ZA200401577B - Virus detection system. - Google Patents
Virus detection system. Download PDFInfo
- Publication number
- ZA200401577B ZA200401577B ZA200401577A ZA200401577A ZA200401577B ZA 200401577 B ZA200401577 B ZA 200401577B ZA 200401577 A ZA200401577 A ZA 200401577A ZA 200401577 A ZA200401577 A ZA 200401577A ZA 200401577 B ZA200401577 B ZA 200401577B
- Authority
- ZA
- South Africa
- Prior art keywords
- encrypted
- byte
- data
- dominant
- encrypted data
- Prior art date
Links
- 241000700605 Viruses Species 0.000 title claims abstract description 155
- 238000001514 detection method Methods 0.000 title description 9
- 238000000034 method Methods 0.000 claims abstract description 82
- 238000012545 processing Methods 0.000 claims description 67
- 230000002155 anti-virotic effect Effects 0.000 description 26
- 238000013036 cure process Methods 0.000 description 10
- 208000015181 infectious disease Diseases 0.000 description 5
- 230000008569 process Effects 0.000 description 4
- 238000004458 analytical method Methods 0.000 description 3
- 230000008901 benefit Effects 0.000 description 3
- 241000701076 Macacine alphaherpesvirus 1 Species 0.000 description 2
- 230000006399 behavior Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 230000003612 virological effect Effects 0.000 description 2
- 238000013473 artificial intelligence Methods 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 239000000872 buffer Substances 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000000249 desinfective effect Effects 0.000 description 1
- 230000001066 destructive effect Effects 0.000 description 1
- 230000010460 detection of virus Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- JEIPFZHSYJVQDO-UHFFFAOYSA-N ferric oxide Chemical compound O=[Fe]O[Fe]=O JEIPFZHSYJVQDO-UHFFFAOYSA-N 0.000 description 1
- 238000007429 general method Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/565—Static detection by checking file integrity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/568—Computer malware detection or handling, e.g. anti-virus arrangements eliminating virus, restoring damaged files
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US32234701P | 2001-09-14 | 2001-09-14 |
Publications (1)
Publication Number | Publication Date |
---|---|
ZA200401577B true ZA200401577B (en) | 2005-05-11 |
Family
ID=23254478
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
ZA200401577A ZA200401577B (en) | 2001-09-14 | 2004-02-26 | Virus detection system. |
Country Status (13)
Country | Link |
---|---|
US (1) | US7260725B2 (zh) |
EP (1) | EP1425649B1 (zh) |
JP (1) | JP2005527873A (zh) |
KR (1) | KR20040039357A (zh) |
CN (1) | CN1260627C (zh) |
AT (1) | ATE435466T1 (zh) |
AU (1) | AU2002333625B2 (zh) |
BR (1) | BR0212490A (zh) |
CA (1) | CA2460607A1 (zh) |
DE (1) | DE60232803D1 (zh) |
IL (2) | IL160757A0 (zh) |
WO (1) | WO2003025722A2 (zh) |
ZA (1) | ZA200401577B (zh) |
Families Citing this family (34)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8127356B2 (en) * | 2003-08-27 | 2012-02-28 | International Business Machines Corporation | System, method and program product for detecting unknown computer attacks |
US7555777B2 (en) * | 2004-01-13 | 2009-06-30 | International Business Machines Corporation | Preventing attacks in a data processing system |
US20050177748A1 (en) * | 2004-02-10 | 2005-08-11 | Seiichi Katano | Virus protection for multi-function peripherals |
US20050177720A1 (en) * | 2004-02-10 | 2005-08-11 | Seiichi Katano | Virus protection for multi-function peripherals |
US8707251B2 (en) * | 2004-06-07 | 2014-04-22 | International Business Machines Corporation | Buffered viewing of electronic documents |
US20060015940A1 (en) * | 2004-07-14 | 2006-01-19 | Shay Zamir | Method for detecting unwanted executables |
US20060101277A1 (en) * | 2004-11-10 | 2006-05-11 | Meenan Patrick A | Detecting and remedying unauthorized computer programs |
US8005803B2 (en) * | 2005-07-14 | 2011-08-23 | Microsoft Corporation | Best practices analyzer |
US8272058B2 (en) | 2005-07-29 | 2012-09-18 | Bit 9, Inc. | Centralized timed analysis in a network security system |
US8984636B2 (en) | 2005-07-29 | 2015-03-17 | Bit9, Inc. | Content extractor and analysis system |
US7895651B2 (en) | 2005-07-29 | 2011-02-22 | Bit 9, Inc. | Content tracking in a network security system |
CN100437614C (zh) * | 2005-11-16 | 2008-11-26 | 白杰 | 未知病毒程序的识别及清除方法 |
CN100465978C (zh) * | 2005-11-16 | 2009-03-04 | 白杰 | 被病毒程序破坏的数据恢复方法、装置及病毒清除方法 |
US8713686B2 (en) * | 2006-01-25 | 2014-04-29 | Ca, Inc. | System and method for reducing antivirus false positives |
US7664626B1 (en) * | 2006-03-24 | 2010-02-16 | Symantec Corporation | Ambiguous-state support in virtual machine emulators |
CN101018002B (zh) * | 2006-12-28 | 2013-03-27 | 李平 | 小型三相高性能方波永磁直流低速无刷电机 |
US20090172674A1 (en) * | 2007-12-28 | 2009-07-02 | International Business Machines Corporation | Managing the computer collection of information in an information technology environment |
US8239668B1 (en) | 2009-04-15 | 2012-08-07 | Trend Micro Incorporated | Computer security threat data collection and aggregation with user privacy protection |
US9202048B2 (en) | 2010-01-27 | 2015-12-01 | Mcafee, Inc. | Method and system for discrete stateful behavioral analysis |
CN101924762B (zh) * | 2010-08-18 | 2013-02-27 | 北京奇虎科技有限公司 | 一种基于云安全的主动防御方法 |
US8782791B2 (en) * | 2010-12-01 | 2014-07-15 | Symantec Corporation | Computer virus detection systems and methods |
KR101755646B1 (ko) | 2011-03-24 | 2017-07-10 | 삼성전자주식회사 | 안티-바이러스 유닛을 포함하는 데이터 저장 장치 및 그것의 동작 방법 |
JP5839967B2 (ja) * | 2011-12-01 | 2016-01-06 | 三菱電機株式会社 | マルウェア解析システム |
EP3364297B1 (en) * | 2012-06-26 | 2022-05-04 | Lynx Software Technologies Inc. | Systems and methods involving features of hardware virtualization such as separation kernel hypervisors, hypervisors, hypervisor guest context, hypervisor context, rootkit detection prevention, and/or other features |
CN103778370B (zh) * | 2012-10-17 | 2016-08-24 | 腾讯科技(深圳)有限公司 | 病毒文件处理方法和客户端设备 |
US10235539B2 (en) * | 2013-02-25 | 2019-03-19 | Mitsubishi Electric Corporation | Server device, recording medium, and concealed search system |
US9213840B2 (en) | 2014-05-15 | 2015-12-15 | Lynx Software Technologies, Inc. | Systems and methods involving features of hardware virtualization, hypervisor, APIs of interest, and/or other features |
WO2016004263A1 (en) | 2014-07-01 | 2016-01-07 | Lynx Software Technologies, Inc. | Systems and methods involving aspects of hardware virtualization such as separation kernel hypervisors, hypervisors, hypervisor guest context, hypervisor context, anti-fingerprinting, and/or other features |
WO2015176048A1 (en) | 2014-05-15 | 2015-11-19 | Lynx Software Technologies, Inc. | Aspects of hardware virtualization, hypervisors, code detection |
WO2015176029A1 (en) | 2014-05-15 | 2015-11-19 | Lynx Software Technologies, Inc. | Systems and methods involving features of hardware virtualization such as hypervisor, pages of interest, and/or other features |
US11782745B2 (en) | 2014-07-01 | 2023-10-10 | Lynx Software Technologies, Inc. | Systems and methods involving aspects of hardware virtualization such as separation kernel hypervisors, hypervisors, hypervisor guest context, hypervisor context, anti-fingerprinting and/or other features |
US10050798B2 (en) * | 2015-02-06 | 2018-08-14 | Mitsubishi Electric Corporation | Cryptographic block identification apparatus, cryptographic block identification method, and non-transitory computer readable recording medium storing cryptographic block identification program |
US10346608B2 (en) * | 2017-12-12 | 2019-07-09 | John Almeida | Virus immune computer system and method |
CN110826065B (zh) * | 2019-10-30 | 2022-03-15 | 亚信科技(成都)有限公司 | 一种扫描方法、装置及系统 |
Family Cites Families (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5809138A (en) * | 1994-07-25 | 1998-09-15 | Netz Computing Ltd. | Method for protecting storage media against computer virus infection |
US5442699A (en) * | 1994-11-21 | 1995-08-15 | International Business Machines Corporation | Searching for patterns in encrypted data |
US5613002A (en) * | 1994-11-21 | 1997-03-18 | International Business Machines Corporation | Generic disinfection of programs infected with a computer virus |
US5485575A (en) * | 1994-11-21 | 1996-01-16 | International Business Machines Corporation | Automatic analysis of a computer virus structure and means of attachment to its hosts |
US5765030A (en) * | 1996-07-19 | 1998-06-09 | Symantec Corp | Processor emulator module having a variable pre-fetch queue size for program execution |
US5696822A (en) * | 1995-09-28 | 1997-12-09 | Symantec Corporation | Polymorphic virus detection module |
US5826013A (en) * | 1995-09-28 | 1998-10-20 | Symantec Corporation | Polymorphic virus detection module |
US6067410A (en) * | 1996-02-09 | 2000-05-23 | Symantec Corporation | Emulation repair system |
US5854916A (en) * | 1995-09-28 | 1998-12-29 | Symantec Corporation | State-based cache for antivirus software |
US6052780A (en) * | 1996-09-12 | 2000-04-18 | Open Security Solutions, Llc | Computer system and process for accessing an encrypted and self-decrypting digital information product while restricting access to decrypted digital information |
US5964889A (en) * | 1997-04-16 | 1999-10-12 | Symantec Corporation | Method to analyze a program for presence of computer viruses by examining the opcode for faults before emulating instruction in emulator |
US6016546A (en) * | 1997-07-10 | 2000-01-18 | International Business Machines Corporation | Efficient detection of computer viruses and other data traits |
US6357008B1 (en) * | 1997-09-23 | 2002-03-12 | Symantec Corporation | Dynamic heuristic method for detecting computer viruses using decryption exploration and evaluation phases |
US6081894A (en) * | 1997-10-22 | 2000-06-27 | Rvt Technologies, Inc. | Method and apparatus for isolating an encrypted computer system upon detection of viruses and similar data |
US6393568B1 (en) * | 1997-10-23 | 2002-05-21 | Entrust Technologies Limited | Encryption and decryption system and method with content analysis provision |
US6981141B1 (en) * | 1998-05-07 | 2005-12-27 | Maz Technologies, Inc | Transparent encryption and decryption with algorithm independent cryptographic engine that allows for containerization of encrypted files |
US6851057B1 (en) * | 1999-11-30 | 2005-02-01 | Symantec Corporation | Data driven detection of viruses |
US6971019B1 (en) * | 2000-03-14 | 2005-11-29 | Symantec Corporation | Histogram-based virus detection |
US6980992B1 (en) * | 2001-07-26 | 2005-12-27 | Mcafee, Inc. | Tree pattern system and method for multiple virus signature recognition |
-
2002
- 2002-09-13 CA CA002460607A patent/CA2460607A1/en not_active Abandoned
- 2002-09-13 US US10/243,229 patent/US7260725B2/en active Active
- 2002-09-13 CN CNB028178505A patent/CN1260627C/zh not_active Expired - Fee Related
- 2002-09-13 BR BR0212490-4A patent/BR0212490A/pt not_active IP Right Cessation
- 2002-09-13 KR KR10-2004-7003789A patent/KR20040039357A/ko not_active Application Discontinuation
- 2002-09-13 AU AU2002333625A patent/AU2002333625B2/en not_active Ceased
- 2002-09-13 IL IL16075702A patent/IL160757A0/xx unknown
- 2002-09-13 DE DE60232803T patent/DE60232803D1/de not_active Expired - Lifetime
- 2002-09-13 AT AT02798961T patent/ATE435466T1/de not_active IP Right Cessation
- 2002-09-13 JP JP2003529288A patent/JP2005527873A/ja not_active Abandoned
- 2002-09-13 EP EP02798961A patent/EP1425649B1/en not_active Expired - Lifetime
- 2002-09-13 WO PCT/US2002/029152 patent/WO2003025722A2/en active Application Filing
-
2004
- 2004-02-26 ZA ZA200401577A patent/ZA200401577B/en unknown
- 2004-03-04 IL IL160757A patent/IL160757A/en not_active IP Right Cessation
Also Published As
Publication number | Publication date |
---|---|
BR0212490A (pt) | 2004-08-24 |
IL160757A (en) | 2009-05-04 |
CA2460607A1 (en) | 2003-03-27 |
EP1425649A2 (en) | 2004-06-09 |
JP2005527873A (ja) | 2005-09-15 |
WO2003025722A2 (en) | 2003-03-27 |
IL160757A0 (en) | 2004-08-31 |
ATE435466T1 (de) | 2009-07-15 |
WO2003025722A3 (en) | 2004-01-15 |
US7260725B2 (en) | 2007-08-21 |
DE60232803D1 (de) | 2009-08-13 |
CN1260627C (zh) | 2006-06-21 |
KR20040039357A (ko) | 2004-05-10 |
CN1571947A (zh) | 2005-01-26 |
AU2002333625B2 (en) | 2007-10-11 |
US20030093682A1 (en) | 2003-05-15 |
EP1425649B1 (en) | 2009-07-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7260725B2 (en) | Virus detection system | |
AU2002333625A1 (en) | Virus detection system | |
US20220284094A1 (en) | Methods and apparatus for malware threat research | |
JP4702957B2 (ja) | 耐タンパ・トラステッド仮想マシン | |
JP4950902B2 (ja) | ダイナミックトランスレーションによる先取りコンピュータマルウェアの保護 | |
US7774595B2 (en) | Computer security apparatus and method using security input device driver | |
JP4087442B2 (ja) | アクセス制御用のパラメータ付きハッシュ関数 | |
KR101265099B1 (ko) | 소프트웨어 보안 처리방법 및 기록매체 | |
US20070180528A1 (en) | System and method for reducing antivirus false positives | |
US8555070B2 (en) | External interface access control for medical systems | |
US20100235916A1 (en) | Apparatus and method for computer virus detection and remediation and self-repair of damaged files and/or objects | |
JP2004511031A (ja) | ディジタル・データ保護構成 | |
KR20130093775A (ko) | 시스템 파일 보호 및 복구를 위한 장치, 방법, 사용자 단말기 및 시스템 | |
US8555410B2 (en) | External interface access control | |
EP3151147A1 (en) | System and method for detection of malicious data encryption programs | |
Cohen | Defense-in-depth against computer viruses | |
JP7031070B1 (ja) | プログラム処理装置、プログラム処理方法、及び、プログラム | |
US11765302B2 (en) | Image forming apparatus equipped with an anti-malware function of a permission-list type, image forming method using the same, and non-transitory computer-readable recording medium on which image forming program for the same is recorded | |
CN116049846A (zh) | 一种软件加密方法及装置 | |
CN111062037A (zh) | 一种计算机病毒处理方法 | |
Polk et al. | Anti-Virus Tools and Techniques | |
Sutaria | Classifying malicious windows executables using anomaly based detection | |
Radatti | Protection against hostile algorithms in UNIX software |