MX2013009373A - Metodos y aparatos para tratar con malware. - Google Patents
Metodos y aparatos para tratar con malware.Info
- Publication number
- MX2013009373A MX2013009373A MX2013009373A MX2013009373A MX2013009373A MX 2013009373 A MX2013009373 A MX 2013009373A MX 2013009373 A MX2013009373 A MX 2013009373A MX 2013009373 A MX2013009373 A MX 2013009373A MX 2013009373 A MX2013009373 A MX 2013009373A
- Authority
- MX
- Mexico
- Prior art keywords
- data
- malware
- computer
- remote computers
- objects
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/561—Virus type analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0263—Rule management
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Virology (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Business, Economics & Management (AREA)
- General Business, Economics & Management (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Hardware Redundancy (AREA)
- Computer And Data Communications (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
Abstract
En un aspecto, un método para clasificar un objeto de computadora como malware incluye en una computadora (3) base, recibir datos sobre un objeto de computadora de cada una de una pluralidad de computadoras (2) remotas en las cuales se almacenan y/o se procesan el objeto u objetos similares. La computadora (3) base comprende varios servidores (62) de amenazas dispuestos para recibir tales datos de varias computadoras (2) remotas y aplicar reglas y/o heurísticas contra esos datos en tiempo real para determinar si tal objeto es o no malware y para comunicar tal determinación a las computadoras (2) remotas. La computadora (3) base comprende al menos un servidor (74) central en comunicación con los servidores (62) de amenazas y se dispone para recibir tales datos sobre objetos de los servidores (62) de amenazas para mantener una base (71, 72, 73) de datos maestra de datos recibidos sobre objetos de todos los servidores (62) de amenazas.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US201161443095P | 2011-02-15 | 2011-02-15 | |
| PCT/EP2012/052497 WO2012110501A1 (en) | 2011-02-15 | 2012-02-14 | Methods and apparatus for dealing with malware |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| MX2013009373A true MX2013009373A (es) | 2014-04-14 |
| MX341081B MX341081B (es) | 2016-08-08 |
Family
ID=45688475
Family Applications (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| MX2013009373A MX341081B (es) | 2011-02-15 | 2012-02-14 | Metodos y aparatos para tratar con malware. |
| MX2016001153A MX362630B (es) | 2011-02-15 | 2012-02-14 | Métodos y aparatos para tratar con malware. |
Family Applications After (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| MX2016001153A MX362630B (es) | 2011-02-15 | 2012-02-14 | Métodos y aparatos para tratar con malware. |
Country Status (9)
| Country | Link |
|---|---|
| US (5) | US9413721B2 (es) |
| EP (4) | EP2676219B1 (es) |
| JP (4) | JP5967107B2 (es) |
| CN (2) | CN105868635B (es) |
| AU (3) | AU2012217181B2 (es) |
| CA (2) | CA3049427A1 (es) |
| HK (2) | HK1199521A1 (es) |
| MX (2) | MX341081B (es) |
| WO (1) | WO2012110501A1 (es) |
Families Citing this family (133)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| GB0513375D0 (en) | 2005-06-30 | 2005-08-03 | Retento Ltd | Computer security |
| US8826034B1 (en) * | 2007-09-28 | 2014-09-02 | Symantec Corporation | Selective revocation of heuristic exemption for content with digital signatures |
| US8650648B2 (en) | 2008-03-26 | 2014-02-11 | Sophos Limited | Method and system for detecting restricted content associated with retrieved content |
| US10210162B1 (en) | 2010-03-29 | 2019-02-19 | Carbonite, Inc. | Log file management |
| US9390263B2 (en) | 2010-03-31 | 2016-07-12 | Sophos Limited | Use of an application controller to monitor and control software file and application environments |
| US9413721B2 (en) | 2011-02-15 | 2016-08-09 | Webroot Inc. | Methods and apparatus for dealing with malware |
| US8667592B2 (en) * | 2011-03-15 | 2014-03-04 | Symantec Corporation | Systems and methods for looking up anti-malware metadata |
| US9715325B1 (en) | 2012-06-21 | 2017-07-25 | Open Text Corporation | Activity stream based interaction |
| US9088606B2 (en) * | 2012-07-05 | 2015-07-21 | Tenable Network Security, Inc. | System and method for strategic anti-malware monitoring |
| RU2535506C2 (ru) | 2012-12-25 | 2014-12-10 | Закрытое акционерное обшество "Лаборатория Касперского" | Система и способ формирования сценариев модели поведения приложений |
| US20150286636A1 (en) * | 2013-03-15 | 2015-10-08 | Salim Elkhou | Document processing system and method |
| US9753920B2 (en) * | 2013-03-15 | 2017-09-05 | Altasense, Inc. | Document processing system and method |
| US20140308919A1 (en) * | 2013-04-11 | 2014-10-16 | Rawllin International Inc. | Application-level trusted third party solution based on an antiviral mobile client |
| US9578045B2 (en) * | 2013-05-03 | 2017-02-21 | Webroot Inc. | Method and apparatus for providing forensic visibility into systems and networks |
| US9323925B2 (en) * | 2013-05-30 | 2016-04-26 | Trusteer, Ltd. | Method and system for prevention of windowless screen capture |
| US9686304B1 (en) * | 2013-06-25 | 2017-06-20 | Symantec Corporation | Systems and methods for healing infected document files |
| US9794275B1 (en) * | 2013-06-28 | 2017-10-17 | Symantec Corporation | Lightweight replicas for securing cloud-based services |
| US10628263B1 (en) | 2013-08-02 | 2020-04-21 | David Cowen | Logfile-related technologies and techniques |
| US9866573B2 (en) * | 2013-09-27 | 2018-01-09 | EMC IP Holding Company LLC | Dynamic malicious application detection in storage systems |
| US9294501B2 (en) * | 2013-09-30 | 2016-03-22 | Fireeye, Inc. | Fuzzy hash of behavioral results |
| US9961133B2 (en) | 2013-11-04 | 2018-05-01 | The Johns Hopkins University | Method and apparatus for remote application monitoring |
| US10567398B2 (en) | 2013-11-04 | 2020-02-18 | The Johns Hopkins University | Method and apparatus for remote malware monitoring |
| US10432658B2 (en) * | 2014-01-17 | 2019-10-01 | Watchguard Technologies, Inc. | Systems and methods for identifying and performing an action in response to identified malicious network traffic |
| US9262635B2 (en) * | 2014-02-05 | 2016-02-16 | Fireeye, Inc. | Detection efficacy of virtual machine-based analysis with application specific events |
