JP6468732B2 - ウィンドウのない状態での画面キャプチャを防止するための方法及びシステム - Google Patents
ウィンドウのない状態での画面キャプチャを防止するための方法及びシステム Download PDFInfo
- Publication number
- JP6468732B2 JP6468732B2 JP2014110778A JP2014110778A JP6468732B2 JP 6468732 B2 JP6468732 B2 JP 6468732B2 JP 2014110778 A JP2014110778 A JP 2014110778A JP 2014110778 A JP2014110778 A JP 2014110778A JP 6468732 B2 JP6468732 B2 JP 6468732B2
- Authority
- JP
- Japan
- Prior art keywords
- computer
- screen capture
- window
- whitelist
- preventing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims description 75
- 238000013500 data storage Methods 0.000 claims description 3
- 238000010586 diagram Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 230000026676 system process Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/032—Protect output to user by software means
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- User Interface Of Digital Computer (AREA)
Description
悪意あるプロセスと悪意ないプロセスとの区別
悪意あるプロセスの例は、最近発見されたFAKEM RAT(http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-fakem-rat.pdf)である。これは、それ自体のプロセスを使用し(「マルウェアは通常、名前tpframe.exeを使用して、%System%フォルダにそれ自体をコピーする」)、スクリーンショットをとることができる(「デスクトップのスナップショットをとる」)。
22 ソフトウェアエージェント
24 OS
26 データ記憶ユニット
28 データネットワーク
Claims (5)
- 画面キャプチャ手法の使用を介したマルウェアによるデータ取得を防止する方法であって、
コンピュータ上でプロセスを分析するソフトウェアエージェントを動作させるステップと、
ウィンドウを開かない悪意ないプロセスのホワイトリストを記憶するステップと、
前記ソフトウェアエージェントが前記コンピュータ上で実行されるプロセスが前記ホワイトリスト上にリストされているかどうか判定するステップと、
前記プロセスがホワイトリスト中にない場合、前記プロセスが未確認プロセスであると判定するステップと、
前記未確認プロセスがウィンドウを開かない場合、前記未確認プロセスが画面キャプチャを実施するのを阻止するステップと
を含む方法。 - 前記ホワイトリストが外部入力もしくは前記コンピュータ内で生成されたデータに従って更新される、動的リストである、請求項1に記載の方法。
- 請求項1〜2の何れか1項に記載の方法の各ステップのそれぞれをコンピュータに実行させるプログラムをコンピュータ可読媒体に記録した、コンピュータ可読記録媒体。
- 画面キャプチャの使用を介したマルウェアによるデータ取得を防止するためのコンピュータシステムであって、
ウィンドウを開かない悪意ないプロセスのホワイトリストを収容するデータ記憶ユニットと、
コンピュータ上でプロセスを分析するソフトウェアエージェントを備え、
前記ソフトウェアエージェントが、
前記コンピュータ上で実行されるプロセスが前記ホワイトリスト上にリストされているかどうか判定する手段と、
前記プロセスがホワイトリスト中にない場合、前記プロセスが未確認プロセスであると判定する手段と、
前記未確認プロセスがウィンドウを開かない場合、前記未確認プロセスが画面キャプチャを実施するのを阻止する手段と
を具備する、システム。 - 前記ホワイトリストが外部入力もしくは前記コンピュータ内で生成されたデータに従って更新される、動的リストである、請求項4に記載のシステム。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/905,650 | 2013-05-30 | ||
US13/905,650 US9323925B2 (en) | 2013-05-30 | 2013-05-30 | Method and system for prevention of windowless screen capture |
Publications (2)
Publication Number | Publication Date |
---|---|
JP2014235745A JP2014235745A (ja) | 2014-12-15 |
JP6468732B2 true JP6468732B2 (ja) | 2019-02-13 |
Family
ID=50841649
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2014110778A Active JP6468732B2 (ja) | 2013-05-30 | 2014-05-29 | ウィンドウのない状態での画面キャプチャを防止するための方法及びシステム |
Country Status (3)
Country | Link |
---|---|
US (1) | US9323925B2 (ja) |
EP (1) | EP2808822A1 (ja) |
JP (1) | JP6468732B2 (ja) |
Families Citing this family (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7231050B1 (en) * | 2000-07-21 | 2007-06-12 | Harris Scott C | Protection against unintentional file changing |
US9392003B2 (en) | 2012-08-23 | 2016-07-12 | Raytheon Foreground Security, Inc. | Internet security cyber threat reporting system and method |
US9940637B2 (en) | 2015-06-05 | 2018-04-10 | Apple Inc. | User interface for loyalty accounts and private label accounts |
