SG11201702438VA - Analysis system, analysis device, analysis method, and storage medium having analysis program recorded therein - Google Patents
Analysis system, analysis device, analysis method, and storage medium having analysis program recorded thereinInfo
- Publication number
- SG11201702438VA SG11201702438VA SG11201702438VA SG11201702438VA SG11201702438VA SG 11201702438V A SG11201702438V A SG 11201702438VA SG 11201702438V A SG11201702438V A SG 11201702438VA SG 11201702438V A SG11201702438V A SG 11201702438VA SG 11201702438V A SG11201702438V A SG 11201702438VA
- Authority
- SG
- Singapore
- Prior art keywords
- analysis
- storage medium
- program recorded
- analysis method
- analysis system
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/12—Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/10—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols with particular housing, physical features or manual controls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/36—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols with means for detecting characters not meant for transmission
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Debugging And Monitoring (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2014195178 | 2014-09-25 | ||
PCT/JP2015/004744 WO2016047111A1 (en) | 2014-09-25 | 2015-09-17 | Analysis system, analysis device, analysis method, and storage medium having analysis program recorded therein |
Publications (1)
Publication Number | Publication Date |
---|---|
SG11201702438VA true SG11201702438VA (en) | 2017-04-27 |
Family
ID=55580658
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG11201702438VA SG11201702438VA (en) | 2014-09-25 | 2015-09-17 | Analysis system, analysis device, analysis method, and storage medium having analysis program recorded therein |
Country Status (5)
Country | Link |
---|---|
US (1) | US10536261B2 (en) |
EP (1) | EP3200390B1 (en) |
JP (1) | JP6369554B2 (en) |
SG (1) | SG11201702438VA (en) |
WO (1) | WO2016047111A1 (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP6834688B2 (en) * | 2017-03-30 | 2021-02-24 | 日本電気株式会社 | Malware analysis method, malware analysis device and malware analysis system |
FR3067486B1 (en) * | 2017-06-09 | 2021-08-27 | Cryptosense | NON-INTRUSIVE DETECTION PROCESS FOR SECURITY BREAKS OF A COMPUTER PROGRAM |
JP6671701B1 (en) * | 2019-07-19 | 2020-03-25 | Eaglys株式会社 | Arithmetic device, arithmetic method, arithmetic program, and arithmetic system |
Family Cites Families (35)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1001569A4 (en) * | 1998-06-02 | 2002-03-13 | Nippon Telegraph & Telephone | Device and method for evaluating randomness of function, device and method for generating random function, and recorded medium on which programs for implementing these methods are recorded |
JP2002082907A (en) * | 2000-09-11 | 2002-03-22 | Nec Corp | Security function substitution method in data communication and its system, and recording medium |
US7228412B2 (en) * | 2001-07-06 | 2007-06-05 | Juniper Networks, Inc. | Bufferless secure sockets layer architecture |
IL155671A (en) * | 2003-04-30 | 2004-12-15 | Elad Barkan | Cryptanalysis method and system |
US7764785B2 (en) * | 2004-11-08 | 2010-07-27 | King Fahd University Of Petroleum And Minerals | Method for communicating securely over an insecure communication channel |
US9176772B2 (en) * | 2005-02-11 | 2015-11-03 | Oracle International Corporation | Suspending and resuming of sessions |
JP2006279938A (en) | 2005-03-01 | 2006-10-12 | Matsushita Electric Works Ltd | Decryption apparatus for use in encrypted communication |
JP5018315B2 (en) * | 2006-09-14 | 2012-09-05 | ソニー株式会社 | Wireless communication system, wireless communication device, authentication method for wireless communication device, and program |
JP2007116752A (en) | 2007-02-05 | 2007-05-10 | Koden Electronics Co Ltd | Method of confirming correctness of decrypted data |
US8131994B2 (en) * | 2007-06-01 | 2012-03-06 | Cisco Technology, Inc. | Dual cryptographic keying |
JP5083760B2 (en) | 2007-08-03 | 2012-11-28 | 独立行政法人情報通信研究機構 | Malware similarity inspection method and apparatus |
WO2009060899A1 (en) * | 2007-11-07 | 2009-05-14 | Nippon Telegraph And Telephone Corporation | Common key setting method, relay device, and program |
US8117449B2 (en) * | 2007-12-27 | 2012-02-14 | Mastercard International, Inc. | Method to detect man-in-the-middle (MITM) or relay attacks |
JP2009187339A (en) | 2008-02-07 | 2009-08-20 | Nec Corp | E-mail apparatus, e-mail system, e-mail inspection method and e-mail inspection program |
US8098816B2 (en) * | 2008-10-17 | 2012-01-17 | Qualcomm Incorporated | Apparatus and method for evaluating a cipher structure's resistance to cryptanalysis |
US8549625B2 (en) | 2008-12-12 | 2013-10-01 | International Business Machines Corporation | Classification of unwanted or malicious software through the identification of encrypted data communication |
US8863282B2 (en) | 2009-10-15 | 2014-10-14 | Mcafee Inc. | Detecting and responding to malware using link files |
US8302194B2 (en) | 2009-10-26 | 2012-10-30 | Symantec Corporation | Using file prevalence to inform aggressiveness of behavioral heuristics |
US8875220B2 (en) * | 2010-07-01 | 2014-10-28 | Raytheom Company | Proxy-based network access protection |
