JP6563407B2 - 静的逆アセンブリからのapiコールグラフの生成 - Google Patents
静的逆アセンブリからのapiコールグラフの生成 Download PDFInfo
- Publication number
- JP6563407B2 JP6563407B2 JP2016549386A JP2016549386A JP6563407B2 JP 6563407 B2 JP6563407 B2 JP 6563407B2 JP 2016549386 A JP2016549386 A JP 2016549386A JP 2016549386 A JP2016549386 A JP 2016549386A JP 6563407 B2 JP6563407 B2 JP 6563407B2
- Authority
- JP
- Japan
- Prior art keywords
- program
- call
- code
- function
- api
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000003068 static effect Effects 0.000 title description 14
- 230000006870 function Effects 0.000 claims description 71
- 238000000034 method Methods 0.000 claims description 16
- 230000015654 memory Effects 0.000 claims description 7
- 230000006399 behavior Effects 0.000 claims description 5
- 230000002085 persistent effect Effects 0.000 claims description 3
- 238000010586 diagram Methods 0.000 description 12
- 238000012546 transfer Methods 0.000 description 10
- 238000004590 computer program Methods 0.000 description 6
- 238000013459 approach Methods 0.000 description 5
- 238000004891 communication Methods 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 230000000694 effects Effects 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 230000007704 transition Effects 0.000 description 3
- 108091029480 NONCODE Proteins 0.000 description 2
- 230000008676 import Effects 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 238000007792 addition Methods 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 230000001953 sensory effect Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 230000001052 transient effect Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/70—Software maintenance or management
- G06F8/75—Structural analysis for program understanding
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/40—Transformation of program code
- G06F8/53—Decompilation; Disassembly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3409—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment for performance assessment
- G06F11/3414—Workload generation, e.g. scripts, playback
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2201/00—Indexing scheme relating to error detection, to error correction, and to monitoring
- G06F2201/865—Monitoring of software
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Quality & Reliability (AREA)
- Stored Programmes (AREA)
- Debugging And Monitoring (AREA)
Description
システムをプロファイルするほとんどのAPIコールは、APIコールをインターセプトして記録するために、一式のOS導入、及びいくつかのユーザモード又はカーネルモードの機器を備えるバーチャルマシンにおいて、対象のプログラムを実行する。しかし、そのような動的な分析アプローチは、それぞれのバーチャルマシンに要求されるかなりの量のリソースを消費し、したがって、物理的なコンピュータ上で同時に動作し得るバーチャルマシンの数を著しく制限する。さらに、プログラムは、一般的に、リアルタイムに実行され、よってプログラムは、任意の重要なアクティビティを示す前に、発生するいくつかのイベント又は経過するタイムインターバルを待機することがある。このことは、システムが何分もそれぞれの対象のプログラムを動作することを強いられ、又はプログラムが実質的なAPIコールを実行する前に停止する危険を冒し得ることを意味する。
Claims (9)
- プログラムの少なくとも一部を含むデータを受け取るステップと、
プログラムのエントリポイント位置及び実行関連のメタデータを特定して検索するステップであって、エントリポイント位置はオペレーティングシステム又は他のプログラムが実行を開始するプログラムの少なくとも一部分の内部の一つまたは複数の位置に対応し、実行関連のメタデータはコード又はコードの領域がプログラム内に存在するところを記述する、特定して検索するステップと、
特定されたエントリポイント位置及びメタデータに基づいて、プログラム内部のコードの領域を、逆アセンブリを用いて特定するステップと、
複数の関数のそれぞれに対してのエントリポイントを判別するステップと、
複数の関数に対して判別されたエントリポイントに基づいて、それぞれの関数に対する可能性のあるコールシーケンスのセットを生成するステップと、
実行中にプログラムの少なくとも一部が取ることができる可能な経路を推測することを可能にするために、可能なコールシーケンスの生成されたセットを特徴付ける関数コールグラフを生成するステップと、
