RU2462754C2 - Автоматическое обнаружение и реагирование на уязвимости - Google Patents
Автоматическое обнаружение и реагирование на уязвимости Download PDFInfo
- Publication number
- RU2462754C2 RU2462754C2 RU2009129132/08A RU2009129132A RU2462754C2 RU 2462754 C2 RU2462754 C2 RU 2462754C2 RU 2009129132/08 A RU2009129132/08 A RU 2009129132/08A RU 2009129132 A RU2009129132 A RU 2009129132A RU 2462754 C2 RU2462754 C2 RU 2462754C2
- Authority
- RU
- Russia
- Prior art keywords
- program
- interface
- failure
- user
- function
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/0703—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
- G06F11/0706—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment
- G06F11/0748—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment in a remote unit communicating with a single-box computer node experiencing an error/fault
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/0703—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
- G06F11/079—Root cause analysis, i.e. error or fault diagnosis
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Quality & Reliability (AREA)
- Computing Systems (AREA)
- Debugging And Monitoring (AREA)
- Computer And Data Communications (AREA)
- Storage Device Security (AREA)
- Radar Systems Or Details Thereof (AREA)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US11/618,470 | 2006-12-29 | ||
| US11/618,470 US8453245B2 (en) | 2006-12-29 | 2006-12-29 | Automatic vulnerability detection and response |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| RU2009129132A RU2009129132A (ru) | 2011-02-10 |
| RU2462754C2 true RU2462754C2 (ru) | 2012-09-27 |
Family
ID=39586025
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| RU2009129132/08A RU2462754C2 (ru) | 2006-12-29 | 2007-12-31 | Автоматическое обнаружение и реагирование на уязвимости |
Country Status (10)
| Country | Link |
|---|---|
| US (1) | US8453245B2 (enExample) |
| EP (1) | EP2118802A4 (enExample) |
| JP (1) | JP2010515177A (enExample) |
| KR (1) | KR20090117705A (enExample) |
| CN (1) | CN101573712A (enExample) |
| AU (1) | AU2007341952B2 (enExample) |
| BR (1) | BRPI0720666A2 (enExample) |
| MX (1) | MX2009007064A (enExample) |
| RU (1) | RU2462754C2 (enExample) |
| WO (1) | WO2008083382A1 (enExample) |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10445505B2 (en) | 2014-09-22 | 2019-10-15 | Mcafee, Llc | Process vulnerability assessment |
| RU2739831C1 (ru) * | 2019-11-27 | 2020-12-28 | Акционерное общество "Лаборатория Касперского" | Способ устранения неполадки, возникшей при работе приложения |
| RU2739867C1 (ru) * | 2019-11-27 | 2020-12-29 | Акционерное общество "Лаборатория Касперского" | Способ определения модуля приложения, связанного с причиной неполадки, возникшей при работе приложения |
Families Citing this family (30)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8453245B2 (en) | 2006-12-29 | 2013-05-28 | Microsoft Corporation | Automatic vulnerability detection and response |
| US8627475B2 (en) * | 2010-04-08 | 2014-01-07 | Microsoft Corporation | Early detection of potential malware |
| US20120311715A1 (en) * | 2011-05-30 | 2012-12-06 | Yaron Tal | System and method for protecting a website from hacking attacks |
| CN103595708B (zh) * | 2013-10-22 | 2017-08-25 | 北京奇虎科技有限公司 | 浏览器异常关闭的处理方法、系统、浏览器和服务器 |
| CN106453509B (zh) * | 2013-10-22 | 2019-06-04 | 北京奇虎科技有限公司 | 浏览器异常关闭的处理方法、系统、浏览器和服务器 |
| US10089473B2 (en) | 2014-12-24 | 2018-10-02 | Sap Se | Software nomenclature system for security vulnerability management |
| KR101619691B1 (ko) | 2015-01-22 | 2016-05-10 | 주식회사 엔씨소프트 | 프로그램 오류 분석 방법 및 시스템 |
| US10176329B2 (en) * | 2015-08-11 | 2019-01-08 | Symantec Corporation | Systems and methods for detecting unknown vulnerabilities in computing processes |
| JP6721775B2 (ja) * | 2017-02-24 | 2020-07-15 | 株式会社Fuji | 不具合情報共有システム |
| CN110096873B (zh) | 2018-01-31 | 2025-03-25 | 开利公司 | 通过补丁变换的自动诱饵推导 |
| US11886390B2 (en) | 2019-04-30 | 2024-01-30 | JFrog Ltd. | Data file partition and replication |
| US11340894B2 (en) | 2019-04-30 | 2022-05-24 | JFrog, Ltd. | Data file partition and replication |
| US11386233B2 (en) | 2019-04-30 | 2022-07-12 | JFrog, Ltd. | Data bundle generation and deployment |
| US10972289B2 (en) | 2019-07-19 | 2021-04-06 | JFrog, Ltd. | Software release verification |
| US10999314B2 (en) * | 2019-07-19 | 2021-05-04 | JFrog Ltd. | Software release tracking and logging |
| US11307920B2 (en) | 2019-11-26 | 2022-04-19 | Disney Enterprises, Inc. | Automated crash recovery |
| US11860680B2 (en) | 2020-11-24 | 2024-01-02 | JFrog Ltd. | Software pipeline and release validation |
| US12061889B2 (en) | 2021-10-29 | 2024-08-13 | JFrog Ltd. | Software release distribution across a hierarchical network |
| US12169568B2 (en) * | 2022-10-19 | 2024-12-17 | Dell Products, L.P. | Systems and methods for vulnerability proofing when booting an IHS |
| US12174968B2 (en) * | 2022-10-19 | 2024-12-24 | Dell Products, L.P. | Systems and methods for vulnerability proofing when adding and replacing IHS hardware |
| US12158959B2 (en) * | 2022-10-19 | 2024-12-03 | Dell Products, L.P. | Systems and methods for vulnerability proofing when updating an IHS |
| US12141294B2 (en) * | 2022-10-20 | 2024-11-12 | Dell Products, L.P. | Systems and methods for context-aware vulnerability risk scores |
| US12153685B2 (en) * | 2022-10-20 | 2024-11-26 | Dell Products, L.P. | Systems and methods for vulnerability proofing when using a bootable image |
| US12137112B2 (en) * | 2022-10-20 | 2024-11-05 | Dell Products, L.P. | Systems and methods for vulnerability proofed cluster management |
| US12135794B2 (en) * | 2022-10-20 | 2024-11-05 | Dell Products, L.P. | Systems and methods for validated vulnerability proofing |
| US12141295B2 (en) * | 2022-10-21 | 2024-11-12 | Dell Products, L.P. | Systems and methods for vulnerability proofing machine learning recommendations |
| US12235970B2 (en) * | 2022-10-21 | 2025-02-25 | Dell Products, L.P. | Systems and methods for aggregated vulnerability proofing of an IHS |
| US12223059B2 (en) * | 2022-10-21 | 2025-02-11 | Dell Products, L.P. | Systems and methods for vulnerability proofing when configuring an IHS |
| US12130931B2 (en) * | 2022-10-21 | 2024-10-29 | Dell Products, L.P. | Systems and methods for vulnerability proofing interdependent IHS components |
| US12147544B2 (en) * | 2022-10-21 | 2024-11-19 | Dell Products, L.P. | Systems and methods for vulnerability proofing during IHS provisioning |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6629267B1 (en) * | 2000-05-15 | 2003-09-30 | Microsoft Corporation | Method and system for reporting a program failure |
| RU2261470C1 (ru) * | 2004-03-01 | 2005-09-27 | Федеральное государственное унитарное предприятие "Научно-производственное предприятие "Полет" | Устройство программного управления |
Family Cites Families (20)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2693019B2 (ja) | 1990-05-30 | 1997-12-17 | 株式会社東芝 | プログラマブル・コントローラのプログラム監視装置 |
| US6874084B1 (en) * | 2000-05-02 | 2005-03-29 | International Business Machines Corporation | Method and apparatus for establishing a secure communication connection between a java application and secure server |
| US6675295B1 (en) * | 2000-06-19 | 2004-01-06 | Microsoft Corporation | Method and computer system for detecting and correcting a failure in a computer application program during startup |
| US6708333B1 (en) * | 2000-06-23 | 2004-03-16 | Microsoft Corporation | Method and system for reporting failures of a program module in a corporate environment |
| US20020124172A1 (en) * | 2001-03-05 | 2002-09-05 | Brian Manahan | Method and apparatus for signing and validating web pages |
| JP2002264455A (ja) * | 2001-03-07 | 2002-09-18 | Canon Inc | 画像形成装置および画像形成装置管理装置および画像形成装置の制御方法および画像形成装置管理装置の制御方法および記憶媒体 |
| US7313822B2 (en) | 2001-03-16 | 2007-12-25 | Protegrity Corporation | Application-layer security method and system |
| US7096362B2 (en) * | 2001-06-01 | 2006-08-22 | International Business Machines Corporation | Internet authentication with multiple independent certificate authorities |
| US7231659B2 (en) * | 2001-07-31 | 2007-06-12 | Verisign, Inc. | Entity authentication in a shared hosting computer network environment |
| US7562222B2 (en) * | 2002-05-10 | 2009-07-14 | Rsa Security Inc. | System and method for authenticating entities to users |
| US8042179B2 (en) | 2003-09-04 | 2011-10-18 | Science Park Corporation | False code execution prevention method, program for the method, and recording medium for recording the program |
| US7437764B1 (en) * | 2003-11-14 | 2008-10-14 | Symantec Corporation | Vulnerability assessment of disk images |
| US7413085B2 (en) * | 2004-09-07 | 2008-08-19 | Iconix, Inc. | Techniques for displaying emails listed in an email inbox |
| JP2006094046A (ja) * | 2004-09-22 | 2006-04-06 | Fuji Xerox Co Ltd | 複合機および複合機の管理システム |
| JP4688472B2 (ja) | 2004-11-01 | 2011-05-25 | 株式会社エヌ・ティ・ティ・ドコモ | 端末制御装置及び端末制御方法 |
| US7979889B2 (en) * | 2005-01-07 | 2011-07-12 | Cisco Technology, Inc. | Methods and apparatus providing security to computer systems and networks |
| US20060185018A1 (en) | 2005-02-17 | 2006-08-17 | Microsoft Corporation | Systems and methods for shielding an identified vulnerability |
| US7743254B2 (en) * | 2005-03-23 | 2010-06-22 | Microsoft Corporation | Visualization of trust in an address bar |
| US7735136B2 (en) * | 2005-04-18 | 2010-06-08 | Vmware, Inc. | 0-touch and 1-touch techniques for improving the availability of computer programs under protection without compromising security |
| US8453245B2 (en) | 2006-12-29 | 2013-05-28 | Microsoft Corporation | Automatic vulnerability detection and response |
-
2006
- 2006-12-29 US US11/618,470 patent/US8453245B2/en not_active Expired - Fee Related
-
2007
- 2007-12-31 CN CNA2007800486253A patent/CN101573712A/zh active Pending
- 2007-12-31 AU AU2007341952A patent/AU2007341952B2/en not_active Ceased
- 2007-12-31 RU RU2009129132/08A patent/RU2462754C2/ru not_active IP Right Cessation
- 2007-12-31 WO PCT/US2007/089221 patent/WO2008083382A1/en not_active Ceased
- 2007-12-31 MX MX2009007064A patent/MX2009007064A/es not_active Application Discontinuation
- 2007-12-31 BR BRPI0720666-6A patent/BRPI0720666A2/pt not_active IP Right Cessation
- 2007-12-31 JP JP2009544323A patent/JP2010515177A/ja active Pending
- 2007-12-31 EP EP07870139A patent/EP2118802A4/en not_active Ceased
- 2007-12-31 KR KR1020097015518A patent/KR20090117705A/ko not_active Abandoned
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6629267B1 (en) * | 2000-05-15 | 2003-09-30 | Microsoft Corporation | Method and system for reporting a program failure |
| RU2261470C1 (ru) * | 2004-03-01 | 2005-09-27 | Федеральное государственное унитарное предприятие "Научно-производственное предприятие "Полет" | Устройство программного управления |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10445505B2 (en) | 2014-09-22 | 2019-10-15 | Mcafee, Llc | Process vulnerability assessment |
| RU2739831C1 (ru) * | 2019-11-27 | 2020-12-28 | Акционерное общество "Лаборатория Касперского" | Способ устранения неполадки, возникшей при работе приложения |
| RU2739867C1 (ru) * | 2019-11-27 | 2020-12-29 | Акционерное общество "Лаборатория Касперского" | Способ определения модуля приложения, связанного с причиной неполадки, возникшей при работе приложения |
Also Published As
| Publication number | Publication date |
|---|---|
| AU2007341952A1 (en) | 2008-07-10 |
| MX2009007064A (es) | 2009-07-09 |
| EP2118802A4 (en) | 2012-08-22 |
| RU2009129132A (ru) | 2011-02-10 |
| US20080163374A1 (en) | 2008-07-03 |
| JP2010515177A (ja) | 2010-05-06 |
| BRPI0720666A2 (pt) | 2014-01-14 |
| CN101573712A (zh) | 2009-11-04 |
| AU2007341952B2 (en) | 2011-10-13 |
| US8453245B2 (en) | 2013-05-28 |
| EP2118802A1 (en) | 2009-11-18 |
| KR20090117705A (ko) | 2009-11-12 |
| WO2008083382A1 (en) | 2008-07-10 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| RU2462754C2 (ru) | Автоматическое обнаружение и реагирование на уязвимости | |
| CN109918916B (zh) | 一种双体系可信计算系统及方法 | |
| CN101385012B (zh) | 在装置间使用关于恶意应用程序行为的信息的设备和方法 | |
| US8156552B2 (en) | Method, computer software, and system for providing end to end security protection of an online transaction | |
| US8255995B2 (en) | Methods and apparatus providing computer and network security utilizing probabilistic policy reposturing | |
| US20060195745A1 (en) | Methods and systems for repairing applications | |
| US20060161784A1 (en) | Systems and methods for updating a secure boot process on a computer with a hardware security module | |
| US7506380B2 (en) | Systems and methods for boot recovery in a secure boot process on a computer with a hardware security module | |
| EP3270318B1 (en) | Dynamic security module terminal device and method for operating same | |
| US7665139B1 (en) | Method and apparatus to detect and prevent malicious changes to tokens | |
| CN110309659A (zh) | 一种基于双体系结构的可信计算平台的动态度量方法 | |
| US11777984B1 (en) | Automatic threat detection and remediation | |
| CN111177726A (zh) | 一种系统漏洞检测方法、装置、设备及介质 | |
| CN100492300C (zh) | 在微处理器实现的设备上执行进程的系统和方法 | |
| US10880316B2 (en) | Method and system for determining initial execution of an attack | |
| KR100976961B1 (ko) | 인터넷 사이트 보안 시스템 및 그 방법 | |
| CN112269996A (zh) | 一种面向区块链主节点的主动免疫可信计算平台的动态度量方法 | |
| KR102086375B1 (ko) | 악성 소프트웨어에 대한 실시간 예방 및 사후 복구를 위한 보안 시스템 및 그 방법 | |
| KR101530532B1 (ko) | 모바일단말의 루팅 탐지 시스템 및 방법 | |
| US20250045382A1 (en) | Apparatus for attestation of a running workload in a trusted execution environment, a method for attestation of a running workload in a trusted execution environment, and a non-transitory computer-readable medium | |
| Kim et al. | Linux based unauthorized process control | |
| Gehani et al. | Real-time access control reconfiguration | |
| US20210157918A1 (en) | Intrusion resilient applications | |
| KR20050092845A (ko) | 인터넷 접속을 통한 진단 및 원격지원 서비스 방법 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PC41 | Official registration of the transfer of exclusive right |
Effective date: 20150526 |
|
| MM4A | The patent is invalid due to non-payment of fees |
Effective date: 20200101 |