JP4950902B2 - ダイナミックトランスレーションによる先取りコンピュータマルウェアの保護 - Google Patents
ダイナミックトランスレーションによる先取りコンピュータマルウェアの保護 Download PDFInfo
- Publication number
- JP4950902B2 JP4950902B2 JP2007544568A JP2007544568A JP4950902B2 JP 4950902 B2 JP4950902 B2 JP 4950902B2 JP 2007544568 A JP2007544568 A JP 2007544568A JP 2007544568 A JP2007544568 A JP 2007544568A JP 4950902 B2 JP4950902 B2 JP 4950902B2
- Authority
- JP
- Japan
- Prior art keywords
- program code
- malware
- execution
- basic block
- instruction
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000013519 translation Methods 0.000 title claims description 88
- 238000000034 method Methods 0.000 claims description 118
- 230000007935 neutral effect Effects 0.000 claims description 37
- 230000006870 function Effects 0.000 claims description 6
- 238000012545 processing Methods 0.000 claims description 4
- 230000004044 response Effects 0.000 claims description 3
- 238000001514 detection method Methods 0.000 description 23
- 230000002155 anti-virotic effect Effects 0.000 description 14
- 241000700605 Viruses Species 0.000 description 10
- 238000010586 diagram Methods 0.000 description 9
- 208000015181 infectious disease Diseases 0.000 description 6
- 230000008569 process Effects 0.000 description 5
- 238000012546 transfer Methods 0.000 description 5
- 230000008859 change Effects 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 230000009471 action Effects 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 230000006378 damage Effects 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 230000006399 behavior Effects 0.000 description 1
- 230000003542 behavioural effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000015556 catabolic process Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000007796 conventional method Methods 0.000 description 1
- 230000007123 defense Effects 0.000 description 1
- 238000006731 degradation reaction Methods 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 239000000725 suspension Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/16—Protection against loss of memory contents
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Virology (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Devices For Executing Special Programs (AREA)
- Storage Device Security (AREA)
Description
Claims (18)
- 潜在的なマルウェアを実行する要求の受信に応答して安全なプログラムコードを生成するためのコンピュータにより実施される方法であって、
前記マルウェアに含まれているプログラムコードを復号するステップと、
前記復号されたプログラムコードを安全で機能的に等価なプログラムコードに翻訳するステップであって、前記翻訳されたプログラムコードが翻訳後に変更されたか否かを判定し、変更があったときは、変更後のプログラムの実行前に、当該プログラムコードを再度翻訳する、ステップと、
計算装置上で前記等価なプログラムコードを実行するステップと
を含むことを特徴とする方法。 - 前記プログラムコードを復号するステップの前に、メモリ内に前記マルウェアの基本ブロックをロードするステップをさらに含むことを特徴とする請求項1に記載の方法。
- 前記プログラムコードを復号するステップの前に、前記マルウェアがマルウェア特性を有するプログラムコードを含むかどうかを決定するために、前記ロードされた基本ブロックを解析するステップをさらに含むことを特徴とする請求項2に記載の方法。
- 前記基本ブロックをロードするステップでは、前記基本ブロック内の第1の命令が識別されることを特徴とする請求項2に記載の方法。
- 前記基本ブロックをロードするステップでは、前記基本ブロック内の最後の命令が識別されることを特徴とする請求項2に記載の方法。
- 前記プログラムコードを復号するステップは、前記マルウェアから、アーキテクチャニュートラルプログラムコードを生成するステップを含むことを特徴とする請求項1に記載の方法。
- ソース言語が、X86-32ビットコンピュータアーキテクチャの仕様を満足することを特徴とする請求項6に記載の方法。
- 前記等価なプログラムコードに翻訳するステップは、
前記マルウェア内の命令を選択するステップと、
前記マルウェアの機能を実現することができないアーキテクチャニュートラルフォーマットの等価な命令の組を生成するステップと、
前記アーキテクチャニュートラルフォーマットの等価な命令の組を実行可能なプログラムコードにコンパイルするステップと
を含むことを特徴とする請求項1に記載の方法。 - 前記等価なプログラムコードに翻訳するステップは、
前記復号されたプログラムコード内の命令を選択するステップと、
前記マルウェアの機能を実現することができない実行可能な安全で機能的に等価の命令の組を生成するステップと
を含むことを特徴とする請求項1に記載の方法。 - 前記等価なプログラムコードを実行するステップでは、当該等価なプログラムコードは、基本ブロック単位で実行されることを特徴とする請求項1に記載の方法。
- 前記基本ブロック単位での実行は、
前記基本ブロック内の命令を選択するステップと、
中央処理ユニットにより前記命令を処理するステップと、
前記選択された命令の実行により中断時要件が生じたかどうかを決定するステップとを含むことを特徴とする請求項10に記載の方法。 - 前記選択された命令の実行により、当該選択された命令の後に実行される予定の基本ブロック内のプログラムコードを変更されるとき、前記基本ブロックは、2つの基本ブロックに分割されることを特徴とする請求項11に記載の方法。
- 前記等価なプログラムコードを実行するステップは、
実行中に発生するエラーを検出するステップと、
実行を中断して、例外ハンドラーを呼び出すステップと、
前記例外ハンドラーが実行を完了した後に、実行の再開に必要な情報を記憶するステップと
を特徴とする請求項11に記載の方法。 - 請求項1ないし13のいずれか1項の方法をコンピュータに実行させるための命令を記憶したことを特徴とするコンピュータ読取可能記憶媒体。
- 潜在的なマルウェアを安全に実行するための計算装置であって、
前記マルウェアに含まれているプログラムコードを復号する手段と、
前記復号されたプログラムコードを安全で機能的に等価なプログラムコードに翻訳する手段であって、前記翻訳されたプログラムコードが翻訳後に変更されたか否かを判定し、変更があったときは、変更後のプログラムの実行前に、当該プログラムコードを再度翻訳する、手段と、
計算装置上で前記等価なプログラムコードを実行する手段と
を備えたことを特徴とする計算装置。 - プログラムコードがメモリ内にロードされたときに、プログラムの実行フローを追跡するブロックマネージャと通信するように構成されたメモリをさらに含むことを特徴とする請求項15に記載の計算装置。
- 前記復号されたプログラムコードを翻訳する手段は、前記復号されたプログラムコードを、アーキテクチャニュートラルフォーマットのプログラムコードに翻訳するように動作するプラグイン・モジュールをサポートするように構成されていることを特徴とする請求項15に記載の計算装置。
- 前記プログラムコードを復号する手段は、計算装置上で実行できるプログラムコードに、アーキテクチャニュートラルフォーマットのプログラムコードをコンパイルするように動作するプラグイン・モジュールをサポートするように構成されていることを特徴とする請求項15に記載の計算装置。
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/005,000 | 2004-12-06 | ||
US11/005,000 US7636856B2 (en) | 2004-12-06 | 2004-12-06 | Proactive computer malware protection through dynamic translation |
PCT/US2005/043773 WO2006062849A2 (en) | 2004-12-06 | 2005-12-05 | Proactive computer malware protection through dynamic translation |
Publications (2)
Publication Number | Publication Date |
---|---|
JP2008523471A JP2008523471A (ja) | 2008-07-03 |
JP4950902B2 true JP4950902B2 (ja) | 2012-06-13 |
Family
ID=36575761
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2007544568A Active JP4950902B2 (ja) | 2004-12-06 | 2005-12-05 | ダイナミックトランスレーションによる先取りコンピュータマルウェアの保護 |
Country Status (6)
Country | Link |
---|---|
US (1) | US7636856B2 (ja) |
EP (1) | EP1800434B1 (ja) |
JP (1) | JP4950902B2 (ja) |
KR (1) | KR101213821B1 (ja) |
CN (1) | CN101438529B (ja) |
WO (1) | WO2006062849A2 (ja) |
Families Citing this family (68)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7810158B2 (en) * | 2004-12-16 | 2010-10-05 | At&T Intellectual Property I, L.P. | Methods and systems for deceptively trapping electronic worms |
US8646080B2 (en) * | 2005-09-16 | 2014-02-04 | Avg Technologies Cy Limited | Method and apparatus for removing harmful software |
US20070067844A1 (en) * | 2005-09-16 | 2007-03-22 | Sana Security | Method and apparatus for removing harmful software |
US8719924B1 (en) * | 2005-03-04 | 2014-05-06 | AVG Technologies N.V. | Method and apparatus for detecting harmful software |
US7571476B2 (en) * | 2005-04-14 | 2009-08-04 | Webroot Software, Inc. | System and method for scanning memory for pestware |
US7591016B2 (en) * | 2005-04-14 | 2009-09-15 | Webroot Software, Inc. | System and method for scanning memory for pestware offset signatures |
US7349931B2 (en) * | 2005-04-14 | 2008-03-25 | Webroot Software, Inc. | System and method for scanning obfuscated files for pestware |
US7562293B2 (en) * | 2005-05-27 | 2009-07-14 | International Business Machines Corporation | Method and apparatus for processing a parseable document |
US8078740B2 (en) | 2005-06-03 | 2011-12-13 | Microsoft Corporation | Running internet applications with low rights |
GB2427048A (en) | 2005-06-09 | 2006-12-13 | Avecho Group Ltd | Detection of unwanted code or data in electronic mail |
US7730040B2 (en) * | 2005-07-27 | 2010-06-01 | Microsoft Corporation | Feedback-driven malware detector |
US8407785B2 (en) | 2005-08-18 | 2013-03-26 | The Trustees Of Columbia University In The City Of New York | Systems, methods, and media protecting a digital data processing device from attack |