を含む実行中にプログラムの少なくとも一部が取ることができる可能な経路を推測するためのコンピュータが実行する方法。 - コールシーケンスは、アプリケーション プログラミング インターフェース(API)コールをさらに含む、請求項1に記載の方法。
- コールシーケンスは、プログラムによって実行されるサブ関数をコールすることをさらに含む、請求項2に記載の方法。
- 対応する関数の振る舞いに作用するパラメータ情報を、コールシーケンス内のコールの少なくとも一つに付与するステップをさらに含む、
請求項1から3のいずれか一に記載の方法。 - エントリポイント位置を特定して検索するステップは、
予め規定されるバイトシーケンスについてプログラムをスキャンするステップを含む、
請求項1から4のいずれか一に記載の方法。 - 逆アセンブルが、エミュレーション拡張された逆アセンブリを含む、請求項1から5のいずれか一に記載の方法。
- 機械語を含むプログラムの少なくとも一部を含むデータを受け取るステップと、
機械語を命令に逆アセンブリするステップであって、逆アセンブリすることは、オペレーティングシステム又は他のプログラムが実行を開始するプログラムの少なくとも一部分の内部の一つまたは複数の位置に対応する特定されたエントリポイント位置に基づき、かつ、コード又はコードの領域がプログラム内に存在するところを記述する実行関連のメタデータに基づく、逆アセンブリするステップと、
命令を、コードブロックを含む関数に組成するステップと、
関数を特徴付ける制御フローグラフを構成するステップと、
制御フローグラフを介して、すべての可能性のある経路をトラバースすることによって、アプリケーションプログラミングインターフェース(API)コールシーケンスを抽出するステップと、
APIコール及び子関数コールの相対的な順序を判別するステップと、及び
判別された相対的な順序に従って抽出されるAPIコールシーケンスに基づいて、APIコールグラフを生成するステップと、
を含む方法。 - 命令をストアする持続性の機械可読型媒体であって、
少なくとも一つのコンピュータシステムの一部を形成する少なくとも一つのデータプロセッサによって実行される際に、前記命令は請求項1から7のいずれか一に記載の方法を実装するように稼働する、
持続性の機械可読型媒体。 - 少なくとも一つのデータプロセッサ、及び
命令をストアするメモリを含み、命令は、少なくとも一つのデータプロセッサによって実行される際に、請求項1から7のいずれか一に記載の方法を実装するように稼働する、
システム。
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/169,841 US8930916B1 (en) | 2014-01-31 | 2014-01-31 | Generation of API call graphs from static disassembly |
US14/169,841 | 2014-01-31 | ||
US14/590,788 US9378012B2 (en) | 2014-01-31 | 2015-01-06 | Generation of API call graphs from static disassembly |
US14/590,788 | 2015-01-06 | ||
PCT/US2015/013934 WO2015117013A1 (en) | 2014-01-31 | 2015-01-30 | Generation of api call graphs from static disassembly |
Publications (3)
Publication Number | Publication Date |
---|---|
JP2017504910A JP2017504910A (ja) | 2017-02-09 |
JP2017504910A5 JP2017504910A5 (ja) | 2018-03-01 |
JP6563407B2 true JP6563407B2 (ja) | 2019-08-21 |
Family
ID=52117457
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2016549386A Active JP6563407B2 (ja) | 2014-01-31 | 2015-01-30 | 静的逆アセンブリからのapiコールグラフの生成 |
Country Status (6)
Country | Link |
---|---|
US (3) | US8930916B1 (ja) |
EP (2) | EP3100159B1 (ja) |
JP (1) | JP6563407B2 (ja) |
AU (1) | AU2015210761B2 (ja) |
CA (1) | CA2938265C (ja) |
WO (1) | WO2015117013A1 (ja) |
Families Citing this family (38)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8510596B1 (en) * | 2006-02-09 | 2013-08-13 | Virsec Systems, Inc. | System and methods for run time detection and correction of memory corruption |
WO2014210050A1 (en) | 2013-06-24 | 2014-12-31 | Cylance Inc. | Automated system for generative multimodel multiclass classification and similarity analysis using machine learning |
US8930916B1 (en) | 2014-01-31 | 2015-01-06 | Cylance Inc. | Generation of API call graphs from static disassembly |
US9262296B1 (en) | 2014-01-31 | 2016-02-16 | Cylance Inc. | Static feature extraction from structured files |
AU2015213797B2 (en) | 2014-02-07 | 2019-09-26 | Cylance Inc. | Application execution control utilizing ensemble machine learning for discernment |
US9767004B2 (en) * | 2014-06-16 | 2017-09-19 | Symantec Corporation | Dynamic call tracking method based on CPU interrupt instructions to improve disassembly quality of indirect calls |
CN105320504B (zh) * | 2014-06-25 | 2018-08-17 | 成都普中软件有限公司 | 一种基于软件元视图构造软件视图的可视软件建模方法 |
US9465940B1 (en) | 2015-03-30 | 2016-10-11 | Cylance Inc. | Wavelet decomposition of software entropy to identify malware |
