KR102419574B1 - 컴퓨터 애플리케이션에서 메모리 손상을 교정하기 위한 시스템 및 방법 - Google Patents
컴퓨터 애플리케이션에서 메모리 손상을 교정하기 위한 시스템 및 방법 Download PDFInfo
- Publication number
- KR102419574B1 KR102419574B1 KR1020197001449A KR20197001449A KR102419574B1 KR 102419574 B1 KR102419574 B1 KR 102419574B1 KR 1020197001449 A KR1020197001449 A KR 1020197001449A KR 20197001449 A KR20197001449 A KR 20197001449A KR 102419574 B1 KR102419574 B1 KR 102419574B1
- Authority
- KR
- South Korea
- Prior art keywords
- computer
- computer application
- application
- code
- routine
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/48—Program initiating; Program switching, e.g. by interrupt
- G06F9/4806—Task transfer initiation or dispatching
- G06F9/4843—Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system
- G06F9/485—Task life-cycle, e.g. stopping, restarting, resuming execution
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Debugging And Monitoring (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US201662350917P | 2016-06-16 | 2016-06-16 | |
| US62/350,917 | 2016-06-16 | ||
| PCT/US2017/037841 WO2017218872A1 (en) | 2016-06-16 | 2017-06-16 | Systems and methods for remediating memory corruption in a computer application |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| KR20190035686A KR20190035686A (ko) | 2019-04-03 |
| KR102419574B1 true KR102419574B1 (ko) | 2022-07-11 |
Family
ID=59276839
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| KR1020197001449A Active KR102419574B1 (ko) | 2016-06-16 | 2017-06-16 | 컴퓨터 애플리케이션에서 메모리 손상을 교정하기 위한 시스템 및 방법 |
Country Status (7)
| Country | Link |
|---|---|
| US (1) | US11409870B2 (enExample) |
| EP (1) | EP3472746B1 (enExample) |
| JP (1) | JP6949951B2 (enExample) |
| KR (1) | KR102419574B1 (enExample) |
| AU (1) | AU2017285429B2 (enExample) |
| CA (1) | CA3027728A1 (enExample) |
| WO (1) | WO2017218872A1 (enExample) |
Families Citing this family (39)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8510596B1 (en) | 2006-02-09 | 2013-08-13 | Virsec Systems, Inc. | System and methods for run time detection and correction of memory corruption |
| WO2015038944A1 (en) | 2013-09-12 | 2015-03-19 | Virsec Systems, Inc. | Automated runtime detection of malware |
| EP3161715A1 (en) | 2014-06-24 | 2017-05-03 | Virsec Systems, Inc. | System and methods for automated detection of input and output validation and resource management vulnerability |
| US9710648B2 (en) | 2014-08-11 | 2017-07-18 | Sentinel Labs Israel Ltd. | Method of malware detection and system thereof |
| US11507663B2 (en) | 2014-08-11 | 2022-11-22 | Sentinel Labs Israel Ltd. | Method of remediating operations performed by a program and system thereof |
| US11409870B2 (en) | 2016-06-16 | 2022-08-09 | Virsec Systems, Inc. | Systems and methods for remediating memory corruption in a computer application |
| US10193762B2 (en) * | 2016-08-11 | 2019-01-29 | Rescale, Inc. | Dynamic optimization of simulation resources |
| US12135989B2 (en) | 2016-08-11 | 2024-11-05 | Rescale, Inc. | Compute recommendation engine |
| US10387198B2 (en) | 2016-08-11 | 2019-08-20 | Rescale, Inc. | Integrated multi-provider compute platform |
| US11695800B2 (en) | 2016-12-19 | 2023-07-04 | SentinelOne, Inc. | Deceiving attackers accessing network data |
| JP2020530922A (ja) | 2017-08-08 | 2020-10-29 | センチネル ラボ, インコーポレイテッドSentinel Labs, Inc. | エッジネットワーキングのエンドポイントを動的にモデリングおよびグループ化する方法、システム、およびデバイス |
| KR101904911B1 (ko) * | 2017-10-13 | 2018-10-08 | 한국인터넷진흥원 | 하이브리드 퍼징 기반 보안 취약점 자동 탐색 방법 및 그 장치 |
| US10296302B1 (en) * | 2017-11-06 | 2019-05-21 | General Electric Company | One-click deployment of industrial software |
| JP7284761B2 (ja) | 2018-01-12 | 2023-05-31 | ヴァーセック・システムズ・インコーポレーテッド | 投機的実行のエクスプロイトに対する防御 |
| US10902130B2 (en) * | 2018-02-18 | 2021-01-26 | Fujitsu Limited | Guiding automated testing of binary programs |
| US10735262B1 (en) * | 2018-04-26 | 2020-08-04 | Intuit Inc. | System and method for self-orchestrated canary release deployment within an API gateway architecture |
| US10983923B2 (en) * | 2018-10-29 | 2021-04-20 | Sternum Ltd. | Dynamic memory protection |
| JP7278423B2 (ja) * | 2019-05-20 | 2023-05-19 | センチネル ラブス イスラエル リミテッド | 実行可能コード検出、自動特徴抽出及び位置独立コード検出のためのシステム及び方法 |
| CN110275722B (zh) | 2019-06-21 | 2023-08-08 | 北京百度网讯科技有限公司 | 用于升级应用的方法、装置、设备和存储介质 |
| CN110457909B (zh) * | 2019-08-15 | 2024-05-28 | 腾讯科技(深圳)有限公司 | 虚拟机内存的漏洞修复方法、装置及计算机设备 |
| CN115104097A (zh) * | 2020-01-28 | 2022-09-23 | C2A安全有限公司 | 控制流完整性系统和方法 |
| US11403092B2 (en) * | 2020-07-09 | 2022-08-02 | Microsoft Technology Licensing, Llc | System compliance based on a mix of hotpatches and coldpatches |
| US12205021B1 (en) | 2020-07-17 | 2025-01-21 | State Farm Mutual Automobile Insurance Company | Systems and methods for analyzing a technical event |
| US11816211B2 (en) | 2020-07-31 | 2023-11-14 | RunSafe Security, Inc. | Active signaling in response to attacks on a transformed binary |
| US12158958B2 (en) | 2020-08-27 | 2024-12-03 | Virsec Systems, Inc. | Web attack simulator |
| CA3190145A1 (en) | 2020-08-27 | 2022-03-03 | Satya V. Gupta | Automated application vulnerability and risk assessment |
| US11886599B2 (en) * | 2020-09-29 | 2024-01-30 | Dynatrace Llc | Method and system for data flow monitoring to identify application security vulnerabilities and to detect and prevent attacks |
| EP4272100A1 (en) | 2020-12-31 | 2023-11-08 | Virsec Systems, Inc. | Automated detection of cross site scripting attacks |
| US12282552B2 (en) | 2021-05-18 | 2025-04-22 | Virsec Systems, Inc. | Quantification of cyber risk in application workloads |
| US11899782B1 (en) | 2021-07-13 | 2024-02-13 | SentinelOne, Inc. | Preserving DLL hooks |
| US12174965B2 (en) * | 2021-11-05 | 2024-12-24 | Blackberry Limited | Identifying application program interface use in a binary code |
| US12182271B2 (en) * | 2021-11-05 | 2024-12-31 | Blackberry Limited | Detecting software vulnerabilities in a binary code |
| CN114244620B (zh) * | 2021-12-24 | 2023-06-09 | 湖南云箭智能科技有限公司 | 一种板卡入网验证方法、装置及板卡控制中心 |
| CN114595461B (zh) * | 2022-02-15 | 2024-07-16 | 阿里云计算有限公司 | 一种数据处理的方法和装置 |
| US12452273B2 (en) | 2022-03-30 | 2025-10-21 | SentinelOne, Inc | Systems, methods, and devices for preventing credential passing attacks |
| US20230333835A1 (en) * | 2022-04-19 | 2023-10-19 | Bank Of America Corporation | System and method for dynamic code patch deployment within a distributed network |
| US12477364B2 (en) | 2022-10-13 | 2025-11-18 | T-Mobile Usa, Inc. | Monitoring operation of multiple components associated with a wireless telecommunication network |
| WO2024152041A1 (en) | 2023-01-13 | 2024-07-18 | SentinelOne, Inc. | Classifying cybersecurity threats using machine learning on non-euclidean data |
| US12340211B2 (en) | 2023-03-03 | 2025-06-24 | The Mitre Corporation | Systems and methods for real-time binary analysis with hot patching of programmable logic controllers |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20080016339A1 (en) * | 2006-06-29 | 2008-01-17 | Jayant Shukla | Application Sandbox to Detect, Remove, and Prevent Malware |
| WO2015038944A1 (en) * | 2013-09-12 | 2015-03-19 | Virsec Systems, Inc. | Automated runtime detection of malware |
| WO2015200046A1 (en) * | 2014-06-27 | 2015-12-30 | Qualcomm Incorporated | Dynamic patching of multiple, functionally equivalent variations of various software modules for security reasons |
Family Cites Families (227)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US4215406A (en) | 1972-08-22 | 1980-07-29 | Westinghouse Electric Corp. | Digital computer monitored and/or operated system or process which is structured for operation with an improved automatic programming process and system |
| US4080650A (en) | 1976-07-28 | 1978-03-21 | Bell Telephone Laboratories, Incorporated | Facilitating return from an on-line debugging program to a target program breakpoint |
| US4466077A (en) | 1981-09-25 | 1984-08-14 | International Business Machines Corporation | Method and apparatus for division employing associative memory |
| JPS59216249A (ja) | 1983-05-23 | 1984-12-06 | Toshiba Corp | 集積回路装置 |
| GB8511995D0 (en) | 1985-05-11 | 1985-06-19 | Ross S R | Software protection |
| US4803720A (en) | 1986-09-22 | 1989-02-07 | International Business Machines Corporation | Dual plane cross point switch architecture for a micro-PBX |
| US5224160A (en) | 1987-02-23 | 1993-06-29 | Siemens Nixdorf Informationssysteme Ag | Process for securing and for checking the integrity of the secured programs |
| US4910663A (en) | 1987-07-10 | 1990-03-20 | Tandem Computers Incorporated | System for measuring program execution by replacing an executable instruction with interrupt causing instruction |
| US5222220A (en) | 1989-11-16 | 1993-06-22 | Mehta Hemang S | Microprocessor stack built-in guards |
| US5179702A (en) | 1989-12-29 | 1993-01-12 | Supercomputer Systems Limited Partnership | System and method for controlling a highly parallel multiprocessor using an anarchy based scheduler for parallel execution thread scheduling |
| US5161193A (en) | 1990-06-29 | 1992-11-03 | Digital Equipment Corporation | Pipelined cryptography processor and method for its use in communication networks |
| JP2839201B2 (ja) | 1990-07-30 | 1998-12-16 | 株式会社日立製作所 | 仮想計算機システム |
| US5235551A (en) | 1991-01-08 | 1993-08-10 | Pacific Data Products, Inc. | Memory addressing scheme |
| US5297274A (en) | 1991-04-15 | 1994-03-22 | International Business Machines Corporation | Performance analysis of program in multithread OS by creating concurrently running thread generating breakpoint interrupts to active tracing monitor |
| US5321828A (en) | 1991-06-07 | 1994-06-14 | Step Engineering | High speed microcomputer in-circuit emulator |
| US5359659A (en) | 1992-06-19 | 1994-10-25 | Doren Rosenthal | Method for securing software against corruption by computer viruses |
| US5440723A (en) | 1993-01-19 | 1995-08-08 | International Business Machines Corporation | Automatic immune system for computers and computer networks |
| US5784552A (en) | 1993-07-28 | 1998-07-21 | Digital Equipment Corporation | Debugging a computer program by simulating execution forwards and backwards in a main history log and alternative history logs |
| US5611043A (en) | 1994-03-18 | 1997-03-11 | Borland International, Inc. | Debugger system and method for controlling child processes |
| US5533192A (en) | 1994-04-21 | 1996-07-02 | Apple Computer, Inc. | Computer program debugging system and method |
| US5630048A (en) | 1994-05-19 | 1997-05-13 | La Joie; Leslie T. | Diagnostic system for run-time monitoring of computer operations |
| JP3360933B2 (ja) | 1994-06-01 | 2003-01-07 | 富士通株式会社 | 情報処理システムにおける記憶制御方法および記憶制御装置 |
| US5826012A (en) | 1995-04-21 | 1998-10-20 | Lettvin; Jonathan D. | Boot-time anti-virus and maintenance facility |
| US5680542A (en) | 1995-06-07 | 1997-10-21 | Motorola, Inc. | Method and apparatus for synchronizing data in a host memory with data in target MCU memory |
