JP2018519604A5 - - Google Patents
Download PDFInfo
- Publication number
- JP2018519604A5 JP2018519604A5 JP2017566815A JP2017566815A JP2018519604A5 JP 2018519604 A5 JP2018519604 A5 JP 2018519604A5 JP 2017566815 A JP2017566815 A JP 2017566815A JP 2017566815 A JP2017566815 A JP 2017566815A JP 2018519604 A5 JP2018519604 A5 JP 2018519604A5
- Authority
- JP
- Japan
- Prior art keywords
- processor
- system functions
- determination
- retrieve
- analyzing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 claims 58
- 230000006870 function Effects 0.000 claims 16
- 238000004590 computer program Methods 0.000 claims 3
- 238000012544 monitoring process Methods 0.000 claims 1
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US14/752,901 | 2015-06-27 | ||
| US14/752,901 US20160381051A1 (en) | 2015-06-27 | 2015-06-27 | Detection of malware |
| PCT/US2016/033977 WO2017003587A1 (en) | 2015-06-27 | 2016-05-25 | Detection of malware |
Publications (3)
| Publication Number | Publication Date |
|---|---|
| JP2018519604A JP2018519604A (ja) | 2018-07-19 |
| JP2018519604A5 true JP2018519604A5 (enExample) | 2019-02-14 |
| JP6526842B2 JP6526842B2 (ja) | 2019-06-05 |
Family
ID=57602997
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2017566815A Active JP6526842B2 (ja) | 2015-06-27 | 2016-05-25 | マルウェアの検出 |
Country Status (5)
| Country | Link |
|---|---|
| US (1) | US20160381051A1 (enExample) |
| EP (1) | EP3314510A1 (enExample) |
| JP (1) | JP6526842B2 (enExample) |
| CN (1) | CN107851157A (enExample) |
| WO (1) | WO2017003587A1 (enExample) |
Families Citing this family (18)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10237287B1 (en) * | 2016-02-11 | 2019-03-19 | Awake Security, Inc. | System and method for detecting a malicious activity in a computing environment |
| US10135847B2 (en) * | 2016-05-18 | 2018-11-20 | Salesforce.Com, Inc. | Reverse shell network intrusion detection |
| US10372909B2 (en) * | 2016-08-19 | 2019-08-06 | Hewlett Packard Enterprise Development Lp | Determining whether process is infected with malware |
| US10783246B2 (en) | 2017-01-31 | 2020-09-22 | Hewlett Packard Enterprise Development Lp | Comparing structural information of a snapshot of system memory |
| US10423151B2 (en) * | 2017-07-07 | 2019-09-24 | Battelle Energy Alliance, Llc | Controller architecture and systems and methods for implementing the same in a networked control system |
| US10116671B1 (en) * | 2017-09-28 | 2018-10-30 | International Business Machines Corporation | Distributed denial-of-service attack detection based on shared network flow information |
| CN110378081A (zh) * | 2019-06-06 | 2019-10-25 | 厦门网宿有限公司 | 一种加壳动态链接库加载方法及装置 |
| US11271777B2 (en) | 2019-09-24 | 2022-03-08 | Pribit Technology, Inc. | System for controlling network access of terminal based on tunnel and method thereof |
| US12348494B2 (en) | 2019-09-24 | 2025-07-01 | Pribit Technology, Inc. | Network access control system and method therefor |
| US11082256B2 (en) | 2019-09-24 | 2021-08-03 | Pribit Technology, Inc. | System for controlling network access of terminal based on tunnel and method thereof |
| US12381890B2 (en) | 2019-09-24 | 2025-08-05 | Pribit Technology, Inc. | System and method for secure network access of terminal |
| US12166759B2 (en) | 2019-09-24 | 2024-12-10 | Pribit Technology, Inc. | System for remote execution code-based node control flow management, and method therefor |
| US11381557B2 (en) * | 2019-09-24 | 2022-07-05 | Pribit Technology, Inc. | Secure data transmission using a controlled node flow |
| US11652801B2 (en) | 2019-09-24 | 2023-05-16 | Pribit Technology, Inc. | Network access control system and method therefor |
| US11190494B2 (en) | 2019-09-24 | 2021-11-30 | Pribit Technology, Inc. | Application whitelist using a controlled node flow |
| JP7395211B2 (ja) | 2019-09-24 | 2023-12-11 | プライビット テクノロジー インク | 端末のネットワーク接続を認証及び制御するためのシステム及びそれに関する方法 |
| US11489849B2 (en) | 2020-01-14 | 2022-11-01 | Saudi Arabian Oil Company | Method and system for detecting and remediating malicious code in a computer network |