US9495633B2 (en) | 2015-04-16 | 2016-11-15 | Cylance, Inc. | Recurrent neural networks for malware analysis |
US9424112B1 (en) * | 2015-10-01 | 2016-08-23 | Emc Corporation | Execution plan generator and execution engine for interfacing with application programming interfaces |
US9733927B2 (en) * | 2015-11-11 | 2017-08-15 | International Business Machines Corporation | Detection of software or hardware incompatibilities in software packages |
US9602531B1 (en) | 2016-02-16 | 2017-03-21 | Cylance, Inc. | Endpoint-based man in the middle attack detection |
FR3051934A1 (fr) * | 2016-05-24 | 2017-12-01 | Orange | Procede d'identification d'au moins une fonction d'un noyau d'un systeme d'exploitation |
US10681059B2 (en) | 2016-05-25 | 2020-06-09 | CyberOwl Limited | Relating to the monitoring of network security |
US10216954B2 (en) * | 2016-06-27 | 2019-02-26 | International Business Machines Corporation | Privacy detection of a mobile application program |
US10157057B2 (en) * | 2016-08-01 | 2018-12-18 | Syntel, Inc. | Method and apparatus of segment flow trace analysis |
US10261891B2 (en) | 2016-08-05 | 2019-04-16 | International Business Machines Corporation | Automated test input generation for integration testing of microservice-based web applications |
CN106569947A (zh) * | 2016-11-01 | 2017-04-19 | 北京大学(天津滨海)新代信息技术研究院 | 一种从单元测试代码中提取api使用示例的方法与工具 |
US10083029B2 (en) * | 2016-11-09 | 2018-09-25 | Red Hat, Inc. | Detect application defects by correlating contracts in application dependencies |
CN106503558B (zh) * | 2016-11-18 | 2019-02-19 | 四川大学 | 一种基于社团结构分析的Android恶意代码检测方法 |
US10261763B2 (en) * | 2016-12-13 | 2019-04-16 | Palantir Technologies Inc. | Extensible data transformation authoring and validation system |
US10565377B1 (en) * | 2016-12-21 | 2020-02-18 | Palo Alto Networks, Inc. | Context-based analysis of applications |
JP2018109910A (ja) * | 2017-01-05 | 2018-07-12 | 富士通株式会社 | 類似度判定プログラム、類似度判定方法および情報処理装置 |
JP6866645B2 (ja) | 2017-01-05 | 2021-04-28 | 富士通株式会社 | 類似度判定プログラム、類似度判定方法および情報処理装置 |
US10481876B2 (en) * | 2017-01-11 | 2019-11-19 | Microsoft Technology Licensing, Llc | Methods and systems for application rendering |
US20180373865A1 (en) * | 2017-06-26 | 2018-12-27 | Microsoft Technology Licensing, Llc | Call flow-based anomaly detection for layered software systems |
CN111566624A (zh) * | 2018-02-15 | 2020-08-21 | 英特尔公司 | 用于标识调用栈中的不正确信息的技术 |
US10705814B2 (en) * | 2018-11-30 | 2020-07-07 | Grammatech, Inc. | Systems and/or methods for generating reassemblable disassemblies of binaries using declarative logic |
US11163876B2 (en) * | 2019-01-29 | 2021-11-02 | Oracle International Corporation | Guided security analysis |
US11074069B2 (en) * | 2019-06-06 | 2021-07-27 | International Business Machines Corporation | Replaying interactions with transactional and database environments with re-arrangement |
WO2021095188A1 (ja) * | 2019-11-14 | 2021-05-20 | 日本電気株式会社 | 難読化装置、難読化方法および記録媒体 |
US11334360B2 (en) * | 2020-05-06 | 2022-05-17 | Deepbits Technology Inc. | High throughput disassembly system for executable code and applications |
CN112068883B (zh) * | 2020-07-31 | 2022-10-11 | 中国人民解放军战略支援部队信息工程大学 | 精简指令集下大型二进制固件参数个数识别方法 |
US11360877B2 (en) * | 2020-09-14 | 2022-06-14 | International Business Machines Corporation | Forming microservices from monolithic applications |
US20230058452A1 (en) * | 2021-08-17 | 2023-02-23 | Sap Se | Efficient error reproduction scenarios through data transformation |
KR102393795B1 (ko) * | 2021-08-26 | 2022-05-03 | 시큐레터 주식회사 | 응용프로그램의 실행 흐름 변경을 통한 비실행 파일의 악성 탐지 방법 및 장치 |
US12061900B2 (en) | 2022-05-16 | 2024-08-13 | Datastax, Inc. | Web application configuration settings for execution in a cloud computing environment |
KR102642735B1 (ko) * | 2022-12-27 | 2024-03-05 | 쿠팡 주식회사 | Api 호출에 관한 정보를 제공하는 장치, 방법 및 기록매체 |
Family Cites Families (67)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6126329A (en) * | 1993-06-08 | 2000-10-03 | Rational Software Coporation | Method and apparatus for accurate profiling of computer programs |
US5841947A (en) | 1996-07-12 | 1998-11-24 | Nordin; Peter | Computer implemented machine learning method and system |
US6430590B1 (en) | 1999-01-29 | 2002-08-06 | International Business Machines Corporation | Method and apparatus for processing executable program modules having multiple dependencies |
US6546551B1 (en) * | 1999-09-28 | 2003-04-08 | International Business Machines Corporation | Method for accurately extracting library-based object-oriented applications |
US7181768B1 (en) | 1999-10-28 | 2007-02-20 | Cigital | Computer intrusion detection system and method based on application monitoring |
US6898737B2 (en) | 2001-05-24 | 2005-05-24 | Microsoft Corporation | Automatic classification of event data |
US7065764B1 (en) | 2001-07-20 | 2006-06-20 | Netrendered, Inc. | Dynamically allocated cluster system |
AU2003259797A1 (en) | 2002-08-05 | 2004-02-23 | Fish, Robert | System and method of parallel pattern matching |
US7640051B2 (en) | 2003-06-25 | 2009-12-29 | Siemens Medical Solutions Usa, Inc. | Systems and methods for automated diagnosis and decision support for breast imaging |
JP2005044330A (ja) | 2003-07-24 | 2005-02-17 | Univ Of California San Diego | 弱仮説生成装置及び方法、学習装置及び方法、検出装置及び方法、表情学習装置及び方法、表情認識装置及び方法、並びにロボット装置 |
US20060047807A1 (en) | 2004-08-25 | 2006-03-02 | Fujitsu Limited | Method and system for detecting a network anomaly in a network |
US20060112388A1 (en) | 2004-11-22 | 2006-05-25 | Masaaki Taniguchi | Method for dynamic scheduling in a distributed environment |
US7716645B2 (en) * | 2005-06-10 | 2010-05-11 | International Business Machines Corporation | Using atomic sets of memory locations |
US7945902B1 (en) * | 2005-07-13 | 2011-05-17 | Oracle America, Inc. | Detection of non-standard application programming interface usage via analysis of executable code |
US20080134326A2 (en) | 2005-09-13 | 2008-06-05 | Cloudmark, Inc. | Signature for Executable Code |
US8079037B2 (en) * | 2005-10-11 | 2011-12-13 | Knoa Software, Inc. | Generic, multi-instance method and GUI detection system for tracking and monitoring computer applications |
US8443446B2 (en) * | 2006-03-27 | 2013-05-14 | Telecom Italia S.P.A. | Method and system for identifying malicious messages in mobile communication networks, related network and computer program product therefor |
JPWO2007135723A1 (ja) | 2006-05-22 | 2009-09-24 | 富士通株式会社 | ニューラルネットワーク学習装置、方法、及びプログラム |
WO2008055156A2 (en) | 2006-10-30 | 2008-05-08 | The Trustees Of Columbia University In The City Of New York | Methods, media, and systems for detecting an anomalous sequence of function calls |
US8370818B2 (en) * | 2006-12-02 | 2013-02-05 | Time Warner Cable Inc. | Methods and apparatus for analyzing software interface usage |