| US9769189B2 (en) * | 2014-02-21 | 2017-09-19 | Verisign, Inc. | Systems and methods for behavior-based automated malware analysis and classification |
| US10242185B1 (en) | 2014-03-21 | 2019-03-26 | Fireeye, Inc. | Dynamic guest image creation and rollback |
| US9917851B2 (en) | 2014-04-28 | 2018-03-13 | Sophos Limited | Intrusion detection using a heartbeat |
| US10122753B2 (en) | 2014-04-28 | 2018-11-06 | Sophos Limited | Using reputation to avoid false malware detections |
| DE102014211504A1 (de) | 2014-06-16 | 2015-12-17 | Siemens Aktiengesellschaft | Verfahren und System zur Gewinnung und Analyse von forensischen Daten in einer verteilten Rechnerinfrastruktur |
| WO2015200211A1 (en) | 2014-06-22 | 2015-12-30 | Webroot Inc. | Network threat prediction and blocking |
| US9785773B2 (en) * | 2014-07-03 | 2017-10-10 | Palantir Technologies Inc. | Malware data item analysis |
| US10216809B1 (en) * | 2014-07-07 | 2019-02-26 | Microstrategy Incorporated | Mobile explorer |
| EP3172690A4 (en) * | 2014-07-22 | 2018-03-07 | Hewlett-Packard Development Company, L.P. | Conditional security indicator sharing |
| US10693895B2 (en) | 2014-07-22 | 2020-06-23 | Micro Focus Llc | Security indicator access determination |
| US9710648B2 (en) | 2014-08-11 | 2017-07-18 | Sentinel Labs Israel Ltd. | Method of malware detection and system thereof |
| US11507663B2 (en) | 2014-08-11 | 2022-11-22 | Sentinel Labs Israel Ltd. | Method of remediating operations performed by a program and system thereof |
| US8943598B1 (en) * | 2014-08-12 | 2015-01-27 | Bank Of America Corporation | Automatic compromise detection for hardware signature for payment authentication |
| US9824356B2 (en) | 2014-08-12 | 2017-11-21 | Bank Of America Corporation | Tool for creating a system hardware signature for payment authentication |
| US10122687B2 (en) | 2014-09-14 | 2018-11-06 | Sophos Limited | Firewall techniques for colored objects on endpoints |
| US10902014B1 (en) * | 2014-11-18 | 2021-01-26 | Amazon Technologies, Inc. | Reducing network traffic when replicating memory data across hosts |
| US10185823B1 (en) * | 2014-11-18 | 2019-01-22 | Amazon Technologies, Inc. | Examining memory of execution environments to identify potential anomalies |
| WO2016099458A1 (en) | 2014-12-16 | 2016-06-23 | Hewlett Packard Enterprise Development Lp | Determining permissible activity based on permissible activity rules |
| WO2016097757A1 (en) | 2014-12-18 | 2016-06-23 | Sophos Limited | A method and system for network access control based on traffic monitoring and vulnerability detection using process related information |
| WO2016107754A1 (en) | 2014-12-30 | 2016-07-07 | British Telecommunications Public Limited Company | Malware detection |
| WO2016107753A1 (en) | 2014-12-30 | 2016-07-07 | British Telecommunications Public Limited Company | Malware detection in migrated virtual machines |
| US9438613B1 (en) * | 2015-03-30 | 2016-09-06 | Fireeye, Inc. | Dynamic content activation for automated analysis of embedded objects |
| US9729572B1 (en) * | 2015-03-31 | 2017-08-08 | Juniper Networks, Inc. | Remote remediation of malicious files |
| CA3022864A1 (en) * | 2015-05-04 | 2017-01-26 | Syed Kamran HASAN | Method and device for managing security in a computer network |
| US10395133B1 (en) | 2015-05-08 | 2019-08-27 | Open Text Corporation | Image box filtering for optical character recognition |
| US10599844B2 (en) | 2015-05-12 | 2020-03-24 | Webroot, Inc. | Automatic threat detection of executable files based on static data analysis |
| US11363035B2 (en) * | 2015-05-22 | 2022-06-14 | Fisher-Rosemount Systems, Inc. | Configurable robustness agent in a plant security system |
| US20160381051A1 (en) * | 2015-06-27 | 2016-12-29 | Mcafee, Inc. | Detection of malware |
| US10395029B1 (en) * | 2015-06-30 | 2019-08-27 | Fireeye, Inc. | Virtual system and method with threat protection |
| US11113086B1 (en) | 2015-06-30 | 2021-09-07 | Fireeye, Inc. | Virtual system and method for securing external network connectivity |
| US10289686B1 (en) | 2015-06-30 | 2019-05-14 | Open Text Corporation | Method and system for using dynamic content types |
| US10642753B1 (en) | 2015-06-30 | 2020-05-05 | Fireeye, Inc. | System and method for protecting a software component running in virtual machine using a virtualization layer |
| US10726127B1 (en) | 2015-06-30 | 2020-07-28 | Fireeye, Inc. | System and method for protecting a software component running in a virtual machine through virtual interrupts by the virtualization layer |
| CN105187390B (zh) * | 2015-08-10 | 2018-10-19 | 济南大学 | 主动式移动终端恶意软件网络流量数据集获取方法及系统 |
| US10102369B2 (en) | 2015-08-19 | 2018-10-16 | Palantir Technologies Inc. | Checkout system executable code monitoring, and user account compromise determination system |
| CN105045605B (zh) * | 2015-08-28 | 2019-05-24 | 成都卫士通信息产业股份有限公司 | 一种将dll注入目标进程的方法和系统 |
| US10733296B2 (en) | 2015-12-24 | 2020-08-04 | British Telecommunications Public Limited Company | Software security |
| EP3394785B1 (en) | 2015-12-24 | 2019-10-30 | British Telecommunications public limited company | Detecting malicious software |
| WO2017108575A1 (en) | 2015-12-24 | 2017-06-29 | British Telecommunications Public Limited Company | Malicious software identification |
| CN105590063B (zh) * | 2015-12-25 | 2019-03-22 | 珠海豹趣科技有限公司 | 一种挖掘漏洞的方法、装置及电子设备 |
| EP3437290B1 (en) | 2016-03-30 | 2020-08-26 | British Telecommunications public limited company | Detecting computer security threats |
| WO2017167545A1 (en) | 2016-03-30 | 2017-10-05 | British Telecommunications Public Limited Company | Network traffic threat identification |
| US9967267B2 (en) | 2016-04-15 | 2018-05-08 | Sophos Limited | Forensic analysis of computing activity |
| US12153674B2 (en) | 2016-04-15 | 2024-11-26 | Sophos Limited | Tracking malware root causes with an event graph |
| US9928366B2 (en) | 2016-04-15 | 2018-03-27 | Sophos Limited | Endpoint malware detection using an event graph |
| US12021831B2 (en) | 2016-06-10 | 2024-06-25 | Sophos Limited | Network security |
| CN106130959B (zh) * | 2016-06-12 | 2019-07-23 | 微梦创科网络科技(中国)有限公司 | 恶意应用识别方法及装置 |
| GB2551813B (en) | 2016-06-30 | 2020-01-08 | Sophos Ltd | Mobile device policy enforcement |
| GB2566657B8 (en) | 2016-06-30 | 2022-04-13 | Sophos Ltd | Proactive network security using a health heartbeat |
| GB2555517B (en) | 2016-08-03 | 2022-05-11 | Sophos Ltd | Mitigation of return-oriented programming attacks |
| CN106301787B (zh) * | 2016-08-14 | 2019-03-22 | 汪念鸿 | 一种用时间验证验证码的方法 |
| WO2018033350A1 (en) | 2016-08-16 | 2018-02-22 | British Telecommunications Public Limited Company | Reconfigured virtual machine to mitigate attack |
| GB2554980B (en) | 2016-08-16 | 2019-02-13 | British Telecomm | Mitigating security attacks in virtualised computing environments |
| ES2699956T3 (es) * | 2016-09-19 | 2019-02-13 | Retarus Gmbh | Técnica para detectar mensajes electrónicos sospechosos |
| US11695800B2 (en) | 2016-12-19 | 2023-07-04 | SentinelOne, Inc. | Deceiving attackers accessing network data |
| US11616812B2 (en) | 2016-12-19 | 2023-03-28 | Attivo Networks Inc. | Deceiving attackers accessing active directory data |
| US10581879B1 (en) * | 2016-12-22 | 2020-03-03 | Fireeye, Inc. | Enhanced malware detection for generated objects |
| US10360380B2 (en) | 2017-01-19 | 2019-07-23 | Cylance Inc. | Advanced malware classification |
| CN108959951B (zh) * | 2017-05-19 | 2021-01-12 | 北京瑞星网安技术股份有限公司 | 文档安全防护的方法、装置、设备及可读存储介质 |
| EP3643040A4 (en) | 2017-08-08 | 2021-06-09 | SentinelOne, Inc. | Methods, systems, and devices for dynamically modeling and grouping endpoints for edge networking |
| US10885212B2 (en) | 2017-09-12 | 2021-01-05 | Sophos Limited | Secure management of process properties |
| US10929534B2 (en) | 2017-10-18 | 2021-02-23 | AO Kaspersky Lab | System and method detecting malicious files using machine learning |
| RU2679785C1 (ru) | 2017-10-18 | 2019-02-12 | Акционерное общество "Лаборатория Касперского" | Система и способ классификации объектов |
| CA3117314A1 (en) * | 2017-11-08 | 2019-05-16 | Csp, Inc. | Secure invocation of network security entities |
| CN107733927B (zh) * | 2017-11-28 | 2021-10-19 | 深信服科技股份有限公司 | 一种僵尸网络文件检测的方法、云服务器、装置及系统 |
| US10841333B2 (en) | 2018-01-08 | 2020-11-17 | Sophos Limited | Malware detection using machine learning |
| US11470115B2 (en) | 2018-02-09 | 2022-10-11 | Attivo Networks, Inc. | Implementing decoys in a network environment |
| JP6783261B2 (ja) * | 2018-02-15 | 2020-11-11 | 日本電信電話株式会社 | 脅威情報抽出装置及び脅威情報抽出システム |
| US10728034B2 (en) | 2018-02-23 | 2020-07-28 | Webroot Inc. | Security privilege escalation exploit detection and mitigation |
| US11616758B2 (en) | 2018-04-04 | 2023-03-28 | Sophos Limited | Network device for securing endpoints in a heterogeneous enterprise network |
| US11288385B2 (en) | 2018-04-13 | 2022-03-29 | Sophos Limited | Chain of custody for enterprise documents |
| CN108959919A (zh) * | 2018-05-25 | 2018-12-07 | 合肥利元杰信息科技有限公司 | 一种技术服务程序下载系统 |
| US10929531B1 (en) * | 2018-06-27 | 2021-02-23 | Ca, Inc. | Automated scoring of intra-sample sections for malware detection |
| US11552962B2 (en) | 2018-08-31 | 2023-01-10 | Sophos Limited | Computer assisted identification of intermediate level threats |
| US11550900B1 (en) | 2018-11-16 | 2023-01-10 | Sophos Limited | Malware mitigation based on runtime memory allocation |
| GB2588745B (en) | 2018-11-19 | 2021-11-03 | Sophos Ltd | Deferred malware scanning |
| US11070573B1 (en) | 2018-11-30 | 2021-07-20 | Capsule8, Inc. | Process tree and tags |
| US20220035910A1 (en) * | 2018-12-19 | 2022-02-03 | Hewlett-Packard Development Company, L.P. | Security detection analytics |
| US11314863B2 (en) | 2019-03-27 | 2022-04-26 | Webroot, Inc. | Behavioral threat detection definition and compilation |
| US11714905B2 (en) | 2019-05-10 | 2023-08-01 | Sophos Limited | Attribute relevance tagging in malware recognition |
| WO2020236981A1 (en) | 2019-05-20 | 2020-11-26 | Sentinel Labs Israel Ltd. | Systems and methods for executable code detection, automatic feature extraction and position independent code detection |
| CN112149122B (zh) * | 2019-06-28 | 2025-05-30 | 卡巴斯基实验室股份制公司 | 对计算设备上的应用进行分类的系统和方法 |
| US20210026954A1 (en) | 2019-07-26 | 2021-01-28 | ReliaQuest Holding, LLC | Threat mitigation system and method |
| CN110737450A (zh) * | 2019-09-12 | 2020-01-31 | 中国人民解放军国防科技大学 | 一种动态应用安全增强方法、装置、设备和计算机介质 |
| US11636204B2 (en) * | 2019-10-01 | 2023-04-25 | Acronis International Gmbh | Systems and methods for countering removal of digital forensics information by malicious software |
| US11093612B2 (en) * | 2019-10-17 | 2021-08-17 | International Business Machines Corporation | Maintaining system security |
| CN111193595B (zh) * | 2019-11-28 | 2023-05-09 | 腾讯云计算(北京)有限责任公司 | 电子签名的错误检测方法、装置、设备和存储介质 |
| US11290480B2 (en) * | 2020-05-26 | 2022-03-29 | Bank Of America Corporation | Network vulnerability assessment tool |
| US12026276B2 (en) | 2020-06-22 | 2024-07-02 | Sophos Limited | Data augmentation for threat investigation in an enterprise network |
| US11182407B1 (en) | 2020-06-24 | 2021-11-23 | Bank Of America Corporation | Metadata access for distributed data lake users |
| US11775639B2 (en) | 2020-10-23 | 2023-10-03 | Sophos Limited | File integrity monitoring |
| US11579857B2 (en) | 2020-12-16 | 2023-02-14 | Sentinel Labs Israel Ltd. | Systems, methods and devices for device fingerprinting and automatic deployment of software in a computing network using a peer-to-peer approach |
| US11277375B1 (en) | 2021-01-04 | 2022-03-15 | Saudi Arabian Oil Company | Sender policy framework (SPF) configuration validator and security examinator |
| US11929992B2 (en) | 2021-03-31 | 2024-03-12 | Sophos Limited | Encrypted cache protection |
| US12192214B2 (en) | 2021-05-05 | 2025-01-07 | Sophos Limited | Mitigating threats associated with tampering attempts |
| US11899782B1 (en) | 2021-07-13 | 2024-02-13 | SentinelOne, Inc. | Preserving DLL hooks |
| GB2626472A (en) | 2021-10-11 | 2024-07-24 | Sophos Ltd | Augmented threat investigation |
| EP4420300B1 (en) | 2021-10-18 | 2025-05-07 | Sophos Limited | Network appliances for secure enterprise resources |
| US12425445B2 (en) | 2022-01-28 | 2025-09-23 | Sophos Limited | Early malware detection |
| US12095731B2 (en) | 2022-03-21 | 2024-09-17 | Sophos Limited | Aggregating security events |
| US12452273B2 (en) | 2022-03-30 | 2025-10-21 | SentinelOne, Inc | Systems, methods, and devices for preventing credential passing attacks |
| US12265526B2 (en) | 2022-03-31 | 2025-04-01 | Sophos Limited | Methods and apparatus for natural language interface for constructing complex database queries |
| US12130923B2 (en) | 2022-03-31 | 2024-10-29 | Sophos Limited | Methods and apparatus for augmenting training data using large language models |
| US12204870B2 (en) | 2022-03-31 | 2025-01-21 | Sophos Limited | Natural language analysis of a command line using a machine learning model to generate a natural language description of the command line |
| US12526289B2 (en) | 2022-05-17 | 2026-01-13 | Sophos Limited | Methods and apparatus for machine learning to generate a decision tree database to identify commands similar to a command of interest |
| JP2023173753A (ja) * | 2022-05-26 | 2023-12-07 | 株式会社日立製作所 | 情報管理装置、情報管理方法およびプログラム |
| US12468810B2 (en) | 2023-01-13 | 2025-11-11 | SentinelOne, Inc. | Classifying cybersecurity threats using machine learning on non-euclidean data |
| US20240427887A1 (en) * | 2023-06-20 | 2024-12-26 | Crowdstrike, Inc. | Rules-Based Malware Resolution Suggestions |
| CN119646904B (zh) * | 2024-11-11 | 2025-11-21 | 武汉船舶通信研究所(中国船舶集团有限公司第七二二研究所) | 一种用于存储设备的安全防护usb集线器及授权方法 |
Family Cites Families (196)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPS6110718A (ja) | 1984-06-27 | 1986-01-18 | Fuji Electric Co Ltd | カルマン渦流量計 |
| US5011885A (en) | 1989-10-27 | 1991-04-30 | The Mead Corporation | Methods for the production of microcapsules using functionalized isocyanate |
| JPH03233629A (ja) | 1990-02-09 | 1991-10-17 | Nec Corp | 実行形式ファイルの被破壊チェック方式 |
| GB2283341A (en) | 1993-10-29 | 1995-05-03 | Sophos Plc | Central virus checker for computer network. |
| JPH0844677A (ja) | 1994-07-29 | 1996-02-16 | Toshiba Corp | 分散処理システム |
| WO1996005674A1 (en) | 1994-08-12 | 1996-02-22 | Frank Thomson Leighton | Failsafe key escrow system |
| US5751982A (en) | 1995-03-31 | 1998-05-12 | Apple Computer, Inc. | Software emulation system with dynamic translation of emulated instructions for increased processing speed |
| US7337315B2 (en) | 1995-10-02 | 2008-02-26 | Corestreet, Ltd. | Efficient certificate revocation |
| US5899991A (en) * | 1997-05-12 | 1999-05-04 | Teleran Technologies, L.P. | Modeling technique for system access control and management |
| US6357008B1 (en) | 1997-09-23 | 2002-03-12 | Symantec Corporation | Dynamic heuristic method for detecting computer viruses using decryption exploration and evaluation phases |
| US6175869B1 (en) | 1998-04-08 | 2001-01-16 | Lucent Technologies Inc. | Client-side techniques for web server allocation |
| US6748451B2 (en) | 1998-05-26 | 2004-06-08 | Dow Global Technologies Inc. | Distributed computing environment using real-time scheduling logic and time deterministic architecture |
| US6219786B1 (en) | 1998-09-09 | 2001-04-17 | Surfcontrol, Inc. | Method and system for monitoring and controlling network access |
| US6338141B1 (en) | 1998-09-30 | 2002-01-08 | Cybersoft, Inc. | Method and apparatus for computer virus detection, analysis, and removal in real time |
| US7051365B1 (en) | 1999-06-30 | 2006-05-23 | At&T Corp. | Method and apparatus for a distributed firewall |
| US6772346B1 (en) | 1999-07-16 | 2004-08-03 | International Business Machines Corporation | System and method for managing files in a distributed system using filtering |
| US7296274B2 (en) * | 1999-11-15 | 2007-11-13 | Sandia National Laboratories | Method and apparatus providing deception and/or altered execution of logic in an information system |
| US6941470B1 (en) | 2000-04-07 | 2005-09-06 | Everdream Corporation | Protected execution environments within a computer system |
| US7921459B2 (en) * | 2000-04-28 | 2011-04-05 | International Business Machines Corporation | System and method for managing security events on a network |
| US7089303B2 (en) | 2000-05-31 | 2006-08-08 | Invicta Networks, Inc. | Systems and methods for distributed network protection |
| US7093239B1 (en) | 2000-07-14 | 2006-08-15 | Internet Security Systems, Inc. | Computer immune system and method for detecting unwanted code in a computer system |
| US7350204B2 (en) | 2000-07-24 | 2008-03-25 | Microsoft Corporation | Policies for secure software execution |
| GB2368233B (en) | 2000-08-31 | 2002-10-16 | F Secure Oyj | Maintaining virus detection software |
| US6842878B1 (en) * | 2000-09-29 | 2005-01-11 | International Business Machines Corporation | Method to document relations between objects using a graphical interface tree component |
| AU2001296205A1 (en) | 2000-10-17 | 2002-04-29 | Shyne-Song Chuang | A method and system for detecting rogue software |
| AU2002220172A1 (en) | 2000-11-15 | 2002-05-27 | David M. Holbrook | Apparatus and method for organizing and/or presenting data |
| US6957230B2 (en) | 2000-11-30 | 2005-10-18 | Microsoft Corporation | Dynamically generating multiple hierarchies of inter-object relationships based on object attribute values |
| US7231440B1 (en) * | 2000-12-18 | 2007-06-12 | Mcafee, Inc. | System and method for distributing portable computer virus definition records with binary file conversion |
| US20020087734A1 (en) | 2000-12-29 | 2002-07-04 | Marshall Donald Brent | System and method for managing dependencies in a component-based system |
| EP1225513A1 (en) | 2001-01-19 | 2002-07-24 | Eyal Dotan | Method for protecting computer programs and data from hostile code |
| US7168093B2 (en) | 2001-01-25 | 2007-01-23 | Solutionary, Inc. | Method and apparatus for verifying the integrity and security of computer networks and implementation of counter measures |
| US7478243B2 (en) | 2001-03-21 | 2009-01-13 | Microsoft Corporation | On-disk file format for serverless distributed file system with signed manifest of file modifications |
| US20040103315A1 (en) | 2001-06-07 | 2004-05-27 | Geoffrey Cooper | Assessment tool |
| US20020194490A1 (en) | 2001-06-18 | 2002-12-19 | Avner Halperin | System and method of virus containment in computer networks |
| US20030023857A1 (en) | 2001-07-26 | 2003-01-30 | Hinchliffe Alexander James | Malware infection suppression |
| US7310817B2 (en) | 2001-07-26 | 2007-12-18 | Mcafee, Inc. | Centrally managed malware scanning |
| US6993660B1 (en) | 2001-08-03 | 2006-01-31 | Mcafee, Inc. | System and method for performing efficient computer virus scanning of transient messages using checksums in a distributed computing environment |
| GB0121497D0 (en) | 2001-09-05 | 2001-10-24 | Cryptic Software Ltd | Network security |
| US7356736B2 (en) | 2001-09-25 | 2008-04-08 | Norman Asa | Simulated computer system for monitoring of software performance |
| US20030070088A1 (en) | 2001-10-05 | 2003-04-10 | Dmitry Gryaznov | Computer virus names cross-reference and information method and system |
| US7107617B2 (en) | 2001-10-15 | 2006-09-12 | Mcafee, Inc. | Malware scanning of compressed computer files |
| US6944609B2 (en) * | 2001-10-18 | 2005-09-13 | Lycos, Inc. | Search results using editor feedback |
| US20030084323A1 (en) | 2001-10-31 | 2003-05-01 | Gales George S. | Network intrusion detection system and method |
| JP2003150594A (ja) * | 2001-11-12 | 2003-05-23 | Hitachi Ltd | データウェアハウスシステム |
| EP1315066A1 (en) | 2001-11-21 | 2003-05-28 | BRITISH TELECOMMUNICATIONS public limited company | Computer security system |
| US20030101381A1 (en) | 2001-11-29 | 2003-05-29 | Nikolay Mateev | System and method for virus checking software |
| US20030115479A1 (en) * | 2001-12-14 | 2003-06-19 | Jonathan Edwards | Method and system for detecting computer malwares by scan of process memory after process initialization |
| US6944772B2 (en) | 2001-12-26 | 2005-09-13 | D'mitri Dozortsev | System and method of enforcing executable code identity verification over the network |
| US7415726B2 (en) | 2001-12-28 | 2008-08-19 | Mcafee, Inc. | Controlling access to suspicious files |
| US7269851B2 (en) | 2002-01-07 | 2007-09-11 | Mcafee, Inc. | Managing malware protection upon a computer network |
| US7152105B2 (en) | 2002-01-15 | 2006-12-19 | Mcafee, Inc. | System and method for network vulnerability detection and reporting |
| US20030188194A1 (en) | 2002-03-29 | 2003-10-02 | David Currie | Method and apparatus for real-time security verification of on-line services |
| US20030196094A1 (en) * | 2002-04-10 | 2003-10-16 | Hillis W. Daniel | Method and apparatus for authenticating the content of a distributed database |
| EP1495616B1 (en) | 2002-04-17 | 2010-05-05 | Computer Associates Think, Inc. | Detecting and countering malicious code in enterprise networks |
| US7370360B2 (en) | 2002-05-13 | 2008-05-06 | International Business Machines Corporation | Computer immune system and method for detecting unwanted code in a P-code or partially compiled native-code program executing within a virtual machine |
| US7409717B1 (en) | 2002-05-23 | 2008-08-05 | Symantec Corporation | Metamorphic computer virus detection |
| US20060041760A1 (en) | 2002-06-26 | 2006-02-23 | Zezhen Huang | Trusted computer activity monitoring and recording system and method |
| US20040006704A1 (en) | 2002-07-02 | 2004-01-08 | Dahlstrom Dale A. | System and method for determining security vulnerabilities |
| KR100940202B1 (ko) | 2002-08-29 | 2010-02-10 | 삼성전자주식회사 | 일방향 함수를 사용하여 계층적으로 암호화하는 장치 및방법 |
| US7509679B2 (en) | 2002-08-30 | 2009-03-24 | Symantec Corporation | Method, system and computer program product for security in a global computer network transaction |
| US7263585B2 (en) | 2002-09-19 | 2007-08-28 | Ip-First, Llc | Store-induced instruction coherency mechanism |
| US7188173B2 (en) * | 2002-09-30 | 2007-03-06 | Intel Corporation | Method and apparatus to enable efficient processing and transmission of network communications |
| US8180051B1 (en) | 2002-10-07 | 2012-05-15 | Cisco Technology, Inc | Methods and apparatus for securing communications of a user operated device |
| US7437760B2 (en) | 2002-10-10 | 2008-10-14 | International Business Machines Corporation | Antiviral network system |
| US8046835B2 (en) | 2002-10-23 | 2011-10-25 | Frederick S. M. Herz | Distributed computer network security activity model SDI-SCAM |
| US7159149B2 (en) | 2002-10-24 | 2007-01-02 | Symantec Corporation | Heuristic detection and termination of fast spreading network worm attacks |
| US6907781B2 (en) | 2002-11-05 | 2005-06-21 | Snap-On Incorporated | Wheel balancing system with integrated wheel lift, loaded mode testing, and wheel imaging system |
| US7343626B1 (en) | 2002-11-12 | 2008-03-11 | Microsoft Corporation | Automated detection of cross site scripting vulnerabilities |
| US7219239B1 (en) * | 2002-12-02 | 2007-05-15 | Arcsight, Inc. | Method for batching events for transmission by software agent |
| US7353533B2 (en) | 2002-12-18 | 2008-04-01 | Novell, Inc. | Administration of protection of data accessible by a mobile device |
| US8327442B2 (en) | 2002-12-24 | 2012-12-04 | Herz Frederick S M | System and method for a distributed application and network security system (SDI-SCAM) |
| US7013483B2 (en) | 2003-01-03 | 2006-03-14 | Aladdin Knowledge Systems Ltd. | Method for emulating an executable code in order to detect maliciousness |
| US20040153644A1 (en) | 2003-02-05 | 2004-08-05 | Mccorkendale Bruce | Preventing execution of potentially malicious software |
| US7219148B2 (en) * | 2003-03-03 | 2007-05-15 | Microsoft Corporation | Feedback loop for spam prevention |
| US7529754B2 (en) | 2003-03-14 | 2009-05-05 | Websense, Inc. | System and method of monitoring and controlling application files |
| GB2400932B (en) | 2003-04-25 | 2005-12-14 | Messagelabs Ltd | A method of,and system for,heuristically determining that an unknown file is harmless by using traffic heuristics |
| GB2400933B (en) | 2003-04-25 | 2006-11-22 | Messagelabs Ltd | A method of, and system for, heuristically detecting viruses in executable code by detecting files which have been maliciously altered |
| US8201249B2 (en) | 2003-05-14 | 2012-06-12 | Northrop Grumman Systems Corporation | Steady state computer intrusion and misuse detection |
| US8065725B2 (en) | 2003-05-30 | 2011-11-22 | Yuliang Zheng | Systems and methods for enhanced network security |
| US7257842B2 (en) | 2003-07-21 | 2007-08-14 | Mcafee, Inc. | Pre-approval of computer files during a malware detection |
| US8127356B2 (en) * | 2003-08-27 | 2012-02-28 | International Business Machines Corporation | System, method and program product for detecting unknown computer attacks |
| EP1668511B1 (en) * | 2003-10-03 | 2014-04-30 | Enterasys Networks, Inc. | Apparatus and method for dynamic distribution of intrusion signatures |
| US7464158B2 (en) | 2003-10-15 | 2008-12-09 | International Business Machines Corporation | Secure initialization of intrusion detection system |
| US7069389B2 (en) | 2003-11-26 | 2006-06-27 | Microsoft Corporation | Lazy flushing of translation lookaside buffers |
| US7461088B2 (en) * | 2003-12-15 | 2008-12-02 | Apple Inc. | Superset file browser |
| EP1695167A1 (en) | 2003-12-17 | 2006-08-30 | Telecom Italia S.p.A. | Method and apparatus for monitoring operation of processing systems, related network and computer program product therefor |
| EP1549012A1 (en) | 2003-12-24 | 2005-06-29 | DataCenterTechnologies N.V. | Method and system for identifying the content of files in a network |
| US8544096B2 (en) * | 2003-12-30 | 2013-09-24 | Emc Corporation | On-access and on-demand distributed virus scanning |
| US7506371B1 (en) | 2004-01-22 | 2009-03-17 | Guardium, Inc. | System and methods for adaptive behavior based access control |
| US7707634B2 (en) | 2004-01-30 | 2010-04-27 | Microsoft Corporation | System and method for detecting malware in executable scripts according to its functionality |
| US7624119B2 (en) | 2004-02-11 | 2009-11-24 | International Business Machines Corporation | Low-overhead built-in timestamp column for relational database systems |
| US7376970B2 (en) | 2004-02-20 | 2008-05-20 | Microsoft Corporation | System and method for proactive computer virus protection |
| US20060090073A1 (en) | 2004-04-27 | 2006-04-27 | Shira Steinberg | System and method of using human friendly representations of mathematical values and activity analysis to confirm authenticity |
| US7814056B2 (en) * | 2004-05-21 | 2010-10-12 | Computer Associates Think, Inc. | Method and apparatus for data backup using data blocks |
| US7694150B1 (en) | 2004-06-22 | 2010-04-06 | Cisco Technology, Inc | System and methods for integration of behavioral and signature based security |
| US20060080637A1 (en) | 2004-10-12 | 2006-04-13 | Microsoft Corporation | System and method for providing malware information for programmatic access |
| JP4327698B2 (ja) | 2004-10-19 | 2009-09-09 | 富士通株式会社 | ネットワーク型ウィルス活動検出プログラム、処理方法およびシステム |
| US7793338B1 (en) | 2004-10-21 | 2010-09-07 | Mcafee, Inc. | System and method of network endpoint security |
| US7461339B2 (en) | 2004-10-21 | 2008-12-02 | Trend Micro, Inc. | Controlling hostile electronic mail content |
| US7831995B2 (en) | 2004-10-29 | 2010-11-09 | CORE, SDI, Inc. | Establishing and enforcing security and privacy policies in web-based applications |
| US7509493B2 (en) | 2004-11-19 | 2009-03-24 | Microsoft Corporation | Method and system for distributing security policies |
| US20060117055A1 (en) | 2004-11-29 | 2006-06-01 | John Doyle | Client-based web server application verification and testing system |
| WO2006101549A2 (en) | 2004-12-03 | 2006-09-28 | Whitecell Software, Inc. | Secure system for allowing the execution of authorized computer program code |
| US7979889B2 (en) | 2005-01-07 | 2011-07-12 | Cisco Technology, Inc. | Methods and apparatus providing security to computer systems and networks |
| EP1684151A1 (en) | 2005-01-20 | 2006-07-26 | Grant Rothwell William | Computer protection against malware affection |
| US20060161856A1 (en) | 2005-01-20 | 2006-07-20 | International Business Machines Corporation | Data collection tool for a computer |
| US8646080B2 (en) | 2005-09-16 | 2014-02-04 | Avg Technologies Cy Limited | Method and apparatus for removing harmful software |
| US8418226B2 (en) | 2005-03-18 | 2013-04-09 | Absolute Software Corporation | Persistent servicing agent |
| US8438499B2 (en) | 2005-05-03 | 2013-05-07 | Mcafee, Inc. | Indicating website reputations during user interactions |
| US7665143B2 (en) | 2005-05-16 | 2010-02-16 | Microsoft Corporation | Creating secure process objects |
| US20060265759A1 (en) | 2005-05-19 | 2006-11-23 | Microsoft Corporation | Systems and methods for identifying principals to control access to computing resources |
| US7877803B2 (en) | 2005-06-27 | 2011-01-25 | Hewlett-Packard Development Company, L.P. | Automated immune response for a computer |
| JP2007013343A (ja) * | 2005-06-28 | 2007-01-18 | Fujitsu Ltd | ワーム検出パラメータ設定プログラム及びワーム検出パラメータ設定装置 |
| GB0513375D0 (en) | 2005-06-30 | 2005-08-03 | Retento Ltd | Computer security |
| US7774361B1 (en) * | 2005-07-08 | 2010-08-10 | Symantec Corporation | Effective aggregation and presentation of database intrusion incidents |
| US8272058B2 (en) | 2005-07-29 | 2012-09-18 | Bit 9, Inc. | Centralized timed analysis in a network security system |
| JP4718288B2 (ja) * | 2005-09-29 | 2011-07-06 | 株式会社日立製作所 | ディスクレス計算機の運用管理システム |
| US7712132B1 (en) | 2005-10-06 | 2010-05-04 | Ogilvie John W | Detecting surreptitious spyware |
| US8286254B2 (en) * | 2005-11-16 | 2012-10-09 | Cisco Technology, Inc. | Behavioral learning for interactive user security |
| US20090271867A1 (en) | 2005-12-30 | 2009-10-29 | Peng Zhang | Virtual machine to detect malicious code |
| US20070174429A1 (en) | 2006-01-24 | 2007-07-26 | Citrix Systems, Inc. | Methods and servers for establishing a connection between a client system and a virtual machine hosting a requested computing environment |
| JP2007242002A (ja) | 2006-02-10 | 2007-09-20 | Mitsubishi Electric Corp | ネットワーク管理装置及びネットワーク管理方法及びプログラム |
| US8448242B2 (en) | 2006-02-28 | 2013-05-21 | The Trustees Of Columbia University In The City Of New York | Systems, methods, and media for outputting data based upon anomaly detection |
| US8347376B2 (en) | 2006-03-06 | 2013-01-01 | Cisco Technology, Inc. | Techniques for distributing a new communication key within a virtual private network |
| US7926111B2 (en) | 2006-03-17 | 2011-04-12 | Symantec Corporation | Determination of related entities |
| US8479174B2 (en) | 2006-04-05 | 2013-07-02 | Prevx Limited | Method, computer program and computer for analyzing an executable computer file |
| EP2011099A4 (en) | 2006-04-06 | 2013-08-21 | Juniper Networks Inc | SYSTEM AND METHOD FOR DETECTING PROBLEMS FOR MOBILE PLATFORMS WITH LIMITED ACCESS |
| US7966659B1 (en) * | 2006-04-18 | 2011-06-21 | Rockwell Automation Technologies, Inc. | Distributed learn mode for configuring a firewall, security authority, intrusion detection/prevention devices, and the like |
| US20070289019A1 (en) * | 2006-04-21 | 2007-12-13 | David Lowrey | Methodology, system and computer readable medium for detecting and managing malware threats |
| US8528087B2 (en) | 2006-04-27 | 2013-09-03 | Robot Genius, Inc. | Methods for combating malicious software |
| US7921063B1 (en) | 2006-05-17 | 2011-04-05 | Daniel Quinlan | Evaluating electronic mail messages based on probabilistic analysis |
| US7761912B2 (en) * | 2006-06-06 | 2010-07-20 | Microsoft Corporation | Reputation driven firewall |
| US7890869B1 (en) | 2006-06-12 | 2011-02-15 | Redseal Systems, Inc. | Network security visualization methods, apparatus and graphical user interfaces |
| US8364596B2 (en) * | 2006-06-29 | 2013-01-29 | International Business Machines Corporation | System and method for providing and/or obtaining electronic documents |
| US8239915B1 (en) * | 2006-06-30 | 2012-08-07 | Symantec Corporation | Endpoint management using trust rating data |
| US7583187B1 (en) * | 2006-07-11 | 2009-09-01 | Mcafee, Inc. | System, method and computer program product for automatically summarizing security events |
| CN101512969B (zh) * | 2006-09-06 | 2011-10-05 | 网络通保安有限公司 | 推式更新系统 |
| US8042184B1 (en) | 2006-10-18 | 2011-10-18 | Kaspersky Lab, Zao | Rapid analysis of data stream for malware presence |
| US7877795B2 (en) | 2006-10-30 | 2011-01-25 | At&T Intellectual Property I, Lp | Methods, systems, and computer program products for automatically configuring firewalls |
| US7954143B2 (en) | 2006-11-13 | 2011-05-31 | At&T Intellectual Property I, Lp | Methods, network services, and computer program products for dynamically assigning users to firewall policy groups |
| US8056115B2 (en) * | 2006-12-11 | 2011-11-08 | International Business Machines Corporation | System, method and program product for identifying network-attack profiles and blocking network intrusions |
| US8959568B2 (en) * | 2007-03-14 | 2015-02-17 | Microsoft Corporation | Enterprise security assessment sharing |
| US7895154B2 (en) * | 2007-03-28 | 2011-02-22 | Microsoft Corporation | Communication reputation |
| US7802299B2 (en) * | 2007-04-09 | 2010-09-21 | Microsoft Corporation | Binary function database system |
| US7840501B1 (en) * | 2007-07-12 | 2010-11-23 | Mcafee, Inc. | Behavioral analysis apparatus and associated method that utilizes a system selected based on a level of data |
| JP5083760B2 (ja) * | 2007-08-03 | 2012-11-28 | 独立行政法人情報通信研究機構 | マルウェアの類似性検査方法及び装置 |
| US7614084B2 (en) | 2007-10-02 | 2009-11-03 | Kaspersky Lab Zao | System and method for detecting multi-component malware |
| CN101350053A (zh) | 2007-10-15 | 2009-01-21 | 北京瑞星国际软件有限公司 | 防止网页浏览器被漏洞利用的方法和装置 |
| US7991726B2 (en) * | 2007-11-30 | 2011-08-02 | Bank Of America Corporation | Intrusion detection system alerts mechanism |
| CN100504904C (zh) | 2007-12-25 | 2009-06-24 | 北京大学 | 一种Windows隐蔽性恶意软件检测方法 |
| US8806629B1 (en) * | 2008-01-02 | 2014-08-12 | Cisco Technology, Inc. | Automatic generation of policy-driven anti-malware signatures and mitigation of DoS (denial-of-service) attacks |
| US20090178131A1 (en) * | 2008-01-08 | 2009-07-09 | Microsoft Corporation | Globally distributed infrastructure for secure content management |
| US8225402B1 (en) * | 2008-04-09 | 2012-07-17 | Amir Averbuch | Anomaly-based detection of SQL injection attacks |
| US8341740B2 (en) * | 2008-05-21 | 2012-12-25 | Alcatel Lucent | Method and system for identifying enterprise network hosts infected with slow and/or distributed scanning malware |
| US9405555B2 (en) | 2008-05-23 | 2016-08-02 | Microsoft Technology Licensing, Llc | Automated code splitting and pre-fetching for improving responsiveness of browser-based applications |
| US8272059B2 (en) | 2008-05-28 | 2012-09-18 | International Business Machines Corporation | System and method for identification and blocking of malicious code for web browser script engines |
| US8234709B2 (en) * | 2008-06-20 | 2012-07-31 | Symantec Operating Corporation | Streaming malware definition updates |
| US8301904B1 (en) | 2008-06-24 | 2012-10-30 | Mcafee, Inc. | System, method, and computer program product for automatically identifying potentially unwanted data as unwanted |
| CN101329711B (zh) | 2008-07-24 | 2011-04-06 | 成都市华为赛门铁克科技有限公司 | 一种计算机文件检测的方法及装置 |
| US8504504B2 (en) * | 2008-09-26 | 2013-08-06 | Oracle America, Inc. | System and method for distributed denial of service identification and prevention |
| US8041733B2 (en) * | 2008-10-14 | 2011-10-18 | Yahoo! Inc. | System for automatically categorizing queries |
| US8347386B2 (en) | 2008-10-21 | 2013-01-01 | Lookout, Inc. | System and method for server-coupled malware prevention |
| US9367680B2 (en) * | 2008-10-21 | 2016-06-14 | Lookout, Inc. | System and method for mobile communication device application advisement |
| US9235704B2 (en) * | 2008-10-21 | 2016-01-12 | Lookout, Inc. | System and method for a scanning API |
| IL195340A (en) | 2008-11-17 | 2013-06-27 | Shlomo Dolev | Builds and detects malware signatures for executable codes on your computer |
| US8862621B1 (en) * | 2008-11-26 | 2014-10-14 | The United States Of America As Represented By The Secretary Of The Navy | Intelligent universal situation awareness and natural language interface |
| US20100169972A1 (en) | 2008-12-31 | 2010-07-01 | Microsoft Corporation | Shared repository of malware data |
| JP5283271B2 (ja) * | 2009-05-18 | 2013-09-04 | 独立行政法人情報通信研究機構 | ネットワークにおけるサーバ選択方法,選択システム及びプログラム |
| GB0909695D0 (en) | 2009-06-05 | 2009-07-22 | Maxymiser Ltd | On page console |
| US8578175B2 (en) | 2011-02-23 | 2013-11-05 | International Business Machines Corporation | Secure object having protected region, integrity tree, and unprotected region |
| US20100332593A1 (en) * | 2009-06-29 | 2010-12-30 | Igor Barash | Systems and methods for operating an anti-malware network on a cloud computing platform |
| US8276202B1 (en) | 2009-06-30 | 2012-09-25 | Aleksandr Dubrovsky | Cloud-based gateway security scanning |
| US8116732B2 (en) | 2009-08-05 | 2012-02-14 | Oto Technologies, Llc | Routing mobile users to secure locations based on transaction type |
| US8443447B1 (en) * | 2009-08-06 | 2013-05-14 | Trend Micro Incorporated | Apparatus and method for detecting malware-infected electronic mail |
| US9081958B2 (en) * | 2009-08-13 | 2015-07-14 | Symantec Corporation | Using confidence about user intent in a reputation system |
| US8336100B1 (en) * | 2009-08-21 | 2012-12-18 | Symantec Corporation | Systems and methods for using reputation data to detect packed malware |
| US8332946B1 (en) | 2009-09-15 | 2012-12-11 | AVG Netherlands B.V. | Method and system for protecting endpoints |
| US8214903B2 (en) | 2009-10-02 | 2012-07-03 | International Business Machines Corporation | Analysis of scripts |
| US8448243B1 (en) | 2009-10-14 | 2013-05-21 | Symantec Corporation | Systems and methods for detecting unknown malware in an executable file |
| US8161060B2 (en) | 2009-10-19 | 2012-04-17 | The Frayman Group, Inc. | Methods and systems for identifying, assessing and clearing conflicts of interest |
| US8640104B2 (en) | 2009-12-08 | 2014-01-28 | International Business Machines Corporation | Computer method and apparatus for debugging in a dynamic computer language |
| US9002972B2 (en) | 2010-01-29 | 2015-04-07 | Symantec Corporation | Systems and methods for sharing the results of computing operations among related computing systems |
| US8825601B2 (en) * | 2010-02-01 | 2014-09-02 | Microsoft Corporation | Logical data backup and rollback using incremental capture in a distributed database |
| US8499283B2 (en) | 2010-02-09 | 2013-07-30 | Webroot Inc. | Detection of scripting-language-based exploits using parse tree transformation |
| US8407790B2 (en) | 2010-02-09 | 2013-03-26 | Webroot, Inc. | Low-latency detection of scripting-language-based exploits |
| US8307435B1 (en) | 2010-02-18 | 2012-11-06 | Symantec Corporation | Software object corruption detection |
| US8504876B2 (en) * | 2010-04-30 | 2013-08-06 | The Mitre Corporation | Anomaly detection for database systems |
| US8407795B2 (en) | 2010-05-18 | 2013-03-26 | Ca, Inc. | Systems and methods to secure backup images from viruses |
| US20110307804A1 (en) * | 2010-06-11 | 2011-12-15 | Spierer Mitchell D | Electronic message management system and method |
| US8352484B1 (en) | 2010-07-02 | 2013-01-08 | Symantec Corporation | Systems and methods for hashing executable files |
| US20120017200A1 (en) | 2010-07-16 | 2012-01-19 | Fujitsu Limited | Solving Hybrid Constraints to Validate a Security Software Module for Detecting Injection Attacks |
| TWI442260B (zh) | 2010-11-19 | 2014-06-21 | Inst Information Industry | 伺服器、使用者裝置及其惡意程式偵測方法 |
| EP2643759B1 (en) * | 2010-11-24 | 2019-10-16 | Logrhythm, Inc. | Advanced intelligence engine |
| US9413721B2 (en) | 2011-02-15 | 2016-08-09 | Webroot Inc. | Methods and apparatus for dealing with malware |
| US9065826B2 (en) | 2011-08-08 | 2015-06-23 | Microsoft Technology Licensing, Llc | Identifying application reputation based on resource accesses |
| JP6110718B2 (ja) | 2013-04-22 | 2017-04-05 | 日本電信電話株式会社 | 光信号処理回路 |
-
2012
- 2012-02-13 US US13/372,375 patent/US9413721B2/en active Active
- 2012-02-13 US US13/372,433 patent/US10574630B2/en active Active
- 2012-02-13 US US13/372,439 patent/US20120260304A1/en not_active Abandoned
- 2012-02-14 MX MX2013009373A patent/MX341081B/es active IP Right Grant
- 2012-02-14 CA CA3049427A patent/CA3049427A1/en not_active Abandoned
- 2012-02-14 AU AU2012217181A patent/AU2012217181B2/en active Active
- 2012-02-14 EP EP12704768.6A patent/EP2676219B1/en active Active
- 2012-02-14 CN CN201610412950.4A patent/CN105868635B/zh active Active
- 2012-02-14 WO PCT/EP2012/052497 patent/WO2012110501A1/en not_active Ceased
- 2012-02-14 CN CN201280018306.9A patent/CN103493061B/zh active Active
- 2012-02-14 MX MX2016001153A patent/MX362630B/es unknown
- 2012-02-14 EP EP21196603.1A patent/EP3958088B1/en active Active
- 2012-02-14 EP EP14161847.0A patent/EP2750071B1/en active Active
- 2012-02-14 CA CA2827385A patent/CA2827385A1/en not_active Abandoned
- 2012-02-14 EP EP14161844.7A patent/EP2750070A3/en not_active Withdrawn
- 2012-02-14 JP JP2013553909A patent/JP5967107B2/ja active Active
-
2014
- 2014-05-23 US US14/286,786 patent/US20140304800A1/en not_active Abandoned
- 2014-12-30 HK HK14113078.2A patent/HK1199521A1/en unknown
- 2014-12-30 HK HK14113079.1A patent/HK1199522A1/en unknown
-
2016
- 2016-06-20 JP JP2016121712A patent/JP6224173B2/ja active Active
-
2017
- 2017-04-11 AU AU2017202384A patent/AU2017202384A1/en not_active Abandoned
- 2017-10-04 JP JP2017194396A patent/JP6522707B2/ja active Active
-
2019
- 2019-01-23 AU AU2019200445A patent/AU2019200445B2/en active Active
- 2019-03-22 JP JP2019054637A patent/JP2019106216A/ja active Pending
-
2020
- 2020-02-10 US US16/786,692 patent/US20200177552A1/en active Pending
Also Published As
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| MX2013009373A (es) | Metodos y aparatos para tratar con malware. | |
| MX2019011590A (es) | Metodos y sistemas para realizar pruebas en aplicaciones web. | |
| WO2015116998A3 (en) | Electronic transfer and obligation enforcement system | |
| PH12017550113A1 (en) | System and method for extracting and sharing application-related user data | |
| BR112017005824A2 (pt) | método, e, dispositivo móvel. | |
| MY203162A (en) | Information sharing method, client, and computer storage medium | |
| PH12014502159A1 (en) | Method, system, and apparatus for exchanging data between client devices | |
| BR112017018382A2 (pt) | distribuição e utilização de informações de antena para operações de determinação de localização | |
| EP4375952A3 (en) | Systems and methods for reducing data density in large datasets | |
| AR087681A1 (es) | Sistema y metodo para proveer acceso a internet a un dispositivo informatico | |
| TR201910552T4 (tr) | DNS istemcilerinin yapılandırılması. | |
| MX361184B (es) | Sistemas y metodos para la evaluacion cuantitativa de una propiedad para renovacion. | |
| MX2015012847A (es) | Sistemas y metodos para evaluar la textura de una formulacion de recubrimiento. | |
| MX2016004190A (es) | Metodos y sistemas para administrar informacion de la comunidad. | |
| GB2500160A (en) | Replicating data | |
| PH12019500554A1 (en) | White space database discovery | |
| WO2015127170A3 (en) | Method and system for providing a robust and efficient virtual asset vulnerability management and verification service | |
| WO2014004545A3 (en) | Pushing business objects | |
| GB2544367A (en) | Tool for planning crowd control measures | |
| WO2013166250A3 (en) | Using actions to select advertisements | |
| WO2008088905A3 (en) | Method and system for distributing a database and computer program within a network | |
| SG11201805826VA (en) | Data storage and service processing method and apparatus | |
| TW201711736A (en) | Information distribution methods, computer readable media, and information distribution servers | |
| WO2015180842A8 (de) | System und verfahren für eine sichere und anonyme kommunikation in einem netzwerk | |
| MX2017015376A (es) | Tecnicas para agrupaciones de servidor de valor cero dinamicas. |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| GB | Transfer or rights |
Owner name: WEBROOT INC. |
|
| FG | Grant or registration |