JP2018538633A5 - - Google Patents
Download PDFInfo
- Publication number
- JP2018538633A5 JP2018538633A5 JP2018532300A JP2018532300A JP2018538633A5 JP 2018538633 A5 JP2018538633 A5 JP 2018538633A5 JP 2018532300 A JP2018532300 A JP 2018532300A JP 2018532300 A JP2018532300 A JP 2018532300A JP 2018538633 A5 JP2018538633 A5 JP 2018538633A5
- Authority
- JP
- Japan
- Prior art keywords
- computer system
- security
- tool
- server computer
- client
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 230000004044 response Effects 0.000 claims 23
- 230000000116 mitigating effect Effects 0.000 claims 8
- 238000007689 inspection Methods 0.000 claims 2
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US201562269952P | 2015-12-19 | 2015-12-19 | |
| US62/269,952 | 2015-12-19 | ||
| PCT/EP2016/081697 WO2017103254A1 (en) | 2015-12-19 | 2016-12-19 | Dual memory introspection for securing multiple network endpoints |
Publications (3)
| Publication Number | Publication Date |
|---|---|
| JP2018538633A JP2018538633A (ja) | 2018-12-27 |
| JP2018538633A5 true JP2018538633A5 (enExample) | 2019-08-15 |
| JP6772270B2 JP6772270B2 (ja) | 2020-10-21 |
Family
ID=57777593
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2018532300A Active JP6772270B2 (ja) | 2015-12-19 | 2016-12-19 | 複数のネットワークエンドポイントをセキュアにするためのデュアルメモリイントロスペクション |
Country Status (12)
| Country | Link |
|---|---|
| US (1) | US10630643B2 (enExample) |
| EP (1) | EP3391274B1 (enExample) |
| JP (1) | JP6772270B2 (enExample) |
| KR (1) | KR102301721B1 (enExample) |
| CN (1) | CN108369625B (enExample) |
| AU (1) | AU2016369460B2 (enExample) |
| CA (1) | CA3006003C (enExample) |
| ES (1) | ES2762988T3 (enExample) |
| IL (1) | IL259344B (enExample) |
| RU (1) | RU2714607C2 (enExample) |
| SG (1) | SG11201804327TA (enExample) |
| WO (1) | WO2017103254A1 (enExample) |
Families Citing this family (30)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20180063088A1 (en) * | 2016-09-01 | 2018-03-01 | Airwatch Llc | Hypervisor network profiles to facilitate vpn tunnel |
| CN111066015B (zh) * | 2017-04-26 | 2024-02-23 | 西兰克公司 | 端点检测和响应系统事件特征数据传输 |
| US10505966B2 (en) * | 2017-06-06 | 2019-12-10 | Sap Se | Cross-site request forgery (CSRF) vulnerability detection |
| US10503910B2 (en) * | 2017-06-06 | 2019-12-10 | Sap Se | Security testing framework including virtualized server-side platform |
| US10764169B2 (en) | 2017-10-09 | 2020-09-01 | Keysight Technologies, Inc. | Methods, systems, and computer readable media for testing virtual network components deployed in virtual private clouds (VPCs) |
| US10693909B2 (en) | 2018-01-19 | 2020-06-23 | International Business Machines Corporation | Securing an endpoint in a computer network |
| US11038770B2 (en) * | 2018-02-01 | 2021-06-15 | Keysight Technologies, Inc. | Methods, systems, and computer readable media for managing deployment and maintenance of network tools |
| US10812349B2 (en) | 2018-02-17 | 2020-10-20 | Keysight Technologies, Inc. | Methods, systems and computer readable media for triggering on-demand dynamic activation of cloud-based network visibility tools |
| US11347861B2 (en) | 2018-04-10 | 2022-05-31 | Raytheon Company | Controlling security state of commercial off the shelf (COTS) system |
| RU2757597C1 (ru) * | 2018-07-18 | 2021-10-19 | БИТДЕФЕНДЕР АйПиАр МЕНЕДЖМЕНТ ЛТД | Системы и способы сообщения об инцидентах компьютерной безопасности |
