AU1598601A - Method and system for intercepting an application program interface - Google Patents
Method and system for intercepting an application program interfaceInfo
- Publication number
- AU1598601A AU1598601A AU15986/01A AU1598601A AU1598601A AU 1598601 A AU1598601 A AU 1598601A AU 15986/01 A AU15986/01 A AU 15986/01A AU 1598601 A AU1598601 A AU 1598601A AU 1598601 A AU1598601 A AU 1598601A
- Authority
- AU
- Australia
- Prior art keywords
- intercepting
- application program
- program interface
- interface
- application
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1416—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights
- G06F12/1425—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights the protection being physical, e.g. cell, word, block
- G06F12/1441—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights the protection being physical, e.g. cell, word, block for a range
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/448—Execution paradigms, e.g. implementations of programming paradigms
- G06F9/4482—Procedural
- G06F9/4484—Executing subprograms
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2209/00—Indexing scheme relating to G06F9/00
- G06F2209/54—Indexing scheme relating to G06F9/54
- G06F2209/542—Intercept
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Debugging And Monitoring (AREA)
Applications Claiming Priority (6)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| IL13291699A IL132916A (en) | 1999-11-14 | 1999-11-14 | Method and system for intercepting an application program interface |
| IL132916 | 1999-11-14 | ||
| US09/561,395 US6823460B1 (en) | 1999-11-14 | 2000-04-28 | Method and system for intercepting an application program interface |
| US09561395 | 2000-04-28 | ||
| PCT/US2000/031032 WO2001037095A1 (en) | 1999-11-14 | 2000-11-10 | Method and system for intercepting an application program interface |
| CA002386100A CA2386100A1 (en) | 1999-11-14 | 2002-05-13 | Method and system for intercepting application program interface |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| AU1598601A true AU1598601A (en) | 2001-05-30 |
Family
ID=72714002
Family Applications (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| AU15986/01A Abandoned AU1598601A (en) | 1999-11-14 | 2000-11-10 | Method and system for intercepting an application program interface |
| AU48883/02A Expired AU768758B2 (en) | 1999-11-14 | 2002-06-20 | Method and system for intercepting an application program interface |
Family Applications After (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| AU48883/02A Expired AU768758B2 (en) | 1999-11-14 | 2002-06-20 | Method and system for intercepting an application program interface |
Country Status (5)
| Country | Link |
|---|---|
| EP (1) | EP1236114A1 (en) |
| JP (1) | JP2003515219A (en) |
| AU (2) | AU1598601A (en) |
| CA (1) | CA2386100A1 (en) |
| WO (1) | WO2001037095A1 (en) |
Families Citing this family (23)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2002093334A2 (en) | 2001-04-06 | 2002-11-21 | Symantec Corporation | Temporal access control for computer virus outbreaks |
| US7155741B2 (en) * | 2002-05-06 | 2006-12-26 | Symantec Corporation | Alteration of module load locations |
| US7367056B1 (en) | 2002-06-04 | 2008-04-29 | Symantec Corporation | Countering malicious code infections to computer files that have been infected more than once |
| US6931530B2 (en) | 2002-07-22 | 2005-08-16 | Vormetric, Inc. | Secure network file access controller implementing access control and auditing |
| US7334124B2 (en) | 2002-07-22 | 2008-02-19 | Vormetric, Inc. | Logical access block processing protocol for transparent secure file storage |
| US7469419B2 (en) | 2002-10-07 | 2008-12-23 | Symantec Corporation | Detection of malicious computer code |
| US7143288B2 (en) | 2002-10-16 | 2006-11-28 | Vormetric, Inc. | Secure file system server architecture and methods |
| WO2004075060A1 (en) * | 2003-02-21 | 2004-09-02 | Tabei, Hikaru | Computer virus detection device |
| US7203959B2 (en) | 2003-03-14 | 2007-04-10 | Symantec Corporation | Stream scanning through network proxy servers |
| JPWO2005029328A1 (en) * | 2003-09-18 | 2007-11-15 | 有限会社 電机本舗 | Operating system and recording medium recording the same |
| US7624449B1 (en) | 2004-01-22 | 2009-11-24 | Symantec Corporation | Countering polymorphic malicious computer code through code optimization |
| US7484094B1 (en) | 2004-05-14 | 2009-01-27 | Symantec Corporation | Opening computer files quickly and safely over a network |
| US7373667B1 (en) | 2004-05-14 | 2008-05-13 | Symantec Corporation | Protecting a computer coupled to a network from malicious code infections |
| US7698731B2 (en) * | 2004-10-25 | 2010-04-13 | Panasonic Corporation | Security architecture and mechanism to access and use security components in operating system |
| CN100346611C (en) * | 2005-06-30 | 2007-10-31 | 西安交通大学 | Invading detection method based on stack pattern in Linux environment |
