SG10201911370SA - Extracting malicious instructions on a virtual machine in a network environment - Google Patents

Extracting malicious instructions on a virtual machine in a network environment

Info

Publication number
SG10201911370SA
SG10201911370SA SG10201911370SA SG10201911370SA SG10201911370SA SG 10201911370S A SG10201911370S A SG 10201911370SA SG 10201911370S A SG10201911370S A SG 10201911370SA SG 10201911370S A SG10201911370S A SG 10201911370SA SG 10201911370S A SG10201911370S A SG 10201911370SA
Authority
SG
Singapore
Prior art keywords
virtual machine
network environment
malicious instructions
extracting malicious
extracting
Prior art date
Application number
SG10201911370SA
Inventor
Jeffery Schilling
Chase Cunningham
Tawfiq Shah
Srujan Kotikela
Original Assignee
Armor Defense Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Armor Defense Inc filed Critical Armor Defense Inc
Publication of SG10201911370SA publication Critical patent/SG10201911370SA/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/02Addressing or allocation; Relocation
    • G06F12/08Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems
    • G06F12/10Address translation
    • G06F12/1009Address translation using page tables, e.g. page table structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/28Databases characterised by their database models, e.g. relational or object models
    • G06F16/284Relational databases
    • G06F16/285Clustering or classification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/54Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/561Virus type analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/565Static detection by checking file integrity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45545Guest-host, i.e. hypervisor is an application program itself, e.g. VirtualBox
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45579I/O management, e.g. providing access to device drivers or storage
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45583Memory management, e.g. access or allocation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45587Isolation or security of virtual machine instances
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45591Monitoring or debugging support
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45595Network integration; Enabling network access in virtual machine instances
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/567Computer malware detection or handling, e.g. anti-virus arrangements using dedicated hardware
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2212/00Indexing scheme relating to accessing, addressing or allocation within memory systems or architectures
    • G06F2212/10Providing a specific technical effect
    • G06F2212/1052Security improvement
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2212/00Indexing scheme relating to accessing, addressing or allocation within memory systems or architectures
    • G06F2212/15Use in a specific computing environment
    • G06F2212/152Virtualized environment, e.g. logically partitioned system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2212/00Indexing scheme relating to accessing, addressing or allocation within memory systems or architectures
    • G06F2212/15Use in a specific computing environment
    • G06F2212/154Networked environment
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/034Test or assess a computer or a system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment
SG10201911370SA 2015-11-23 2016-11-16 Extracting malicious instructions on a virtual machine in a network environment SG10201911370SA (en)

Applications Claiming Priority (7)

Application Number Priority Date Filing Date Title
US201562258730P 2015-11-23 2015-11-23
US15/169,248 US10579792B2 (en) 2015-11-23 2016-05-31 Extracting malicious instructions on a virtual machine
US15/169,282 US10210324B2 (en) 2015-11-23 2016-05-31 Detecting malicious instructions on a virtual machine
US15/169,230 US10409983B2 (en) 2015-11-23 2016-05-31 Detecting malicious instructions in a virtual machine memory
US15/169,304 US10210325B2 (en) 2015-11-23 2016-05-31 Extracting and detecting malicious instructions on a virtual machine
US15/169,203 US10157276B2 (en) 2015-11-23 2016-05-31 Extracting malicious instructions on a virtual machine in a network environment
US15/169,320 US10255432B2 (en) 2015-11-23 2016-05-31 Detecting malicious instructions on a virtual machine using profiling

Publications (1)

Publication Number Publication Date
SG10201911370SA true SG10201911370SA (en) 2020-02-27

Family

ID=58719700

Family Applications (6)

Application Number Title Priority Date Filing Date
SG11201804196WA SG11201804196WA (en) 2015-11-23 2016-11-16 Extracting malicious instructions on a virtual machine in a network environment
SG10201911343VA SG10201911343VA (en) 2015-11-23 2016-11-16 Extracting malicious instructions on a virtual machine in a network environment
SG10201911370SA SG10201911370SA (en) 2015-11-23 2016-11-16 Extracting malicious instructions on a virtual machine in a network environment
SG10201911266YA SG10201911266YA (en) 2015-11-23 2016-11-16 Extracting malicious instructions on a virtual machine in a network environment
SG10201911212YA SG10201911212YA (en) 2015-11-23 2016-11-16 Extracting malicious instructions on a virtual machine in a network environment
SG10201911284SA SG10201911284SA (en) 2015-11-23 2016-11-16 Extracting malicious instructions on a virtual machine in a network environment

Family Applications Before (2)

Application Number Title Priority Date Filing Date
SG11201804196WA SG11201804196WA (en) 2015-11-23 2016-11-16 Extracting malicious instructions on a virtual machine in a network environment
SG10201911343VA SG10201911343VA (en) 2015-11-23 2016-11-16 Extracting malicious instructions on a virtual machine in a network environment

Family Applications After (3)

Application Number Title Priority Date Filing Date
SG10201911266YA SG10201911266YA (en) 2015-11-23 2016-11-16 Extracting malicious instructions on a virtual machine in a network environment
SG10201911212YA SG10201911212YA (en) 2015-11-23 2016-11-16 Extracting malicious instructions on a virtual machine in a network environment
SG10201911284SA SG10201911284SA (en) 2015-11-23 2016-11-16 Extracting malicious instructions on a virtual machine in a network environment

Country Status (3)

Country Link
US (6) US10255432B2 (en)
EP (2) EP3767506A1 (en)
SG (6) SG11201804196WA (en)

Families Citing this family (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ATE500698T1 (en) 2004-04-30 2011-03-15 Research In Motion Ltd SYSTEM AND METHOD FOR FILTERING DATA TRANSFERS IN A MOBILE DEVICE
US10078752B2 (en) * 2014-03-27 2018-09-18 Barkly Protects, Inc. Continuous malicious software identification through responsive machine learning
US10198280B2 (en) 2015-12-14 2019-02-05 Barkly Protects, Inc. Method and apparatus for hypervisor based monitoring of system interactions
US10509685B2 (en) * 2015-12-14 2019-12-17 VCE IP Holding Company, LLC Methods, systems, and computer readable mediums for workload clustering
US10462173B1 (en) * 2016-06-30 2019-10-29 Fireeye, Inc. Malware detection verification and enhancement by coordinating endpoint and malware detection systems
US10318723B1 (en) * 2016-11-29 2019-06-11 Sprint Communications Company L.P. Hardware-trusted network-on-chip (NOC) and system-on-chip (SOC) network function virtualization (NFV) data communications
US10791134B2 (en) * 2016-12-21 2020-09-29 Threat Stack, Inc. System and method for cloud-based operating system event and data access monitoring
US10375169B1 (en) * 2017-05-24 2019-08-06 United States Of America As Represented By The Secretary Of The Navy System and method for automatically triggering the live migration of cloud services and automatically performing the triggered migration
US10546120B2 (en) * 2017-09-25 2020-01-28 AO Kaspersky Lab System and method of forming a log in a virtual machine for conducting an antivirus scan of a file
GB2568115B (en) * 2017-11-07 2020-05-06 British Telecomm Training a machine learning algorithm to select the security configuration for a virtual machine
WO2019091697A1 (en) 2017-11-07 2019-05-16 British Telecommunications Public Limited Company Dynamic security policy
US11775653B2 (en) * 2017-11-07 2023-10-03 British Telecommunications Public Limited Company Security configuration determination
GB2568114B (en) * 2017-11-07 2020-05-06 British Telecomm Training a machine learning algorithm to define vulnerability vectors for a virtual machine configuration vector
CN107911358B (en) * 2017-11-09 2021-04-27 郑州云海信息技术有限公司 Method and system for protecting network security
WO2019125516A1 (en) * 2017-12-23 2019-06-27 Barkly Protects, Inc. Continuous malicious software identification through responsive machine learning
US10897470B2 (en) * 2018-01-31 2021-01-19 Hewlett Packard Enterprise Development Lp Detecting attacks on computing devices
US11290479B2 (en) * 2018-08-11 2022-03-29 Rapid7, Inc. Determining insights in an electronic environment
US10826943B2 (en) 2018-08-21 2020-11-03 At&T Intellectual Property I, L.P. Security controller
WO2020104772A1 (en) * 2018-11-19 2020-05-28 Secure Micro Ltd Computer implemented method
MY195710A (en) * 2018-12-21 2023-02-07 Mimos Berhad Method of Preparing Virtual Machine, Method of Managing Downloading and Uploading Files at Virtual Machine and System Therefor
US11068310B2 (en) 2019-03-08 2021-07-20 International Business Machines Corporation Secure storage query and donation
US11176054B2 (en) * 2019-03-08 2021-11-16 International Business Machines Corporation Host virtual address space for secure interface control storage
US11093625B2 (en) * 2019-05-09 2021-08-17 Vmware, Inc. Adaptive file access authorization using process access patterns
US11556633B2 (en) * 2020-01-03 2023-01-17 Blackberry Limited Security threat detection in hosted guest operating systems
US11442766B1 (en) * 2020-02-03 2022-09-13 Architecture Technology Corporation Systems and methods for open threat hunt
US11645390B2 (en) * 2020-03-16 2023-05-09 Vmware, Inc. Cloud-based method to increase integrity of a next generation antivirus (NGAV) security solution in a virtualized computing environment
US11755433B2 (en) * 2020-12-22 2023-09-12 EMC IP Holding Company LLC Method and system for health rank based virtual machine restoration using a conformal framework
WO2022191843A1 (en) * 2021-03-11 2022-09-15 Hewlett-Packard Development Company, L.P. Instructions to process files in virtual machines
US11968222B2 (en) * 2022-07-05 2024-04-23 Palo Alto Networks (Israel Analytics) Ltd. Supply chain attack detection

Family Cites Families (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7434003B2 (en) * 2005-11-15 2008-10-07 Microsoft Corporation Efficient operating system operation on a hypervisor
US20070260939A1 (en) 2006-04-21 2007-11-08 Honeywell International Inc. Error filtering in fault tolerant computing systems
WO2009151888A2 (en) * 2008-05-19 2009-12-17 Authentium, Inc. Secure virtualization system software
US10203993B2 (en) * 2009-02-18 2019-02-12 International Business Machines Corporation Method and system for continuous optimization of data centers by combining server and storage virtualization
US8166276B2 (en) * 2009-02-27 2012-04-24 Advanced Micro Devices, Inc. Translate and verify instruction for a processor
US20100268981A1 (en) 2009-04-20 2010-10-21 Futurewei Technologies, Inc. System and Method for Tunneling System Error Handling Between Communications Systems
EP2425341B1 (en) * 2009-05-01 2018-07-11 Citrix Systems, Inc. Systems and methods for establishing a cloud bridge between virtual storage resources
US8254261B2 (en) * 2009-10-16 2012-08-28 Oracle America, Inc. Method and system for intra-host communication
CN102158386B (en) * 2010-02-11 2015-06-03 威睿公司 Distributed load balance for system management program
US8671405B2 (en) * 2010-03-31 2014-03-11 Microsoft Corporation Virtual machine crash file generation techniques
US8989187B2 (en) * 2010-06-04 2015-03-24 Coraid, Inc. Method and system of scaling a cloud computing network
US8539285B2 (en) 2010-06-22 2013-09-17 International Business Machines Corporation Systems for agile error determination and reporting and methods thereof
US8572741B2 (en) 2010-10-14 2013-10-29 Moka5, Inc. Providing security for a virtual machine by selectively triggering a host security scan
WO2012154658A2 (en) * 2011-05-06 2012-11-15 University Of North Carolina At Chapel Hill Methods, systems, and computer readable media for efficient computer forensic analysis and data access control
US9250969B2 (en) * 2011-08-30 2016-02-02 At&T Intellectual Property I, L.P. Tagging a copy of memory of a virtual machine with information for fetching of relevant portions of the memory
US8402539B1 (en) * 2011-09-08 2013-03-19 Symantec Corporation Systems and methods for detecting malware
US9026864B2 (en) 2012-02-29 2015-05-05 Red Hat, Inc. Offloading health-checking policy
US9311248B2 (en) * 2012-05-07 2016-04-12 Raytheon Cyber Products, Llc Methods and apparatuses for monitoring activities of virtual machines
WO2013184108A1 (en) * 2012-06-06 2013-12-12 Empire Technology Development Llc Software protection mechanism
US9430257B2 (en) * 2013-01-03 2016-08-30 Red Hat Israel, Inc. Scheduling virtual machines using user-defined rules
US9350558B2 (en) * 2013-01-09 2016-05-24 Dell Products L.P. Systems and methods for providing multicast routing in an overlay network
JP6170186B2 (en) * 2013-03-15 2017-07-26 テレフオンアクチーボラゲット エルエム エリクソン(パブル) Hypervisors and physical machines and their respective methods for measuring performance in hypervisors and physical machines
US20150052614A1 (en) * 2013-08-19 2015-02-19 International Business Machines Corporation Virtual machine trust isolation in a cloud environment
US9065854B2 (en) 2013-10-28 2015-06-23 Citrix Systems, Inc. Systems and methods for managing a guest virtual machine executing within a virtualized environment
US9319380B2 (en) * 2014-03-20 2016-04-19 Bitdefender IPR Management Ltd. Below-OS security solution for distributed network endpoints
US9530007B1 (en) * 2014-08-26 2016-12-27 Amazon Technologies, Inc. Identifying tamper-resistant characteristics for kernel data structures
US9628279B2 (en) * 2014-09-30 2017-04-18 Microsoft Technology Licensing, Llc Protecting application secrets from operating system attacks
WO2016107753A1 (en) * 2014-12-30 2016-07-07 British Telecommunications Public Limited Company Malware detection in migrated virtual machines
US9921979B2 (en) * 2015-01-14 2018-03-20 Red Hat Israel, Ltd. Position dependent code in virtual machine functions
US9569247B2 (en) * 2015-03-31 2017-02-14 Red Hat Israel, Ltd. Range based virtual machine functions
US9483644B1 (en) * 2015-03-31 2016-11-01 Fireeye, Inc. Methods for detecting file altering malware in VM based analysis
US10652112B2 (en) * 2015-10-02 2020-05-12 Keysight Technologies Singapore (Sales) Pte. Ltd. Network traffic pre-classification within VM platforms in virtual processing environments
US10630557B2 (en) * 2015-10-19 2020-04-21 Nicira, Inc. Virtual network management
US10515023B2 (en) * 2016-02-29 2019-12-24 Intel Corporation System for address mapping and translation protection

Also Published As

Publication number Publication date
EP3767506A1 (en) 2021-01-20
US10157276B2 (en) 2018-12-18
US10210324B2 (en) 2019-02-19
SG10201911212YA (en) 2020-02-27
US20180004938A1 (en) 2018-01-04
US10210325B2 (en) 2019-02-19
US20170147820A1 (en) 2017-05-25
US20170147821A1 (en) 2017-05-25
SG10201911343VA (en) 2020-02-27
EP3380933B1 (en) 2020-07-08
US20170149801A1 (en) 2017-05-25
EP3380933A1 (en) 2018-10-03
US10579792B2 (en) 2020-03-03
US10409983B2 (en) 2019-09-10
US10255432B2 (en) 2019-04-09
US20170147816A1 (en) 2017-05-25
SG10201911284SA (en) 2020-02-27
SG11201804196WA (en) 2018-06-28
EP3380933A4 (en) 2019-05-22
SG10201911266YA (en) 2020-01-30
US20170149807A1 (en) 2017-05-25

Similar Documents

Publication Publication Date Title
SG10201911284SA (en) Extracting malicious instructions on a virtual machine in a network environment
GB2555175B (en) Efficient attack mitigation in a virtual machine
GB2555176B (en) Machine learning for attack mitigation in virtual machines
HK1254084A1 (en) System and methods for auditing a virtual machine
GB2548700B (en) Virtual machine security
GB201602099D0 (en) Securityevent detection through virtual machine introspection
GB2545838B (en) Hypervisor and virtual machine protection
SG11201705365UA (en) Virtual currency conversion device, method and computer program
EP2804100A4 (en) Virtual machine management program, method and device
EP3133771A4 (en) Virtual machine resource changing method, device and virtual network function device
HK1251315B (en) Virtual machine systems
GB201400515D0 (en) Gaming machine with wild multiplier feature
ZA201507128B (en) Gaming machine
PL2975801T3 (en) Method for detecting an attack in a computer network
EP3149578A4 (en) Grouping virtual machines in a cloud application
EP3236623A4 (en) Link management method, device and system in virtual machine environment
GB201414347D0 (en) Suspending and resuming virtual machines
GB2563086B (en) Cyber Synchronous Machine (in short, Cybersync Machine)
GB2536802B (en) Reducing virtual machine pre-emption in virtualized environment
SG11201606927XA (en) Game machine
GB201512177D0 (en) Machine to machine virtual private network
EP3105910A4 (en) Enabling different device triggering aspects in a machine to machine communication system
PL2796046T3 (en) Meat mass processing machine
EP3299960A4 (en) Virtual machine deployment method, device and network function virtualization orchestrator (nfvo)
GB201503831D0 (en) Virtual trying on experience