10-30 | 2008-05-28 | 华为技术有限公司 | 一种以太网二层交换设备绑定硬件地址和端口的方法 |
| EP1680722A1 (en) | 2003-11-05 | 2006-07-19 | Qinetiq Limited | Detection of items stored in a computer system |
| JP4485330B2 (ja) | 2003-11-20 | 2010-06-23 | 富士通株式会社 | 回路の有向ファルシフィケーション |
| US7529979B2 (en) | 2003-12-12 | 2009-05-05 | International Business Machines Corporation | Hardware/software based indirect time stamping methodology for proactive hardware/software event detection and control |
| US7549042B2 (en) * | 2003-12-16 | 2009-06-16 | Microsoft Corporation | Applying custom software image updates to non-volatile storage in a failsafe manner |
| US20050138409A1 (en) | 2003-12-22 | 2005-06-23 | Tayib Sheriff | Securing an electronic device |
| US7716495B2 (en) * | 2003-12-31 | 2010-05-11 | Microsoft Corporation | Protection against runtime function attacks |
| US20100005531A1 (en) | 2004-12-23 | 2010-01-07 | Kenneth Largman | Isolated multiplexed multi-dimensional processing in a virtual processing space having virus, spyware, and hacker protection features |
| US7284276B2 (en) | 2004-01-22 | 2007-10-16 | Symantec Corporation | Return-to-LIBC attack detection using branch trace records system and method |
| US7730530B2 (en) | 2004-01-30 | 2010-06-01 | Microsoft Corporation | System and method for gathering exhibited behaviors on a .NET executable module in a secure manner |
| US7693975B2 (en) | 2004-03-02 | 2010-04-06 | Hewlett-Packard Development Company, L.P. | Network device applying kalman filter |
| US7328323B1 (en) | 2004-03-08 | 2008-02-05 | Symantec Corporation | Heap buffer overflow exploitation prevention system and method |
| JP2005258498A (ja) | 2004-03-09 | 2005-09-22 | Hitachi Ltd | サーバ回復方法 |
| US7272748B1 (en) | 2004-03-17 | 2007-09-18 | Symantec Corporation | Method and apparatus to detect and recover from a stack frame corruption |
| US7530093B2 (en) | 2004-04-30 | 2009-05-05 | Microsoft Corporation | Securing applications and operating systems |
| US8042180B2 (en) | 2004-05-21 | 2011-10-18 | Computer Associates Think, Inc. | Intrusion detection based on amount of network traffic |
| US7490268B2 (en) | 2004-06-01 | 2009-02-10 | The Trustees Of Columbia University In The City Of New York | Methods and systems for repairing applications |
| US7207065B2 (en) | 2004-06-04 | 2007-04-17 | Fortify Software, Inc. | Apparatus and method for developing secure software |
| US7860096B2 (en) | 2004-06-08 | 2010-12-28 | Oracle America, Inc. | Switching method and apparatus for use in a communications network |
| US7596227B2 (en) | 2004-06-08 | 2009-09-29 | Dartdevices Interop Corporation | System method and model for maintaining device integrity and security among intermittently connected interoperating devices |
| US7526810B2 (en) | 2004-06-21 | 2009-04-28 | Ebay Inc. | Method and system to verify data received, at a server system, for access and/or publication via the server system |
| US20050283601A1 (en) * | 2004-06-22 | 2005-12-22 | Sun Microsystems, Inc. | Systems and methods for securing a computer boot |
| US8955104B2 (en) | 2004-07-07 | 2015-02-10 | University Of Maryland College Park | Method and system for monitoring system memory integrity |
| US7971255B1 (en) | 2004-07-15 | 2011-06-28 | The Trustees Of Columbia University In The City Of New York | Detecting and preventing malcode execution |
| FR2873466A1 (fr) | 2004-07-21 | 2006-01-27 | St Microelectronics Sa | Procede de programmation d'un controleur de dma dans un systeme sur puce et systeme sur puce associe |
| US7634812B2 (en) | 2004-07-21 | 2009-12-15 | Microsoft Corporation | Filter generation |
| US7603715B2 (en) | 2004-07-21 | 2009-10-13 | Microsoft Corporation | Containment of worms |
| EP1619572A1 (en) | 2004-07-23 | 2006-01-25 | Texas Instruments Incorporated | System and method of identifying and preventing security violations within a computing system |
| JP4643201B2 (ja) | 2004-08-12 | 2011-03-02 | 日本電信電話株式会社 | バッファオーバーフロー脆弱性分析方法、データ処理装置、分析情報提供装置、分析情報抽出処理用プログラムおよび分析情報提供処理用プログラム |
| GB2417579A (en) | 2004-08-26 | 2006-03-01 | Hewlett Packard Development Co | Method for dynamically inserting code into a process by enabling taken branch traps to intercept a branch during the execution of the process |
| US7430683B2 (en) | 2004-09-23 | 2008-09-30 | Intel Corporation | Method and apparatus for enabling run-time recovery of a failed platform |
| EP1825342A1 (en) | 2004-11-22 | 2007-08-29 | Nokia Corporation | Method and device for verifying the integrity of platform software of an electronic device |
| US7484239B1 (en) | 2004-11-30 | 2009-01-27 | Symantec Corporation | Detecting heap and stack execution in the operating system using regions |
| KR100675836B1 (ko) | 2004-12-10 | 2007-01-29 | 한국전자통신연구원 | Epon 구간내에서의 링크 보안을 위한 인증 방법 |
| US20060126799A1 (en) | 2004-12-15 | 2006-06-15 | Microsoft Corporation | Fault injection |
| US7613954B2 (en) | 2004-12-21 | 2009-11-03 | National Instruments Corporation | Test executive with stack corruption detection |
| TWI252976B (en) | 2004-12-27 | 2006-04-11 | Ind Tech Res Inst | Detecting method and architecture thereof for malicious codes |
| US7774787B2 (en) | 2005-01-11 | 2010-08-10 | Microsoft Corporation | Method for specifying and verifying multi-threaded object-oriented programs with invariants |
| US7315871B2 (en) | 2005-01-19 | 2008-01-01 | International Business Machines Inc. Corporation | Method, system and program product for interning invariant data objects in dynamic space constrained systems |
| JP4549303B2 (ja) * | 2005-02-07 | 2010-09-22 | 株式会社ソニー・コンピュータエンタテインメント | パイプラインを用いてメッセージ認証コードを提供する方法および装置 |
| JP2006259869A (ja) | 2005-03-15 | 2006-09-28 | Fujitsu Ltd | マルチプロセッサシステム |
| US7290230B2 (en) | 2005-03-17 | 2007-10-30 | Fujitsu Limited | System and method for verifying a digital design using dynamic abstraction |
| ES2745045T3 (es) | 2005-04-22 | 2020-02-27 | Audinate Pty Ltd | Red, dispositivo y método para transportar medios digitales |
| US7493602B2 (en) | 2005-05-02 | 2009-02-17 | International Business Machines Corporation | Methods and arrangements for unified program analysis |
| US7912877B2 (en) | 2005-05-20 | 2011-03-22 | Microsoft Corporation | Leveraging garbage collection to dynamically infer heap invariants |
| US7752381B2 (en) | 2005-05-24 | 2010-07-06 | Micron Technology, Inc. | Version based non-volatile memory translation layer |
| US7730536B2 (en) | 2005-06-08 | 2010-06-01 | Verizon Business Global Llc | Security perimeters |
| GB0513375D0 (en) | 2005-06-30 | 2005-08-03 | Retento Ltd | Computer security |
| US20070027815A1 (en) | 2005-07-29 | 2007-02-01 | Symantec Corporation | Systems and methods for centralized subscription and license management in a small networking environment |
| US7895651B2 (en) | 2005-07-29 | 2011-02-22 | Bit 9, Inc. | Content tracking in a network security system |
| EP1758021A2 (en) | 2005-08-25 | 2007-02-28 | International Business Machines Corporation | Method or apparatus for managing a server process in a computer system |
| US20070050848A1 (en) | 2005-08-31 | 2007-03-01 | Microsoft Corporation | Preventing malware from accessing operating system services |
| US20070067359A1 (en) | 2005-09-21 | 2007-03-22 | Lenovo (Singapore) Pte. Ltd. | Centralized system for versioned data synchronization |
| US20070118646A1 (en) | 2005-10-04 | 2007-05-24 | Computer Associates Think, Inc. | Preventing the installation of rootkits on a standalone computer |
| US7809670B2 (en) * | 2005-12-09 | 2010-10-05 | Microsoft Corporation | Classification of malware using clustering that orders events in accordance with the time of occurance |
| US9390031B2 (en) | 2005-12-30 | 2016-07-12 | Intel Corporation | Page coloring to associate memory pages with programs |
| US8108840B2 (en) | 2006-01-12 | 2012-01-31 | International Business Machines Corporation | Method for enhancing debugger performance of hardware assisted breakpoints |
| US20070174549A1 (en) | 2006-01-24 | 2007-07-26 | Yevgen Gyl | Method for utilizing a memory interface to control partitioning of a memory module |
| US7845005B2 (en) | 2006-02-07 | 2010-11-30 | International Business Machines Corporation | Method for preventing malicious software installation on an internet-connected computer |
| US8510596B1 (en) * | 2006-02-09 | 2013-08-13 | Virsec Systems, Inc. | System and methods for run time detection and correction of memory corruption |
| US20080016339A1 (en) * | 2006-06-29 | 2008-01-17 | Jayant Shukla | Application Sandbox to Detect, Remove, and Prevent Malware |
| US7643812B2 (en) | 2006-09-18 | 2010-01-05 | Agere Systems Inc. | Method and apparatus for a single-path enhanced-algorithm digital automatic gain control integrated receiver with power management and XM interference enhancement |
| WO2008055156A2 (en) | 2006-10-30 | 2008-05-08 | The Trustees Of Columbia University In The City Of New York | Methods, media, and systems for detecting an anomalous sequence of function calls |
| IL181426A (en) | 2007-02-19 | 2011-06-30 | Deutsche Telekom Ag | Automatic removal of signatures for malware |
| US20080215925A1 (en) | 2007-03-02 | 2008-09-04 | International Business Machines Corporation | Distributed fault injection mechanism |
| WO2008124038A1 (en) | 2007-04-03 | 2008-10-16 | Ldra Technology, Inc. | Automated management of software requirements verification |
| US8336102B2 (en) | 2007-06-01 | 2012-12-18 | Microsoft Corporation | Delivering malformed data for fuzz testing to software applications |
| CN101154258A (zh) | 2007-08-14 | 2008-04-02 | 电子科技大学 | 恶意程序动态行为自动化分析系统与方法 |
| US7971044B2 (en) | 2007-10-05 | 2011-06-28 | Qualcomm Incorporated | Link stack repair of erroneous speculative update |
| US8627287B2 (en) | 2007-11-29 | 2014-01-07 | Microsoft Corporation | Prioritizing quality improvements to source code |
| US7453910B1 (en) | 2007-12-18 | 2008-11-18 | International Business Machines Corporation | Synchronization of independent clocks |
| US8434151B1 (en) | 2008-01-04 | 2013-04-30 | International Business Machines Corporation | Detecting malicious software |
| US8261326B2 (en) | 2008-04-25 | 2012-09-04 | International Business Machines Corporation | Network intrusion blocking security overlay |
| US8307191B1 (en) | 2008-05-09 | 2012-11-06 | Vmware, Inc. | Page fault handling in a virtualized computer system |
| JP2009282180A (ja) | 2008-05-21 | 2009-12-03 | Olympus Imaging Corp | 観察光学系及びそれを用いた撮像装置 |
| US8407523B2 (en) | 2008-06-06 | 2013-03-26 | Iti Scotland Limited | Method for protecting software programs |
| US9280466B2 (en) | 2008-09-09 | 2016-03-08 | Kabushiki Kaisha Toshiba | Information processing device including memory management device managing access from processor to memory and memory management method |
| JP2010257150A (ja) | 2009-04-23 | 2010-11-11 | Ntt Docomo Inc | 不正処理検知装置、不正処理検知方法及びプログラム |
| KR101269549B1 (ko) | 2009-05-08 | 2013-06-04 | 한국전자통신연구원 | 오류 주입을 이용한 소프트웨어 신뢰성 테스트 시스템 및 방법 |
| US9230455B2 (en) | 2009-12-11 | 2016-01-05 | Digital Immunity Llc | Steganographic embedding of executable code |
| US8958546B2 (en) | 2009-12-11 | 2015-02-17 | Stegosytems, Inc. | Steganographic messaging system using code invariants |
| JP5499805B2 (ja) | 2010-03-19 | 2014-05-21 | 日本電気株式会社 | 情報処理装置、情報処理システム、情報処理方法並びに情報処理プログラム |
| CN102012987B (zh) | 2010-12-02 | 2013-03-13 | 李清宝 | 自动二进制恶意代码行为分析系统 |
| US8464102B2 (en) | 2010-12-23 | 2013-06-11 | GM Global Technology Operations LLC | Methods and systems for diagnosing hardware and software faults using time-stamped events |
| US8595610B2 (en) | 2011-01-25 | 2013-11-26 | Infineon Technologies Ag | Method, software and computer system for manipulating aggregated data |
| US8615640B2 (en) | 2011-03-17 | 2013-12-24 | Lsi Corporation | System and method to efficiently schedule and/or commit write data to flash based SSDs attached to an array controller |
| US8495581B2 (en) | 2011-05-05 | 2013-07-23 | International Business Machines Corporation | Code evaluation based on failure prediction |
| US8788627B2 (en) | 2011-09-30 | 2014-07-22 | Apple Inc. | Interactive web application framework |
| US8984478B2 (en) * | 2011-10-03 | 2015-03-17 | Cisco Technology, Inc. | Reorganization of virtualized computer programs |
| WO2013063474A1 (en) | 2011-10-28 | 2013-05-02 | Scargo, Inc. | Security policy deployment and enforcement system for the detection and control of polymorphic and targeted malware |
| WO2013073504A1 (ja) | 2011-11-15 | 2013-05-23 | 独立行政法人科学技術振興機構 | プログラム解析・検証サービス提供システム、その制御方法、制御プログラム、コンピュータを機能させるための制御プログラム、プログラム解析・検証装置、プログラム解析・検証ツール管理装置 |
| US9372991B2 (en) * | 2012-03-06 | 2016-06-21 | International Business Machines Corporation | Detecting malicious computer code in an executing program module |
| US8792498B2 (en) | 2012-03-23 | 2014-07-29 | Wind River Systems, Inc. | System and method for enhanced updating layer-2 bridge address table on asymmetric multiprocessing systems |
| US9043903B2 (en) | 2012-06-08 | 2015-05-26 | Crowdstrike, Inc. | Kernel-level security agent |
| JP5863973B2 (ja) | 2012-08-01 | 2016-02-17 | 三菱電機株式会社 | プログラム実行装置及びプログラム解析装置 |
| US9201720B2 (en) | 2012-08-13 | 2015-12-01 | Nxp B.V. | FlexRay network runtime error detection and containment |
| US9882984B2 (en) | 2013-08-02 | 2018-01-30 | International Business Machines Corporation | Cache migration management in a virtualized distributed computing system |
| WO2015038944A1 (en) | 2013-09-12 | 2015-03-19 | Virsec Systems, Inc. | Automated runtime detection of malware |
| GB2520987B (en) | 2013-12-06 | 2016-06-01 | Cyberlytic Ltd | Using fuzzy logic to assign a risk level profile to a potential cyber threat |
| EP3161715A1 (en) | 2014-06-24 | 2017-05-03 | Virsec Systems, Inc. | System and methods for automated detection of input and output validation and resource management vulnerability |
| US10114726B2 (en) | 2014-06-24 | 2018-10-30 | Virsec Systems, Inc. | Automated root cause analysis of single or N-tiered application |
| US10019569B2 (en) | 2014-06-27 | 2018-07-10 | Qualcomm Incorporated | Dynamic patching for diversity-based software security |
| US9699205B2 (en) | 2015-08-31 | 2017-07-04 | Splunk Inc. | Network security system |
| US11409870B2 (en) | 2016-06-16 | 2022-08-09 | Virsec Systems, Inc. | Systems and methods for remediating memory corruption in a computer application |
-
2014
- 2014-09-12 WO PCT/US2014/055469 patent/WO2015038944A1/en not_active Ceased
- 2014-09-12 KR KR1020167009506A patent/KR102368170B1/ko active Active
- 2014-09-12 AU AU2014318585A patent/AU2014318585B2/en active Active
- 2014-09-12 EP EP14772544.4A patent/EP3044719B1/en active Active
- 2014-09-12 JP JP2016542827A patent/JP2016534479A/ja active Pending
- 2014-09-12 US US14/916,066 patent/US10079841B2/en active Active
- 2014-09-12 CA CA2923231A patent/CA2923231C/en active Active
-
2018
- 2018-04-03 AU AU2018202323A patent/AU2018202323A1/en not_active Abandoned
- 2018-07-19 US US16/040,021 patent/US11146572B2/en active Active
-
2020
- 2020-03-18 JP JP2020048093A patent/JP7046111B2/ja active Active
- 2020-05-28 AU AU2020203503A patent/AU2020203503B2/en active Active
Patent Citations (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2003330736A (ja) * | 2002-05-08 | 2003-11-21 | Nippon Telegr & Teleph Corp <Ntt> | 不正リソース利用防止システム及びその方法並びにプログラム |
| JP2004287810A (ja) * | 2003-03-20 | 2004-10-14 | Nec Corp | 不正アクセス防止システム、不正アクセス防止方法、および不正アクセス防止プログラム |
| JP2005276185A (ja) * | 2004-02-24 | 2005-10-06 | Microsoft Corp | ソフトウェアの脆弱性の悪用を防止するように通信をフィルタ処理するための方法およびシステム |
| JP2008129714A (ja) * | 2006-11-17 | 2008-06-05 | Univ Of Tsukuba | 異常検知方法、異常検知装置及び異常検知用プログラム並びに学習モデル生成方法 |
| JP2009031859A (ja) * | 2007-07-24 | 2009-02-12 | Nippon Telegr & Teleph Corp <Ntt> | 情報収集システムおよび情報収集方法 |
| JPWO2010067703A1 (ja) * | 2008-12-08 | 2012-05-17 | 日本電気株式会社 | データ依存関係解析装置、情報処理装置、データ依存関係解析方法、及びプログラム |
| JP2011059930A (ja) * | 2009-09-09 | 2011-03-24 | Nec Computertechno Ltd | 電源ユニット |
| JP2014531647A (ja) * | 2011-09-09 | 2014-11-27 | ヒューレット−パッカード デベロップメント カンパニー エル.ピー.Hewlett‐Packard Development Company, L.P. | 基準ベースラインに基づき、イベントシーケンス中の時間的位置に従ってイベントを評価するシステム及び方法 |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2019519056A (ja) * | 2016-06-16 | 2019-07-04 | ヴァーセック システムズ,インコーポレイテッド | コンピュータアプリケーション内のメモリ破損を修復するためのシステム及び方法 |
Also Published As
| Publication number | Publication date |
|---|---|
| AU2020203503B2 (en) | 2021-12-09 |
| KR20160114037A (ko) | 2016-10-04 |
| EP3044719B1 (en) | 2019-08-28 |
| US11146572B2 (en) | 2021-10-12 |
| WO2015038944A1 (en) | 2015-03-19 |
| US20160212159A1 (en) | 2016-07-21 |
| EP3044719A1 (en) | 2016-07-20 |
| JP7046111B2 (ja) | 2022-04-01 |
| KR102368170B1 (ko) | 2022-02-25 |
| US20180324195A1 (en) | 2018-11-08 |
| US10079841B2 (en) | 2018-09-18 |
| AU2020203503A1 (en) | 2020-06-18 |
| AU2014318585B2 (en) | 2018-01-04 |
| CA2923231A1 (en) | 2015-03-19 |
| AU2018202323A1 (en) | 2018-04-26 |
| JP2020095753A (ja) | 2020-06-18 |
| CA2923231C (en) | 2020-06-02 |
| AU2014318585A1 (en) | 2016-03-17 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP7046111B2 (ja) | マルウェアのランタイム中の自動検出 | |
| AU2018204262B2 (en) | Automated code lockdown to reduce attack surface for software | |
| EP3295359B1 (en) | Detection of sql injection attacks | |
| KR102739986B1 (ko) | 패턴 매칭 기반 데이터세트 추출 | |
| JP2022133461A (ja) | カーネルモードにおけるマルウェアおよびステガノグラフィのリアルタイム検出ならびにマルウェアおよびステガノグラフィからの保護 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20170905 |
|
| A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20170905 |
|
| A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20180726 |
|
| A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20180731 |
|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20181022 |
|
| A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20190326 |
|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20190620 |
|
| A02 | Decision of refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A02 Effective date: 20191119 |