| US7739740B1 (en) | 2005-09-22 | 2010-06-15 | Symantec Corporation | Detecting polymorphic threats |
| KR100843701B1 (en) * | 2006-11-07 | 2008-07-04 | 소프트캠프(주) | How Apia checks the information recorded in the call stack |
| US8079039B2 (en) * | 2007-03-09 | 2011-12-13 | Microsoft Corporation | Isolating, managing and communicating with user interface elements |
| ES2439804B1 (en) * | 2012-04-19 | 2014-10-29 | Universitat Politècnica De Catalunya | Procedure, system and piece of executable code to virtualize a hardware resource associated with a computer system |
| CN102799493A (en) * | 2012-06-21 | 2012-11-28 | 北京伸得纬科技有限公司 | Method for intercepting target progress with self-protection |
| KR101244731B1 (en) * | 2012-09-11 | 2013-03-18 | 주식회사 안랩 | Apparatus and method for detecting malicious shell code by using debug event |
| CN103970559B (en) * | 2013-02-05 | 2017-09-29 | 北京壹人壹本信息科技有限公司 | A kind of equipment loading method and device based on android system |
| US10909014B2 (en) * | 2017-02-22 | 2021-02-02 | Nec Corporation | Information processing device, information processing system, monitoring method, and recording medium |
Family Cites Families (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5577209A (en) * | 1991-07-11 | 1996-11-19 | Itt Corporation | Apparatus and method for providing multi-level security for communication among computers and terminals on a network |
| US5826014A (en) * | 1996-02-06 | 1998-10-20 | Network Engineering Software | Firewall system for protecting network elements connected to a public network |
| US5832228A (en) * | 1996-07-30 | 1998-11-03 | Itt Industries, Inc. | System and method for providing multi-level security in computer devices utilized with non-secure networks |
| US6067620A (en) * | 1996-07-30 | 2000-05-23 | Holden; James M. | Stand alone security device for computer networks |
| US5974549A (en) * | 1997-03-27 | 1999-10-26 | Soliton Ltd. | Security monitor |
| US6088804A (en) * | 1998-01-12 | 2000-07-11 | Motorola, Inc. | Adaptive system and method for responding to computer network security attacks |
| US6185689B1 (en) * | 1998-06-24 | 2001-02-06 | Richard S. Carson & Assoc., Inc. | Method for network self security assessment |
-
2000
- 2000-11-10 JP JP2001539121A patent/JP2003515219A/en not_active Withdrawn
- 2000-11-10 WO PCT/US2000/031032 patent/WO2001037095A1/en not_active Ceased
- 2000-11-10 AU AU15986/01A patent/AU1598601A/en not_active Abandoned
- 2000-11-10 EP EP00978530A patent/EP1236114A1/en not_active Withdrawn
-
2002
- 2002-05-13 CA CA002386100A patent/CA2386100A1/en not_active Abandoned
- 2002-06-20 AU AU48883/02A patent/AU768758B2/en not_active Expired
Also Published As
| Publication number | Publication date |
|---|---|
| EP1236114A1 (en) | 2002-09-04 |
| JP2003515219A (en) | 2003-04-22 |
| AU4888302A (en) | 2002-12-05 |
| WO2001037095A1 (en) | 2001-05-25 |
| AU768758B2 (en) | 2004-01-08 |
| CA2386100A1 (en) | 2003-11-13 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| IL132916A (en) | Method and system for intercepting an application program interface | |
| AU1598601A (en) | Method and system for intercepting an application program interface | |
| AU7857300A (en) | Method and system for developing software | |
| AU7331700A (en) | Software rehosting system and method | |
| AU2726601A (en) | Method and system for employment placement | |
| AU6167700A (en) | Introspective editor system, program, and method for software translation | |
| AU5445600A (en) | Graphical system and method for debugging computer programs | |
| AU4357000A (en) | System and method for testing computer software | |
| AU2001245598A1 (en) | Application program interface for message-routing and management system | |
| AU5441101A (en) | System and method for providing individualized dosing | |
| AU4653999A (en) | Exposure method and system | |
| AU2001297701A1 (en) | System and method for intercepting telecommunications | |
| AU1175500A (en) | Software language translation system and method | |
| AU4197200A (en) | System and method for dimensioning objects | |
| AU2002357858A1 (en) | Method and system for preloading resources | |
| AU2001255698A1 (en) | Network enabled application software system and method | |
| AU6113198A (en) | Method and system for improving communication | |
| AU2578301A (en) | Mounting system and method | |
| AU2001268056A1 (en) | System and method for e-commerce interface with controlled e-commerce interactions | |
| AU1991201A (en) | Testing system and method for testing an object | |
| AU4495400A (en) | Portal system and method | |
| AU5878200A (en) | External system interface method and system | |
| AU4236100A (en) | Method and system for serving software applications | |
| AU1663000A (en) | Method and system for performing electronic auctions | |
| AU2105101A (en) | Method and system for conducting an auction for resources |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| MK6 | Application lapsed section 142(2)(f)/reg. 8.3(3) - pct applic. not entering national phase |