| US11423150B2 (en) | 2018-09-07 | 2022-08-23 | Raytheon Company | System and method for booting processors with encrypted boot image |
| US10878101B2 (en) | 2018-09-07 | 2020-12-29 | Raytheon Company | Trusted booting by hardware root of trust (HRoT) device |
| US11178159B2 (en) | 2018-09-07 | 2021-11-16 | Raytheon Company | Cross-domain solution using network-connected hardware root-of-trust device |
| US11178169B2 (en) * | 2018-12-27 | 2021-11-16 | Paypal, Inc. | Predicting online electronic attacks based on other attacks |
| WO2020205497A1 (en) | 2019-04-01 | 2020-10-08 | Raytheon Company | Root of trust assisted access control of secure encrypted drives |
| US11595411B2 (en) | 2019-04-01 | 2023-02-28 | Raytheon Company | Adaptive, multi-layer enterprise data protection and resiliency platform |
| US10951509B1 (en) | 2019-06-07 | 2021-03-16 | Keysight Technologies, Inc. | Methods, systems, and computer readable media for providing intent-driven microapps for execution on communications network testing devices |
| US11249787B2 (en) * | 2019-10-01 | 2022-02-15 | Bank Of America Corporation | Method and system for data collection using hypervisor |
| US11489745B2 (en) | 2019-10-15 | 2022-11-01 | Keysight Technologies, Inc. | Methods, systems and computer readable media for providing a declarative network monitoring environment |
| US11379588B2 (en) | 2019-12-20 | 2022-07-05 | Raytheon Company | System validation by hardware root of trust (HRoT) device and system management mode (SMM) |
| CN114978566A (zh) * | 2021-02-12 | 2022-08-30 | 比特梵德知识产权管理有限公司 | 用于保护节电无线装置免受攻击的安全设备 |
| US11615181B2 (en) | 2021-03-30 | 2023-03-28 | Netapp, Inc. | Methods for managing verification and validation of third-party code and devices thereof |
| US11586725B2 (en) | 2021-03-30 | 2023-02-21 | Netapp, Inc. | Methods for managing verification and validation of third-party code and devices thereof |
| US11681520B2 (en) * | 2021-04-20 | 2023-06-20 | International Business Machines Corporation | Software upgrading using dynamic link library injection |
| US12393437B1 (en) * | 2021-04-29 | 2025-08-19 | Marvell Asia Pte Ltd | Method and apparatus for supporting security implementation in a virtual network |
| US12020059B2 (en) * | 2021-08-30 | 2024-06-25 | International Business Machines Corporation | Inaccessible prefix pages during virtual machine execution |
| US20230409717A1 (en) * | 2022-06-15 | 2023-12-21 | AO Kaspersky Lab | System and method for detecting vulnerabilities in the operating system based on process and thread data |
| CN115794604B (zh) * | 2022-10-14 | 2024-04-19 | 寒武纪行歌(南京)科技有限公司 | 数据生成方法、装置、设备、介质及程序产品 |
| US12339958B2 (en) * | 2022-10-28 | 2025-06-24 | Dell Products, L.P. | Ransomware protection systems and methods leveraging smart network interface controllers |
| KR102548703B1 (ko) * | 2022-11-22 | 2023-06-28 | 에스지에이솔루션즈 주식회사 | 홈 네트워크 환경에서의 원격 시스템에 대한 접속 제어 방법, 장치 및 컴퓨터-판독가능 기록매체 |
Family Cites Families (38)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5960170A (en) * | 1997-03-18 | 1999-09-28 | Trend Micro, Inc. | Event triggered iterative virus detection |
| JP2001222414A (ja) * | 2000-02-09 | 2001-08-17 | Dainippon Printing Co Ltd | Dtpツール自動更新システム |
| KR100551421B1 (ko) * | 2002-12-28 | 2006-02-09 | 주식회사 팬택앤큐리텔 | 바이러스치료기능을 가진 이동통신 시스템 |
| US7496961B2 (en) | 2003-10-15 | 2009-02-24 | Intel Corporation | Methods and apparatus to provide network traffic support and physical security support |
