JP2019502197A5 - - Google Patents

Download PDF

Info

Publication number
JP2019502197A5
JP2019502197A5 JP2018526555A JP2018526555A JP2019502197A5 JP 2019502197 A5 JP2019502197 A5 JP 2019502197A5 JP 2018526555 A JP2018526555 A JP 2018526555A JP 2018526555 A JP2018526555 A JP 2018526555A JP 2019502197 A5 JP2019502197 A5 JP 2019502197A5
Authority
JP
Japan
Prior art keywords
code
generated code
runtime generated
memory
runtime
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
JP2018526555A
Other languages
English (en)
Japanese (ja)
Other versions
JP2019502197A (ja
JP6837064B2 (ja
Filing date
Publication date
Application filed filed Critical
Priority claimed from PCT/IL2016/050987 external-priority patent/WO2017098495A1/en
Publication of JP2019502197A publication Critical patent/JP2019502197A/ja
Publication of JP2019502197A5 publication Critical patent/JP2019502197A5/ja
Application granted granted Critical
Publication of JP6837064B2 publication Critical patent/JP6837064B2/ja
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

JP2018526555A 2015-12-08 2016-09-07 ランタイム生成コードにおける悪意のあるコードの検出のためのシステムおよび方法 Active JP6837064B2 (ja)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201562264404P 2015-12-08 2015-12-08
US62/264,404 2015-12-08
PCT/IL2016/050987 WO2017098495A1 (en) 2015-12-08 2016-09-07 Systems and methods for detection of malicious code in runtime generated code

Publications (3)

Publication Number Publication Date
JP2019502197A JP2019502197A (ja) 2019-01-24
JP2019502197A5 true JP2019502197A5 (enExample) 2019-10-17
JP6837064B2 JP6837064B2 (ja) 2021-03-03

Family

ID=57113519

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2018526555A Active JP6837064B2 (ja) 2015-12-08 2016-09-07 ランタイム生成コードにおける悪意のあるコードの検出のためのシステムおよび方法

Country Status (8)

Country Link
US (1) US20170161498A1 (enExample)
EP (1) EP3387579A1 (enExample)
JP (1) JP6837064B2 (enExample)
CA (1) CA3005314A1 (enExample)
IL (1) IL259878B (enExample)
SG (1) SG11201804085SA (enExample)
TW (1) TWI791418B (enExample)
WO (1) WO2017098495A1 (enExample)

Families Citing this family (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9916448B1 (en) * 2016-01-21 2018-03-13 Trend Micro Incorporated Detection of malicious mobile apps
US10275595B2 (en) * 2016-09-29 2019-04-30 Trap Data Security Ltd. System and method for characterizing malware
TWI668592B (zh) * 2017-07-28 2019-08-11 中華電信股份有限公司 Method for automatically determining the malicious degree of Android App by using multiple dimensions
US10977368B1 (en) * 2017-12-27 2021-04-13 Ca Technologies, Inc. Detecting malware based on memory allocation patterns
US11238017B2 (en) * 2018-01-30 2022-02-01 Salesforce.Com, Inc. Runtime detector for data corruptions
US11609984B2 (en) * 2018-02-14 2023-03-21 Digital Guardian Llc Systems and methods for determining a likelihood of an existence of malware on an executable
US11481376B2 (en) 2018-06-19 2022-10-25 Salesforce, Inc. Platform for handling data corruptions
JP7672041B2 (ja) * 2019-06-26 2025-05-07 久利寿 帝都 情報処理方法および情報処理システム
US11681804B2 (en) 2020-03-09 2023-06-20 Commvault Systems, Inc. System and method for automatic generation of malware detection traps
CN112199274B (zh) * 2020-09-18 2022-05-03 北京大学 基于V8引擎的JavaScript动态污点跟踪方法及电子装置
US11709675B2 (en) 2020-10-30 2023-07-25 Apple Inc. Software verification of dynamically generated code
CN112579094B (zh) * 2020-12-15 2024-05-14 上海赛可出行科技服务有限公司 一种基于模板代码匹配的轻量级热修复方法
CN113868655B (zh) * 2021-09-29 2025-07-11 北京天融信网络安全技术有限公司 木马查杀方法、装置、电子设备及计算机可读存储介质
US20230252162A1 (en) * 2022-02-10 2023-08-10 Cisco Technology, Inc. Application Vulnerability Score Based on Stack Traces
US12328322B2 (en) 2022-04-01 2025-06-10 Vectra Ai, Inc. Method, product, and system for network security management using software representation that embodies network configuration and policy data
US12212585B2 (en) 2022-04-01 2025-01-28 Vectra Ai, Inc. Method, product, and system for analyzing a computer network to identify attack paths using a software representation that embodies network configuration and policy data for security management
US12219070B2 (en) 2022-04-01 2025-02-04 Vectra Ai, Inc. Method, product, and system for generating detection signatures based on attack paths in a computer network identified using a software representation that embodies network configuration and policy data for security management using detection signature templates
US12477001B2 (en) 2022-04-01 2025-11-18 Vectra Ai, Inc. Method, product, and system for analyzing attack paths in computer network generated using a software representation that embodies network configuration and policy data for security management
EP4254866A1 (en) * 2022-04-01 2023-10-04 Vectra AI, Inc. Method, product, and system for generating detection signatures based on attack paths in a computer network identified using a software representation that embodies network configuration and policy data for security management using detection signature templates
US20240056481A1 (en) 2022-08-09 2024-02-15 Commvault Systems, Inc. Data storage management system integrating cyber threat deception

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070192863A1 (en) * 2005-07-01 2007-08-16 Harsh Kapoor Systems and methods for processing data flows
US7478431B1 (en) * 2002-08-02 2009-01-13 Symantec Corporation Heuristic detection of computer viruses
GB2396227B (en) * 2002-12-12 2006-02-08 Messagelabs Ltd Method of and system for heuristically detecting viruses in executable code
US7984304B1 (en) * 2004-03-02 2011-07-19 Vmware, Inc. Dynamic verification of validity of executable code
US8176554B1 (en) * 2008-05-30 2012-05-08 Symantec Corporation Malware detection through symbol whitelisting
US20110191848A1 (en) * 2010-02-03 2011-08-04 Microsoft Corporation Preventing malicious just-in-time spraying attacks
KR101122650B1 (ko) * 2010-04-28 2012-03-09 한국전자통신연구원 정상 프로세스에 위장 삽입된 악성코드 탐지 장치, 시스템 및 방법
US20120331303A1 (en) * 2011-06-23 2012-12-27 Andersson Jonathan E Method and system for preventing execution of malware
CN102819697B (zh) * 2011-12-26 2015-07-22 哈尔滨安天科技股份有限公司 一种基于线程反编译的多平台恶意代码检测方法和系统
TWI528216B (zh) * 2014-04-30 2016-04-01 財團法人資訊工業策進會 隨選檢測惡意程式之方法、電子裝置、及使用者介面

Similar Documents

Publication Publication Date Title
JP2019502197A5 (enExample)
TWI791418B (zh) 用以檢測運作時期所產生碼中之惡意碼的系統及方法、與相關電腦程式產品
US11507669B1 (en) Characterizing, detecting and healing vulnerabilities in computer code
EP3039608B1 (en) Hardware and software execution profiling
US8850581B2 (en) Identification of malware detection signature candidate code
US9471783B2 (en) Generic unpacking of applications for malware detection
Volckaert et al. Cloning your gadgets: Complete ROP attack immunity with multi-variant execution
KR101228899B1 (ko) 벡터량 산출을 이용한 악성코드의 분류 및 진단 방법과 장치
WO2019075493A1 (en) RANDOMIZATION OF BINARY CODE DEVICE STRUCTURE ARRANGEMENT TO ENHANCE SECURITY BY ENHANCED ENTROPY
JP2005243004A5 (enExample)
Lim et al. An Android Application Protection Scheme against Dynamic Reverse Engineering Attacks.
CN109271789B (zh) 恶意进程检测方法、装置、电子设备及存储介质
US10409572B2 (en) Compiled file normalization
KR102173151B1 (ko) 원본코드 자동추출장치 및 원본코드 자동추출방법
CN104537281A (zh) 用于移动应用保护的系统和方法
CN110717181B (zh) 基于新型程序依赖图的非控制数据攻击检测方法及装置
CN108073411A (zh) 一种补丁的内核加载方法及装置
Shapiro et al. {“Weird}{Machines”} in {ELF}: A spotlight on the underappreciated metadata
CN107209815B (zh) 用于使用返回导向编程的代码混淆的方法
Kittel et al. Counteracting data-only malware with code pointer examination
JP5989599B2 (ja) 情報処理装置、および、情報処理方法
Ahmed et al. Rule-based integrity checking of interrupt descriptor tables in cloud environments
Wu et al. SAEG: Stateful Automatic Exploit Generation
Al-Saleh et al. On information flow for intrusion detection: What if accurate full-system dynamic information flow tracking was possible?
Yang et al. Toward an efficient pe-malware detection tool