US8763103B2 (en) | 2006-04-21 | 2014-06-24 | The Trustees Of Columbia University In The City Of New York | Systems and methods for inhibiting attacks on applications |
US8185737B2 (en) | 2006-06-23 | 2012-05-22 | Microsoft Corporation | Communication across domains |
US8261344B2 (en) * | 2006-06-30 | 2012-09-04 | Sophos Plc | Method and system for classification of software using characteristics and combinations of such characteristics |
US8365286B2 (en) * | 2006-06-30 | 2013-01-29 | Sophos Plc | Method and system for classification of software using characteristics and combinations of such characteristics |
US8151352B1 (en) * | 2006-07-14 | 2012-04-03 | Bitdefender IPR Managament Ltd. | Anti-malware emulation systems and methods |
US8190868B2 (en) | 2006-08-07 | 2012-05-29 | Webroot Inc. | Malware management through kernel detection |
US20080127114A1 (en) * | 2006-11-28 | 2008-05-29 | Amit Vasudevan | Framework for stealth dynamic coarse and fine-grained malware analysis |
US9729513B2 (en) | 2007-11-08 | 2017-08-08 | Glasswall (Ip) Limited | Using multiple layers of policy management to manage risk |
GB2444514A (en) | 2006-12-04 | 2008-06-11 | Glasswall | Electronic file re-generation |
US7945787B2 (en) * | 2007-04-13 | 2011-05-17 | Computer Associates Think, Inc. | Method and system for detecting malware using a remote server |
US7912894B2 (en) * | 2007-05-15 | 2011-03-22 | Adams Phillip M | Computerized, copy-detection and discrimination apparatus and method |
US10019570B2 (en) | 2007-06-14 | 2018-07-10 | Microsoft Technology Licensing, Llc | Protection and communication abstractions for web browsers |
GB2452479A (en) * | 2007-08-31 | 2009-03-11 | Sony Corp | Content protection through deletion of a decryption key in response to a predetermined event |
US8341736B2 (en) | 2007-10-12 | 2012-12-25 | Microsoft Corporation | Detection and dynamic alteration of execution of potential software threats |
US8353041B2 (en) * | 2008-05-16 | 2013-01-08 | Symantec Corporation | Secure application streaming |
US8732825B2 (en) * | 2008-05-28 | 2014-05-20 | Symantec Corporation | Intelligent hashes for centralized malware detection |
US8745703B2 (en) * | 2008-06-24 | 2014-06-03 | Microsoft Corporation | Identifying exploitation of vulnerabilities using error report |
US8863287B1 (en) * | 2008-06-26 | 2014-10-14 | Emc Corporation | Commonality factoring pattern detection |
US20090328210A1 (en) * | 2008-06-30 | 2009-12-31 | Microsoft Corporation | Chain of events tracking with data tainting for automated security feedback |
US8522200B2 (en) | 2008-08-28 | 2013-08-27 | Microsoft Corporation | Detouring in scripting systems |
US20100058474A1 (en) * | 2008-08-29 | 2010-03-04 | Avg Technologies Cz, S.R.O. | System and method for the detection of malware |
US9122797B2 (en) * | 2008-09-30 | 2015-09-01 | Honeywell International Inc. | Deterministic remote interface unit emulator |
US11489857B2 (en) | 2009-04-21 | 2022-11-01 | Webroot Inc. | System and method for developing a risk profile for an internet resource |
US9087195B2 (en) * | 2009-07-10 | 2015-07-21 | Kaspersky Lab Zao | Systems and methods for detecting obfuscated malware |
JP2013523043A (ja) | 2010-03-22 | 2013-06-13 | エルアールディシー システムズ、エルエルシー | ソースデータセットの完全性を識別及び保護する方法 |
US8082585B1 (en) * | 2010-09-13 | 2011-12-20 | Raymond R. Givonetti | Protecting computers from malware using a hardware solution that is not alterable by any software |
US9058492B1 (en) * | 2011-02-14 | 2015-06-16 | Symantec Corporation | Techniques for reducing executable code vulnerability |
US9032526B2 (en) | 2011-05-12 | 2015-05-12 | Microsoft Technology Licensing, Llc | Emulating mixed-code programs using a virtual machine instance |
US20120331303A1 (en) * | 2011-06-23 | 2012-12-27 | Andersson Jonathan E | Method and system for preventing execution of malware |
JP2014526751A (ja) | 2011-09-15 | 2014-10-06 | ザ・トラスティーズ・オブ・コロンビア・ユニバーシティ・イン・ザ・シティ・オブ・ニューヨーク | リターン指向プログラミングのペイロードを検出するためのシステム、方法、および、非一時的コンピュータ可読媒体 |
CN103257914B (zh) * | 2012-02-16 | 2016-08-17 | 联想(北京)有限公司 | 一种获取电池信息的方法和电子装置 |
US9424427B1 (en) | 2012-03-16 | 2016-08-23 | Bitdefender IPR Management Ltd. | Anti-rootkit systems and methods |
CN104798075A (zh) * | 2012-09-28 | 2015-07-22 | 惠普发展公司,有限责任合伙企业 | 应用随机化 |
US9043906B2 (en) * | 2012-11-28 | 2015-05-26 | William Christopher Hardy | System and method for preventing operation of undetected malware loaded onto a computing device |
RU2514142C1 (ru) | 2012-12-25 | 2014-04-27 | Закрытое акционерное общество "Лаборатория Касперского" | Способ повышения эффективности работы аппаратного ускорения эмуляции приложений |
US9471783B2 (en) * | 2013-03-15 | 2016-10-18 | Mcafee, Inc. | Generic unpacking of applications for malware detection |
US20150007330A1 (en) * | 2013-06-26 | 2015-01-01 | Sap Ag | Scoring security risks of web browser extensions |
GB2518880A (en) | 2013-10-04 | 2015-04-08 | Glasswall Ip Ltd | Anti-Malware mobile content data management apparatus and method |
CA2831711A1 (en) * | 2013-10-31 | 2015-04-30 | Ibm Canada Limited - Ibm Canada Limitee | Performing safe conditional-load and conditional-store operations |
US9330264B1 (en) | 2014-11-26 | 2016-05-03 | Glasswall (Ip) Limited | Statistical analytic method for the determination of the risk posed by file based content |
US10291647B2 (en) | 2015-04-27 | 2019-05-14 | The Johns Hopkins University | Apparatus and method for enabling safe handling of malware |
US10713146B2 (en) * | 2015-06-26 | 2020-07-14 | AVAST Software s.r.o. | Dynamic binary translation and instrumentation with postponed attachment to running native threads |
RU2622627C2 (ru) | 2015-09-30 | 2017-06-16 | Акционерное общество "Лаборатория Касперского" | Способ обнаружения вредоносных исполняемых файлов, содержащих интерпретатор, посредством комбинирования эмуляторов |
US10437998B2 (en) * | 2015-10-26 | 2019-10-08 | Mcafee, Llc | Hardware heuristic-driven binary translation-based execution analysis for return-oriented programming malware detection |
US9858423B2 (en) * | 2016-01-11 | 2018-01-02 | International Business Machines Corporation | Application modification based on a security vulnerability |
US10528734B2 (en) * | 2016-03-25 | 2020-01-07 | The Mitre Corporation | System and method for vetting mobile phone software applications |
US10169581B2 (en) * | 2016-08-29 | 2019-01-01 | Trend Micro Incorporated | Detecting malicious code in sections of computer files |
EP3352110B1 (en) * | 2017-01-23 | 2020-04-01 | Cyphort Inc. | System and method for detecting and classifying malware |
CN107015491B (zh) * | 2017-04-13 | 2019-05-14 | 北京机械设备研究所 | 一种顺序控制方法 |
US11126721B2 (en) * | 2018-06-28 | 2021-09-21 | Intel Corporation | Methods, systems and apparatus to detect polymorphic malware |
US10803174B2 (en) * | 2018-09-15 | 2020-10-13 | Quantum Star Technologies LLC | Bit-level data generation and artificial intelligence techniques and architectures for data protection |
WO2021038705A1 (ja) * | 2019-08-27 | 2021-03-04 | 日本電気株式会社 | バックドア検査装置、バックドア検査方法、及び非一時的なコンピュータ可読媒体 |
CN112527457A (zh) * | 2020-12-11 | 2021-03-19 | 成都云铀子网络科技有限公司 | 一种通用Unicorn模拟指令执行的虚拟机实现方法 |
US20220269784A1 (en) * | 2021-02-25 | 2022-08-25 | Quantum Star Technologies Inc. | N-dimensional model techniques and architectures for data protection |
US11836252B2 (en) | 2021-06-23 | 2023-12-05 | Acronis International Gmbh | Machine learning through iterative memory analysis for malware detection |
US11921850B2 (en) | 2021-06-23 | 2024-03-05 | Acronis International Gmbh | Iterative memory analysis for malware detection |
Family Cites Families (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AU3776793A (en) * | 1992-02-27 | 1993-09-13 | Intel Corporation | Dynamic flow instruction cache memory |
US5398196A (en) * | 1993-07-29 | 1995-03-14 | Chambers; David A. | Method and apparatus for detection of computer viruses |
US5765030A (en) * | 1996-07-19 | 1998-06-09 | Symantec Corp | Processor emulator module having a variable pre-fetch queue size for program execution |
US6067410A (en) * | 1996-02-09 | 2000-05-23 | Symantec Corporation | Emulation repair system |
US5826013A (en) * | 1995-09-28 | 1998-10-20 | Symantec Corporation | Polymorphic virus detection module |
US6330691B1 (en) * | 1996-02-23 | 2001-12-11 | Institute For The Development Of Emerging Architectures Llc | Use of dynamic translation to provide breakpoints in non-writeable object code |
US5732210A (en) * | 1996-03-15 | 1998-03-24 | Hewlett-Packard Company | Use of dynamic translation to provide fast debug event checks |
US5951698A (en) * | 1996-10-02 | 1999-09-14 | Trend Micro, Incorporated | System, apparatus and method for the detection and removal of viruses in macros |
JPH10301772A (ja) * | 1997-04-30 | 1998-11-13 | Sony Corp | 情報処理装置および情報処理方法、並びに記録媒体 |
US6275938B1 (en) * | 1997-08-28 | 2001-08-14 | Microsoft Corporation | Security enhancement for untrusted executable code |
US6357008B1 (en) * | 1997-09-23 | 2002-03-12 | Symantec Corporation | Dynamic heuristic method for detecting computer viruses using decryption exploration and evaluation phases |
US6631514B1 (en) * | 1998-01-06 | 2003-10-07 | Hewlett-Packard Development, L.P. | Emulation system that uses dynamic binary translation and permits the safe speculation of trapping operations |
US6704925B1 (en) * | 1998-09-10 | 2004-03-09 | Vmware, Inc. | Dynamic binary translator with a system and method for updating and maintaining coherency of a translation cache |
US7069583B2 (en) * | 2000-07-14 | 2006-06-27 | Computer Associates Think, Inc. | Detection of polymorphic virus code using dataflow analysis |
US7350235B2 (en) * | 2000-07-14 | 2008-03-25 | Computer Associates Think, Inc. | Detection of decryption to identify encrypted virus |
US20030041315A1 (en) * | 2001-08-21 | 2003-02-27 | International Business Machines Corporation | Debugger with automatic detection of control points influencing program behavior |
US20030101381A1 (en) * | 2001-11-29 | 2003-05-29 | Nikolay Mateev | System and method for virus checking software |
GB2393274B (en) * | 2002-09-20 | 2006-03-15 | Advanced Risc Mach Ltd | Data processing system having an external instruction set and an internal instruction set |
US7367057B2 (en) * | 2003-06-30 | 2008-04-29 | Intel Corporation | Processor based system and method for virus detection |
-
2004
- 2004-12-06 US US11/005,000 patent/US7636856B2/en active Active
-
2005
- 2005-12-05 KR KR1020077008704A patent/KR101213821B1/ko active IP Right Grant
- 2005-12-05 JP JP2007544568A patent/JP4950902B2/ja active Active
- 2005-12-05 EP EP05852859.7A patent/EP1800434B1/en active Active
- 2005-12-05 CN CN2005800385997A patent/CN101438529B/zh not_active Expired - Fee Related
- 2005-12-05 WO PCT/US2005/043773 patent/WO2006062849A2/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