US8924705B1 (en) * | 2010-09-24 | 2014-12-30 | Revera Systems | Method and detection system for detecting encrypted peer-to-peer (EP2P) sessions associated with a particular EP2P network |
WO2012135192A2 (en) | 2011-03-28 | 2012-10-04 | Mcafee, Inc. | System and method for virtual machine monitor based anti-malware security |
IL212344A (en) * | 2011-04-14 | 2015-03-31 | Verint Systems Ltd | System and method for selective inspection of encrypted traffic |
JP5389855B2 (en) | 2011-04-28 | 2014-01-15 | 日本電信電話株式会社 | Analysis system, analysis method and analysis program |
JP2013105366A (en) | 2011-11-15 | 2013-05-30 | Hitachi Ltd | Program analyzing system and method |
JP5839967B2 (en) * | 2011-12-01 | 2016-01-06 | 三菱電機株式会社 | Malware analysis system |
EP2807560B1 (en) * | 2012-01-24 | 2019-12-04 | SSH Communications Security Oyj | Privileged access auditing |
JP5994390B2 (en) * | 2012-05-24 | 2016-09-21 | 株式会社バッファロー | Authentication method and wireless connection device |
US9176838B2 (en) * | 2012-10-19 | 2015-11-03 | Intel Corporation | Encrypted data inspection in a network environment |
JP6129523B2 (en) * | 2012-11-19 | 2017-05-17 | 株式会社東芝 | Communication apparatus and program |
WO2014142901A1 (en) * | 2013-03-14 | 2014-09-18 | Mcafee, Inc. | Decryption of data between a client and a server |
US20140298415A1 (en) * | 2013-03-28 | 2014-10-02 | Research In Motion Limited | Method and system for providing connectivity for an ssl/tls server behind a restrictive firewall or nat |
US8996873B1 (en) * | 2014-04-08 | 2015-03-31 | Cloudflare, Inc. | Secure session capability using public-key cryptography without access to the private key |
US9184911B2 (en) * | 2014-04-08 | 2015-11-10 | Cloudflare, Inc. | Secure session capability using public-key cryptography without access to the private key |
US9652417B2 (en) * | 2014-05-19 | 2017-05-16 | Fortinet, Inc. | Network interface card rate limiting |
JP2016029787A (en) * | 2014-07-16 | 2016-03-03 | キヤノン株式会社 | Information processing unit, encryption communication method, and program |
-
2015
- 2015-09-17 US US15/510,742 patent/US10536261B2/en active Active
- 2015-09-17 SG SG11201702438VA patent/SG11201702438VA/en unknown
- 2015-09-17 EP EP15845289.6A patent/EP3200390B1/en active Active
- 2015-09-17 JP JP2016549944A patent/JP6369554B2/en active Active
- 2015-09-17 WO PCT/JP2015/004744 patent/WO2016047111A1/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
JPWO2016047111A1 (en) | 2017-07-06 |
EP3200390A4 (en) | 2018-05-16 |
EP3200390B1 (en) | 2019-10-30 |
US20170288854A1 (en) | 2017-10-05 |
WO2016047111A1 (en) | 2016-03-31 |
US10536261B2 (en) | 2020-01-14 |
EP3200390A1 (en) | 2017-08-02 |
JP6369554B2 (en) | 2018-08-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
HK1222744A1 (en) | Methods and systems for data analysis and compression | |
SG11201701066XA (en) | Data retrieval apparatus, program and recording medium | |
FI4203593T3 (en) | Method and apparatus for receiving information, and storage medium | |
EP3159820A4 (en) | Authentication device, authentication system, authentication method, and program storage medium | |
GB201705105D0 (en) | System and method for collection, storage and managementfor medical data | |
HK1250086A1 (en) | Information processing device, information processing method, and recording medium storing program | |
HK1250081A1 (en) | Information processing device, information processing method, and recording medium with program stored therein | |
EP3094083A4 (en) | File generation method, file generation device and recording medium | |
EP3396354A4 (en) | Number analyzing method, number analyzing device, and storage medium for number analysis | |
SG11201701365XA (en) | File access method and apparatus, and storage system | |
SG11201702431PA (en) | Analysis system, analysis device, analysis method, and storage medium having analysis program recorded therein | |
EP2977876A4 (en) | Information processing device, information processing method, program, and information storage medium | |
EP2957357A4 (en) | Air-flushing method, air-flushing device, program and recording medium | |
GB201719210D0 (en) | Sound source position detection device, sound source position detection method, sound source position detection program, and storage medium | |
PL3012835T3 (en) | Linear-prediction analysis device, method, program, and storage medium | |
SG11201702815WA (en) | Recording Medium, Playback Method, And Playback Device | |
EP3185234A4 (en) | Secret calculation system and relay device, and method, program, and storage medium thereof | |
SG11201609072QA (en) | Information-processing device, information-processing monitoring method, and recording medium | |
GB2549617B (en) | Pipe network analysis device, pipe network analysis method, and storage medium in which computer program is recorded | |
GB2565005B (en) | Analysis device, analysis method, and storage medium storing program | |
PL3699910T3 (en) | Periodic-combined-envelope-sequence generation device, periodic-combined-envelope-sequence generation method, periodic-combined-envelope-sequence generation program and recording medium | |
EP3032523A4 (en) | Information processing device, program, and storage medium | |
GB201808922D0 (en) | Device, method, and recording medium | |
GB201814927D0 (en) | Analysis device, analysis method and storage medium which stores program | |
EP3098813A4 (en) | Linear-predictive analysis device, method, program, and recording medium |