| US5684948A (en) | 1995-09-01 | 1997-11-04 | National Semiconductor Corporation | Memory management circuit which provides simulated privilege levels |
| US6151618A (en) | 1995-12-04 | 2000-11-21 | Microsoft Corporation | Safe general purpose virtual machine computing system |
| US5909580A (en) | 1996-02-08 | 1999-06-01 | Inprise Corporation | Development system and methods with direct compiler support for detecting invalid use and management of resources and memory at runtime |
| US6119206A (en) | 1996-02-12 | 2000-09-12 | Sun Microsystems, Inc. | Design of tags for lookup of non-volatile registers |
| JPH09282180A (ja) * | 1996-04-11 | 1997-10-31 | Sony Corp | データ処理装置 |
| DE69704004T2 (de) | 1996-06-19 | 2001-06-07 | Matsushita Electric Industrial Co., Ltd. | Vorrichtung zur Programmfehlerbeseitigung |
| US5850559A (en) | 1996-08-07 | 1998-12-15 | Compaq Computer Corporation | Method and apparatus for secure execution of software prior to a computer system being powered down or entering a low energy consumption mode |
| US6314558B1 (en) | 1996-08-27 | 2001-11-06 | Compuware Corporation | Byte code instrumentation |
| GB9626401D0 (en) | 1996-12-19 | 1997-02-05 | Sgs Thomson Microelectronics | Diagnostic procedures in an integrated circuit device |
| US5873124A (en) | 1997-02-06 | 1999-02-16 | Microsoft Corporation | Virtual memory scratch pages |
| US5890005A (en) | 1997-06-02 | 1999-03-30 | Nokia Mobile Phones Limited | Low power, low interconnect complexity microprocessor and memory interface |
| JP2001515244A (ja) | 1997-09-05 | 2001-09-18 | サン・マイクロシステムズ・インコーポレーテッド | スケーリング可能な共用メモリ・マルチプロセッサ・システム |
| US5983348A (en) | 1997-09-10 | 1999-11-09 | Trend Micro Incorporated | Computer network malicious code scanner |
| US6237137B1 (en) | 1997-10-15 | 2001-05-22 | Dell Usa, L.P. | Method and system for preventing unauthorized access to a computer program |
| US6263489B1 (en) | 1998-04-30 | 2001-07-17 | Hewlett-Packard Company | Method and apparatus for debugging of optimized code |
| US6077312A (en) | 1998-05-06 | 2000-06-20 | International Business Machines Corporation | Apparatus, program product and method of debugging utilizing a context sensitive breakpoint |
| US6178522B1 (en) | 1998-06-02 | 2001-01-23 | Alliedsignal Inc. | Method and apparatus for managing redundant computer-based systems for fault tolerant computing |
| US6553429B1 (en) | 1998-06-05 | 2003-04-22 | Microsoft Corporation | Fast conditional thunk utility |
| US6275893B1 (en) | 1998-09-14 | 2001-08-14 | Compaq Computer Corporation | Method and apparatus for providing seamless hooking and intercepting of selected kernel and HAL exported entry points in an operating system |
| US6665316B1 (en) | 1998-09-29 | 2003-12-16 | Agilent Technologies, Inc. | Organization of time synchronization in a distributed system |
| EP0992906B1 (en) | 1998-10-06 | 2005-08-03 | Texas Instruments Inc. | Apparatus and method for software breakpoint in a delay slot |
| US7380245B1 (en) | 1998-11-23 | 2008-05-27 | Samsung Electronics Co., Ltd. | Technique for detecting corruption associated with a stack in a storage device |
| US6782478B1 (en) | 1999-04-28 | 2004-08-24 | Thomas Probert | Techniques for encoding information in computer code |
| US6981176B2 (en) | 1999-05-10 | 2005-12-27 | Delphi Technologies, Inc. | Secured microcontroller architecture |
| US7430670B1 (en) | 1999-07-29 | 2008-09-30 | Intertrust Technologies Corp. | Software self-defense systems and methods |
| WO2001022228A1 (en) | 1999-09-17 | 2001-03-29 | Nortel Networks Limited | System and method for producing a verification system for verifying procedure interfaces |
| US6745160B1 (en) | 1999-10-08 | 2004-06-01 | Nec Corporation | Verification of scheduling in the presence of loops using uninterpreted symbolic simulation |
| US20020009198A1 (en) | 2000-01-18 | 2002-01-24 | Lipton Richard J. | Method and systems for data security |
| JP3552627B2 (ja) | 2000-02-04 | 2004-08-11 | インターナショナル・ビジネス・マシーンズ・コーポレーション | スタック保護システム、コンピュータシステム、コンパイラ、スタック保護方法および記憶媒体 |
| US7376820B2 (en) | 2000-03-16 | 2008-05-20 | Fujitsu Limited | Information processing unit, and exception processing method for specific application-purpose operation instruction |
| US6775780B1 (en) | 2000-03-16 | 2004-08-10 | Networks Associates Technology, Inc. | Detecting malicious software by analyzing patterns of system calls generated during emulation |
| US6973577B1 (en) | 2000-05-26 | 2005-12-06 | Mcafee, Inc. | System and method for dynamically detecting computer viruses through associative behavioral analysis of runtime state |
| US7539875B1 (en) | 2000-06-27 | 2009-05-26 | Microsoft Corporation | Secure repository with layers of tamper resistance and system and method for providing same |
| US6895508B1 (en) | 2000-09-07 | 2005-05-17 | International Business Machines Corporation | Stack memory protection |
| US6832373B2 (en) | 2000-11-17 | 2004-12-14 | Bitfone Corporation | System and method for updating and distributing information |
| US7260845B2 (en) | 2001-01-09 | 2007-08-21 | Gabriel Kedma | Sensor for detecting and eliminating inter-process memory breaches in multitasking operating systems |
| US6848044B2 (en) | 2001-03-08 | 2005-01-25 | International Business Machines Corporation | Circuits and methods for recovering link stack data upon branch instruction mis-speculation |
| US20020138554A1 (en) | 2001-03-26 | 2002-09-26 | Motorola, Inc. | Method for remotely verifying software integrity |
| US6993751B2 (en) | 2001-05-14 | 2006-01-31 | Microsoft Corporation | Placing exception throwing instructions in compiled code |
| JP3702815B2 (ja) | 2001-07-12 | 2005-10-05 | 日本電気株式会社 | プロセッサ間レジスタ継承方法及びその装置 |
| US20030014667A1 (en) | 2001-07-16 | 2003-01-16 | Andrei Kolichtchak | Buffer overflow attack detection and suppression |
| US7421587B2 (en) | 2001-07-26 | 2008-09-02 | Mcafee, Inc. | Detecting computer programs within packed computer files |
| US20030188160A1 (en) | 2001-08-02 | 2003-10-02 | Singam Sunder | Method and system to securely update files via a network |
| US7257763B1 (en) | 2001-08-03 | 2007-08-14 | Netlogic Microsystems, Inc. | Content addressable memory with error signaling |
| GB2378778B (en) | 2001-08-13 | 2005-03-23 | Ibm | Computer system with heap and card table |
| EP1246033A1 (de) | 2001-08-23 | 2002-10-02 | Siemens Aktiengesellschaft | Verfahren zur Überwachung konsistenter Speicherinhalte in redundanten Systemen |
| US7853803B2 (en) | 2001-09-28 | 2010-12-14 | Verizon Corporate Services Group Inc. | System and method for thwarting buffer overflow attacks using encrypted process pointers |
| US7526654B2 (en) | 2001-10-16 | 2009-04-28 | Marc Charbonneau | Method and system for detecting a secure state of a computer system |
| US20030079158A1 (en) | 2001-10-23 | 2003-04-24 | Tower James Brian | Secured digital systems and a method and software for operating the same |
| US6832302B1 (en) | 2001-10-24 | 2004-12-14 | At&T Corp. | Methods and apparatus for detecting heap smashing |
| US6668313B2 (en) | 2001-12-21 | 2003-12-23 | Agere Systems, Inc. | Memory system for increased bandwidth |
| US7076629B2 (en) | 2001-12-26 | 2006-07-11 | Bonola Thomas J | Method for providing concurrent non-blocking heap memory management for fixed sized blocks |
| US7168008B2 (en) | 2002-01-18 | 2007-01-23 | Mobitv, Inc. | Method and system for isolating and protecting software components |
| ATE263391T1 (de) | 2002-03-26 | 2004-04-15 | Soteres Gmbh | Verfahren zum schutz der integrität von programmen |
| US7228426B2 (en) | 2002-04-03 | 2007-06-05 | Microsoft Corporation | Integrity ordainment and ascertainment of computer-executable instructions with consideration for execution context |
| US6948091B2 (en) | 2002-05-02 | 2005-09-20 | Honeywell International Inc. | High integrity recovery from multi-bit data failures |
| JP2003330736A (ja) | 2002-05-08 | 2003-11-21 | Nippon Telegr & Teleph Corp <Ntt> | 不正リソース利用防止システム及びその方法並びにプログラム |
| GB2383444B (en) | 2002-05-08 | 2003-12-03 | Gfi Software Ltd | System and method for detecting a potentially malicious executable file |
| US7007159B2 (en) | 2002-05-10 | 2006-02-28 | Intel Corporation | System and method for loading and integrating a firmware extension onto executable base system firmware during initialization |
| US7086088B2 (en) | 2002-05-15 | 2006-08-01 | Nokia, Inc. | Preventing stack buffer overflow attacks |
| US7000095B2 (en) | 2002-09-06 | 2006-02-14 | Mips Technologies, Inc. | Method and apparatus for clearing hazards using jump instructions |
| US7386839B1 (en) | 2002-11-06 | 2008-06-10 | Valery Golender | System and method for troubleshooting software configuration problems using application tracing |
| US7353501B2 (en) | 2002-11-18 | 2008-04-01 | Microsoft Corporation | Generic wrapper scheme |
| US6996677B2 (en) | 2002-11-25 | 2006-02-07 | Nortel Networks Limited | Method and apparatus for protecting memory stacks |
| US20040157639A1 (en) | 2002-11-27 | 2004-08-12 | Morris Roy D. | Systems and methods of mobile restore |
| US20040168078A1 (en) | 2002-12-04 | 2004-08-26 | Brodley Carla E. | Apparatus, system and method for protecting function return address |
| US7058838B2 (en) | 2002-12-17 | 2006-06-06 | Hewlett-Packard Development Company, L.P. | System and method for synchronizing a plurality of processors in a multiprocessor computer platform employing a global clock counter |
| US7603704B2 (en) | 2002-12-19 | 2009-10-13 | Massachusetts Institute Of Technology | Secure execution of a computer program using a code cache |
| US7594111B2 (en) | 2002-12-19 | 2009-09-22 | Massachusetts Institute Of Technology | Secure execution of a computer program |
| US9503470B2 (en) | 2002-12-24 | 2016-11-22 | Fred Herz Patents, LLC | Distributed agent based model for security monitoring and response |
| US7237172B2 (en) | 2002-12-24 | 2007-06-26 | Micron Technology, Inc. | Error detection and correction in a CAM |
| US7043509B2 (en) | 2003-02-19 | 2006-05-09 | Sun Microsystems, Inc. | Parallel non-contiguous allocation and card parsing |
| JP4547861B2 (ja) | 2003-03-20 | 2010-09-22 | 日本電気株式会社 | 不正アクセス防止システム、不正アクセス防止方法、および不正アクセス防止プログラム |
| CA2426619A1 (en) | 2003-04-25 | 2004-10-25 | Ibm Canada Limited - Ibm Canada Limitee | Defensive heap memory management |
| US20050108562A1 (en) | 2003-06-18 | 2005-05-19 | Khazan Roger I. | Technique for detecting executable malicious code using a combination of static and dynamic analyses |
| US7480919B2 (en) | 2003-06-24 | 2009-01-20 | Microsoft Corporation | Safe exceptions |
| US7322027B2 (en) | 2003-06-27 | 2008-01-22 | Microsoft Corporation | Detecting termination and providing information related to termination of a computer system process |
| US8250565B2 (en) | 2003-06-27 | 2012-08-21 | Hewlett-Packard Development Company, L.P. | System and method for downloading update packages into a mobile handset in a carrier network |
| US20040268095A1 (en) | 2003-06-30 | 2004-12-30 | Tatiana Shpeisman | Efficient implementation of null reference check |
| US7707548B2 (en) | 2003-07-22 | 2010-04-27 | Verizon Business Global Llc | Integration of information distribution systems |
| US7137038B2 (en) | 2003-07-29 | 2006-11-14 | Hitachi Global Storage Technologies Netherlands, B.V. | System and method for autonomous data scrubbing in a hard disk drive |
| US7530103B2 (en) | 2003-08-07 | 2009-05-05 | Microsoft Corporation | Projection of trustworthiness from a trusted environment to an untrusted environment |
| DE60321972D1 (de) | 2003-08-11 | 2008-08-14 | Telecom Italia Spa | Verfahren und system zur erkennung einer unbefugten benutzung eines kommunikationsnetzes |
| US20070169075A1 (en) | 2003-09-05 | 2007-07-19 | David Lill | Synchronizing and controlling software downloads, such as for utility meter-reading data collection and processing |
| US7467202B2 (en) | 2003-09-10 | 2008-12-16 | Fidelis Security Systems | High-performance network content analysis platform |
| US7644441B2 (en) | 2003-09-26 | 2010-01-05 | Cigital, Inc. | Methods for identifying malicious software |
| US7290253B1 (en) | 2003-09-30 | 2007-10-30 | Vmware, Inc. | Prediction mechanism for subroutine returns in binary translation sub-systems of computers |
| US7360097B2 (en) | 2003-09-30 | 2008-04-15 | Check Point Software Technologies, Inc. | System providing methodology for securing interfaces of executable files |
| WO2005036831A1 (ja) | 2003-10-07 | 2005-04-21 | Fujitsu Limited | フレーム中継装置 |
| US7500245B2 (en) * | 2005-07-08 | 2009-03-03 | Microsoft Corporation | Changing code execution path using kernel mode redirection |
| US7526755B2 (en) | 2003-10-08 | 2009-04-28 | Microsoft Corporation | Plug-in pre- and postconditions for static program analysis |
| EP1679628A4 (en) | 2003-10-15 | 2007-12-12 | Zuken Inc | PCB DESIGN INSTRUCTION SUPPORT PROCESS AND DEVICE |
| US7237267B2 (en) | 2003-10-16 | 2007-06-26 | Cisco Technology, Inc. | Policy-based network security management |
| CN100391180C (zh) | 2003-10-30 | 2008-05-28 | 华为技术有限公司 | 一种以太网二层交换设备绑定硬件地址和端口的方法 |
| EP1680722A1 (en) | 2003-11-05 | 2006-07-19 | Qinetiq Limited | Detection of items stored in a computer system |
| JP4485330B2 (ja) | 2003-11-20 | 2010-06-23 | 富士通株式会社 | 回路の有向ファルシフィケーション |
| US7529979B2 (en) | 2003-12-12 | 2009-05-05 | International Business Machines Corporation | Hardware/software based indirect time stamping methodology for proactive hardware/software event detection and control |
| US7549042B2 (en) | 2003-12-16 | 2009-06-16 | Microsoft Corporation | Applying custom software image updates to non-volatile storage in a failsafe manner |
| US20050138409A1 (en) | 2003-12-22 | 2005-06-23 | Tayib Sheriff | Securing an electronic device |
| US7716495B2 (en) | 2003-12-31 | 2010-05-11 | Microsoft Corporation | Protection against runtime function attacks |
| US20100005531A1 (en) | 2004-12-23 | 2010-01-07 | Kenneth Largman | Isolated multiplexed multi-dimensional processing in a virtual processing space having virus, spyware, and hacker protection features |
| US7284276B2 (en) | 2004-01-22 | 2007-10-16 | Symantec Corporation | Return-to-LIBC attack detection using branch trace records system and method |
| US7730530B2 (en) | 2004-01-30 | 2010-06-01 | Microsoft Corporation | System and method for gathering exhibited behaviors on a .NET executable module in a secure manner |
| US7694022B2 (en) | 2004-02-24 | 2010-04-06 | Microsoft Corporation | Method and system for filtering communications to prevent exploitation of a software vulnerability |
| US7693975B2 (en) | 2004-03-02 | 2010-04-06 | Hewlett-Packard Development Company, L.P. | Network device applying kalman filter |
| US7328323B1 (en) | 2004-03-08 | 2008-02-05 | Symantec Corporation | Heap buffer overflow exploitation prevention system and method |
| JP2005258498A (ja) * | 2004-03-09 | 2005-09-22 | Hitachi Ltd | サーバ回復方法 |
| US7272748B1 (en) | 2004-03-17 | 2007-09-18 | Symantec Corporation | Method and apparatus to detect and recover from a stack frame corruption |
| US7530093B2 (en) * | 2004-04-30 | 2009-05-05 | Microsoft Corporation | Securing applications and operating systems |
| US8042180B2 (en) | 2004-05-21 | 2011-10-18 | Computer Associates Think, Inc. | Intrusion detection based on amount of network traffic |
| US7490268B2 (en) | 2004-06-01 | 2009-02-10 | The Trustees Of Columbia University In The City Of New York | Methods and systems for repairing applications |
| US7207065B2 (en) | 2004-06-04 | 2007-04-17 | Fortify Software, Inc. | Apparatus and method for developing secure software |
| US7596227B2 (en) | 2004-06-08 | 2009-09-29 | Dartdevices Interop Corporation | System method and model for maintaining device integrity and security among intermittently connected interoperating devices |
| US7860096B2 (en) | 2004-06-08 | 2010-12-28 | Oracle America, Inc. | Switching method and apparatus for use in a communications network |
| US7526810B2 (en) | 2004-06-21 | 2009-04-28 | Ebay Inc. | Method and system to verify data received, at a server system, for access and/or publication via the server system |
| US20050283601A1 (en) | 2004-06-22 | 2005-12-22 | Sun Microsystems, Inc. | Systems and methods for securing a computer boot |
| US8955104B2 (en) | 2004-07-07 | 2015-02-10 | University Of Maryland College Park | Method and system for monitoring system memory integrity |
| US7971255B1 (en) | 2004-07-15 | 2011-06-28 | The Trustees Of Columbia University In The City Of New York | Detecting and preventing malcode execution |
| FR2873466A1 (fr) | 2004-07-21 | 2006-01-27 | St Microelectronics Sa | Procede de programmation d'un controleur de dma dans un systeme sur puce et systeme sur puce associe |
| US7634812B2 (en) | 2004-07-21 | 2009-12-15 | Microsoft Corporation | Filter generation |
| US7603715B2 (en) | 2004-07-21 | 2009-10-13 | Microsoft Corporation | Containment of worms |
| EP1619572A1 (en) | 2004-07-23 | 2006-01-25 | Texas Instruments Incorporated | System and method of identifying and preventing security violations within a computing system |
| JP4643201B2 (ja) * | 2004-08-12 | 2011-03-02 | 日本電信電話株式会社 | バッファオーバーフロー脆弱性分析方法、データ処理装置、分析情報提供装置、分析情報抽出処理用プログラムおよび分析情報提供処理用プログラム |
| GB2417579A (en) | 2004-08-26 | 2006-03-01 | Hewlett Packard Development Co | Method for dynamically inserting code into a process by enabling taken branch traps to intercept a branch during the execution of the process |
| US7430683B2 (en) | 2004-09-23 | 2008-09-30 | Intel Corporation | Method and apparatus for enabling run-time recovery of a failed platform |
| EP1825342A1 (en) | 2004-11-22 | 2007-08-29 | Nokia Corporation | Method and device for verifying the integrity of platform software of an electronic device |
| US7484239B1 (en) | 2004-11-30 | 2009-01-27 | Symantec Corporation | Detecting heap and stack execution in the operating system using regions |
| JP3768516B1 (ja) | 2004-12-03 | 2006-04-19 | 株式会社ソニー・コンピュータエンタテインメント | マルチプロセッサシステムとそのシステムにおけるプログラム実行方法 |
| KR100675836B1 (ko) | 2004-12-10 | 2007-01-29 | 한국전자통신연구원 | Epon 구간내에서의 링크 보안을 위한 인증 방법 |
| US20060126799A1 (en) | 2004-12-15 | 2006-06-15 | Microsoft Corporation | Fault injection |
| US7613954B2 (en) | 2004-12-21 | 2009-11-03 | National Instruments Corporation | Test executive with stack corruption detection |
| TWI252976B (en) | 2004-12-27 | 2006-04-11 | Ind Tech Res Inst | Detecting method and architecture thereof for malicious codes |
| US7774787B2 (en) | 2005-01-11 | 2010-08-10 | Microsoft Corporation | Method for specifying and verifying multi-threaded object-oriented programs with invariants |
| US7315871B2 (en) | 2005-01-19 | 2008-01-01 | International Business Machines Inc. Corporation | Method, system and program product for interning invariant data objects in dynamic space constrained systems |
| JP4549303B2 (ja) | 2005-02-07 | 2010-09-22 | 株式会社ソニー・コンピュータエンタテインメント | パイプラインを用いてメッセージ認証コードを提供する方法および装置 |
| JP2006259869A (ja) | 2005-03-15 | 2006-09-28 | Fujitsu Ltd | マルチプロセッサシステム |
| US7290230B2 (en) | 2005-03-17 | 2007-10-30 | Fujitsu Limited | System and method for verifying a digital design using dynamic abstraction |
| ES2745045T3 (es) | 2005-04-22 | 2020-02-27 | Audinate Pty Ltd | Red, dispositivo y método para transportar medios digitales |
| US7493602B2 (en) | 2005-05-02 | 2009-02-17 | International Business Machines Corporation | Methods and arrangements for unified program analysis |
| US7912877B2 (en) | 2005-05-20 | 2011-03-22 | Microsoft Corporation | Leveraging garbage collection to dynamically infer heap invariants |
| US7752381B2 (en) | 2005-05-24 | 2010-07-06 | Micron Technology, Inc. | Version based non-volatile memory translation layer |
| US7730536B2 (en) | 2005-06-08 | 2010-06-01 | Verizon Business Global Llc | Security perimeters |
| GB0513375D0 (en) | 2005-06-30 | 2005-08-03 | Retento Ltd | Computer security |
| US20070027815A1 (en) | 2005-07-29 | 2007-02-01 | Symantec Corporation | Systems and methods for centralized subscription and license management in a small networking environment |
| US7895651B2 (en) | 2005-07-29 | 2011-02-22 | Bit 9, Inc. | Content tracking in a network security system |
| EP1758021A2 (en) | 2005-08-25 | 2007-02-28 | International Business Machines Corporation | Method or apparatus for managing a server process in a computer system |
| CN1921474A (zh) * | 2005-08-25 | 2007-02-28 | 国际商业机器公司 | 用于在计算机系统中管理服务器处理的方法和设备 |
| US20070050848A1 (en) | 2005-08-31 | 2007-03-01 | Microsoft Corporation | Preventing malware from accessing operating system services |
| US20070067359A1 (en) | 2005-09-21 | 2007-03-22 | Lenovo (Singapore) Pte. Ltd. | Centralized system for versioned data synchronization |
| US20070118646A1 (en) | 2005-10-04 | 2007-05-24 | Computer Associates Think, Inc. | Preventing the installation of rootkits on a standalone computer |
| US7809670B2 (en) | 2005-12-09 | 2010-10-05 | Microsoft Corporation | Classification of malware using clustering that orders events in accordance with the time of occurance |
| WO2007097807A2 (en) * | 2005-12-22 | 2007-08-30 | Telcordia Technologies, Inc. | A method and system for password protocols in the bounded retrieval model with security against dictionary attacks and intrusions |
| US9390031B2 (en) | 2005-12-30 | 2016-07-12 | Intel Corporation | Page coloring to associate memory pages with programs |
| US8108840B2 (en) | 2006-01-12 | 2012-01-31 | International Business Machines Corporation | Method for enhancing debugger performance of hardware assisted breakpoints |
| US20070174549A1 (en) | 2006-01-24 | 2007-07-26 | Yevgen Gyl | Method for utilizing a memory interface to control partitioning of a memory module |
| US7845005B2 (en) | 2006-02-07 | 2010-11-30 | International Business Machines Corporation | Method for preventing malicious software installation on an internet-connected computer |
| US8510596B1 (en) | 2006-02-09 | 2013-08-13 | Virsec Systems, Inc. | System and methods for run time detection and correction of memory corruption |
| US8286238B2 (en) | 2006-09-29 | 2012-10-09 | Intel Corporation | Method and apparatus for run-time in-memory patching of code from a service processor |
| WO2008055156A2 (en) | 2006-10-30 | 2008-05-08 | The Trustees Of Columbia University In The City Of New York | Methods, media, and systems for detecting an anomalous sequence of function calls |
| JP2008129714A (ja) | 2006-11-17 | 2008-06-05 | Univ Of Tsukuba | 異常検知方法、異常検知装置及び異常検知用プログラム並びに学習モデル生成方法 |
| IL181426A (en) | 2007-02-19 | 2011-06-30 | Deutsche Telekom Ag | Automatic removal of signatures for malware |
| US20080215925A1 (en) | 2007-03-02 | 2008-09-04 | International Business Machines Corporation | Distributed fault injection mechanism |
| WO2008124038A1 (en) | 2007-04-03 | 2008-10-16 | Ldra Technology, Inc. | Automated management of software requirements verification |
| US8336102B2 (en) | 2007-06-01 | 2012-12-18 | Microsoft Corporation | Delivering malformed data for fuzz testing to software applications |
| JP4938576B2 (ja) | 2007-07-24 | 2012-05-23 | 日本電信電話株式会社 | 情報収集システムおよび情報収集方法 |
| CN101154258A (zh) | 2007-08-14 | 2008-04-02 | 电子科技大学 | 恶意程序动态行为自动化分析系统与方法 |
| US7971044B2 (en) | 2007-10-05 | 2011-06-28 | Qualcomm Incorporated | Link stack repair of erroneous speculative update |
| US8627287B2 (en) | 2007-11-29 | 2014-01-07 | Microsoft Corporation | Prioritizing quality improvements to source code |
| US7453910B1 (en) | 2007-12-18 | 2008-11-18 | International Business Machines Corporation | Synchronization of independent clocks |
| US8434151B1 (en) | 2008-01-04 | 2013-04-30 | International Business Machines Corporation | Detecting malicious software |
| US8261326B2 (en) | 2008-04-25 | 2012-09-04 | International Business Machines Corporation | Network intrusion blocking security overlay |
| US8307191B1 (en) | 2008-05-09 | 2012-11-06 | Vmware, Inc. | Page fault handling in a virtualized computer system |
| JP2009282180A (ja) | 2008-05-21 | 2009-12-03 | Olympus Imaging Corp | 観察光学系及びそれを用いた撮像装置 |
| US8407523B2 (en) | 2008-06-06 | 2013-03-26 | Iti Scotland Limited | Method for protecting software programs |
| US9280466B2 (en) | 2008-09-09 | 2016-03-08 | Kabushiki Kaisha Toshiba | Information processing device including memory management device managing access from processor to memory and memory management method |
| JP5387584B2 (ja) | 2008-12-08 | 2014-01-15 | 日本電気株式会社 | データ依存関係解析装置、情報処理装置、データ依存関係解析方法、及びプログラム |
| JP2010257150A (ja) | 2009-04-23 | 2010-11-11 | Ntt Docomo Inc | 不正処理検知装置、不正処理検知方法及びプログラム |
| KR101269549B1 (ko) | 2009-05-08 | 2013-06-04 | 한국전자통신연구원 | 오류 주입을 이용한 소프트웨어 신뢰성 테스트 시스템 및 방법 |
| JP2011059930A (ja) | 2009-09-09 | 2011-03-24 | Nec Computertechno Ltd | 電源ユニット |
| US9230455B2 (en) | 2009-12-11 | 2016-01-05 | Digital Immunity Llc | Steganographic embedding of executable code |
| US8958546B2 (en) | 2009-12-11 | 2015-02-17 | Stegosytems, Inc. | Steganographic messaging system using code invariants |
| JP5499805B2 (ja) * | 2010-03-19 | 2014-05-21 | 日本電気株式会社 | 情報処理装置、情報処理システム、情報処理方法並びに情報処理プログラム |
| CN102012987B (zh) | 2010-12-02 | 2013-03-13 | 李清宝 | 自动二进制恶意代码行为分析系统 |
| US8464102B2 (en) | 2010-12-23 | 2013-06-11 | GM Global Technology Operations LLC | Methods and systems for diagnosing hardware and software faults using time-stamped events |
| US8595610B2 (en) | 2011-01-25 | 2013-11-26 | Infineon Technologies Ag | Method, software and computer system for manipulating aggregated data |
| US8615640B2 (en) | 2011-03-17 | 2013-12-24 | Lsi Corporation | System and method to efficiently schedule and/or commit write data to flash based SSDs attached to an array controller |
| US8495581B2 (en) | 2011-05-05 | 2013-07-23 | International Business Machines Corporation | Code evaluation based on failure prediction |
| US9646155B2 (en) | 2011-09-09 | 2017-05-09 | Hewlett Packard Enterprise Development Lp | Systems and methods for evaluation of events based on a reference baseline according to temporal position in a sequence of events |
| US8788627B2 (en) | 2011-09-30 | 2014-07-22 | Apple Inc. | Interactive web application framework |
| US8984478B2 (en) | 2011-10-03 | 2015-03-17 | Cisco Technology, Inc. | Reorganization of virtualized computer programs |
| WO2013063474A1 (en) | 2011-10-28 | 2013-05-02 | Scargo, Inc. | Security policy deployment and enforcement system for the detection and control of polymorphic and targeted malware |
| WO2013073504A1 (ja) | 2011-11-15 | 2013-05-23 | 独立行政法人科学技術振興機構 | プログラム解析・検証サービス提供システム、その制御方法、制御プログラム、コンピュータを機能させるための制御プログラム、プログラム解析・検証装置、プログラム解析・検証ツール管理装置 |
| US9372991B2 (en) | 2012-03-06 | 2016-06-21 | International Business Machines Corporation | Detecting malicious computer code in an executing program module |
| US8792498B2 (en) | 2012-03-23 | 2014-07-29 | Wind River Systems, Inc. | System and method for enhanced updating layer-2 bridge address table on asymmetric multiprocessing systems |
| US9043903B2 (en) * | 2012-06-08 | 2015-05-26 | Crowdstrike, Inc. | Kernel-level security agent |
| JP5863973B2 (ja) * | 2012-08-01 | 2016-02-17 | 三菱電機株式会社 | プログラム実行装置及びプログラム解析装置 |
| US9201720B2 (en) | 2012-08-13 | 2015-12-01 | Nxp B.V. | FlexRay network runtime error detection and containment |
| US9882984B2 (en) | 2013-08-02 | 2018-01-30 | International Business Machines Corporation | Cache migration management in a virtualized distributed computing system |
| GB2520987B (en) * | 2013-12-06 | 2016-06-01 | Cyberlytic Ltd | Using fuzzy logic to assign a risk level profile to a potential cyber threat |
| EP3161715A1 (en) | 2014-06-24 | 2017-05-03 | Virsec Systems, Inc. | System and methods for automated detection of input and output validation and resource management vulnerability |
| US10114726B2 (en) | 2014-06-24 | 2018-10-30 | Virsec Systems, Inc. | Automated root cause analysis of single or N-tiered application |
| US9699205B2 (en) * | 2015-08-31 | 2017-07-04 | Splunk Inc. | Network security system |
| US11409870B2 (en) | 2016-06-16 | 2022-08-09 | Virsec Systems, Inc. | Systems and methods for remediating memory corruption in a computer application |
-
2017
- 2017-06-16 US US16/307,281 patent/US11409870B2/en active Active
- 2017-06-16 AU AU2017285429A patent/AU2017285429B2/en active Active
- 2017-06-16 CA CA3027728A patent/CA3027728A1/en active Pending
- 2017-06-16 JP JP2019518173A patent/JP6949951B2/ja active Active
- 2017-06-16 EP EP17735276.2A patent/EP3472746B1/en active Active
- 2017-06-16 KR KR1020197001449A patent/KR102419574B1/ko active Active
- 2017-06-16 WO PCT/US2017/037841 patent/WO2017218872A1/en not_active Ceased
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20080016339A1 (en) * | 2006-06-29 | 2008-01-17 | Jayant Shukla | Application Sandbox to Detect, Remove, and Prevent Malware |
| WO2015038944A1 (en) * | 2013-09-12 | 2015-03-19 | Virsec Systems, Inc. | Automated runtime detection of malware |
| WO2015200046A1 (en) * | 2014-06-27 | 2015-12-30 | Qualcomm Incorporated | Dynamic patching of multiple, functionally equivalent variations of various software modules for security reasons |
Also Published As
| Publication number | Publication date |
|---|---|
| AU2017285429A1 (en) | 2019-01-24 |
| CA3027728A1 (en) | 2017-12-21 |
| JP6949951B2 (ja) | 2021-10-13 |
| KR20190035686A (ko) | 2019-04-03 |
| EP3472746A1 (en) | 2019-04-24 |
| US20190138725A1 (en) | 2019-05-09 |
| JP2019519056A (ja) | 2019-07-04 |
| EP3472746B1 (en) | 2020-05-13 |
| WO2017218872A1 (en) | 2017-12-21 |
| US11409870B2 (en) | 2022-08-09 |
| AU2017285429B2 (en) | 2022-03-31 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| KR102419574B1 (ko) | 컴퓨터 애플리케이션에서 메모리 손상을 교정하기 위한 시스템 및 방법 | |
| US11599634B1 (en) | System and methods for run time detection and correction of memory corruption | |
| AU2018204262B2 (en) | Automated code lockdown to reduce attack surface for software | |
| US11494484B2 (en) | Leveraging instrumentation capabilities to enable monitoring services | |
| US11870811B2 (en) | Trusted execution security policy platform | |
| KR102368170B1 (ko) | 멀웨어의 자동화된 런타임 검출 | |
| US9230100B2 (en) | Securing anti-virus software with virtualization | |
| Araujo et al. | Embedded honeypotting | |
| Di Santo | Lazarus Group Targets Crypto-Wallets and Financial Data while employing new Tradecrafts | |
| Zhang et al. | DRSA: Debug Register-Based Self-relocating Attack Against Software-Based Remote Authentication | |
| Yin | Malware detection and analysis via layered annotative execution | |
| Ernst et al. | Collaborative Learning for Security and Repair in Application Communities | |
| Laventure et al. | Lemona: Towards an open architecture for decentralized forensics analysis | |
| HK1254985B (zh) | 用於保护多个网络端点的双重存储器内省 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PA0105 | International application |
Patent event date: 20190116 Patent event code: PA01051R01D Comment text: International Patent Application |
|
| PG1501 | Laying open of application | ||
| A201 | Request for examination | ||
| PA0201 | Request for examination |
Patent event code: PA02012R01D Patent event date: 20200528 Comment text: Request for Examination of Application |
|
| E902 | Notification of reason for refusal | ||
| PE0902 | Notice of grounds for rejection |
Comment text: Notification of reason for refusal Patent event date: 20210817 Patent event code: PE09021S01D |
|
| AMND | Amendment | ||
| E601 | Decision to refuse application | ||
| PE0601 | Decision on rejection of patent |
Patent event date: 20220221 Comment text: Decision to Refuse Application Patent event code: PE06012S01D Patent event date: 20210817 Comment text: Notification of reason for refusal Patent event code: PE06011S01I |
|
| X091 | Application refused [patent] | ||
| AMND | Amendment | ||
| PX0901 | Re-examination |
Patent event code: PX09011S01I Patent event date: 20220221 Comment text: Decision to Refuse Application Patent event code: PX09012R01I Patent event date: 20211018 Comment text: Amendment to Specification, etc. |
|
| PX0701 | Decision of registration after re-examination |
Patent event date: 20220419 Comment text: Decision to Grant Registration Patent event code: PX07013S01D Patent event date: 20220323 Comment text: Amendment to Specification, etc. Patent event code: PX07012R01I Patent event date: 20220221 Comment text: Decision to Refuse Application Patent event code: PX07011S01I Patent event date: 20211018 Comment text: Amendment to Specification, etc. Patent event code: PX07012R01I |
|
| X701 | Decision to grant (after re-examination) | ||
| GRNT | Written decision to grant | ||
| PR0701 | Registration of establishment |
Comment text: Registration of Establishment Patent event date: 20220706 Patent event code: PR07011E01D |
|
| PR1002 | Payment of registration fee |
Payment date: 20220707 End annual number: 3 Start annual number: 1 |
|
| PG1601 | Publication of registration |