SG11201702431PA - Analysis system, analysis device, analysis method, and storage medium having analysis program recorded therein - Google Patents
Analysis system, analysis device, analysis method, and storage medium having analysis program recorded thereinInfo
- Publication number
- SG11201702431PA SG11201702431PA SG11201702431PA SG11201702431PA SG11201702431PA SG 11201702431P A SG11201702431P A SG 11201702431PA SG 11201702431P A SG11201702431P A SG 11201702431PA SG 11201702431P A SG11201702431P A SG 11201702431PA SG 11201702431P A SG11201702431P A SG 11201702431PA
- Authority
- SG
- Singapore
- Prior art keywords
- analysis
- storage medium
- program recorded
- analysis method
- analysis system
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/088—Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
- H04L9/003—Countermeasures against attacks on cryptographic mechanisms for power analysis, e.g. differential power analysis [DPA] or simple power analysis [SPA]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/085—Retrieval of network configuration; Tracking network configuration history
- H04L41/0853—Retrieval of network configuration; Tracking network configuration history by actively collecting configuration information or by backing up configuration information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/065—Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/26—Testing cryptographic entity, e.g. testing integrity of encryption key or encryption algorithm
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Debugging And Monitoring (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2014195177 | 2014-09-25 | ||
PCT/JP2015/004755 WO2016047115A1 (en) | 2014-09-25 | 2015-09-17 | Analysis system, analysis device, analysis method, and storage medium having analysis program recorded therein |
Publications (1)
Publication Number | Publication Date |
---|---|
SG11201702431PA true SG11201702431PA (en) | 2017-04-27 |
Family
ID=55580662
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG11201702431PA SG11201702431PA (en) | 2014-09-25 | 2015-09-17 | Analysis system, analysis device, analysis method, and storage medium having analysis program recorded therein |
Country Status (5)
Country | Link |
---|---|
US (1) | US10554383B2 (en) |
EP (1) | EP3211824B1 (en) |
JP (1) | JP6229800B2 (en) |
SG (1) | SG11201702431PA (en) |
WO (1) | WO2016047115A1 (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP6319369B2 (en) * | 2016-06-23 | 2018-05-09 | 日本電気株式会社 | PROCESS CONTROL DEVICE, PROCESS CONTROL METHOD, AND PROCESS CONTROL PROGRAM |
US10637879B2 (en) * | 2017-10-06 | 2020-04-28 | Carbonite, Inc. | Systems and methods for detection and mitigation of malicious encryption |
WO2020032116A1 (en) * | 2018-08-10 | 2020-02-13 | 株式会社デンソー | Vehicle master device, security access key management method, security access key management program, and data structure of specifications data |
JP7111074B2 (en) * | 2018-08-10 | 2022-08-02 | 株式会社デンソー | Vehicle master device, security access key management method, security access key management program, and vehicle electronic control system |
JP6671701B1 (en) * | 2019-07-19 | 2020-03-25 | Eaglys株式会社 | Arithmetic device, arithmetic method, arithmetic program, and arithmetic system |
US11848958B2 (en) * | 2019-12-23 | 2023-12-19 | Mcafee, Llc | Methods and apparatus to detect malware based on network traffic analysis |
US11539503B2 (en) | 2021-03-03 | 2022-12-27 | Red Hat, Inc. | Container management for cryptanalysis attack protection |
Family Cites Families (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH07327029A (en) | 1994-05-31 | 1995-12-12 | Fujitsu Ltd | Ciphering communication system |
US7587044B2 (en) * | 1998-01-02 | 2009-09-08 | Cryptography Research, Inc. | Differential power analysis method and apparatus |
JP2003124924A (en) * | 2001-10-12 | 2003-04-25 | Koden Electronics Co Ltd | Method of confirming safety of data and cipher system |
JP2006279938A (en) | 2005-03-01 | 2006-10-12 | Matsushita Electric Works Ltd | Decryption apparatus for use in encrypted communication |
JP2008059561A (en) | 2006-08-04 | 2008-03-13 | Canon Inc | Information processing apparatus, data processing apparatus, and methods thereof |
JP2007116752A (en) | 2007-02-05 | 2007-05-10 | Koden Electronics Co Ltd | Method of confirming correctness of decrypted data |
JP4990658B2 (en) * | 2007-03-28 | 2012-08-01 | 三菱電機株式会社 | Receiver |
JP5083760B2 (en) | 2007-08-03 | 2012-11-28 | 独立行政法人情報通信研究機構 | Malware similarity inspection method and apparatus |
US8549625B2 (en) | 2008-12-12 | 2013-10-01 | International Business Machines Corporation | Classification of unwanted or malicious software through the identification of encrypted data communication |
JP4799626B2 (en) | 2009-02-04 | 2011-10-26 | ソニーオプティアーク株式会社 | Information processing apparatus, information processing method, and program |
US8863282B2 (en) | 2009-10-15 | 2014-10-14 | Mcafee Inc. | Detecting and responding to malware using link files |
US8302194B2 (en) | 2009-10-26 | 2012-10-30 | Symantec Corporation | Using file prevalence to inform aggressiveness of behavioral heuristics |
EP2691908B1 (en) | 2011-03-28 | 2018-12-05 | McAfee, LLC | System and method for virtual machine monitor based anti-malware security |
JP5389855B2 (en) | 2011-04-28 | 2014-01-15 | 日本電信電話株式会社 | Analysis system, analysis method and analysis program |
JP2013105366A (en) | 2011-11-15 | 2013-05-30 | Hitachi Ltd | Program analyzing system and method |
JP5839967B2 (en) * | 2011-12-01 | 2016-01-06 | 三菱電機株式会社 | Malware analysis system |
-
2015
- 2015-09-17 JP JP2016549948A patent/JP6229800B2/en active Active
- 2015-09-17 US US15/512,154 patent/US10554383B2/en active Active
- 2015-09-17 EP EP15843652.7A patent/EP3211824B1/en active Active
- 2015-09-17 SG SG11201702431PA patent/SG11201702431PA/en unknown
- 2015-09-17 WO PCT/JP2015/004755 patent/WO2016047115A1/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
EP3211824A1 (en) | 2017-08-30 |
US20170279601A1 (en) | 2017-09-28 |
JPWO2016047115A1 (en) | 2017-07-20 |
JP6229800B2 (en) | 2017-11-15 |
EP3211824B1 (en) | 2020-12-09 |
EP3211824A4 (en) | 2018-05-16 |
US10554383B2 (en) | 2020-02-04 |
WO2016047115A1 (en) | 2016-03-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
HK1222744A1 (en) | Methods and systems for data analysis and compression | |
SG11201701066XA (en) | Data retrieval apparatus, program and recording medium | |
FI4203593T3 (en) | Method and apparatus for receiving information, and storage medium | |
EP3159820A4 (en) | Authentication device, authentication system, authentication method, and program storage medium | |
GB201705105D0 (en) | System and method for collection, storage and managementfor medical data | |
HK1250086A1 (en) | Information processing device, information processing method, and recording medium storing program | |
HK1250081A1 (en) | Information processing device, information processing method, and recording medium with program stored therein | |
EP3094083A4 (en) | File generation method, file generation device and recording medium | |
EP3396354A4 (en) | Number analyzing method, number analyzing device, and storage medium for number analysis | |
SG11201701365XA (en) | File access method and apparatus, and storage system | |
SG11201702431PA (en) | Analysis system, analysis device, analysis method, and storage medium having analysis program recorded therein | |
EP2977876A4 (en) | Information processing device, information processing method, program, and information storage medium | |
EP2957357A4 (en) | Air-flushing method, air-flushing device, program and recording medium | |
PL3012835T3 (en) | Linear-prediction analysis device, method, program, and storage medium | |
SG11201702815WA (en) | Recording Medium, Playback Method, And Playback Device | |
EP3185234A4 (en) | Secret calculation system and relay device, and method, program, and storage medium thereof | |
GB201719210D0 (en) | Sound source position detection device, sound source position detection method, sound source position detection program, and storage medium | |
SG11201609072QA (en) | Information-processing device, information-processing monitoring method, and recording medium | |
GB2549617B (en) | Pipe network analysis device, pipe network analysis method, and storage medium in which computer program is recorded | |
GB2565005B (en) | Analysis device, analysis method, and storage medium storing program | |
PL3699910T3 (en) | Periodic-combined-envelope-sequence generation device, periodic-combined-envelope-sequence generation method, periodic-combined-envelope-sequence generation program and recording medium | |
EP3032523A4 (en) | Information processing device, program, and storage medium | |
GB201808922D0 (en) | Device, method, and recording medium | |
GB201814927D0 (en) | Analysis device, analysis method and storage medium which stores program | |
EP3098813A4 (en) | Linear-predictive analysis device, method, program, and recording medium |