WO2006004082A1 - ソフトウエアの一時的な修正方法およびプログラム - Google Patents
ソフトウエアの一時的な修正方法およびプログラム Download PDFInfo
- Publication number
- WO2006004082A1 WO2006004082A1 PCT/JP2005/012312 JP2005012312W WO2006004082A1 WO 2006004082 A1 WO2006004082 A1 WO 2006004082A1 JP 2005012312 W JP2005012312 W JP 2005012312W WO 2006004082 A1 WO2006004082 A1 WO 2006004082A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- routine
- argument
- passing
- arguments
- range
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
Definitions
- Patent Document 1 Japanese Patent Application Laid-Open No. 5—181664
- a method of temporarily modifying software comprising the steps of: receiving an argument before passing it to a routine; passing an argument to a corresponding routine; It also provides a way to send an alert message to the administrator when it is a routine security hole or an abnormal operation range.
- By sending a warning message to the administrator it is possible to take emergency measures such as temporarily shutting down the system etc. from the network.
- Email messages, SNMP traps, various instant 'messaging' services, HTTP protocol, various TCP connections, various UDP packets, serial communications, mobile phones, pagers, etc. can be used to send warning messages.
- the present invention is characterized by checking an argument before passing it to a function, when the received argument falls within the security hole or abnormal operation range of the function, the process which made the call passes through the network. If you connect to another system at the same time, you can also provide a method to protect the network by interrupting the communication with the other system. As a means of blocking communication, it is possible to change the firewall policy, change the router access control list, change the VLAN configuration of the switching node, etc.
- arguments and argument related information are acquired.
- the argument related information is, for example, a routine name, a routine address, a routine handle, and the like.
- routines are functions or system calls. If the argument related information that is not limited to these is information that can associate the arguments with the routine, the routine may be called from the main routine and may receive the arguments.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Debugging And Monitoring (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2004-198413 | 2004-07-05 | ||
JP2004198413A JP2006018765A (ja) | 2004-07-05 | 2004-07-05 | ソフトウエアの一時的な修正方法およびプログラム |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2006004082A1 true WO2006004082A1 (ja) | 2006-01-12 |
Family
ID=35782883
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2005/012312 WO2006004082A1 (ja) | 2004-07-05 | 2005-07-04 | ソフトウエアの一時的な修正方法およびプログラム |
Country Status (2)
Country | Link |
---|---|
JP (1) | JP2006018765A (ja) |
WO (1) | WO2006004082A1 (ja) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2009110357A (ja) * | 2007-10-31 | 2009-05-21 | Kyocera Mita Corp | 電気機器、障害防止方法及び障害防止プログラム |
JP2014505940A (ja) * | 2011-01-17 | 2014-03-06 | 北京神州▲緑▼盟信息安全科技股▲分▼有限公司 | 脆弱性検出装置および方法 |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8523666B2 (en) | 2007-05-25 | 2013-09-03 | Microsoft Corporation | Programming framework for closed systems |
JP5382450B2 (ja) * | 2008-02-14 | 2014-01-08 | 日本電気株式会社 | アクセス制御装置、その方法及び情報記録媒体 |
JP2015535997A (ja) * | 2012-09-28 | 2015-12-17 | ヒューレット−パッカード デベロップメント カンパニー エル.ピー.Hewlett‐Packard Development Company, L.P. | アプリケーションセキュリティ検査 |
CN108415840A (zh) * | 2018-03-14 | 2018-08-17 | 百度在线网络技术(北京)有限公司 | 修复函数缺陷的方法、装置及服务器 |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH05108487A (ja) * | 1991-10-11 | 1993-04-30 | Seiji Murakami | コンピユータウイルス侵入防止装置と侵入防止方式 |
JPH05265772A (ja) * | 1992-02-26 | 1993-10-15 | Nec Corp | プログラム間インタフェース処理方式 |
JPH10124350A (ja) * | 1996-10-22 | 1998-05-15 | Toshiba Microelectron Corp | マイクロコンピュータ用プログラムのデバッグ方法及びデバッグ装置 |
JP2003015899A (ja) * | 2001-07-05 | 2003-01-17 | Hitachi Information Systems Ltd | コンピュータウィルス検出時対処支援装置とその方法およびその処理プログラム |
JP2003067210A (ja) * | 2001-08-22 | 2003-03-07 | Just Syst Corp | プログラム実行防止装置、プログラム実行防止方法、その方法をコンピュータに実行させるプログラムおよびそのプログラムを記録したコンピュータ読み取り可能な記録媒体 |
JP2003510684A (ja) * | 1999-09-20 | 2003-03-18 | ギーゼッケ ウント デフリエント ゲーエムベーハー | プログラム実行を保護するための方法 |
JP2003241989A (ja) * | 2002-02-15 | 2003-08-29 | Toshiba Corp | コンピュータウイルス発生検出装置、方法、およびプログラム |
JP2004070605A (ja) * | 2002-08-05 | 2004-03-04 | Osaka Industrial Promotion Organization | データ処理方法、データ処理装置、コンピュータプログラム、及び記録媒体 |
JP2004126958A (ja) * | 2002-10-02 | 2004-04-22 | Hitachi Software Eng Co Ltd | Wwwサーバシステム保護方法 |
JP2004126854A (ja) * | 2002-10-01 | 2004-04-22 | Mitsubishi Electric Corp | 攻撃対策装置 |
JP2004164554A (ja) * | 2002-09-24 | 2004-06-10 | Hitachi Ltd | プログラム実行監視装置および方法 |
-
2004
- 2004-07-05 JP JP2004198413A patent/JP2006018765A/ja active Pending
-
2005
- 2005-07-04 WO PCT/JP2005/012312 patent/WO2006004082A1/ja active Application Filing
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH05108487A (ja) * | 1991-10-11 | 1993-04-30 | Seiji Murakami | コンピユータウイルス侵入防止装置と侵入防止方式 |
JPH05265772A (ja) * | 1992-02-26 | 1993-10-15 | Nec Corp | プログラム間インタフェース処理方式 |
JPH10124350A (ja) * | 1996-10-22 | 1998-05-15 | Toshiba Microelectron Corp | マイクロコンピュータ用プログラムのデバッグ方法及びデバッグ装置 |
JP2003510684A (ja) * | 1999-09-20 | 2003-03-18 | ギーゼッケ ウント デフリエント ゲーエムベーハー | プログラム実行を保護するための方法 |
JP2003015899A (ja) * | 2001-07-05 | 2003-01-17 | Hitachi Information Systems Ltd | コンピュータウィルス検出時対処支援装置とその方法およびその処理プログラム |
JP2003067210A (ja) * | 2001-08-22 | 2003-03-07 | Just Syst Corp | プログラム実行防止装置、プログラム実行防止方法、その方法をコンピュータに実行させるプログラムおよびそのプログラムを記録したコンピュータ読み取り可能な記録媒体 |
JP2003241989A (ja) * | 2002-02-15 | 2003-08-29 | Toshiba Corp | コンピュータウイルス発生検出装置、方法、およびプログラム |
JP2004070605A (ja) * | 2002-08-05 | 2004-03-04 | Osaka Industrial Promotion Organization | データ処理方法、データ処理装置、コンピュータプログラム、及び記録媒体 |
JP2004164554A (ja) * | 2002-09-24 | 2004-06-10 | Hitachi Ltd | プログラム実行監視装置および方法 |
JP2004126854A (ja) * | 2002-10-01 | 2004-04-22 | Mitsubishi Electric Corp | 攻撃対策装置 |
JP2004126958A (ja) * | 2002-10-02 | 2004-04-22 | Hitachi Software Eng Co Ltd | Wwwサーバシステム保護方法 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2009110357A (ja) * | 2007-10-31 | 2009-05-21 | Kyocera Mita Corp | 電気機器、障害防止方法及び障害防止プログラム |
JP2014505940A (ja) * | 2011-01-17 | 2014-03-06 | 北京神州▲緑▼盟信息安全科技股▲分▼有限公司 | 脆弱性検出装置および方法 |
Also Published As
Publication number | Publication date |
---|---|
JP2006018765A (ja) | 2006-01-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7814543B2 (en) | System and method for securing a computer system connected to a network from attacks | |
US7716727B2 (en) | Network security device and method for protecting a computing device in a networked environment | |
US9124639B2 (en) | Managing command compliance in internetworking devices | |
US7716726B2 (en) | System and method for protecting a computing device from computer exploits delivered over a networked environment in a secured communication | |
JP4914052B2 (ja) | セキュリティポリシーを配布するための方法およびシステム | |
EP3095224B1 (en) | Dynamic filtering for sdn api calls across a security boundary | |
US8595820B1 (en) | Surround security system | |
EP1564964A2 (en) | Network security device and method for protecting a computing device in a networked environment | |
US7603714B2 (en) | Method, system and computer program product for computer system vulnerability analysis and fortification | |
US11637856B2 (en) | Implementation comparison-based security system | |
US20060282896A1 (en) | Critical period protection | |
US7343599B2 (en) | Network-based patching machine | |
US20130097708A1 (en) | System and method for transitioning to a whitelist mode during a malware attack in a network environment | |
US7603706B2 (en) | System security using human authorization | |
WO2006004082A1 (ja) | ソフトウエアの一時的な修正方法およびプログラム | |
EP1273182B1 (en) | Secure data download in a cellular communication system | |
US11803647B2 (en) | Computer system vulnerability lockdown mode | |
Fink | Lessons learned from cyber security assessments of SCADA and energy management systems | |
JP2006018766A (ja) | ネットワーク接続管理システム | |
Roitburd et al. | Very Pwnable Network: Cisco AnyConnect Security Analysis | |
CN113194105B (zh) | 车载设备的网络安全防护方法、装置、电子设备及介质 | |
US20230216875A1 (en) | Automated response to computer vulnerabilities | |
JP2004094723A (ja) | ファイアウォール運用システム、ファイアウォール運用方法、および、ファイアウォール運用プログラム | |
CN113765859A (zh) | 网络安全过滤方法及装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU LV MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: DE |
|
122 | Ep: pct application non-entry in european phase |