| US11546315B2 (en) * | 2020-05-28 | 2023-01-03 | Hewlett Packard Enterprise Development Lp | Authentication key-based DLL service |
Family Cites Families (18)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1818822A (zh) * | 2005-02-07 | 2006-08-16 | 福建东方微点信息安全有限责任公司 | 缓冲区溢出攻击的检测方法 |
| CN100401224C (zh) * | 2005-06-23 | 2008-07-09 | 福建东方微点信息安全有限责任公司 | 计算机反病毒防护系统和方法 |
| CN101127638B (zh) * | 2007-06-07 | 2011-06-15 | 飞塔公司 | 一种具有主动性的病毒自动防控系统和方法 |
| CN101441687B (zh) * | 2007-11-21 | 2010-07-14 | 珠海金山软件股份有限公司 | 一种提取病毒文件的病毒特征的方法及其装置 |
| US8307432B1 (en) * | 2008-10-07 | 2012-11-06 | Trend Micro Incorporated | Generic shellcode detection |
| US8407787B1 (en) * | 2009-01-22 | 2013-03-26 | Trend Micro Incorporated | Computer apparatus and method for non-intrusive inspection of program behavior |
| CN101788915A (zh) * | 2010-02-05 | 2010-07-28 | 北京工业大学 | 基于可信进程树的白名单更新方法 |
| KR101122650B1 (ko) * | 2010-04-28 | 2012-03-09 | 한국전자통신연구원 | 정상 프로세스에 위장 삽입된 악성코드 탐지 장치, 시스템 및 방법 |
| US9413721B2 (en) * | 2011-02-15 | 2016-08-09 | Webroot Inc. | Methods and apparatus for dealing with malware |
| JP2014514651A (ja) * | 2011-03-28 | 2014-06-19 | マカフィー, インコーポレイテッド | バーチャルマシーンモニタベースのアンチマルウェアセキュリティのためのシステム及び方法 |
| US8904537B2 (en) * | 2011-05-09 | 2014-12-02 | F—Secure Corporation | Malware detection |
| CN102622543B (zh) * | 2012-02-06 | 2016-08-03 | 北京百度网讯科技有限公司 | 一种动态检测恶意网页脚本的方法和装置 |
| US20140150101A1 (en) * | 2012-09-12 | 2014-05-29 | Xecure Lab Co., Ltd. | Method for recognizing malicious file |
| US8931074B2 (en) * | 2012-10-10 | 2015-01-06 | Dell Products L.P. | Adaptive system behavior change on malware trigger |
| CN103294951B (zh) * | 2012-11-29 | 2016-09-07 | 北京安天电子设备有限公司 | 一种基于文档型漏洞的恶意代码样本提取方法及系统 |
| CN103679031B (zh) * | 2013-12-12 | 2017-10-31 | 北京奇虎科技有限公司 | 一种文件病毒免疫的方法和装置 |
| US9491190B2 (en) * | 2013-12-26 | 2016-11-08 | Guardicore Ltd. | Dynamic selection of network traffic for file extraction shellcode detection |
| CN103955645B (zh) * | 2014-04-28 | 2017-03-08 | 百度在线网络技术(北京)有限公司 | 恶意进程行为的检测方法、装置及系统 |
-
2015
- 2015-06-27 US US14/752,901 patent/US20160381051A1/en not_active Abandoned
-
2016
- 2016-05-25 CN CN201680037858.2A patent/CN107851157A/zh active Pending
- 2016-05-25 WO PCT/US2016/033977 patent/WO2017003587A1/en not_active Ceased
- 2016-05-25 JP JP2017566815A patent/JP6526842B2/ja active Active
- 2016-05-25 EP EP16818401.8A patent/EP3314510A1/en not_active Withdrawn
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP2018519604A5 (enExample) | ||
| US8291500B1 (en) | Systems and methods for automated malware artifact retrieval and analysis | |
| US9584541B1 (en) | Cyber threat identification and analytics apparatuses, methods and systems | |
| CN103955645B (zh) | 恶意进程行为的检测方法、装置及系统 | |
| US20140373158A1 (en) | Detecting security vulnerabilities on computing devices | |
| US9256511B2 (en) | Computer software application self-testing | |
| CN104331663B (zh) | web shell的检测方法以及web服务器 | |
| US9117072B2 (en) | Software exploit detection | |
| JP2014521184A5 (enExample) | ||
| KR101884548B1 (ko) | 멀웨어의 추적 및 검출을 위한 시스템 및 방법 | |
| US10158733B2 (en) | Automated DPI process | |
| CN105607986A (zh) | 用户行为日志数据采集方法及装置 | |
| US11019096B2 (en) | Combining apparatus, combining method, and combining program | |
| US11709756B2 (en) | Dynamic distributed tracing instrumentation in a microservice architecture | |
| CN112685745B (zh) | 一种固件检测方法、装置、设备及存储介质 | |
| CN105095759A (zh) | 文件的检测方法及装置 | |
| US11055416B2 (en) | Detecting vulnerabilities in applications during execution | |
| CN108268773B (zh) | Android应用升级包本地存储安全性检测方法 | |
| CN105791250B (zh) | 应用程序检测方法及装置 | |
| US10962966B2 (en) | Equipment process monitoring system with automatic configuration of control limits and alert zones | |
| CN104461741B (zh) | 基于图形设备接口的计算设备优化方法及装置 | |
| CN106407815B (zh) | 漏洞检测方法及装置 | |
| KR20150134172A (ko) | 악성코드 탐지 장치 및 방법 | |
| KR102128047B1 (ko) | 프로세스 행위 프로파일 생성 장치 및 방법 | |
| CN111444510A (zh) | 基于虚拟机实现的cpu漏洞检测方法及系统 |