| JP4624181B2 (ja) * | 2004-07-28 | 2011-02-02 | 株式会社エヌ・ティ・ティ・データ | 不正アクセス対策制御装置および不正アクセス対策制御プログラム |
| US8024568B2 (en) | 2005-01-28 | 2011-09-20 | Citrix Systems, Inc. | Method and system for verification of an endpoint security scan |
| US20080320594A1 (en) | 2007-03-19 | 2008-12-25 | Xuxian Jiang | Malware Detector |
| US7797748B2 (en) | 2007-12-12 | 2010-09-14 | Vmware, Inc. | On-access anti-virus mechanism for virtual machine architecture |
| US8719936B2 (en) * | 2008-02-01 | 2014-05-06 | Northeastern University | VMM-based intrusion detection system |
| US7979260B1 (en) * | 2008-03-31 | 2011-07-12 | Symantec Corporation | Simulating PXE booting for virtualized machines |
| US8443363B1 (en) * | 2008-05-30 | 2013-05-14 | Symantec Corporation | Coordinated virtualization activities |
| US9098698B2 (en) | 2008-09-12 | 2015-08-04 | George Mason Research Foundation, Inc. | Methods and apparatus for application isolation |
| JP4589996B2 (ja) * | 2008-10-14 | 2010-12-01 | 株式会社セキュアウェア | データ処理方法、データ処理装置、コンピュータプログラム、及び記録媒体 |
| US8850571B2 (en) * | 2008-11-03 | 2014-09-30 | Fireeye, Inc. | Systems and methods for detecting malicious network content |
| US9177145B2 (en) * | 2009-03-24 | 2015-11-03 | Sophos Limited | Modified file tracking on virtual machines |
| US8544089B2 (en) * | 2009-08-17 | 2013-09-24 | Fatskunk, Inc. | Auditing a device |
| JP5725529B2 (ja) * | 2010-07-21 | 2015-05-27 | 日本電気株式会社 | Web脆弱性補修システム、Web脆弱性補修方法、及びプログラム |
| RU2444056C1 (ru) * | 2010-11-01 | 2012-02-27 | Закрытое акционерное общество "Лаборатория Касперского" | Система и способ ускорения решения проблем за счет накопления статистической информации |
| US20120144489A1 (en) * | 2010-12-07 | 2012-06-07 | Microsoft Corporation | Antimalware Protection of Virtual Machines |
| CN102122330B (zh) * | 2011-01-24 | 2014-12-03 | 中国人民解放军国防科学技术大学 | 基于虚拟机的“In-VM”恶意代码检测系统 |
| US8819833B2 (en) * | 2011-03-01 | 2014-08-26 | Honeywell International Inc. | Assured pipeline threat detection |
| US8566899B2 (en) * | 2011-03-16 | 2013-10-22 | Symantec Corporation | Techniques for securing a checked-out virtual machine in a virtual desktop infrastructure |
| US20120254993A1 (en) * | 2011-03-28 | 2012-10-04 | Mcafee, Inc. | System and method for virtual machine monitor based anti-malware security |
| US8813227B2 (en) | 2011-03-29 | 2014-08-19 | Mcafee, Inc. | System and method for below-operating system regulation and control of self-modifying code |
| US8601583B1 (en) * | 2011-04-14 | 2013-12-03 | Trend Micro Incorporated | Certification of virtual machine images in cloud computing environments |
| US9298910B2 (en) * | 2011-06-08 | 2016-03-29 | Mcafee, Inc. | System and method for virtual partition monitoring |
| US8099596B1 (en) * | 2011-06-30 | 2012-01-17 | Kaspersky Lab Zao | System and method for malware protection using virtualization |
| US8584235B2 (en) * | 2011-11-02 | 2013-11-12 | Bitdefender IPR Management Ltd. | Fuzzy whitelisting anti-malware systems and methods |
| US20130312096A1 (en) | 2012-05-18 | 2013-11-21 | Vmware, Inc. | On-demand data scan in a virtual machine |
| US9003408B2 (en) * | 2012-09-28 | 2015-04-07 | Adventium Enterprises | Providing virtual machine services by isolated virtual machines |
| CN103500304B (zh) * | 2013-10-13 | 2016-06-29 | 西安电子科技大学 | 基于Xen的虚拟机个性化安全监控系统及监控方法 |
| CN104169939B (zh) * | 2013-11-12 | 2017-02-15 | 华为技术有限公司 | 一种实现虚拟化安全的方法和系统 |
| RU2568282C2 (ru) * | 2014-04-18 | 2015-11-20 | Закрытое акционерное общество "Лаборатория Касперского" | Система и способ обеспечения отказоустойчивости антивирусной защиты, реализуемой в виртуальной среде |
| US9798882B2 (en) * | 2014-06-06 | 2017-10-24 | Crowdstrike, Inc. | Real-time model of states of monitored devices |
| FR3022371A1 (fr) * | 2014-06-11 | 2015-12-18 | Orange | Procede de supervision de la securite d'une machine virtuelle dans une architecture d'informatique dans le nuage |
| US9009836B1 (en) * | 2014-07-17 | 2015-04-14 | Kaspersky Lab Zao | Security architecture for virtual machines |
| JP2014225302A (ja) * | 2014-09-08 | 2014-12-04 | 富士通株式会社 | ウイルス検出プログラム、ウイルス検出方法、及びコンピュータ |
| US9608909B1 (en) * | 2015-06-08 | 2017-03-28 | Cisco Technology, Inc. | Technique for mitigating effects of slow or stuck virtual machines in fibre channel communications networks |
-
2016
- 2016-12-19 CN CN201680073890.6A patent/CN108369625B/zh active Active
- 2016-12-19 KR KR1020187015228A patent/KR102301721B1/ko active Active
- 2016-12-19 AU AU2016369460A patent/AU2016369460B2/en active Active
- 2016-12-19 SG SG11201804327TA patent/SG11201804327TA/en unknown
- 2016-12-19 JP JP2018532300A patent/JP6772270B2/ja active Active
- 2016-12-19 ES ES16825369T patent/ES2762988T3/es active Active
- 2016-12-19 RU RU2018126207A patent/RU2714607C2/ru active
- 2016-12-19 US US15/383,082 patent/US10630643B2/en active Active
- 2016-12-19 CA CA3006003A patent/CA3006003C/en active Active
- 2016-12-19 WO PCT/EP2016/081697 patent/WO2017103254A1/en not_active Ceased
- 2016-12-19 EP EP16825369.8A patent/EP3391274B1/en active Active
-
2018
- 2018-05-14 IL IL259344A patent/IL259344B/en active IP Right Grant
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP2018538633A5 (enExample) | ||
| US10579792B2 (en) | Extracting malicious instructions on a virtual machine | |
| RU2018126207A (ru) | Двукратная самодиагностика памяти для защиты множества сетевых конечных точек | |
| KR101810762B1 (ko) | 클라우드 환경에서 hdfs 기반의 도커 컨테이너 보안 로그 분석 방법 및 시스템 | |
| EP3214568B1 (en) | Method, apparatus and system for processing cloud application attack behaviours in cloud computing system | |
| US10659478B2 (en) | Identifying stealth packets in network communications through use of packet headers | |
| US9241010B1 (en) | System and method for network behavior detection | |
| US10341355B1 (en) | Confidential malicious behavior analysis for virtual computing resources | |
| US20130340077A1 (en) | Secure cloud hypervisor monitor | |
| JP2019082989A5 (enExample) | ||
| CN108763031A (zh) | 一种基于日志的威胁情报检测方法及装置 | |
| JP2011175639A5 (enExample) | ||
| JP2014513834A5 (enExample) | ||
| JP2016514295A5 (enExample) | ||
| US20190260797A1 (en) | Method and system for verifying validity of detection result | |
| CN107465702B (zh) | 基于无线网络入侵的预警方法及装置 | |
| US11556652B2 (en) | End-point visibility | |
| KR102040371B1 (ko) | 네트워크 공격 패턴 분석 및 방법 | |
| US11050768B1 (en) | Detecting compute resource anomalies in a group of computing resources | |
| US20170279825A1 (en) | Tracking cloud workloads to isolate security breach exposure | |
| GB2589790A (en) | Security of server hosting remote application | |
| KR101695461B1 (ko) | 보안 위험 감지 장치 및 방법 | |
| WO2017091399A1 (en) | Extracting malicious instructions on a virtual machine in a network environment | |
| CN118740408A (zh) | 一种数据处理方法、通信装置和通信设备 |