US20080133571A1 (en) | 2006-12-05 | 2008-06-05 | International Business Machines Corporation | Modifying Behavior in Messaging Systems According to Organizational Hierarchy |
CN101246452B (zh) * | 2007-02-12 | 2010-12-15 | 国际商业机器公司 | 执行快速的mmu模拟的方法和装置、以及全系统模拟器 |
US9009649B2 (en) * | 2007-05-16 | 2015-04-14 | Accenture Global Services Limited | Application search tool for rapid prototyping and development of new applications |
KR100942795B1 (ko) | 2007-11-21 | 2010-02-18 | 한국전자통신연구원 | 악성프로그램 탐지장치 및 그 방법 |
US9032374B2 (en) * | 2008-04-03 | 2015-05-12 | International Business Machines Corporation | Metadata-integrated debugger |
US8347272B2 (en) * | 2008-07-23 | 2013-01-01 | International Business Machines Corporation | Call graph dependency extraction by static source code analysis |
US8504504B2 (en) | 2008-09-26 | 2013-08-06 | Oracle America, Inc. | System and method for distributed denial of service identification and prevention |
US20100082400A1 (en) | 2008-09-29 | 2010-04-01 | Yahoo! Inc.. | Scoring clicks for click fraud prevention |
JP5133192B2 (ja) * | 2008-10-06 | 2013-01-30 | 日本電信電話株式会社 | オリジナルコードの抽出装置、抽出方法、および抽出プログラム |
US8505015B2 (en) | 2008-10-29 | 2013-08-06 | Teradata Us, Inc. | Placing a group work item into every prioritized work queue of multiple parallel processing units based on preferred placement of the work queues |
US20100107245A1 (en) | 2008-10-29 | 2010-04-29 | Microsoft Corporation | Tamper-tolerant programs |
US9239740B2 (en) * | 2009-06-16 | 2016-01-19 | Microsoft Technology Licensing, Llc | Program partitioning across client and cloud |
US8726254B2 (en) * | 2009-06-20 | 2014-05-13 | Microsoft Corporation | Embedded annotation and program analysis |
US8370613B1 (en) | 2009-06-30 | 2013-02-05 | Symantec Corporation | Method and apparatus for automatically optimizing a startup sequence to improve system boot time |
US8560465B2 (en) | 2009-07-02 | 2013-10-15 | Samsung Electronics Co., Ltd | Execution allocation cost assessment for computing systems and environments including elastic computing systems and environments |
US9081958B2 (en) | 2009-08-13 | 2015-07-14 | Symantec Corporation | Using confidence about user intent in a reputation system |
US8516452B2 (en) * | 2009-12-08 | 2013-08-20 | International Business Machines Corporation | Feedback-directed call graph expansion |
US8818923B1 (en) | 2011-06-27 | 2014-08-26 | Hrl Laboratories, Llc | Neural network device with engineered delays for pattern storage and matching |
US8887163B2 (en) | 2010-06-25 | 2014-11-11 | Ebay Inc. | Task scheduling based on dependencies and resources |
US9262228B2 (en) | 2010-09-23 | 2016-02-16 | Microsoft Technology Licensing, Llc | Distributed workflow in loosely coupled computing |
US20120096043A1 (en) * | 2010-10-19 | 2012-04-19 | 7 Degrees, Inc. | Data graph cloud system and method |
US8683449B2 (en) * | 2010-10-28 | 2014-03-25 | Juniper Networks, Inc. | Automated parallel software code impact analysis |
WO2012071989A1 (zh) | 2010-11-29 | 2012-06-07 | 北京奇虎科技有限公司 | 基于机器学习的程序识别方法及装置 |
US8549647B1 (en) | 2011-01-14 | 2013-10-01 | The United States Of America As Represented By The Secretary Of The Air Force | Classifying portable executable files as malware or whiteware |
US9398033B2 (en) | 2011-02-25 | 2016-07-19 | Cavium, Inc. | Regular expression processing automaton |
US9286182B2 (en) | 2011-06-17 | 2016-03-15 | Microsoft Technology Licensing, Llc | Virtual machine snapshotting and analysis |
US8631395B2 (en) * | 2011-09-02 | 2014-01-14 | Microsoft Corporation | Inter-procedural dead catch handler optimizations |
US9329887B2 (en) | 2011-10-19 | 2016-05-03 | Hob Gmbh & Co. Kg | System and method for controlling multiple computer peripheral devices using a generic driver |
US20130152200A1 (en) | 2011-12-09 | 2013-06-13 | Christoph Alme | Predictive Heap Overflow Protection |
CN103186406B (zh) * | 2011-12-30 | 2016-08-17 | 国际商业机器公司 | 用于控制流分析的方法和装置 |
US8713684B2 (en) * | 2012-02-24 | 2014-04-29 | Appthority, Inc. | Quantifying the risks of applications for mobile devices |
US8627291B2 (en) * | 2012-04-02 | 2014-01-07 | International Business Machines Corporation | Identification of localizable function calls |
US9292688B2 (en) | 2012-09-26 | 2016-03-22 | Northrop Grumman Systems Corporation | System and method for automated machine-learning, zero-day malware detection |
US20140180738A1 (en) | 2012-12-21 | 2014-06-26 | Cloudvu, Inc. | Machine learning for systems management |
US9104525B2 (en) * | 2013-01-22 | 2015-08-11 | Microsoft Technology Licensing, Llc | API usage pattern mining |
US9015685B2 (en) * | 2013-03-01 | 2015-04-21 | International Business Machines Corporation | Code analysis for simulation efficiency improvement |
US20140282421A1 (en) * | 2013-03-15 | 2014-09-18 | Microsoft Corporation | Distributed software validation |
US20140358828A1 (en) | 2013-05-29 | 2014-12-04 | Purepredictive, Inc. | Machine learning generated action plan |
US20140372513A1 (en) | 2013-06-12 | 2014-12-18 | Cloudvu, Inc. | Multi-tenant enabling a single-tenant computer program product |
WO2014210050A1 (en) | 2013-06-24 | 2014-12-31 | Cylance Inc. | Automated system for generative multimodel multiclass classification and similarity analysis using machine learning |
EP2833594A1 (en) | 2013-07-31 | 2015-02-04 | Siemens Aktiengesellschaft | Feature based three stage neural networks intrusion detection method and system |
US9798751B2 (en) | 2013-10-16 | 2017-10-24 | University Of Tennessee Research Foundation | Method and apparatus for constructing a neuroscience-inspired artificial neural network |
US9262296B1 (en) | 2014-01-31 | 2016-02-16 | Cylance Inc. | Static feature extraction from structured files |
US8930916B1 (en) | 2014-01-31 | 2015-01-06 | Cylance Inc. | Generation of API call graphs from static disassembly |
US9774654B2 (en) * | 2015-02-02 | 2017-09-26 | Linkedin Corporation | Service call graphs for website performance |
US20160241560A1 (en) * | 2015-02-13 | 2016-08-18 | Instart Logic, Inc. | Client-site dom api access control |
US10810179B2 (en) * | 2015-09-25 | 2020-10-20 | Microsoft Technology Licensing, Llc | Distributed graph database |
-
2014
- 2014-01-31 US US14/169,841 patent/US8930916B1/en active Active
-
2015
- 2015-01-06 US US14/590,788 patent/US9378012B2/en active Active
- 2015-01-30 JP JP2016549386A patent/JP6563407B2/ja active Active
- 2015-01-30 AU AU2015210761A patent/AU2015210761B2/en active Active
- 2015-01-30 EP EP15705164.0A patent/EP3100159B1/en active Active
- 2015-01-30 CA CA2938265A patent/CA2938265C/en active Active
- 2015-01-30 EP EP19213981.4A patent/EP3654177B1/en active Active
