[go: up one dir, main page]

AU1598601A - Method and system for intercepting an application program interface - Google Patents

Method and system for intercepting an application program interface

Info

Publication number
AU1598601A
AU1598601A AU15986/01A AU1598601A AU1598601A AU 1598601 A AU1598601 A AU 1598601A AU 15986/01 A AU15986/01 A AU 15986/01A AU 1598601 A AU1598601 A AU 1598601A AU 1598601 A AU1598601 A AU 1598601A
Authority
AU
Australia
Prior art keywords
intercepting
application program
program interface
interface
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
AU15986/01A
Inventor
Yona Hollander
Oded Horvitz
Ophir Rahman
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CLICKNET SOFTWARE Inc
Original Assignee
CLICKNET SOFTWARE Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from IL13291699A external-priority patent/IL132916A/en
Application filed by CLICKNET SOFTWARE Inc filed Critical CLICKNET SOFTWARE Inc
Publication of AU1598601A publication Critical patent/AU1598601A/en
Abandoned legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1416Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights
    • G06F12/1425Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights the protection being physical, e.g. cell, word, block
    • G06F12/1441Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights the protection being physical, e.g. cell, word, block for a range
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/448Execution paradigms, e.g. implementations of programming paradigms
    • G06F9/4482Procedural
    • G06F9/4484Executing subprograms
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2209/00Indexing scheme relating to G06F9/00
    • G06F2209/54Indexing scheme relating to G06F9/54
    • G06F2209/542Intercept

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Debugging And Monitoring (AREA)
AU15986/01A 1999-11-14 2000-11-10 Method and system for intercepting an application program interface Abandoned AU1598601A (en)

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
IL13291699A IL132916A (en) 1999-11-14 1999-11-14 Method and system for intercepting an application program interface
IL132916 1999-11-14
US09/561,395 US6823460B1 (en) 1999-11-14 2000-04-28 Method and system for intercepting an application program interface
US09561395 2000-04-28
PCT/US2000/031032 WO2001037095A1 (en) 1999-11-14 2000-11-10 Method and system for intercepting an application program interface
CA002386100A CA2386100A1 (en) 1999-11-14 2002-05-13 Method and system for intercepting application program interface

Publications (1)

Publication Number Publication Date
AU1598601A true AU1598601A (en) 2001-05-30

Family

ID=72714002

Family Applications (2)

Application Number Title Priority Date Filing Date
AU15986/01A Abandoned AU1598601A (en) 1999-11-14 2000-11-10 Method and system for intercepting an application program interface
AU48883/02A Expired AU768758B2 (en) 1999-11-14 2002-06-20 Method and system for intercepting an application program interface

Family Applications After (1)

Application Number Title Priority Date Filing Date
AU48883/02A Expired AU768758B2 (en) 1999-11-14 2002-06-20 Method and system for intercepting an application program interface

Country Status (5)

Country Link
EP (1) EP1236114A1 (en)
JP (1) JP2003515219A (en)
AU (2) AU1598601A (en)
CA (1) CA2386100A1 (en)
WO (1) WO2001037095A1 (en)

Families Citing this family (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002093334A2 (en) 2001-04-06 2002-11-21 Symantec Corporation Temporal access control for computer virus outbreaks
US7155741B2 (en) * 2002-05-06 2006-12-26 Symantec Corporation Alteration of module load locations
US7367056B1 (en) 2002-06-04 2008-04-29 Symantec Corporation Countering malicious code infections to computer files that have been infected more than once
US6931530B2 (en) 2002-07-22 2005-08-16 Vormetric, Inc. Secure network file access controller implementing access control and auditing
US7334124B2 (en) 2002-07-22 2008-02-19 Vormetric, Inc. Logical access block processing protocol for transparent secure file storage
US7469419B2 (en) 2002-10-07 2008-12-23 Symantec Corporation Detection of malicious computer code
US7143288B2 (en) 2002-10-16 2006-11-28 Vormetric, Inc. Secure file system server architecture and methods
WO2004075060A1 (en) * 2003-02-21 2004-09-02 Tabei, Hikaru Computer virus detection device
US7203959B2 (en) 2003-03-14 2007-04-10 Symantec Corporation Stream scanning through network proxy servers
JPWO2005029328A1 (en) * 2003-09-18 2007-11-15 有限会社 電机本舗 Operating system and recording medium recording the same
US7624449B1 (en) 2004-01-22 2009-11-24 Symantec Corporation Countering polymorphic malicious computer code through code optimization
US7484094B1 (en) 2004-05-14 2009-01-27 Symantec Corporation Opening computer files quickly and safely over a network
US7373667B1 (en) 2004-05-14 2008-05-13 Symantec Corporation Protecting a computer coupled to a network from malicious code infections
US7698731B2 (en) * 2004-10-25 2010-04-13 Panasonic Corporation Security architecture and mechanism to access and use security components in operating system
CN100346611C (en) * 2005-06-30 2007-10-31 西安交通大学 Invading detection method based on stack pattern in Linux environment
US7739740B1 (en) 2005-09-22 2010-06-15 Symantec Corporation Detecting polymorphic threats
KR100843701B1 (en) * 2006-11-07 2008-07-04 소프트캠프(주) How Apia checks the information recorded in the call stack
US8079039B2 (en) * 2007-03-09 2011-12-13 Microsoft Corporation Isolating, managing and communicating with user interface elements
ES2439804B1 (en) * 2012-04-19 2014-10-29 Universitat Politècnica De Catalunya Procedure, system and piece of executable code to virtualize a hardware resource associated with a computer system
CN102799493A (en) * 2012-06-21 2012-11-28 北京伸得纬科技有限公司 Method for intercepting target progress with self-protection
KR101244731B1 (en) * 2012-09-11 2013-03-18 주식회사 안랩 Apparatus and method for detecting malicious shell code by using debug event
CN103970559B (en) * 2013-02-05 2017-09-29 北京壹人壹本信息科技有限公司 A kind of equipment loading method and device based on android system
US10909014B2 (en) * 2017-02-22 2021-02-02 Nec Corporation Information processing device, information processing system, monitoring method, and recording medium

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5577209A (en) * 1991-07-11 1996-11-19 Itt Corporation Apparatus and method for providing multi-level security for communication among computers and terminals on a network
US5826014A (en) * 1996-02-06 1998-10-20 Network Engineering Software Firewall system for protecting network elements connected to a public network
US5832228A (en) * 1996-07-30 1998-11-03 Itt Industries, Inc. System and method for providing multi-level security in computer devices utilized with non-secure networks
US6067620A (en) * 1996-07-30 2000-05-23 Holden; James M. Stand alone security device for computer networks
US5974549A (en) * 1997-03-27 1999-10-26 Soliton Ltd. Security monitor
US6088804A (en) * 1998-01-12 2000-07-11 Motorola, Inc. Adaptive system and method for responding to computer network security attacks
US6185689B1 (en) * 1998-06-24 2001-02-06 Richard S. Carson & Assoc., Inc. Method for network self security assessment

Also Published As

Publication number Publication date
EP1236114A1 (en) 2002-09-04
JP2003515219A (en) 2003-04-22
AU4888302A (en) 2002-12-05
WO2001037095A1 (en) 2001-05-25
AU768758B2 (en) 2004-01-08
CA2386100A1 (en) 2003-11-13

Similar Documents

Publication Publication Date Title
IL132916A (en) Method and system for intercepting an application program interface
AU1598601A (en) Method and system for intercepting an application program interface
AU7857300A (en) Method and system for developing software
AU7331700A (en) Software rehosting system and method
AU2726601A (en) Method and system for employment placement
AU6167700A (en) Introspective editor system, program, and method for software translation
AU5445600A (en) Graphical system and method for debugging computer programs
AU4357000A (en) System and method for testing computer software
AU2001245598A1 (en) Application program interface for message-routing and management system
AU5441101A (en) System and method for providing individualized dosing
AU4653999A (en) Exposure method and system
AU2001297701A1 (en) System and method for intercepting telecommunications
AU1175500A (en) Software language translation system and method
AU4197200A (en) System and method for dimensioning objects
AU2002357858A1 (en) Method and system for preloading resources
AU2001255698A1 (en) Network enabled application software system and method
AU6113198A (en) Method and system for improving communication
AU2578301A (en) Mounting system and method
AU2001268056A1 (en) System and method for e-commerce interface with controlled e-commerce interactions
AU1991201A (en) Testing system and method for testing an object
AU4495400A (en) Portal system and method
AU5878200A (en) External system interface method and system
AU4236100A (en) Method and system for serving software applications
AU1663000A (en) Method and system for performing electronic auctions
AU2105101A (en) Method and system for conducting an auction for resources

Legal Events

Date Code Title Description
MK6 Application lapsed section 142(2)(f)/reg. 8.3(3) - pct applic. not entering national phase