US10271084B2 (en) * | 2015-06-07 | 2019-04-23 | Apple Inc. | Video recording and replay |
JP2017010504A (ja) * | 2015-06-25 | 2017-01-12 | 株式会社エネサイバー | 情報の漏洩改竄防止装置 |
US11580608B2 (en) | 2016-06-12 | 2023-02-14 | Apple Inc. | Managing contact information for communication applications |
RU2634168C1 (ru) | 2016-07-29 | 2017-10-24 | Акционерное общество "Лаборатория Касперского" | Система и способ блокирования доступа к защищаемым приложениям |
JP6437970B2 (ja) * | 2016-08-25 | 2018-12-12 | ソフトバンク株式会社 | 情報処理装置及びプログラム |
US10425445B2 (en) * | 2016-12-15 | 2019-09-24 | Interwise Ltd | Deception using screen capture |
DK201870378A1 (en) | 2018-05-07 | 2020-01-13 | Apple Inc. | DISPLAYING USER INTERFACES ASSOCIATED WITH PHYSICAL ACTIVITIES |
CN110096324B (zh) * | 2019-04-22 | 2022-11-25 | 四川易简天下科技股份有限公司 | 一种基于windows系统的自动过滤自身窗口的高效抓屏方法 |
DK201970530A1 (en) | 2019-05-06 | 2021-01-28 | Apple Inc | Avatar integration with multiple applications |
US11039074B1 (en) | 2020-06-01 | 2021-06-15 | Apple Inc. | User interfaces for managing media |
US11514161B2 (en) * | 2020-09-11 | 2022-11-29 | Mcafee, Llc | Method and apparatus for detecting malware via analysis of a screen capture |
CN112417533A (zh) * | 2020-11-26 | 2021-02-26 | 江苏通付盾信息安全技术有限公司 | 防截屏方法、装置、计算机设备和存储介质 |
CN113486413A (zh) * | 2021-07-23 | 2021-10-08 | 统信软件技术有限公司 | 一种防截屏处理方法、计算设备及可读存储介质 |
Family Cites Families (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6108799A (en) * | 1997-11-21 | 2000-08-22 | International Business Machines Corporation | Automated sample creation of polymorphic and non-polymorphic marcro viruses |
US6925638B1 (en) * | 2000-09-21 | 2005-08-02 | International Business Machines Corporation | Mutability analysis in Java |
US10043008B2 (en) * | 2004-10-29 | 2018-08-07 | Microsoft Technology Licensing, Llc | Efficient white listing of user-modifiable files |
US20060253584A1 (en) * | 2005-05-03 | 2006-11-09 | Dixon Christopher J | Reputation of an entity associated with a content item |
US7730040B2 (en) * | 2005-07-27 | 2010-06-01 | Microsoft Corporation | Feedback-driven malware detector |
US7818800B1 (en) | 2005-08-05 | 2010-10-19 | Symantec Corporation | Method, system, and computer program product for blocking malicious program behaviors |
JP4214280B2 (ja) * | 2006-08-30 | 2009-01-28 | クオリティ株式会社 | ソフトウエア管理システム,管理サーバおよび管理プログラム |
US8225404B2 (en) * | 2008-01-22 | 2012-07-17 | Wontok, Inc. | Trusted secure desktop |
JP2010262609A (ja) * | 2009-04-28 | 2010-11-18 | Fourteenforty Research Institute Inc | 効率的なマルウェアの動的解析手法 |
KR101122646B1 (ko) * | 2010-04-28 | 2012-03-09 | 한국전자통신연구원 | 위장 가상 머신 정보를 이용한 인텔리전트 봇 대응 방법 및 장치 |
US9413721B2 (en) * | 2011-02-15 | 2016-08-09 | Webroot Inc. | Methods and apparatus for dealing with malware |
CN102394859B (zh) | 2011-07-27 | 2014-05-14 | 哈尔滨安天科技股份有限公司 | 基于线程行为的木马窃取文件检测方法和系统 |
-
2013
- 2013-05-30 US US13/905,650 patent/US9323925B2/en active Active
-
2014
- 2014-05-29 JP JP2014110778A patent/JP6468732B2/ja active Active
- 2014-05-30 EP EP14170651.5A patent/EP2808822A1/en not_active Withdrawn
Also Published As
Publication number | Publication date |
---|---|
US9323925B2 (en) | 2016-04-26 |
JP2014235745A (ja) | 2014-12-15 |
US20140359766A1 (en) | 2014-12-04 |