- 2015-01-30 WO PCT/US2015/013934 patent/WO2015117013A1/en active Application Filing
-
2016
- 2016-05-27 US US15/167,581 patent/US9921830B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
US8930916B1 (en) | 2015-01-06 |
JP2017504910A (ja) | 2017-02-09 |
AU2015210761A1 (en) | 2016-08-18 |
WO2015117013A1 (en) | 2015-08-06 |
AU2015210761B2 (en) | 2020-11-19 |
US20150220333A1 (en) | 2015-08-06 |
EP3654177A1 (en) | 2020-05-20 |
EP3654177B1 (en) | 2023-06-14 |
CA2938265A1 (en) | 2015-08-06 |
EP3100159B1 (en) | 2020-03-04 |
US9921830B2 (en) | 2018-03-20 |
EP3100159A1 (en) | 2016-12-07 |
US20160274909A1 (en) | 2016-09-22 |
US9378012B2 (en) | 2016-06-28 |
CA2938265C (en) | 2024-02-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6563407B2 (ja) | 静的逆アセンブリからのapiコールグラフの生成 | |
EP2880537B1 (en) | Function evaluation using lightweight process snapshots | |
Safi et al. | Detecting event anomalies in event-based systems | |
EP2972881B1 (en) | Diagnostics of state transitions | |
CN103678506B (zh) | 在浏览器中加载应用程序快捷方式的方法、装置和浏览器 | |
JP2006185211A (ja) | プログラム解析装置、テスト実行装置、その解析方法及びプログラム | |
EP3171275A1 (en) | Transparent process interception | |
JP2020522799A (ja) | コンピュータシステムの脅威検出を改善するためのアプリケーション間依存性分析 | |
Babaei et al. | Efficient reordering and replay of execution traces of distributed reactive systems in the context of model-driven development | |
US8762953B2 (en) | Exception-based error handling in an array-based language | |
Brutschy et al. | Static analysis for independent app developers | |
Chae et al. | Credible, resilient, and scalable detection of software plagiarism using authority histograms | |
EP3506136B1 (en) | Detecting stack cookie utilization in a binary software component using binary static analysis | |
KR102578430B1 (ko) | 바이너리 정적 분석을 통해 얻은 타입 정보를 활용하는 윈도우 커널 퍼징 기법 | |
Dhawan et al. | Enhancing JavaScript with transactions | |
Chae et al. | Effective and efficient detection of software theft via dynamic API authority vectors | |
Mazloom et al. | Dataflow tomography: Information flow tracking for understanding and visualizing full systems | |
Lin et al. | SPADE: Scalable App Digging with Binary Instrumentation and Automated Execution | |
Halfond | Identifying inter-component control flow in web applications | |
CA2878558A1 (en) | Lock free streaming of executable code data | |
Hai et al. | Multi-threaded on-the-fly model generation of malware with hash compaction | |
Bania | Dynamic Data Flow Analysis via Virtual Code Integration (aka The SpiderPig case) | |
EP3906474A1 (en) | Data breakpoints on certain kinds of functions |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20180119 |
|
A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20180119 |
|
A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20181227 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20190115 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20190328 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20190423 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20190611 |
|
TRDD | Decision of grant or rejection written | ||
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20190625 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20190724 |
|
R150 | Certificate of patent or registration of utility model |
Ref document number: 6563407 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |