SG11201804085SA - Systems and methods for detection of malicious code in runtime generated code - Google Patents

Systems and methods for detection of malicious code in runtime generated code

Info

Publication number
SG11201804085SA
SG11201804085SA SG11201804085SA SG11201804085SA SG11201804085SA SG 11201804085S A SG11201804085S A SG 11201804085SA SG 11201804085S A SG11201804085S A SG 11201804085SA SG 11201804085S A SG11201804085S A SG 11201804085SA SG 11201804085S A SG11201804085S A SG 11201804085SA
Authority
SG
Singapore
Prior art keywords
runtime
code
generated code
international
match
Prior art date
Application number
SG11201804085SA
Other languages
English (en)
Inventor
Udi Yavo
Original Assignee
Ensilo Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ensilo Ltd filed Critical Ensilo Ltd
Publication of SG11201804085SA publication Critical patent/SG11201804085SA/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Virology (AREA)
  • General Health & Medical Sciences (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Stored Programmes (AREA)
  • Debugging And Monitoring (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
SG11201804085SA 2015-12-08 2016-09-07 Systems and methods for detection of malicious code in runtime generated code SG11201804085SA (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201562264404P 2015-12-08 2015-12-08
PCT/IL2016/050987 WO2017098495A1 (en) 2015-12-08 2016-09-07 Systems and methods for detection of malicious code in runtime generated code

Publications (1)

Publication Number Publication Date
SG11201804085SA true SG11201804085SA (en) 2018-06-28

Family

ID=57113519

Family Applications (1)

Application Number Title Priority Date Filing Date
SG11201804085SA SG11201804085SA (en) 2015-12-08 2016-09-07 Systems and methods for detection of malicious code in runtime generated code

Country Status (8)

Country Link
US (1) US20170161498A1 (enExample)
EP (1) EP3387579A1 (enExample)
JP (1) JP6837064B2 (enExample)
CA (1) CA3005314A1 (enExample)
IL (1) IL259878B (enExample)
SG (1) SG11201804085SA (enExample)
TW (1) TWI791418B (enExample)
WO (1) WO2017098495A1 (enExample)

Families Citing this family (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9916448B1 (en) * 2016-01-21 2018-03-13 Trend Micro Incorporated Detection of malicious mobile apps
US10275595B2 (en) * 2016-09-29 2019-04-30 Trap Data Security Ltd. System and method for characterizing malware
TWI668592B (zh) * 2017-07-28 2019-08-11 中華電信股份有限公司 Method for automatically determining the malicious degree of Android App by using multiple dimensions
US10977368B1 (en) * 2017-12-27 2021-04-13 Ca Technologies, Inc. Detecting malware based on memory allocation patterns
US11238017B2 (en) * 2018-01-30 2022-02-01 Salesforce.Com, Inc. Runtime detector for data corruptions
US11609984B2 (en) * 2018-02-14 2023-03-21 Digital Guardian Llc Systems and methods for determining a likelihood of an existence of malware on an executable
US11481376B2 (en) 2018-06-19 2022-10-25 Salesforce, Inc. Platform for handling data corruptions
JP7672041B2 (ja) 2019-06-26 2025-05-07 久利寿 帝都 情報処理方法および情報処理システム
US11681804B2 (en) 2020-03-09 2023-06-20 Commvault Systems, Inc. System and method for automatic generation of malware detection traps
CN112199274B (zh) * 2020-09-18 2022-05-03 北京大学 基于V8引擎的JavaScript动态污点跟踪方法及电子装置
US11709675B2 (en) 2020-10-30 2023-07-25 Apple Inc. Software verification of dynamically generated code
CN112579094B (zh) * 2020-12-15 2024-05-14 上海赛可出行科技服务有限公司 一种基于模板代码匹配的轻量级热修复方法
CN113868655B (zh) * 2021-09-29 2025-07-11 北京天融信网络安全技术有限公司 木马查杀方法、装置、电子设备及计算机可读存储介质
US20230252162A1 (en) * 2022-02-10 2023-08-10 Cisco Technology, Inc. Application Vulnerability Score Based on Stack Traces
US12212585B2 (en) 2022-04-01 2025-01-28 Vectra Ai, Inc. Method, product, and system for analyzing a computer network to identify attack paths using a software representation that embodies network configuration and policy data for security management
US12219070B2 (en) 2022-04-01 2025-02-04 Vectra Ai, Inc. Method, product, and system for generating detection signatures based on attack paths in a computer network identified using a software representation that embodies network configuration and policy data for security management using detection signature templates
US12328322B2 (en) 2022-04-01 2025-06-10 Vectra Ai, Inc. Method, product, and system for network security management using software representation that embodies network configuration and policy data
EP4254866A1 (en) * 2022-04-01 2023-10-04 Vectra AI, Inc. Method, product, and system for generating detection signatures based on attack paths in a computer network identified using a software representation that embodies network configuration and policy data for security management using detection signature templates
US12477001B2 (en) 2022-04-01 2025-11-18 Vectra Ai, Inc. Method, product, and system for analyzing attack paths in computer network generated using a software representation that embodies network configuration and policy data for security management
US20240056481A1 (en) 2022-08-09 2024-02-15 Commvault Systems, Inc. Data storage management system integrating cyber threat deception

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070192863A1 (en) * 2005-07-01 2007-08-16 Harsh Kapoor Systems and methods for processing data flows
US7478431B1 (en) * 2002-08-02 2009-01-13 Symantec Corporation Heuristic detection of computer viruses
GB2396227B (en) * 2002-12-12 2006-02-08 Messagelabs Ltd Method of and system for heuristically detecting viruses in executable code
US7984304B1 (en) * 2004-03-02 2011-07-19 Vmware, Inc. Dynamic verification of validity of executable code
US8176554B1 (en) * 2008-05-30 2012-05-08 Symantec Corporation Malware detection through symbol whitelisting
US20110191848A1 (en) * 2010-02-03 2011-08-04 Microsoft Corporation Preventing malicious just-in-time spraying attacks
KR101122650B1 (ko) * 2010-04-28 2012-03-09 한국전자통신연구원 정상 프로세스에 위장 삽입된 악성코드 탐지 장치, 시스템 및 방법
US20120331303A1 (en) * 2011-06-23 2012-12-27 Andersson Jonathan E Method and system for preventing execution of malware
CN102819697B (zh) * 2011-12-26 2015-07-22 哈尔滨安天科技股份有限公司 一种基于线程反编译的多平台恶意代码检测方法和系统
TWI528216B (zh) * 2014-04-30 2016-04-01 財團法人資訊工業策進會 隨選檢測惡意程式之方法、電子裝置、及使用者介面

Also Published As

Publication number Publication date
US20170161498A1 (en) 2017-06-08
TW201721497A (zh) 2017-06-16
JP6837064B2 (ja) 2021-03-03
WO2017098495A1 (en) 2017-06-15
TWI791418B (zh) 2023-02-11
IL259878B (en) 2021-07-29
EP3387579A1 (en) 2018-10-17
CA3005314A1 (en) 2017-06-15
JP2019502197A (ja) 2019-01-24
IL259878A (en) 2018-07-31

Similar Documents

Publication Publication Date Title
SG11201804085SA (en) Systems and methods for detection of malicious code in runtime generated code
SG11201907394UA (en) Two-dimensional code generation method and device, and two-dimensional code recognition method and device
SG11201903604PA (en) Iot security service
SG11201809582PA (en) A method and system for verifying ownership of a digital asset using a distributed hash table and a peer-to-peer distributed ledger
SG11201809866PA (en) Cryptographic applications for a blockchain system
SG11201901572PA (en) System for distributed intelligent remote sensing systems
SG11201909410VA (en) Machine learned decision guidance for alerts originating from monitoring systems
SG11201809963XA (en) Application framework using blockchain-based asset ownership
SG11201804361YA (en) Method for managing a trusted identity
SG11201905463TA (en) Abstract enclave identity
SG11201806712RA (en) A method and system for securing computer software using a distributed hash table and a blockchain
SG11201905461VA (en) Data sealing with a sealing enclave
SG11201900052XA (en) Method and system for verification of identity attribute information
SG11201905462WA (en) Cross-platform enclave identity
SG11201903141QA (en) Business processing method and apparatus
SG11201905456UA (en) Addressing a trusted execution environment using encryption key
SG11201900752PA (en) Cybersecurity vulnerability management system and method
SG11201809117QA (en) Operating system for blockchain iot devices
SG11201811213XA (en) Updating virtual memory addresses of target application functionalities for an updated version of application binary code
SG11201900979VA (en) Network-based automated prediction modeling
SG11201710236RA (en) Quantitative unified analytic neural networks
SG11201903276VA (en) Virtual reality identity verification
SG11201903286RA (en) User identity authentication using virtual reality
SG11201803742YA (en) Method and system for processing of a blockchain transaction in a transaction processing network
SG11201806780PA (en) Agent-based turing complete transactions integrating feedback within a blockchain system