SG10201911284SA - Extracting malicious instructions on a virtual machine in a network environment - Google Patents
Extracting malicious instructions on a virtual machine in a network environmentInfo
- Publication number
- SG10201911284SA SG10201911284SA SG10201911284SA SG10201911284SA SG10201911284SA SG 10201911284S A SG10201911284S A SG 10201911284SA SG 10201911284S A SG10201911284S A SG 10201911284SA SG 10201911284S A SG10201911284S A SG 10201911284SA SG 10201911284S A SG10201911284S A SG 10201911284SA
- Authority
- SG
- Singapore
- Prior art keywords
- virtual machine
- network environment
- malicious instructions
- extracting malicious
- extracting
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/02—Addressing or allocation; Relocation
- G06F12/08—Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems
- G06F12/10—Address translation
- G06F12/1009—Address translation using page tables, e.g. page table structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/28—Databases characterised by their database models, e.g. relational or object models
- G06F16/284—Relational databases
- G06F16/285—Clustering or classification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/561—Virus type analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/565—Static detection by checking file integrity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45545—Guest-host, i.e. hypervisor is an application program itself, e.g. VirtualBox
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
- G06F2009/45579—I/O management, e.g. providing access to device drivers or storage
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
- G06F2009/45583—Memory management, e.g. access or allocation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
- G06F2009/45587—Isolation or security of virtual machine instances
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
- G06F2009/45591—Monitoring or debugging support
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
- G06F2009/45595—Network integration; Enabling network access in virtual machine instances
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/567—Computer malware detection or handling, e.g. anti-virus arrangements using dedicated hardware
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2212/00—Indexing scheme relating to accessing, addressing or allocation within memory systems or architectures
- G06F2212/10—Providing a specific technical effect
- G06F2212/1052—Security improvement
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2212/00—Indexing scheme relating to accessing, addressing or allocation within memory systems or architectures
- G06F2212/15—Use in a specific computing environment
- G06F2212/152—Virtualized environment, e.g. logically partitioned system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2212/00—Indexing scheme relating to accessing, addressing or allocation within memory systems or architectures
- G06F2212/15—Use in a specific computing environment
- G06F2212/154—Networked environment
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/034—Test or assess a computer or a system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
Applications Claiming Priority (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201562258730P | 2015-11-23 | 2015-11-23 | |
US15/169,248 US10579792B2 (en) | 2015-11-23 | 2016-05-31 | Extracting malicious instructions on a virtual machine |
US15/169,282 US10210324B2 (en) | 2015-11-23 | 2016-05-31 | Detecting malicious instructions on a virtual machine |
US15/169,230 US10409983B2 (en) | 2015-11-23 | 2016-05-31 | Detecting malicious instructions in a virtual machine memory |
US15/169,304 US10210325B2 (en) | 2015-11-23 | 2016-05-31 | Extracting and detecting malicious instructions on a virtual machine |
US15/169,203 US10157276B2 (en) | 2015-11-23 | 2016-05-31 | Extracting malicious instructions on a virtual machine in a network environment |
US15/169,320 US10255432B2 (en) | 2015-11-23 | 2016-05-31 | Detecting malicious instructions on a virtual machine using profiling |
Publications (1)
Publication Number | Publication Date |
---|---|
SG10201911284SA true SG10201911284SA (en) | 2020-02-27 |
Family
ID=58719700
Family Applications (6)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG11201804196WA SG11201804196WA (en) | 2015-11-23 | 2016-11-16 | Extracting malicious instructions on a virtual machine in a network environment |
SG10201911343VA SG10201911343VA (en) | 2015-11-23 | 2016-11-16 | Extracting malicious instructions on a virtual machine in a network environment |
SG10201911370SA SG10201911370SA (en) | 2015-11-23 | 2016-11-16 | Extracting malicious instructions on a virtual machine in a network environment |
SG10201911266YA SG10201911266YA (en) | 2015-11-23 | 2016-11-16 | Extracting malicious instructions on a virtual machine in a network environment |
SG10201911212YA SG10201911212YA (en) | 2015-11-23 | 2016-11-16 | Extracting malicious instructions on a virtual machine in a network environment |
SG10201911284SA SG10201911284SA (en) | 2015-11-23 | 2016-11-16 | Extracting malicious instructions on a virtual machine in a network environment |
Family Applications Before (5)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG11201804196WA SG11201804196WA (en) | 2015-11-23 | 2016-11-16 | Extracting malicious instructions on a virtual machine in a network environment |
SG10201911343VA SG10201911343VA (en) | 2015-11-23 | 2016-11-16 | Extracting malicious instructions on a virtual machine in a network environment |
SG10201911370SA SG10201911370SA (en) | 2015-11-23 | 2016-11-16 | Extracting malicious instructions on a virtual machine in a network environment |
SG10201911266YA SG10201911266YA (en) | 2015-11-23 | 2016-11-16 | Extracting malicious instructions on a virtual machine in a network environment |
SG10201911212YA SG10201911212YA (en) | 2015-11-23 | 2016-11-16 | Extracting malicious instructions on a virtual machine in a network environment |
Country Status (3)
Country | Link |
---|---|
US (6) | US10255432B2 (en) |
EP (2) | EP3767506A1 (en) |
SG (6) | SG11201804196WA (en) |
Families Citing this family (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
ATE500698T1 (en) | 2004-04-30 | 2011-03-15 | Research In Motion Ltd | SYSTEM AND METHOD FOR FILTERING DATA TRANSFERS IN A MOBILE DEVICE |
US10078752B2 (en) * | 2014-03-27 | 2018-09-18 | Barkly Protects, Inc. | Continuous malicious software identification through responsive machine learning |
US10198280B2 (en) | 2015-12-14 | 2019-02-05 | Barkly Protects, Inc. | Method and apparatus for hypervisor based monitoring of system interactions |
US10509685B2 (en) * | 2015-12-14 | 2019-12-17 | VCE IP Holding Company, LLC | Methods, systems, and computer readable mediums for workload clustering |
US10462173B1 (en) * | 2016-06-30 | 2019-10-29 | Fireeye, Inc. | Malware detection verification and enhancement by coordinating endpoint and malware detection systems |
US10318723B1 (en) * | 2016-11-29 | 2019-06-11 | Sprint Communications Company L.P. | Hardware-trusted network-on-chip (NOC) and system-on-chip (SOC) network function virtualization (NFV) data communications |
US10791134B2 (en) * | 2016-12-21 | 2020-09-29 | Threat Stack, Inc. | System and method for cloud-based operating system event and data access monitoring |
US10375169B1 (en) * | 2017-05-24 | 2019-08-06 | United States Of America As Represented By The Secretary Of The Navy | System and method for automatically triggering the live migration of cloud services and automatically performing the triggered migration |
US10546120B2 (en) * | 2017-09-25 | 2020-01-28 | AO Kaspersky Lab | System and method of forming a log in a virtual machine for conducting an antivirus scan of a file |
GB2568115B (en) * | 2017-11-07 | 2020-05-06 | British Telecomm | Training a machine learning algorithm to select the security configuration for a virtual machine |
WO2019091697A1 (en) | 2017-11-07 | 2019-05-16 | British Telecommunications Public Limited Company | Dynamic security policy |
US11775653B2 (en) * | 2017-11-07 | 2023-10-03 | British Telecommunications Public Limited Company | Security configuration determination |
GB2568114B (en) * | 2017-11-07 | 2020-05-06 | British Telecomm | Training a machine learning algorithm to define vulnerability vectors for a virtual machine configuration vector |
CN107911358B (en) * | 2017-11-09 | 2021-04-27 | 郑州云海信息技术有限公司 | Method and system for protecting network security |
WO2019125516A1 (en) * | 2017-12-23 | 2019-06-27 | Barkly Protects, Inc. | Continuous malicious software identification through responsive machine learning |
US10897470B2 (en) * | 2018-01-31 | 2021-01-19 | Hewlett Packard Enterprise Development Lp | Detecting attacks on computing devices |
US11290479B2 (en) * | 2018-08-11 | 2022-03-29 | Rapid7, Inc. | Determining insights in an electronic environment |
US10826943B2 (en) | 2018-08-21 | 2020-11-03 | At&T Intellectual Property I, L.P. | Security controller |
WO2020104772A1 (en) * | 2018-11-19 | 2020-05-28 | Secure Micro Ltd | Computer implemented method |
MY195710A (en) * | 2018-12-21 | 2023-02-07 | Mimos Berhad | Method of Preparing Virtual Machine, Method of Managing Downloading and Uploading Files at Virtual Machine and System Therefor |
US11068310B2 (en) | 2019-03-08 | 2021-07-20 | International Business Machines Corporation | Secure storage query and donation |
US11176054B2 (en) * | 2019-03-08 | 2021-11-16 | International Business Machines Corporation | Host virtual address space for secure interface control storage |
US11093625B2 (en) * | 2019-05-09 | 2021-08-17 | Vmware, Inc. | Adaptive file access authorization using process access patterns |
US11556633B2 (en) * | 2020-01-03 | 2023-01-17 | Blackberry Limited | Security threat detection in hosted guest operating systems |
US11442766B1 (en) * | 2020-02-03 | 2022-09-13 | Architecture Technology Corporation | Systems and methods for open threat hunt |
US11645390B2 (en) * | 2020-03-16 | 2023-05-09 | Vmware, Inc. | Cloud-based method to increase integrity of a next generation antivirus (NGAV) security solution in a virtualized computing environment |
US11755433B2 (en) * | 2020-12-22 | 2023-09-12 | EMC IP Holding Company LLC | Method and system for health rank based virtual machine restoration using a conformal framework |
WO2022191843A1 (en) * | 2021-03-11 | 2022-09-15 | Hewlett-Packard Development Company, L.P. | Instructions to process files in virtual machines |
US11968222B2 (en) * | 2022-07-05 | 2024-04-23 | Palo Alto Networks (Israel Analytics) Ltd. | Supply chain attack detection |
Family Cites Families (34)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7434003B2 (en) * | 2005-11-15 | 2008-10-07 | Microsoft Corporation | Efficient operating system operation on a hypervisor |
US20070260939A1 (en) | 2006-04-21 | 2007-11-08 | Honeywell International Inc. | Error filtering in fault tolerant computing systems |
WO2009151888A2 (en) * | 2008-05-19 | 2009-12-17 | Authentium, Inc. | Secure virtualization system software |
US10203993B2 (en) * | 2009-02-18 | 2019-02-12 | International Business Machines Corporation | Method and system for continuous optimization of data centers by combining server and storage virtualization |
US8166276B2 (en) * | 2009-02-27 | 2012-04-24 | Advanced Micro Devices, Inc. | Translate and verify instruction for a processor |
US20100268981A1 (en) | 2009-04-20 | 2010-10-21 | Futurewei Technologies, Inc. | System and Method for Tunneling System Error Handling Between Communications Systems |
EP2425341B1 (en) * | 2009-05-01 | 2018-07-11 | Citrix Systems, Inc. | Systems and methods for establishing a cloud bridge between virtual storage resources |
US8254261B2 (en) * | 2009-10-16 | 2012-08-28 | Oracle America, Inc. | Method and system for intra-host communication |
CN102158386B (en) * | 2010-02-11 | 2015-06-03 | 威睿公司 | Distributed load balance for system management program |
US8671405B2 (en) * | 2010-03-31 | 2014-03-11 | Microsoft Corporation | Virtual machine crash file generation techniques |
US8989187B2 (en) * | 2010-06-04 | 2015-03-24 | Coraid, Inc. | Method and system of scaling a cloud computing network |
US8539285B2 (en) | 2010-06-22 | 2013-09-17 | International Business Machines Corporation | Systems for agile error determination and reporting and methods thereof |
US8572741B2 (en) | 2010-10-14 | 2013-10-29 | Moka5, Inc. | Providing security for a virtual machine by selectively triggering a host security scan |
WO2012154658A2 (en) * | 2011-05-06 | 2012-11-15 | University Of North Carolina At Chapel Hill | Methods, systems, and computer readable media for efficient computer forensic analysis and data access control |
US9250969B2 (en) * | 2011-08-30 | 2016-02-02 | At&T Intellectual Property I, L.P. | Tagging a copy of memory of a virtual machine with information for fetching of relevant portions of the memory |
US8402539B1 (en) * | 2011-09-08 | 2013-03-19 | Symantec Corporation | Systems and methods for detecting malware |
US9026864B2 (en) | 2012-02-29 | 2015-05-05 | Red Hat, Inc. | Offloading health-checking policy |
US9311248B2 (en) * | 2012-05-07 | 2016-04-12 | Raytheon Cyber Products, Llc | Methods and apparatuses for monitoring activities of virtual machines |
WO2013184108A1 (en) * | 2012-06-06 | 2013-12-12 | Empire Technology Development Llc | Software protection mechanism |
US9430257B2 (en) * | 2013-01-03 | 2016-08-30 | Red Hat Israel, Inc. | Scheduling virtual machines using user-defined rules |
US9350558B2 (en) * | 2013-01-09 | 2016-05-24 | Dell Products L.P. | Systems and methods for providing multicast routing in an overlay network |
JP6170186B2 (en) * | 2013-03-15 | 2017-07-26 | テレフオンアクチーボラゲット エルエム エリクソン(パブル) | Hypervisors and physical machines and their respective methods for measuring performance in hypervisors and physical machines |
US20150052614A1 (en) * | 2013-08-19 | 2015-02-19 | International Business Machines Corporation | Virtual machine trust isolation in a cloud environment |
US9065854B2 (en) | 2013-10-28 | 2015-06-23 | Citrix Systems, Inc. | Systems and methods for managing a guest virtual machine executing within a virtualized environment |
US9319380B2 (en) * | 2014-03-20 | 2016-04-19 | Bitdefender IPR Management Ltd. | Below-OS security solution for distributed network endpoints |
US9530007B1 (en) * | 2014-08-26 | 2016-12-27 | Amazon Technologies, Inc. | Identifying tamper-resistant characteristics for kernel data structures |
US9628279B2 (en) * | 2014-09-30 | 2017-04-18 | Microsoft Technology Licensing, Llc | Protecting application secrets from operating system attacks |
WO2016107753A1 (en) * | 2014-12-30 | 2016-07-07 | British Telecommunications Public Limited Company | Malware detection in migrated virtual machines |
US9921979B2 (en) * | 2015-01-14 | 2018-03-20 | Red Hat Israel, Ltd. | Position dependent code in virtual machine functions |
US9569247B2 (en) * | 2015-03-31 | 2017-02-14 | Red Hat Israel, Ltd. | Range based virtual machine functions |
US9483644B1 (en) * | 2015-03-31 | 2016-11-01 | Fireeye, Inc. | Methods for detecting file altering malware in VM based analysis |
US10652112B2 (en) * | 2015-10-02 | 2020-05-12 | Keysight Technologies Singapore (Sales) Pte. Ltd. | Network traffic pre-classification within VM platforms in virtual processing environments |
US10630557B2 (en) * | 2015-10-19 | 2020-04-21 | Nicira, Inc. | Virtual network management |
US10515023B2 (en) * | 2016-02-29 | 2019-12-24 | Intel Corporation | System for address mapping and translation protection |
-
2016
- 2016-05-31 US US15/169,320 patent/US10255432B2/en not_active Expired - Fee Related
- 2016-05-31 US US15/169,304 patent/US10210325B2/en active Active
- 2016-05-31 US US15/169,282 patent/US10210324B2/en active Active
- 2016-05-31 US US15/169,230 patent/US10409983B2/en active Active
- 2016-05-31 US US15/169,248 patent/US10579792B2/en active Active
- 2016-05-31 US US15/169,203 patent/US10157276B2/en active Active
- 2016-11-16 SG SG11201804196WA patent/SG11201804196WA/en unknown
- 2016-11-16 EP EP20184056.8A patent/EP3767506A1/en not_active Withdrawn
- 2016-11-16 EP EP16869078.2A patent/EP3380933B1/en active Active
- 2016-11-16 SG SG10201911343VA patent/SG10201911343VA/en unknown
- 2016-11-16 SG SG10201911370SA patent/SG10201911370SA/en unknown
- 2016-11-16 SG SG10201911266YA patent/SG10201911266YA/en unknown
- 2016-11-16 SG SG10201911212YA patent/SG10201911212YA/en unknown
- 2016-11-16 SG SG10201911284SA patent/SG10201911284SA/en unknown
Also Published As
Publication number | Publication date |
---|---|
EP3767506A1 (en) | 2021-01-20 |
US10157276B2 (en) | 2018-12-18 |
US10210324B2 (en) | 2019-02-19 |
SG10201911212YA (en) | 2020-02-27 |
US20180004938A1 (en) | 2018-01-04 |
US10210325B2 (en) | 2019-02-19 |
US20170147820A1 (en) | 2017-05-25 |
US20170147821A1 (en) | 2017-05-25 |
SG10201911343VA (en) | 2020-02-27 |
EP3380933B1 (en) | 2020-07-08 |
US20170149801A1 (en) | 2017-05-25 |
EP3380933A1 (en) | 2018-10-03 |
US10579792B2 (en) | 2020-03-03 |
SG10201911370SA (en) | 2020-02-27 |
US10409983B2 (en) | 2019-09-10 |
US10255432B2 (en) | 2019-04-09 |
US20170147816A1 (en) | 2017-05-25 |
SG11201804196WA (en) | 2018-06-28 |
EP3380933A4 (en) | 2019-05-22 |
SG10201911266YA (en) | 2020-01-30 |
US20170149807A1 (en) | 2017-05-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
SG10201911284SA (en) | Extracting malicious instructions on a virtual machine in a network environment | |
GB2555175B (en) | Efficient attack mitigation in a virtual machine | |
GB2555176B (en) | Machine learning for attack mitigation in virtual machines | |
HK1254084A1 (en) | System and methods for auditing a virtual machine | |
GB2548700B (en) | Virtual machine security | |
GB201602099D0 (en) | Securityevent detection through virtual machine introspection | |
GB2545838B (en) | Hypervisor and virtual machine protection | |
SG11201705365UA (en) | Virtual currency conversion device, method and computer program | |
EP2804100A4 (en) | Virtual machine management program, method and device | |
EP3133771A4 (en) | Virtual machine resource changing method, device and virtual network function device | |
HK1251315B (en) | Virtual machine systems | |
GB201400515D0 (en) | Gaming machine with wild multiplier feature | |
ZA201507128B (en) | Gaming machine | |
PL2975801T3 (en) | Method for detecting an attack in a computer network | |
EP3149578A4 (en) | Grouping virtual machines in a cloud application | |
EP3236623A4 (en) | Link management method, device and system in virtual machine environment | |
GB201414347D0 (en) | Suspending and resuming virtual machines | |
GB2563086B (en) | Cyber Synchronous Machine (in short, Cybersync Machine) | |
GB2536802B (en) | Reducing virtual machine pre-emption in virtualized environment | |
SG11201606927XA (en) | Game machine | |
GB201512177D0 (en) | Machine to machine virtual private network | |
EP3105910A4 (en) | Enabling different device triggering aspects in a machine to machine communication system | |
PL2796046T3 (en) | Meat mass processing machine | |
EP3299960A4 (en) | Virtual machine deployment method, device and network function virtualization orchestrator (nfvo) | |
GB201503831D0 (en) | Virtual trying on experience |