JP2008523471A (ja) | 2008-07-03 |
US20060123244A1 (en) | 2006-06-08 |
US7636856B2 (en) | 2009-12-22 |
EP1800434A4 (en) | 2010-12-29 |
WO2006062849A3 (en) | 2009-04-30 |
CN101438529A (zh) | 2009-05-20 |
EP1800434A2 (en) | 2007-06-27 |
EP1800434B1 (en) | 2017-03-22 |
KR20070083702A (ko) | 2007-08-24 |
KR101213821B1 (ko) | 2012-12-18 |
CN101438529B (zh) | 2011-12-28 |
WO2006062849A2 (en) | 2006-06-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4950902B2 (ja) | ダイナミックトランスレーションによる先取りコンピュータマルウェアの保護 | |
US7624449B1 (en) | Countering polymorphic malicious computer code through code optimization | |
US7367057B2 (en) | Processor based system and method for virus detection | |
US7093239B1 (en) | Computer immune system and method for detecting unwanted code in a computer system | |
Christodorescu et al. | Malware normalization | |
US7836504B2 (en) | On-access scan of memory for malware | |
US7937764B2 (en) | Metamorphic computer virus detection | |
Lakhotia et al. | A method for detecting obfuscated calls in malicious binaries | |
KR20040080843A (ko) | 악성 암호화 스크립트에 대한 분석 및 해독 방법 | |
Christodorescu et al. | Software transformations to improve malware detection | |
US7350235B2 (en) | Detection of decryption to identify encrypted virus | |
EP4332805A1 (en) | Emulation-based malware detection | |
Stepan | Defeating polymorphism: beyond emulation | |
Zhu et al. | Dytaint: The implementation of a novel lightweight 3-state dynamic taint analysis framework for x86 binary programs | |
Geden et al. | RegGuard: Leveraging CPU registers for mitigation of control-and data-oriented attacks | |
Huang et al. | Mitigating Vulnerabilities in Closed Source Software | |
Wu et al. | Efficient and automatic instrumentation for packed binaries | |
Chuan et al. | Design and development of a new scanning core engine for malware detection | |
Peng et al. | Bitmap-Based Security Monitoring for Deeply Embedded Systems | |
Zhang et al. | DRSA: Debug Register-Based Self-relocating Attack Against Software-Based Remote Authentication | |
Středa | Analysis of Virtual Machine based obfuscation | |
Yin | Malware detection and analysis via layered annotative execution | |
Kasina et al. | Detection of polymorphic viruses in windows executables | |
Ganesh | Static analysis of malicious Java applets | |
Notoatmodjo | Detection of Self-Mutating Computer Viruses |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20081119 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20110610 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20110912 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20111007 |
|
A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20120110 |
|
A602 | Written permission of extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A602 Effective date: 20120117 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20120207 |
|
TRDD | Decision of grant or rejection written | ||
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20120302 |
|
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20120309 |
|
FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20150316 Year of fee payment: 3 |
|
R150 | Certificate of patent or registration of utility model |
Ref document number: 4950902 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
S111 | Request for change of ownership or part of ownership |
Free format text: JAPANESE INTERMEDIATE CODE: R313113 |
|
R350 | Written notification of registration of transfer |
Free format text: JAPANESE INTERMEDIATE CODE: R350 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |