WO1997005547A1 - Virus protection in computer systems - Google Patents
Virus protection in computer systems Download PDFInfo
- Publication number
- WO1997005547A1 WO1997005547A1 PCT/GB1995/002652 GB9502652W WO9705547A1 WO 1997005547 A1 WO1997005547 A1 WO 1997005547A1 GB 9502652 W GB9502652 W GB 9502652W WO 9705547 A1 WO9705547 A1 WO 9705547A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- virus
- computer
- boot program
- boot
- memory
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/564—Static detection by virus signature recognition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
Definitions
- the present invention relates to a method and apparatus for protecting a computer system against computer viruses, in particular against boot sector viruses.
- boot sector virus This form of virus is directed at the boot sector of a bootable medium e.g. hardfile or diskette. Since the boot sector is the first item of data in any 'boot up' of a disk-resident computer system, a virus in that location is virtually without defence.
- Checksum approaches have been employed in respect of boot programs stored on the system hardfile, but this approach is not effective when booting from a diskette, for which there may be no checksum value stored m the computer system.
- a diskette, infected with a boot sector virus is placed into a computer system and that system is allowed to boot, the virus operates to transfer itself from the diskette to the system hardfile. This transfer is generally effected when control of the system is passed to an infected boot record on the diskette. At this point, the virus transfer code which is in that boot record executes.
- the first action taken is to hook the Interrupt 13h vector which controls the hardflie/diskette access. This hook inserts a piece of code which will be executed during all Int 13h routines and will cause the boot record of any devices accessed to be updated with the virus code.
- the hook remains in memory throughout the time that the computer system is powered on and will reinstall itself from the boot record when the system is rebooted (either by powering up or by means of ALT-CTRL-DEL) .
- the system hardfile becomes permanently infected with that boot sector virus and even if there is a virus detection facility installed on the system hardfile, it will be powerless to prevent infection taking place.
- no knowledge of the transfer will be flagged and the infected diskette may well be inadvertently used on further computer systems.
- McAfee ROMSHIELD One device on the market which purports to provide protection against infection from infected diskettes is the McAfee ROMSHIELD chip which is designed to fit into the boot ROM socket found on most Ethernet LAN adapters. As described m the product literature, the ROMSHIELD chip automatically scans every diskette inserted into the computer for boot sector viruses before the diskette is accessed. Although this device appears to provide protection against such viruses, it suffers from the disadvantage that it relies on the provision of additional hardware m the system i.e. a LAN adapter, which will not generally be present in standalone systems, and on additional ROM, thereby adding to the cost of the computer system.
- the invention provides a method for preventing the transfer of boot sector viruses to a computer system having a processor and memory in which is stored system microcode that is executed by the processor to initialise the system on system power-up and in which is further stored virus detection code, the system being operable after the system initialisation to load a system boot program from a bootable media, the method comprising: upon completion of system initialisation, loading the boot program from the bootable media into system memory; prior to execution of said boot program, executing said virus detection code to check said stored boot program for the presence of computer viruses; and issuing a warning to the user of the computer system on a determination that the boot program includes a computer virus.
- the invention provides a computer system comprising a processor and read-only memory for storing system microcode that is executed by the processor to initialise the system on system power-up and for further storing virus detection code, the system being operable, on completion of the initialisation procedure to load a boot program from a bootable medium into system memory, the system being further operable, prior to execution of the loaded boot program, to check, by means of the virus detection code executing on said processor, the boot program for computer viruses and to issue a warning to a user of the computer system on a determination that a computer virus has been detected.
- execution of the boot program is prevented on detection of a computer virus.
- this may not be necessary.
- the user might be given the option of booting from the infected medium.
- the system may be allowed to boot automatically from the infected medium - - the antivirus program being used to clean up the infected medium.
- virus detection code can operate to detect the presence of computer viruses.
- One possible approach would be non-signature based heuristic analysis of the boot record wherein 'fuzzy logic' is employed to detect viruses.
- virus signatures are stored in system memory along with the virus detection code. The presence of computer viruses is checked by comparing the boot record with the virus signatures.
- the virus detection code and virus signatures are stored in the same read-memory in which is stored the system microcode (i.e.BIOS and POST).
- system microcode i.e.BIOS and POST.
- the technique of the present invention is effective against virus infection from all types of bootable media, it will be appreciated that it is especially adapted to counter attack from infected diskettes, which problem is not generally susceptible to the known checksum approach described above.
- virus detection code and virus signatures can be stored in read-only memory, it is preferred that they are stored in programmable read-only memory in order to allow updates to the virus detection code and/or the signatures, in order to ensure detection of different viruses as they are developed.
- Figure 1 shows a computer system incorporating the present invention
- Figure 2 is a block diagrammatical representation of the major components of the system of Figure 1;
- Figure 3 is a schematic representation of the system ROM of Figure 2, indicating the boot scan code and virus signatures;
- Figure 4 is a flow chart indicating the virus detection method of the preferred embodiment of the present invention.
- the personal computer system includes a system unit 12 having a suitable enclosure or casing 14, an output device in the form of a video display 16 and input devices in the form of a keyboard 22 and a pointing device such as a mouse 24.
- the system unit includes one or more mass storage devices such as a diskette drive 20 and a hard disk drive (hardfile) 18.
- System unit includes a main processor or CPU 100 connected to read only memory (ROM) 102 which contains the BIOS and POST programs.
- POST is the set of instructions which execute when the system is first powered on to initialise the personal computer system.
- BIOS is the set of instructions which facilitate the transfer of data and control instructions between the processor and I/O devices.
- Processor is also connected, via bus 104 to a plurality of subsystems.
- Bus 104 may be any one of a number of known bus types (e.g. PCI, VL-Bus) .
- RAM Random access memory
- Direct access storage device (DASD) 108 controller provides the interface and connection to the hard disk drive 18.
- DASD controller may also control the operation of other devices such as a CD ROM drive 110.
- Diskette controller 112 provides the interface and connection to the diskette drive 20.
- display controller 114 which controls the operation of video display 16.
- the computer system of Figs 1 and 2 is rebooted either by powering up the system or by invoking the ALT-CTRL-DEL reboot procedure.
- the processor performs a Power On Self Test (POST) by executing POST code which is stored in ROM along with the system BIOS.
- POST Power On Self Test
- a boot program is loaded into the computer system from the booting device which is normally the hard disk or the diskette.
- This boot program is responsible for beginning the load of an operating system from one of a plurality of partitions on the disk, and, in the case of a hardfile, includes two components, a program code component and a partition table data component.
- the operating system e.g. PC DOS
- the operating system e.g. PC DOS
- a boot sector virus on the boot device affects the computer system by replacing the boot program with a virus program at boot time to control the system.
- the virus transfer code which is in that boot record executes and hooks the interrupt 13h vector which controls hardfile/diskette access.
- FIG. 3 shows the memory map of FLASH ROM 102.
- boot scan code 154 and virus signatures 154 which operate on the computer system to detect boot sector viruses on the bootable medium.
- a virus signature is a sequence of bytes which is found in a particular virus and which identifies that virus uniquely.
- the virus signatures stored in ROM are each typically approximately twelve to twenty bytes in length. It should be noted that both the boot scan code and the virus signatures may be located anywhere within the system ROM space.
- Figure 4 shows the steps carried out to detect the presence of a boot sector virus in the boot record of a diskette loaded in the diskette drive 20.
- the portion of the flowchart enclosed by a dotted line represents the additional steps of the virus detection technique.
- the boot record from the bootable media is loaded (step 200) into system memory.
- the boot scan code is then invoked to locate (step 210) the virus signatures in ROM space and to load (step 220) those virus signatures into memory.
- the boot code is then compared with the virus signatures on a byte by byte basis -- in step 230, the first predefined number of bytes of the boot code are checked against each of the virus signatures to see if there is a match.
- step 240 If not, the pointer to the boot code is incremented in step 240. On a determination in step 250 that the end of the boot code has been reached without uncovering a boot sector virus, control is then passed to the boot code (step 260) and the system boot continues as described above.
- step 230 If however in step 230 a match is found between the boot code and a virus signature, the boot operation is halted and a warning is conveyed to the system user e.g. by display of a warning message (step 270) . The system is halted in step 280.
- Corrective action can take a number of different forms.
- the diskette can simply be replaced and the system restarted.
- the normal fix would be to boot from a clean diskette and then to use an antivirus program (from the hardfile or the diskette) to clean up the hardfile.
- recovery may involve the reformatting of the hardfile and replacement of the boot record and operating system code.
- the virus signatures are advantageously stored in FLASH ROM in order to allow for field updates to the list of virus signatures as necessary.
- the virus signatures may be stored in the same physical memory. In the case where BIOS is stored in ROM, then the virus signatures could be stored in separate FLASH ROM.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Virology (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Stored Programmes (AREA)
Abstract
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP95936668A EP0842468B1 (en) | 1995-07-31 | 1995-11-13 | Virus protection in computer systems |
JP9507301A JPH11506856A (en) | 1995-07-31 | 1995-11-13 | Virus protection in computer systems |
DE69517206T DE69517206D1 (en) | 1995-07-31 | 1995-11-13 | VIRUS PROTECTION IN COMPUTER SYSTEMS |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB9515686A GB2303947A (en) | 1995-07-31 | 1995-07-31 | Boot sector virus protection in computer systems |
GB9515686.5 | 1995-07-31 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO1997005547A1 true WO1997005547A1 (en) | 1997-02-13 |
Family
ID=10778543
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/GB1995/002652 WO1997005547A1 (en) | 1995-07-31 | 1995-11-13 | Virus protection in computer systems |
Country Status (6)
Country | Link |
---|---|
US (1) | US5802277A (en) |
EP (1) | EP0842468B1 (en) |
JP (1) | JPH11506856A (en) |
DE (1) | DE69517206D1 (en) |
GB (1) | GB2303947A (en) |
WO (1) | WO1997005547A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8365297B1 (en) | 2011-12-28 | 2013-01-29 | Kaspersky Lab Zao | System and method for detecting malware targeting the boot process of a computer using boot process emulation |
Families Citing this family (163)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6088801A (en) * | 1997-01-10 | 2000-07-11 | Grecsek; Matthew T. | Managing the risk of executing a software process using a capabilities assessment and a policy |
US5948104A (en) * | 1997-05-23 | 1999-09-07 | Neuromedical Systems, Inc. | System and method for automated anti-viral file update |
JP3437065B2 (en) * | 1997-09-05 | 2003-08-18 | 富士通株式会社 | Virus removal method, information processing device, and computer-readable recording medium on which virus removal program is recorded |
KR19990060338A (en) * | 1997-12-31 | 1999-07-26 | 윤종용 | Hard disk drive virus damage data recovery method |
AU4568299A (en) * | 1998-06-15 | 2000-01-05 | Dmw Worldwide, Inc. | Method and apparatus for assessing the security of a computer system |
US6587947B1 (en) * | 1999-04-01 | 2003-07-01 | Intel Corporation | System and method for verification of off-chip processor code |
US6571335B1 (en) * | 1999-04-01 | 2003-05-27 | Intel Corporation | System and method for authentication of off-chip processor firmware code |
TW452733B (en) * | 1999-11-26 | 2001-09-01 | Inventec Corp | Method for preventing BIOS from viruses infection |
WO2001053909A2 (en) * | 2000-01-18 | 2001-07-26 | Telcordia Technologies, Inc. | Method and systems for data security |
US6550007B1 (en) * | 2000-01-25 | 2003-04-15 | Dell Usa, L.P. | BIOS-level floppy boot-sector virus prevention |
US6842861B1 (en) * | 2000-03-24 | 2005-01-11 | Networks Associates Technology, Inc. | Method and system for detecting viruses on handheld computers |
US20040073617A1 (en) | 2000-06-19 | 2004-04-15 | Milliken Walter Clark | Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail |
US9027121B2 (en) | 2000-10-10 | 2015-05-05 | International Business Machines Corporation | Method and system for creating a record for one or more computer security incidents |
US7231440B1 (en) * | 2000-12-18 | 2007-06-12 | Mcafee, Inc. | System and method for distributing portable computer virus definition records with binary file conversion |
US6965928B1 (en) * | 2001-03-09 | 2005-11-15 | Networks Associates Technology, Inc. | System and method for remote maintenance of handheld computers |
US7069594B1 (en) * | 2001-06-15 | 2006-06-27 | Mcafee, Inc. | File system level integrity verification and validation |
US6802355B2 (en) * | 2001-12-31 | 2004-10-12 | Eastman Kodak Company | Overcoat application peel apparatus |
US7069445B2 (en) * | 2001-11-30 | 2006-06-27 | Lenovo (Singapore) Pte. Ltd | System and method for migration of a version of a bootable program |
US8185943B1 (en) | 2001-12-20 | 2012-05-22 | Mcafee, Inc. | Network adapter firewall system and method |
US7761605B1 (en) * | 2001-12-20 | 2010-07-20 | Mcafee, Inc. | Embedded anti-virus scanner for a network adapter |
US7752317B1 (en) * | 2002-07-29 | 2010-07-06 | Novell, Inc. | Workstation virus lockdown in a distribution environment |
US7748039B2 (en) * | 2002-08-30 | 2010-06-29 | Symantec Corporation | Method and apparatus for detecting malicious code in an information handling system |
US7509679B2 (en) * | 2002-08-30 | 2009-03-24 | Symantec Corporation | Method, system and computer program product for security in a global computer network transaction |
US7331062B2 (en) * | 2002-08-30 | 2008-02-12 | Symantec Corporation | Method, computer software, and system for providing end to end security protection of an online transaction |
US7832011B2 (en) * | 2002-08-30 | 2010-11-09 | Symantec Corporation | Method and apparatus for detecting malicious code in an information handling system |
US8069480B1 (en) * | 2002-09-30 | 2011-11-29 | Mcafee, Inc. | Method and system for defining a safe storage area for use in recovering a computer system |
EP1586054A4 (en) * | 2002-12-13 | 2010-12-08 | Symantec Corp | Method, system, and computer program product for security within a global computer network |
EP1429225A1 (en) * | 2002-12-13 | 2004-06-16 | Hewlett-Packard Company | Methods and apparatus relating to product class issues, product detection and customer support |
US8171551B2 (en) | 2003-04-01 | 2012-05-01 | Mcafee, Inc. | Malware detection using external call characteristics |
US7549055B2 (en) * | 2003-05-19 | 2009-06-16 | Intel Corporation | Pre-boot firmware based virus scanner |
US8145710B2 (en) * | 2003-06-18 | 2012-03-27 | Symantec Corporation | System and method for filtering spam messages utilizing URL filtering module |
TW200504704A (en) * | 2003-07-17 | 2005-02-01 | Benq Corp | Optical disk drive which can detect viruses |
US8271588B1 (en) | 2003-09-24 | 2012-09-18 | Symantec Corporation | System and method for filtering fraudulent email messages |
US7496961B2 (en) * | 2003-10-15 | 2009-02-24 | Intel Corporation | Methods and apparatus to provide network traffic support and physical security support |
US8793787B2 (en) | 2004-04-01 | 2014-07-29 | Fireeye, Inc. | Detecting malicious network content using virtual environment components |
US9106694B2 (en) | 2004-04-01 | 2015-08-11 | Fireeye, Inc. | Electronic message analysis for malware detection |
US8171553B2 (en) | 2004-04-01 | 2012-05-01 | Fireeye, Inc. | Heuristic based capture with replay to virtual machine |
US8528086B1 (en) | 2004-04-01 | 2013-09-03 | Fireeye, Inc. | System and method of detecting computer worms |
US7587537B1 (en) | 2007-11-30 | 2009-09-08 | Altera Corporation | Serializer-deserializer circuits formed from input-output circuit registers |
US8881282B1 (en) | 2004-04-01 | 2014-11-04 | Fireeye, Inc. | Systems and methods for malware attack detection and identification |
US7941490B1 (en) | 2004-05-11 | 2011-05-10 | Symantec Corporation | Method and apparatus for detecting spam in email messages and email attachments |
US7370188B2 (en) * | 2004-05-17 | 2008-05-06 | Intel Corporation | Input/output scanning |
KR100704629B1 (en) * | 2005-04-15 | 2007-04-09 | 삼성전자주식회사 | Apparatus and method for protecting virus at the master boot recode located in altered position |
US20060265544A1 (en) * | 2005-05-17 | 2006-11-23 | John Rudelic | Internally authenticated flash remediation |
US8010609B2 (en) * | 2005-06-20 | 2011-08-30 | Symantec Corporation | Method and apparatus for maintaining reputation lists of IP addresses to detect email spam |
US7739337B1 (en) | 2005-06-20 | 2010-06-15 | Symantec Corporation | Method and apparatus for grouping spam email messages |
JP4718288B2 (en) * | 2005-09-29 | 2011-07-06 | 株式会社日立製作所 | Diskless computer operation management system |
US20070118646A1 (en) * | 2005-10-04 | 2007-05-24 | Computer Associates Think, Inc. | Preventing the installation of rootkits on a standalone computer |
US8484725B1 (en) * | 2005-10-26 | 2013-07-09 | Mcafee, Inc. | System, method and computer program product for utilizing a threat scanner for performing non-threat-related processing |
US20080010538A1 (en) * | 2006-06-27 | 2008-01-10 | Symantec Corporation | Detecting suspicious embedded malicious content in benign file formats |
US20080005797A1 (en) * | 2006-06-30 | 2008-01-03 | Microsoft Corporation | Identifying malware in a boot environment |
US8136162B2 (en) * | 2006-08-31 | 2012-03-13 | Broadcom Corporation | Intelligent network interface controller |
US20080071770A1 (en) * | 2006-09-18 | 2008-03-20 | Nokia Corporation | Method, Apparatus and Computer Program Product for Viewing a Virtual Database Using Portable Devices |
JP2008299418A (en) * | 2007-05-29 | 2008-12-11 | Toshiba Corp | Information processor and starting control method |
US7971258B1 (en) * | 2007-09-28 | 2011-06-28 | Trend Micro Incorporated | Methods and arrangement for efficiently detecting and removing malware |
JP5335625B2 (en) * | 2009-09-02 | 2013-11-06 | レノボ・シンガポール・プライベート・リミテッド | Computer program that reduces boot time |
US8832829B2 (en) | 2009-09-30 | 2014-09-09 | Fireeye, Inc. | Network-based binary file extraction and analysis for malware detection |
US9098333B1 (en) | 2010-05-07 | 2015-08-04 | Ziften Technologies, Inc. | Monitoring computer process resource usage |
US8635698B2 (en) * | 2011-10-07 | 2014-01-21 | Imation Corp. | Antivirus system and method for removable media devices |
US8918879B1 (en) * | 2012-05-14 | 2014-12-23 | Trend Micro Inc. | Operating system bootstrap failure detection |
US10572665B2 (en) | 2012-12-28 | 2020-02-25 | Fireeye, Inc. | System and method to create a number of breakpoints in a virtual machine via virtual machine trapping events |
US9195829B1 (en) | 2013-02-23 | 2015-11-24 | Fireeye, Inc. | User interface with real-time visual playback along with synchronous textual analysis log display and event/time index for anomalous behavior detection in applications |
US9626509B1 (en) | 2013-03-13 | 2017-04-18 | Fireeye, Inc. | Malicious content analysis with multi-version application support within single operating environment |
US9104867B1 (en) | 2013-03-13 | 2015-08-11 | Fireeye, Inc. | Malicious content analysis using simulated user interaction without user involvement |
US9311479B1 (en) | 2013-03-14 | 2016-04-12 | Fireeye, Inc. | Correlation and consolidation of analytic data for holistic view of a malware attack |
US10713358B2 (en) | 2013-03-15 | 2020-07-14 | Fireeye, Inc. | System and method to extract and utilize disassembly features to classify software intent |
US9413781B2 (en) | 2013-03-15 | 2016-08-09 | Fireeye, Inc. | System and method employing structured intelligence to verify and contain threats at endpoints |
US9495180B2 (en) | 2013-05-10 | 2016-11-15 | Fireeye, Inc. | Optimized resource allocation for virtual machines within a malware content detection system |
US9635039B1 (en) | 2013-05-13 | 2017-04-25 | Fireeye, Inc. | Classifying sets of malicious indicators for detecting command and control communications associated with malware |
US9300686B2 (en) | 2013-06-28 | 2016-03-29 | Fireeye, Inc. | System and method for detecting malicious links in electronic messages |
US10515214B1 (en) | 2013-09-30 | 2019-12-24 | Fireeye, Inc. | System and method for classifying malware within content created during analysis of a specimen |
US9736179B2 (en) | 2013-09-30 | 2017-08-15 | Fireeye, Inc. | System, apparatus and method for using malware analysis results to drive adaptive instrumentation of virtual machines to improve exploit detection |
US9171160B2 (en) | 2013-09-30 | 2015-10-27 | Fireeye, Inc. | Dynamically adaptive framework and method for classifying malware using intelligent static, emulation, and dynamic analyses |
US9628507B2 (en) | 2013-09-30 | 2017-04-18 | Fireeye, Inc. | Advanced persistent threat (APT) detection center |
US9690936B1 (en) | 2013-09-30 | 2017-06-27 | Fireeye, Inc. | Multistage system and method for analyzing obfuscated content for malware |
US9756074B2 (en) | 2013-12-26 | 2017-09-05 | Fireeye, Inc. | System and method for IPS and VM-based detection of suspicious objects |
US9747446B1 (en) | 2013-12-26 | 2017-08-29 | Fireeye, Inc. | System and method for run-time object classification |
US9507935B2 (en) | 2014-01-16 | 2016-11-29 | Fireeye, Inc. | Exploit detection system with threat-aware microvisor |
US9262635B2 (en) | 2014-02-05 | 2016-02-16 | Fireeye, Inc. | Detection efficacy of virtual machine-based analysis with application specific events |
US10242185B1 (en) | 2014-03-21 | 2019-03-26 | Fireeye, Inc. | Dynamic guest image creation and rollback |
US9591015B1 (en) | 2014-03-28 | 2017-03-07 | Fireeye, Inc. | System and method for offloading packet processing and static analysis operations |
US9223972B1 (en) | 2014-03-31 | 2015-12-29 | Fireeye, Inc. | Dynamically remote tuning of a malware content detection system |
US10084813B2 (en) | 2014-06-24 | 2018-09-25 | Fireeye, Inc. | Intrusion prevention and remedy system |
US10805340B1 (en) | 2014-06-26 | 2020-10-13 | Fireeye, Inc. | Infection vector and malware tracking with an interactive user display |
US9398028B1 (en) | 2014-06-26 | 2016-07-19 | Fireeye, Inc. | System, device and method for detecting a malicious attack based on communcations between remotely hosted virtual machines and malicious web servers |
US10002252B2 (en) | 2014-07-01 | 2018-06-19 | Fireeye, Inc. | Verification of trusted threat-aware microvisor |
US10671726B1 (en) | 2014-09-22 | 2020-06-02 | Fireeye Inc. | System and method for malware analysis using thread-level event monitoring |
US10027689B1 (en) | 2014-09-29 | 2018-07-17 | Fireeye, Inc. | Interactive infection visualization for improved exploit detection and signature generation for malware and malware families |
US9690933B1 (en) | 2014-12-22 | 2017-06-27 | Fireeye, Inc. | Framework for classifying an object as malicious with machine learning for deploying updated predictive models |
US9934376B1 (en) | 2014-12-29 | 2018-04-03 | Fireeye, Inc. | Malware detection appliance architecture |
US9838417B1 (en) | 2014-12-30 | 2017-12-05 | Fireeye, Inc. | Intelligent context aware user interaction for malware detection |
US10148693B2 (en) | 2015-03-25 | 2018-12-04 | Fireeye, Inc. | Exploit detection system |
US10417031B2 (en) | 2015-03-31 | 2019-09-17 | Fireeye, Inc. | Selective virtualization for security threat detection |
US10474813B1 (en) | 2015-03-31 | 2019-11-12 | Fireeye, Inc. | Code injection technique for remediation at an endpoint of a network |
US9654485B1 (en) | 2015-04-13 | 2017-05-16 | Fireeye, Inc. | Analytics-based security monitoring system and method |
US11113086B1 (en) | 2015-06-30 | 2021-09-07 | Fireeye, Inc. | Virtual system and method for securing external network connectivity |
US10642753B1 (en) | 2015-06-30 | 2020-05-05 | Fireeye, Inc. | System and method for protecting a software component running in virtual machine using a virtualization layer |
US10726127B1 (en) | 2015-06-30 | 2020-07-28 | Fireeye, Inc. | System and method for protecting a software component running in a virtual machine through virtual interrupts by the virtualization layer |
US10454950B1 (en) | 2015-06-30 | 2019-10-22 | Fireeye, Inc. | Centralized aggregation technique for detecting lateral movement of stealthy cyber-attacks |
US10715542B1 (en) | 2015-08-14 | 2020-07-14 | Fireeye, Inc. | Mobile application risk analysis |
US9659171B2 (en) | 2015-08-21 | 2017-05-23 | Dell Producrs L.P. | Systems and methods for detecting tampering of an information handling system |
US10033747B1 (en) | 2015-09-29 | 2018-07-24 | Fireeye, Inc. | System and method for detecting interpreter-based exploit attacks |
US10601865B1 (en) | 2015-09-30 | 2020-03-24 | Fireeye, Inc. | Detection of credential spearphishing attacks using email analysis |
US10817606B1 (en) | 2015-09-30 | 2020-10-27 | Fireeye, Inc. | Detecting delayed activation malware using a run-time monitoring agent and time-dilation logic |
US10210329B1 (en) | 2015-09-30 | 2019-02-19 | Fireeye, Inc. | Method to detect application execution hijacking using memory protection |
US9825989B1 (en) | 2015-09-30 | 2017-11-21 | Fireeye, Inc. | Cyber attack early warning system |
US10706149B1 (en) | 2015-09-30 | 2020-07-07 | Fireeye, Inc. | Detecting delayed activation malware using a primary controller and plural time controllers |
KR101703826B1 (en) * | 2015-10-23 | 2017-02-08 | 한국전자통신연구원 | Apparatus and method for protecting data in flash memory based on abnormal actions in smart device |
US10447728B1 (en) | 2015-12-10 | 2019-10-15 | Fireeye, Inc. | Technique for protecting guest processes using a layered virtualization architecture |
US10846117B1 (en) | 2015-12-10 | 2020-11-24 | Fireeye, Inc. | Technique for establishing secure communication between host and guest processes of a virtualization architecture |
US10108446B1 (en) | 2015-12-11 | 2018-10-23 | Fireeye, Inc. | Late load technique for deploying a virtualization layer underneath a running operating system |
US10133866B1 (en) | 2015-12-30 | 2018-11-20 | Fireeye, Inc. | System and method for triggering analysis of an object for malware in response to modification of that object |
US10050998B1 (en) | 2015-12-30 | 2018-08-14 | Fireeye, Inc. | Malicious message analysis system |
US10565378B1 (en) | 2015-12-30 | 2020-02-18 | Fireeye, Inc. | Exploit of privilege detection framework |
US10581874B1 (en) | 2015-12-31 | 2020-03-03 | Fireeye, Inc. | Malware detection system with contextual analysis |
US11552986B1 (en) | 2015-12-31 | 2023-01-10 | Fireeye Security Holdings Us Llc | Cyber-security framework for application of virtual features |
US10785255B1 (en) | 2016-03-25 | 2020-09-22 | Fireeye, Inc. | Cluster configuration within a scalable malware detection system |
US10671721B1 (en) | 2016-03-25 | 2020-06-02 | Fireeye, Inc. | Timeout management services |
US10616266B1 (en) | 2016-03-25 | 2020-04-07 | Fireeye, Inc. | Distributed malware detection system and submission workflow thereof |
US10601863B1 (en) | 2016-03-25 | 2020-03-24 | Fireeye, Inc. | System and method for managing sensor enrollment |
US10893059B1 (en) | 2016-03-31 | 2021-01-12 | Fireeye, Inc. | Verification and enhancement using detection systems located at the network periphery and endpoint devices |
US10826933B1 (en) | 2016-03-31 | 2020-11-03 | Fireeye, Inc. | Technique for verifying exploit/malware at malware detection appliance through correlation with endpoints |
US10169585B1 (en) | 2016-06-22 | 2019-01-01 | Fireeye, Inc. | System and methods for advanced malware detection through placement of transition events |
US10462173B1 (en) | 2016-06-30 | 2019-10-29 | Fireeye, Inc. | Malware detection verification and enhancement by coordinating endpoint and malware detection systems |
US10592678B1 (en) | 2016-09-09 | 2020-03-17 | Fireeye, Inc. | Secure communications between peers using a verified virtual trusted platform module |
US10491627B1 (en) | 2016-09-29 | 2019-11-26 | Fireeye, Inc. | Advanced malware detection using similarity analysis |
US10795991B1 (en) | 2016-11-08 | 2020-10-06 | Fireeye, Inc. | Enterprise search |
US10587647B1 (en) | 2016-11-22 | 2020-03-10 | Fireeye, Inc. | Technique for malware detection capability comparison of network security devices |
US10581879B1 (en) | 2016-12-22 | 2020-03-03 | Fireeye, Inc. | Enhanced malware detection for generated objects |
US10552610B1 (en) | 2016-12-22 | 2020-02-04 | Fireeye, Inc. | Adaptive virtual machine snapshot update framework for malware behavioral analysis |
US10523609B1 (en) | 2016-12-27 | 2019-12-31 | Fireeye, Inc. | Multi-vector malware detection and analysis |
US10904286B1 (en) | 2017-03-24 | 2021-01-26 | Fireeye, Inc. | Detection of phishing attacks using similarity analysis |
US10848397B1 (en) | 2017-03-30 | 2020-11-24 | Fireeye, Inc. | System and method for enforcing compliance with subscription requirements for cyber-attack detection service |
US10798112B2 (en) | 2017-03-30 | 2020-10-06 | Fireeye, Inc. | Attribute-controlled malware detection |
US10791138B1 (en) | 2017-03-30 | 2020-09-29 | Fireeye, Inc. | Subscription-based malware detection |
US10902119B1 (en) | 2017-03-30 | 2021-01-26 | Fireeye, Inc. | Data extraction system for malware analysis |
US10855700B1 (en) | 2017-06-29 | 2020-12-01 | Fireeye, Inc. | Post-intrusion detection of cyber-attacks during lateral movement within networks |
US10601848B1 (en) | 2017-06-29 | 2020-03-24 | Fireeye, Inc. | Cyber-security system and method for weak indicator detection and correlation to generate strong indicators |
US10503904B1 (en) | 2017-06-29 | 2019-12-10 | Fireeye, Inc. | Ransomware detection and mitigation |
US10893068B1 (en) | 2017-06-30 | 2021-01-12 | Fireeye, Inc. | Ransomware file modification prevention technique |
US10747872B1 (en) | 2017-09-27 | 2020-08-18 | Fireeye, Inc. | System and method for preventing malware evasion |
US10805346B2 (en) | 2017-10-01 | 2020-10-13 | Fireeye, Inc. | Phishing attack detection |
US11108809B2 (en) | 2017-10-27 | 2021-08-31 | Fireeye, Inc. | System and method for analyzing binary code for malware classification using artificial neural network techniques |
US11005860B1 (en) | 2017-12-28 | 2021-05-11 | Fireeye, Inc. | Method and system for efficient cybersecurity analysis of endpoint events |
US11271955B2 (en) | 2017-12-28 | 2022-03-08 | Fireeye Security Holdings Us Llc | Platform and method for retroactive reclassification employing a cybersecurity-based global data store |
US11240275B1 (en) | 2017-12-28 | 2022-02-01 | Fireeye Security Holdings Us Llc | Platform and method for performing cybersecurity analyses employing an intelligence hub with a modular architecture |
US10826931B1 (en) | 2018-03-29 | 2020-11-03 | Fireeye, Inc. | System and method for predicting and mitigating cybersecurity system misconfigurations |
US11003773B1 (en) | 2018-03-30 | 2021-05-11 | Fireeye, Inc. | System and method for automatically generating malware detection rule recommendations |
US11558401B1 (en) | 2018-03-30 | 2023-01-17 | Fireeye Security Holdings Us Llc | Multi-vector malware detection data sharing system for improved detection |
US10956477B1 (en) | 2018-03-30 | 2021-03-23 | Fireeye, Inc. | System and method for detecting malicious scripts through natural language processing modeling |
US11075930B1 (en) | 2018-06-27 | 2021-07-27 | Fireeye, Inc. | System and method for detecting repetitive cybersecurity attacks constituting an email campaign |
US11314859B1 (en) | 2018-06-27 | 2022-04-26 | FireEye Security Holdings, Inc. | Cyber-security system and method for detecting escalation of privileges within an access token |
US11228491B1 (en) | 2018-06-28 | 2022-01-18 | Fireeye Security Holdings Us Llc | System and method for distributed cluster configuration monitoring and management |
US11316900B1 (en) | 2018-06-29 | 2022-04-26 | FireEye Security Holdings Inc. | System and method for automatically prioritizing rules for cyber-threat detection and mitigation |
US11182473B1 (en) | 2018-09-13 | 2021-11-23 | Fireeye Security Holdings Us Llc | System and method for mitigating cyberattacks against processor operability by a guest process |
US11763004B1 (en) | 2018-09-27 | 2023-09-19 | Fireeye Security Holdings Us Llc | System and method for bootkit detection |
US11368475B1 (en) | 2018-12-21 | 2022-06-21 | Fireeye Security Holdings Us Llc | System and method for scanning remote services to locate stored objects with malware |
US11258806B1 (en) | 2019-06-24 | 2022-02-22 | Mandiant, Inc. | System and method for automatically associating cybersecurity intelligence to cyberthreat actors |
US11556640B1 (en) | 2019-06-27 | 2023-01-17 | Mandiant, Inc. | Systems and methods for automated cybersecurity analysis of extracted binary string sets |
US11392700B1 (en) | 2019-06-28 | 2022-07-19 | Fireeye Security Holdings Us Llc | System and method for supporting cross-platform data verification |
US11886585B1 (en) | 2019-09-27 | 2024-01-30 | Musarubra Us Llc | System and method for identifying and mitigating cyberattacks through malicious position-independent code execution |
US11637862B1 (en) | 2019-09-30 | 2023-04-25 | Mandiant, Inc. | System and method for surfacing cyber-security threats with a self-learning recommendation engine |
CN112784270A (en) * | 2021-01-18 | 2021-05-11 | 仙境文化传媒(武汉)有限公司 | System and method for loading code file by annotation mode |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1990005418A1 (en) * | 1988-11-03 | 1990-05-17 | Lentz Stephen A | System and method of protecting integrity of computer data and software |
WO1993025024A1 (en) * | 1992-05-26 | 1993-12-09 | Cyberlock Data Intelligence, Inc. | Computer virus monitoring system |
EP0656587A1 (en) * | 1993-11-30 | 1995-06-07 | International Business Machines Corporation | Detecting computer viruses during power on self test |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5121345A (en) * | 1988-11-03 | 1992-06-09 | Lentz Stephen A | System and method for protecting integrity of computer data and software |
EP0449242A3 (en) * | 1990-03-28 | 1992-10-28 | National Semiconductor Corporation | Method and structure for providing computer security and virus prevention |
US5367682A (en) * | 1991-04-29 | 1994-11-22 | Steven Chang | Data processing virus protection circuitry including a permanent memory for storing a redundant partition table |
DK170490B1 (en) * | 1992-04-28 | 1995-09-18 | Multi Inform As | Data Processing Plant |
US5359659A (en) * | 1992-06-19 | 1994-10-25 | Doren Rosenthal | Method for securing software against corruption by computer viruses |
US5361359A (en) * | 1992-08-31 | 1994-11-01 | Trusted Information Systems, Inc. | System and method for controlling the use of a computer |
JP2501771B2 (en) * | 1993-01-19 | 1996-05-29 | インターナショナル・ビジネス・マシーンズ・コーポレイション | Method and apparatus for obtaining multiple valid signatures of an unwanted software entity |
US5440723A (en) * | 1993-01-19 | 1995-08-08 | International Business Machines Corporation | Automatic immune system for computers and computer networks |
US5398196A (en) * | 1993-07-29 | 1995-03-14 | Chambers; David A. | Method and apparatus for detection of computer viruses |
-
1995
- 1995-07-31 GB GB9515686A patent/GB2303947A/en not_active Withdrawn
- 1995-11-13 EP EP95936668A patent/EP0842468B1/en not_active Expired - Lifetime
- 1995-11-13 JP JP9507301A patent/JPH11506856A/en active Pending
- 1995-11-13 DE DE69517206T patent/DE69517206D1/en not_active Expired - Lifetime
- 1995-11-13 WO PCT/GB1995/002652 patent/WO1997005547A1/en active IP Right Grant
-
1996
- 1996-07-26 US US08/686,897 patent/US5802277A/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1990005418A1 (en) * | 1988-11-03 | 1990-05-17 | Lentz Stephen A | System and method of protecting integrity of computer data and software |
WO1993025024A1 (en) * | 1992-05-26 | 1993-12-09 | Cyberlock Data Intelligence, Inc. | Computer virus monitoring system |
EP0656587A1 (en) * | 1993-11-30 | 1995-06-07 | International Business Machines Corporation | Detecting computer viruses during power on self test |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8365297B1 (en) | 2011-12-28 | 2013-01-29 | Kaspersky Lab Zao | System and method for detecting malware targeting the boot process of a computer using boot process emulation |
Also Published As
Publication number | Publication date |
---|---|
GB9515686D0 (en) | 1995-09-27 |
US5802277A (en) | 1998-09-01 |
EP0842468A1 (en) | 1998-05-20 |
EP0842468B1 (en) | 2000-05-24 |
JPH11506856A (en) | 1999-06-15 |
GB2303947A (en) | 1997-03-05 |
DE69517206D1 (en) | 2000-06-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP0842468B1 (en) | Virus protection in computer systems | |
US6792556B1 (en) | Boot record recovery | |
US8607342B1 (en) | Evaluation of incremental backup copies for presence of malicious codes in computer systems | |
US5948104A (en) | System and method for automated anti-viral file update | |
CN103718165B (en) | BIOS flash memory attack protection and notice | |
JP3539907B2 (en) | Computer with bootable program | |
JP5512610B2 (en) | Method, system, and machine-readable storage medium for permitting or blocking access to memory from non-firmware agent | |
US5537540A (en) | Transparent, secure computer virus detection method and apparatus | |
US7257842B2 (en) | Pre-approval of computer files during a malware detection | |
US5559960A (en) | Software anti-virus facility | |
US7191464B2 (en) | Method and system for tracking a secure boot in a trusted computing environment | |
US5854916A (en) | State-based cache for antivirus software | |
US7103913B2 (en) | Method and apparatus for determination of the non-replicative behavior of a malicious program | |
TW452733B (en) | Method for preventing BIOS from viruses infection | |
US20020166059A1 (en) | Methods and apparatus for protecting against viruses on partitionable media | |
Han et al. | A bad dream: Subverting trusted platform module while you are sleeping | |
JPH06348486A (en) | Method and system to protect computer system from computer virus | |
WO2004027551A2 (en) | Computing apparatus with automatic integrity reference generation and maintenance | |
US20020073323A1 (en) | Detection of suspicious privileged access to restricted computer resources | |
US8910283B1 (en) | Firmware-level security agent supporting operating system-level security in computer system | |
US20050015606A1 (en) | Malware scanning using a boot with a non-installed operating system and download of malware detection files | |
US6907524B1 (en) | Extensible firmware interface virus scan | |
US20170262341A1 (en) | Flash memory-hosted local and remote out-of-service platform manageability | |
US20090144332A1 (en) | Sideband access based method and apparatus for determining software integrity | |
EP2729893B1 (en) | Security method and apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): JP US |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH DE DK ES FR GB GR IE IT LU MC NL PT SE |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) |
Free format text: US |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 1995936668 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref country code: JP Ref document number: 1997 507301 Kind code of ref document: A Format of ref document f/p: F |
|
WWP | Wipo information: published in national office |
Ref document number: 1995936668 Country of ref document: EP |
|
WWG | Wipo information: grant in national office |
Ref document number: 1995936668 Country of ref document: EP |