EP2808822A1 (en) | 2014-12-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6468732B2 (ja) | ウィンドウのない状態での画面キャプチャを防止するための方法及びシステム | |
EP3430556B1 (en) | System and method for process hollowing detection | |
US10893068B1 (en) | Ransomware file modification prevention technique | |
JP6829718B2 (ja) | 複数のソフトウェアエンティティにわたって悪意あるビヘイビアを追跡するためのシステムおよび方法 | |
Baliga et al. | Detecting kernel-level rootkits using data structure invariants | |
US9336390B2 (en) | Selective assessment of maliciousness of software code executed in the address space of a trusted process | |
US8181264B2 (en) | Method and apparatus for deferred security analysis | |
US8590045B2 (en) | Malware detection by application monitoring | |
RU2522019C1 (ru) | Система и способ обнаружения угроз в коде, исполняемом виртуальной машиной | |
JP6388485B2 (ja) | マルウェア発見方法及びシステム | |
US8984629B2 (en) | Apparatus and method for preemptively protecting against malicious code by selective virtualization | |
US20140053267A1 (en) | Method for identifying malicious executables | |
US8904538B1 (en) | Systems and methods for user-directed malware remediation | |
JP2017527931A (ja) | マルウェア検出の方法及びそのシステム | |
US9104860B2 (en) | Systems, methods and media for managing process image hijacks | |
JP2019521400A (ja) | 推測的なエクスプロイトの試みの検出 | |
US20100037033A1 (en) | Exploit nonspecific host intrusion prevention/detection methods and systems and smart filters therefor | |
Barabosch et al. | Host-based code injection attacks: A popular technique used by malware | |
US20180373872A1 (en) | Mitigation of Malicious Actions Associated with Graphical User Interface Elements | |
US20160352748A1 (en) | Method for blocking unauthorized data access and computing device with feature of blocking unauthorized data access | |
US20200218832A1 (en) | Automatic Initiation of Execution Analysis | |
EP2881883B1 (en) | System and method for reducing load on an operating system when executing antivirus operations | |
Eresheim et al. | On the impact of kernel code vulnerabilities in iot devices | |
Alshaikh et al. | Crypto-Ransomware Detection and Prevention Techniques and Tools A Survey | |
Tokhtabayev et al. | Malware analysis and detection via activity trees in user-dependent environment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
RD03 | Notification of appointment of power of attorney |
Free format text: JAPANESE INTERMEDIATE CODE: A7423 Effective date: 20161122 |
|
A711 | Notification of change in applicant |
Free format text: JAPANESE INTERMEDIATE CODE: A711 Effective date: 20170106 |
|
A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20170411 |
|
A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20180216 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20180327 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20180611 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20180911 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20181205 |
|
TRDD | Decision of grant or rejection written | ||
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20181220 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20190115 |
|
R150 | Certificate of patent or registration of utility model |
Ref document number: 6468732 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |