$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Methods and apparatus for evaluating and extracting signatures of computer viruses and other undesirable software entiti 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-011/00
출원번호 US-0424584 (1995-04-14)
발명자 / 주소
  • Kephart Jeffrey O. (Yorktown Heights NY)
출원인 / 주소
  • International Business Machines Corporation (Armonk NY 02)
인용정보 피인용 횟수 : 286  인용 특허 : 0

초록

A method, and apparatus for accomplishing the method, to extract and/or evaluate a signature of a computer virus or other undesirable software entity. The method includes a first step of inputting to a digital data processor at least one portion of a undesirable software entity, the at least one por

대표청구항

A method for operating a digital data processor to obtain one or more valid signatures of an undesirable software entity, the digital data processor including a memory that is bidirectionally coupled to the digital data processor, the method comprising the steps of: storing in the memory a corpus of

이 특허를 인용한 특허 (286)

  1. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Adaptive pattern recognition based controller apparatus and method and human-interface therefore.
  2. Hill Douglas W. ; Lynn James T., Adaptive system and method for responding to computer network security attacks.
  3. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Adding information or functionality to a rendered document via association with an electronic counterpart.
  4. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Aggregate analysis of text captures performed by multiple users from rendered documents.
  5. van der Made, Peter A. J., Analytical virtual machine.
  6. van der Made,Peter A. J., Analytical virtual machine.
  7. Rihn, Jennifer; Oliver, Jonathan J., Analyzing traffic patterns to detect infectious messages.
  8. Rihn, Jennifer; Oliver, Jonathan J., Analyzing traffic patterns to detect infectious messages.
  9. Nachenberg Carey, Antivirus accelerator.
  10. Sobel,William; McCorkendale,Bruce, Antivirus scanning in a hard-linked environment.
  11. Cohen, Jonathan D., Apparatus and method for efficient identification of code similarity.
  12. Ji Shuang ; Chen Eva ; Liang Yung-Chang ; Tsai Warren,TWX, Apparatus and method for electronic mail virus detection and elimination.
  13. Cohen, Jonathan D., Apparatus and method for identifying similarity via dynamic decimation of token sequence N-grams.
  14. Cohen, Jonathan D., Apparatus and method for identifying similarity via dynamic decimation of token sequence n-grams.
  15. Hanson, James E; Kephart, Jeffrey O, Apparatus for preventing automatic generation of a chain reaction of messages if a prior extracted message is similar to current processed message.
  16. Stolfo, Salvatore J; Wang, Ke, Apparatus method and medium for detecting payload anomaly using N-gram distribution of normal data.
  17. Stolfo, Salvatore J; Wang, Ke, Apparatus method and medium for detecting payload anomaly using N-gram distribution of normal data.
  18. Stolfo, Salvatore J.; Wang, Ke, Apparatus method and medium for detecting payload anomaly using n-gram distribution of normal data.
  19. Stolfo, Salvatore J., Apparatus method and medium for tracing the origin of network transmissions using N-gram distribution of data.
  20. Stolfo, Salvatore J., Apparatus method and medium for tracing the origin of network transmissions using N-gram distribution of data.
  21. Stolfo, Salvatore J., Apparatus method and medium for tracing the origin of network transmissions using n-gram distribution of data.
  22. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Applying scanned information to identify content.
  23. King, Martin; Grover, Dale; Kushler, Clifford; Stafford-Fraser, James; Mannby, Claes-Fredrik, Archive of text captures from rendered documents.
  24. King,Martin T.; Grover,Dale L.; Kushler,Clifford A.; Stafford Fraser,James Q., Archive of text captures from rendered documents.
  25. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Association of a portable scanner with input/output and storage devices.
  26. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Association of a portable scanner with input/output and storage devices.
  27. Anderson, W. Kyle; Bonhaus, Daryl, Automated identification and clean-up of malicious computer code.
  28. Boulay Jean-Michel Yann,FRX ; Petrillo August T. ; Swimmer Morton Gregory, Automated sample creation of polymorphic and non-polymorphic marcro viruses.
  29. Tahan, Gil; Shabtai, Asaf; Elovici, Yuval, Automatic extraction of signatures for malware.
  30. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Automatic modification of web pages.
  31. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Automatic modification of web pages.
  32. King, Martin T.; Kushler, Clifford A.; Stafford-Fraser, James Quentin, Automatic modification of web pages.
  33. Chesla, Avi, Automatic signature propagation network.
  34. King, Martin T.; Stephens, Redwood; Mannby, Claes-Fredrik; Peterson, Jesse; Sanvitale, Mark; Smith, Michael J., Automatically capturing information, such as capturing information using a document-aware device.
  35. King, Martin T.; Stephens, Redwood; Mannby, Claes-Fredrik; Peterson, Jesse; Sanvitale, Mark; Smith, Michael J.; Daley-Watson, Christopher J., Automatically providing content associated with captured information, such as information captured in real-time.
  36. Arnold William Carlisle ; Bruck Jehoshua ; Kephart Jeffrey Owen ; Sorkin Gregory Bret ; White Steve Richard ; Chess David Michael ; Cox Charles Edwin ; Flickner Myron Dale, Autonomous system for recognition of patterns formed by stored data during computer memory scrubbing.
  37. Carter, Earl T., Binary state machine system and method for REGEX processing of a data stream in an intrusion detection system.
  38. Kennedy, Mark; Renert, Charles, Blocking replication of e-mail worms.
  39. King, Martin Towle; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Quentin, Capturing text from rendered documents using supplement information.
  40. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford Fraser, James Q., Capturing text from rendered documents using supplemental information.
  41. King, Martin Towle; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Quentin, Capturing text from rendered documents using supplemental information.
  42. Brennan, Todd, Centralized timed analysis in a network security system.
  43. Nachenberg, Carey; McCorkendale, Bruce, Circumstantial blocking of incoming network traffic containing code.
  44. Fanton, Andrew F.; Gandee, John J.; Lutton, William H.; Harper, Edwin L.; Godwin, Kurt E.; Rozga, Anthony A., Cloud-based application whitelisting.
  45. Claudatos, Christopher Hercules; Andruss, William Dale; Dutch, Michael John; Bhat, Vageesha, Commonality factoring pattern detection.
  46. Claudatos, Christopher Hercules; Andruss, William Dale; Dutch, Michael John; Bhat, Vageesha, Commonality factoring remediation.
  47. van der Made,Peter A. J., Computer immune system and method for detecting unwanted code in a P-code or partially compiled native-code program executing within a virtual machine.
  48. van der Made,Peter A. J, Computer immune system and method for detecting unwanted code in a computer system.
  49. Fanton, Andrew F.; Gandee, John J.; Lutton, William H.; Harper, Edwin L.; Godwin, Kurt E.; Rozga, Anthony A., Computer system lock-down.
  50. Welborn, Kimberly Joyce; Welborn, Christopher Michael, Computer virus avoidance system and mechanism.
  51. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford Fraser, James Q., Content access with handheld document data capture devices.
  52. Brennan, Todd, Content extractor and analysis system.
  53. Kelly,Nicholas Paul; Lawson Tarbotton,Lee Codel; Gudgion,Kevin Andrew, Controlling access to suspicious files.
  54. Szor,Peter, Countering infections to communications modules.
  55. Szor,Peter; Nachenberg,Carey, Countering malicious code infections to computer files that have been infected more than once.
  56. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford Fraser, James Q., Data capture from rendered documents using handheld device.
  57. King, Martin Towle; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Quentin, Data capture from rendered documents using handheld device.
  58. Lingafelt, Charles Steven; Murray, James William; Swantek, James Thomas; Worely, James Steven, Data loss prevention to remove false positives.
  59. Mody, Jigar J.; Cowie, Neil A., Defining code by its functionality.
  60. Sallam,Ahmed, Detecting computer worms as they arrive at local computers through open network shares.
  61. Kwok, Chung Tin; Moulton, Ryan H.; Qiu, Zhihuan, Detecting content scraping.
  62. Tsao, Wen-Kwang; Wu, PingHuan; Liu, Wei-Zhi, Detecting malicious code in sections of computer files.
  63. Book, Neil; Hoffman, Daniel V., Detecting malware on mobile devices.
  64. Book, Neil; Hoffman, Daniel V., Detecting malware on mobile devices.
  65. Malibiran, Ed Israel Santos; Bautista, Ronald Castro; Bennett, Jr., James Thomas, Detection of computer network data streams from a malware and its variants.
  66. Chi Darren, Detection of computer viruses spanning multiple data streams.
  67. Chang, Chia-Chi; Yen, Sheng-Chuan; Yeh, Che-Fu, Detection of fake antivirus in computers.
  68. Hicks, Richard Middleton, Detection of items stored in a computer system.
  69. Sobel,William, Detection of malicious computer code.
  70. Fossen, Steven Michael; MacDonald, Alexander Douglas, Detection of undesired computer files in archives.
  71. Fossen, Steven Michael; MacDonald, Alexander Douglas, Detection of undesired computer files in archives.
  72. Fossen, Steven Michael; MacDonald, Alexander Douglas, Detection of undesired computer files in archives.
  73. Fossen, Steven Michael; MacDonald, Alexander Douglas, Detection of undesired computer files in damaged archives.
  74. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Document enhancement system and method.
  75. Reznik, Ilia; Simonson, Roger N., Domain name geometrical classification using character-based n-grams.
  76. Reznik, Ilia; Simonson, Roger N., Domain name statistical classification using character-based N-grams.
  77. Szor,Peter, Dynamic detection of computer worms.
  78. Narayanaswamy, Krishna; Iyer, Subramanian, Dynamic threat protection in mobile networks.
  79. Kephart Jeffrey Owen ; Morin Alexandre Guy Georges,FRX ; Sorkin Gregory Bret ; Wells Joseph Warreb, Efficient detection of computer viruses and other data traits.
  80. Millard, John, Efficient file scanning using input-output hints.
  81. Kissel,Timo S., Efficient scanning of stream based data.
  82. Rothwell, Anton C.; Dennis, William R.; Jagger, Luke D., Embedded anti-virus scanner for a network adapter.
  83. Rothwell, Anton C.; Dennis, William R.; Jagger, Luke D., Embedded anti-virus scanner for a network adapter.
  84. Rothwell, Anton C.; Dennis, William R.; Jagger, Luke D., Embedded anti-virus scanner for a network adapter.
  85. Satish, Sourabh; Hernacki, Brian, Endpoint management using trust rating data.
  86. Sobel,William E; Vogel,Greg; McCorkendale,Bruce, Enforcement of compliance with network security policies.
  87. Lee, Dar-Shyang; Hull, Jonathan J., Extracting information from symbolically compressed document images.
  88. Lee,Dar Shyang; Hull,Jonathan J., Extracting information from symbolically compressed document images.
  89. Wang, Qiang, Fast signature scan.
  90. Wang,Qiang, Fast signature scan.
  91. McGrath,Frank; Metheny,Mark; Tobin,William C., Fuzzy location of a testable object in a functional testing tool.
  92. Gartside,Paul Nicholas; Cowie,Neil Andrew, Generating malware definition data for mobile computing devices.
  93. Chen, Hsin-Yi; Tsai, Dung-Jou; Chen, Guan-Liang; Hsu, Cheng-Hsin, Grouping of documents that contain markup language code.
  94. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Handheld device for capturing text from both a document printed on paper and a document displayed on a dynamic display device.
  95. Spiegel,Mark; McCorkendale,Bruce; Sobel,William, Heuristic detection and termination of fast spreading network worm attacks.
  96. Nachenberg,Carey, Heuristic detection of computer viruses.
  97. Szor,Peter, Heuristic detection of malicious computer code by page tracking.
  98. Kennedy, Mark, Heuristically detecting spyware/adware registry activity.
  99. Zhu, Xuewen; Diao, Lili; Li, Da; Tang, Dibin, Identification of normal scripts in computer systems.
  100. King, Martin T.; Stephens, Redwood; Mannby, Claes-Fredrik; Peterson, Jesse; Sanvitale, Mark; Smith, Michael J., Identifying a document by performing spectral analysis on the contents of the document.
  101. King, Martin T.; Mannby, Claes-Fredrik; Smith, Michael J., Image search using text-based elements within the contents of images.
  102. King, Martin T.; Stafford Fraser, James Q.; Kushler, Clifford A.; Grover, Dale L., Information gathering system and method.
  103. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Internet appliance system and method.
  104. Chess David M, Interpreter with virtualized interface.
  105. Diao, Lili; Chan, Vincent; Lu, Patrick MG, Lightweight SVM-based content filtering system for mobile phones.
  106. Diao, Lili; Cao, Jackie; Chan, Vincent, Lightweight content filtering system for mobile phones.
  107. McGrath, Frank; Metheny, Mark; Sandler, Kenneth; Tobin, William C., Locating a testable object in a functional testing tool.
  108. Warren, David A., Malicious code detection.
  109. Edery, Yigal Mordechai; Vered, Nimrod Itzhak; Kroll, David R.; Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  110. Edery, Yigal Mordechai; Vered, Nimrod Itzhak; Kroll, David R.; Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  111. Edery, Yigal Mordechai; Vered, Nirmrod Itzhak; Kroll, David R.; Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  112. Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  113. Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  114. Tuvell, George; Venugopal, Deepak, Malware detection system and method for compressed data on mobile platforms.
  115. Tuvell, George; Venugopal, Deepak, Malware detection system and method for compressed data on mobile platforms.
  116. Tuvell, George; Lee, Charles, Malware detection system and method for limited access mobile platforms.
  117. Tuvell, George; Venugopal, Deepak, Malware detection system and method for mobile platforms.
  118. Tuvell, George; Venugopal, Deepak, Malware detection system and method for mobile platforms.
  119. Zhang, Yanxin; Wang, Xinran; Xie, Huagang; Xu, Wei, Malware detection using clustering with malware source information.
  120. Zhang, Yanxin; Wang, Xinran; Xie, Huagang; Xu, Wei, Malware detection using clustering with malware source information.
  121. Zhang, Yanxin; Wang, Xinran; Xie, Huagang; Xu, Wei, Malware domain detection using passive DNS.
  122. Zhang, Yanxin; Wang, Xinran; Xie, Huagang; Xu, Wei, Malware domain detection using passive DNS.
  123. Tuvell, George; Venugopal, Deepak; Hu, Guoning, Malware modeling detection system and method for mobile platforms.
  124. Kouznetsov, Victor; Libenzi, Davide; Fallenstedt, Martin; Palmer, David W.; Pak, Michael C., Malware scanning user interface for wireless devices.
  125. Kouznetsov, Victor; Libenzi, Davide; Fallenstedt, Martin; Palmer, David W.; Pak, Michael C., Malware scanning wireless service agent system and method.
  126. Rihn, Jennifer; Oliver, Jonathan J., Managing infectious forwarded messages.
  127. Rihn, Jennifer; Oliver, Jonathan J., Managing infectious forwarded messages.
  128. Rihn, Jennifer; Oliver, Jonathan J., Managing infectious forwarded messages.
  129. Grecsek Matthew T., Managing the risk of executing a software process using a capabilities assessment and a policy.
  130. Tarbotton,Lee Codel Lawson; Rice,Trevor Hugh; Roberts,Guy William Welch; Bidgood,Andrew John Peter; Botterill,Carl Steven, Mechanisms for banning computer programs from use.
  131. Montagut, Frederic; Gomez, Laurent; Hebert, Cedric; Ulmer, Cedric, Method and a system for secure execution of workflow tasks in a distributed workflow management system within a decentralized network system.
  132. Hammond, Nicolas J., Method and apparatus for auditing network security.
  133. Joseph W. Wells, Method and apparatus for computer virus detection, analysis, and removal in real time.
  134. Stellenberg,Gerald S.; Aviles,Joaquin J., Method and apparatus for data packet pattern matching.
  135. Kephart Jeffrey Owen ; Sorkin Gregory Bret ; Tesauro Gerald James ; White Steven Richard, Method and apparatus for detecting a presence of a computer virus.
  136. Reyes,Crescencio F.; Malibiran,Ed Israel S.; Bautista,Ronald C., Method and apparatus for detecting malicious content in protected archives.
  137. Chess, David M., Method and apparatus for increasing virus detection speed using a database.
  138. Ide, Curtis E.; Brass, Philip C.; Doty, Theodore R., Method and apparatus for network assessment and authentication.
  139. Ide,Curtis E.; Brass,Philip C.; Doty,Theodore R., Method and apparatus for network assessment and authentication.
  140. Lum, Clinton Edward, Method and apparatus for remote installation of network drivers and software.
  141. Morar, John Frederick; Chess, David Michael; Kephart, Jeffrey Owen; Swimmer, Morton Gregory; White, Steve Richard, Method and apparatus for securely transporting an information container from a trusted environment to an unrestricted environment.
  142. Cheng, Yun Chian, Method and architecture for blocking email spams.
  143. Guan, Sheng, Method and device for obtaining virus signatures.
  144. Guan, Sheng, Method and device for obtaining virus signatures.
  145. Kouznetsov Viktor, Method and system for allowing computer programs easy access to features of a virus scanning engine.
  146. Michlin, Irene; Bartram, Anthony Vaughan, Method and system for automatic invariant byte sequence discovery for generic detection.
  147. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Method and system for character recognition.
  148. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Method and system for character recognition.
  149. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Quentin, Method and system for character recognition.
  150. Zobel, Robert David; Dodd, Timothy David; Millar, Sharon A.; Nesfeder, Jr., David Gerald; Singer, Christopher S., Method and system for configuring and scheduling security audits of a computer network.
  151. Zobel,Robert David; Dodd,Timothy David; Millar,Sharon A.; Nesfeder, Jr.,David Gerald; Singer,Christopher S., Method and system for configuring and scheduling security audits of a computer network.
  152. Hammer, John M.; Ge, Rixin; Burke, Charles D.; Hubbard, Charles, Method and system for creating a record for one or more computer security incidents.
  153. Price, Greg A., Method and system for identifying software revisions from memory images.
  154. Yu, Shengke; Rangan, Venkat, Method and system for information retrieval effectiveness estimation in e-discovery.
  155. Yu, Shengke; Rangan, Venkat, Method and system for information retrieval effectiveness estimation in e-discovery.
  156. Kennis, Peter H., Method and system for intrusion detection in a computer network.
  157. Uscilowski, Bartlomiej; Ionescu, Costin; Parsons, Thomas, Method and system for metadata driven testing of malware signatures.
  158. Palmer, Jr., Bernard Paul; Graham, Robert David, Method and system for protecting computer networks by altering unwanted network data traffic.
  159. Dullien, Thomas; Meyer-Eppler, Soeren, Method for characterization of a computer program part.
  160. Alagna, Michael Tony; Obrecht, Mark; Payne, Andy; Norwood, Peter, Method, computer software, and system for providing end to end security protection of an online transaction.
  161. Wei, Peter Shaohong; Soubramanien, Viswa; Yan, Wei, Methods and apparatus for providing mitigations to particular computers.
  162. Hsu, Cheng-Hsin; Pu, Peng-Shih; Chen, Chih-Chia; Su, Shr-An, Methods and systems for detecting unwanted web contents.
  163. Schmid, Matthew N.; Weber, Michael; Haddox-Schatz, Michael; Geyer, David, Methods for identifying malicious software.
  164. Eskin, Eleazar; Arnold, Andrew Oliver; Prerau, Michael; Portnoy, Leonid; Stolfo, Salvatore J., Methods of unsupervised anomaly detection using a geometric framework.
  165. Eskin, Eleazar; Arnold, Andrew; Prerau, Michael; Portnoy, Leonid; Stolfo, Salvatore J., Methods of unsupervised anomaly detection using a geometric framework.
  166. Bock, Joel; Scandura, Phil; Bharadwaj, Raj Mohan, Methods systems and apparatus for determining whether built-in-test fault codes are indicative of an actual fault condition or a false alarm.
  167. Stolfo, Salvatore J.; Li, Wei-Jen; Keromytis, Angelos D.; Androulaki, Elli, Methods, media, and systems for detecting attack on a digital processing device.
  168. King,Martin T.; Grover,Dale L.; Kushler,Clifford A.; Stafford Fraser,James Q., Methods, systems and computer program products for data gathering in a digital and hard copy document environment.
  169. Obrecht, Mark E.; Myers, Robert P.; Hartmann, Alfred C.; Alagna, Nick F.; Pyle, Kevin N.; Sullivan, Scott D.; Little, Michael W., Monitoring computer process resource usage.
  170. Obrecht, Mark E.; Myers, Robert P.; Hartmann, Alfred C.; Alagna, Nick F.; Pyle, Kevin N.; Sullivan, Scott D.; Little, Michael W., Monitoring computer process resource usage.
  171. Hazama, Katsuki, Multilevel semiconductor memory, write/read method thereto/therefrom and storage medium storing write/read program.
  172. Hazama, Katsuki, Multilevel semiconductor memory, write/read method thereto/therefrom and storage medium storing write/read program.
  173. Hazama, Katsuki, Multilevel semiconductor memory, write/read method thereto/therefrom and storage medium storing write/read program.
  174. Hazama,Katsuki, Multilevel semiconductor memory, write/read method thereto/therefrom and storage medium storing write/read program.
  175. Jagger, Luke D.; Rothwell, Anton C.; Dennis, William R., Network adapter firewall system and method.
  176. Jagger, Luke D.; Rothwell, Anton C.; Dennis, William R., Network adapter firewall system and method.
  177. Ko, Simon C., Network security system with automatic vulnerability tracking and clean-up mechanisms.
  178. Panjwani,Dileep Kumar, Network-based patching machine.
  179. Tuvell, George; Venugopal, Deepak; Pfefferle, Matthew, Non-signature malware detection system and method for mobile platforms.
  180. Millard,John; Spiegel,Mark, Opening computer files quickly and safely over a network.
  181. King, Martin T.; Mannby, Claes-Fredrik; Arends, Thomas C.; Bajorins, David P.; Fox, Daniel C., Optical scanners, such as hand-held optical scanners.
  182. Claudatos, Christopher Hercules; Andruss, William Dale; Dutch, Michael John; Bhat, Vageesha, Partial pattern detection with commonality factoring.
  183. Nachenberg, Carey; Weinstein, Alex, Pattern matching using embedded functions.
  184. King, Martin T.; Stephens, Redwood; Mannby, Claes-Fredrik; Peterson, Jesse; Sanvitale, Mark; Smith, Michael J., Performing actions based on capturing information from rendered documents, such as documents under copyright.
  185. King, Martin T.; Stephens, Redwood; Mannby, Claes-Fredrik; Peterson, Jesse; Sanvitale, Mark; Smith, Michael J., Performing actions based on capturing information from rendered documents, such as documents under copyright.
  186. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Portable scanning device.
  187. Szor,Peter, Preventing e-mail propagation of malicious computer code.
  188. Sobel, William E.; Kennedy, Mark, Preventing unauthorized loading of late binding code into a process.
  189. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Processing techniques for text capture from a rendered document.
  190. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Processing techniques for text capture from a rendered document.
  191. King, Martin Towle; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Quentin, Processing techniques for text capture from a rendered document.
  192. King, Martin T.; Kushler, Clifford A.; Stafford-Fraser, James Q.; Grover, Dale L., Processing techniques for visual capture data from a rendered document.
  193. King, Martin T.; Kushler, Clifford A.; Stafford-Fraser, James Q.; Grover, Dale L., Processing techniques for visual capture data from a rendered document.
  194. Millard,John, Protecting a computer coupled to a network from malicious code infections.
  195. Chou,Tsun Sheng; Lin,Sung Ching; Lin,Chin Ju, Protection of processes running in a computer system.
  196. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Publishing techniques for adding value to a rendered document.
  197. Li,Jianghao, Scripting virus scan engine.
  198. Aoki, Kazuo; Aramaki, Kazuhiro, Search apparatus, search program, and search method.
  199. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Search engines and systems with handheld document data capture devices.
  200. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Search engines and systems with handheld document data capture devices.
  201. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Secure data gathering from rendered documents.
  202. Fanton, Andrew F.; Gandee, John J.; Lutton, William H.; Harper, Edwin L.; Godwin, Kurt E.; Rozga, Anthony A., Secure system for allowing the execution of authorized computer program code.
  203. Fanton, Andrew F.; Gandee, John J.; Lutton, William H.; Harper, Edwin L.; Godwin, Kurt E.; Rozga, Anthony A., Secure system for allowing the execution of authorized computer program code.
  204. Fanton, Andrew F.; Gandee, John J.; Lutton, William H.; Harper, Edwin L.; Godwin, Kurt E.; Rozga, Anthony A., Secure system for allowing the execution of authorized computer program code.
  205. Fanton, Andrew F.; Gandee, John J.; Lutton, William H.; Harper, Edwin L.; Godwin, Kurt E.; Rozga, Anthony A., Secure system for allowing the execution of authorized computer program code.
  206. Fanton, Andrew F.; Gandee, John J.; Lutton, William H.; Harper, Edwin L.; Godwin, Kurt E.; Rozga, Anthony A., Secure system for allowing the execution of authorized computer program code.
  207. Chiueh, Tzi-cker; Griffin, Kent E.; Schneider, Scott; Hu, Xin, Selecting malware signatures based on malware diversity.
  208. Fanton, Andrew F.; Gandee, John J.; Lutton, William H.; Harper, Edwin L.; Godwin, Kurt E.; Rozga, Anthony A., Selective authorization of the loading of dependent code modules by running processes.
  209. Fanton, Andrew F.; Gandee, John J.; Lutton, William H.; Harper, Edwin L.; Godwin, Kurt E.; Rozga, Anthony A., Selective authorization of the loading of dependent code modules by running processes.
  210. Nachenberg,Carey; Szor,Peter, Selective detection of malicious computer code.
  211. Hazama Katsuki,JPX, Semiconductor device with logic rewriting and security protection function.
  212. Nachenberg,Carey, Signature driven cache extension for stream based scanning.
  213. Nazarov, Denis A., Silent-mode signature testing in anti-malware processing.
  214. Nazarov, Denis A., Silent-mode signature testing in anti-malware processing.
  215. Aljammaz, Muhammad; Wegman, Edward J., Software analysis system and method of use.
  216. Nachenberg Carey S., State-based cache for antivirus software.
  217. Togawa Yoshifusa,JPX ; Miyamoto Takayuki,JPX ; Nozawa Kuriko,JPX, Storage device having function for coping with computer virus.
  218. Togawa, Yoshifusa; Miyamoto, Takayuki; Ando, Kuriko, Storage device having function for coping with computer virus.
  219. Nachenberg,Carey S.; Guy,Elias E., Stream scanning through network proxy servers.
  220. Alme, Christoph, Structural recognition of malicious code patterns.
  221. Alme, Christoph, Structural recognition of malicious code patterns.
  222. Chen, I Ming, Structured peer-to-peer push distribution network.
  223. McCorkendale, Bruce, Subjective and statistical event tracking incident management system.
  224. Seeber,Ren챕, System and method for compiling images from a database and comparing the compiled images with known images.
  225. Seeber,Ren��, System and method for compiling images from a database and comparing the compiled images with known images.
  226. Sallam,Ahmed, System and method for correlating network traffic and corresponding file input/output traffic.
  227. Chess, David Michael; Ford, Richard; Kephart, Jeffrey Owen; Swimmer, Morton Gregory, System and method for detecting and repairing document-infecting viruses using dynamic heuristics.
  228. Paithane, Sushant; Vashist, Sai; Yang, Raymond; Khalid, Yasir, System and method for detecting file altering behaviors pertaining to a malicious attack.
  229. Graham, Richard W.; Roese, John J., System and method for dynamic distribution of intrusion signatures.
  230. Pak, Michael Chin-Hwan; Ouchakov, Andrei; Pham, Khai Nhu; Gryaznov, Dmitry O.; Kouznetsov, Victor, System and method for executing computer virus definitions containing general purpose programming language extensions.
  231. Husain, Syed Mohammad Amir, System and method for generation of a heuristic.
  232. Gryaznov,Dmitry O.; Peternev,Viatcheslav; Muttik,Igor, System and method for identifying a macro virus family using a macro virus definitions database.
  233. Neyman,Vitaly; Carmona,Itshak; Rotschield,Ofer, System and method for increasing heuristics suspicion levels in analyzed computer code.
  234. Amin, Muhammad; Mehmood, Masood; Ramaswamy, Ramaswamy; Challa, Madhusudan; Karandikar, Shrikrishna, System and method for offloading packet processing and static analysis operations.
  235. Graham,Robert David; Kavaler,Peter, System and method for preventing network misuse.
  236. de los Santos,Aldous C.; Fernandez,Richard T.; Finones,Rodelio G., System and method for securing computers against computer virus.
  237. Yu, Kai; Chen, Chih-Ming; Chen, Yi-Fen, System and method for securing computers against computer viruses.
  238. Satterlee, Thomas James; Hackenberger, William Frank, System and method for the managed security control of processes on a computer system.
  239. Satterlee, Thomas James; Hackenberger, William Frank, System and method for the managed security control of processes on a computer system.
  240. Honig, Andrew; Howard, Andrew; Eskin, Eleazar; Stolfo, Salvatore J., System and methods for adaptive model generation for detecting intrusion in computer systems.
  241. Honig, Andrew; Howard, Andrew; Eskin, Eleazar; Stolfo, Salvatore J., System and methods for adaptive model generation for detecting intrusion in computer systems.
  242. Stolfo, Salvatore J.; Eskin, Eleazar; Herskop, Shlomo; Bhattacharyya, Manasi, System and methods for detecting malicious email transmission.
  243. Stolfo, Salvatore J.; Eskin, Eleazar; Herskop, Shlomo; Bhattacharyya, Manasi, System and methods for detecting malicious email transmission.
  244. Schultz,Matthew G.; Eskin,Eleazar; Zadok,Erez; Bhattacharyya,Manasi; Salvatore,Stolfo J., System and methods for detection of new malicious executables.
  245. Sartin, A. Bryan; Ganley, Gina M.; Long, Kevin; Joels, Jo Ann; Bonillo, Jr., Andrew J., System security monitoring.
  246. Chen Eva Y. ; Ro Jonny T.,TWX ; Deng Ming M.,TWX ; Chi Leta M.,TWX, System, apparatus and method for the detection and removal of viruses in macros.
  247. Kouznetsov,Victor; Libenzi,Davide; Fallenstedt,Martin; Palmer,David W.; Pak,Michael C., System, method and computer program product for equipping wireless devices with malware scanning capabilities.
  248. Kuo, Chengi J.; Barbieri, Federico, System, method and computer program product for removing null values during scanning.
  249. Honig, Andrew; Howard, Andrew; Eskin, Eleazar; Stolfo, Salvatore J., Systems and methods for adaptive model generation for detecting intrusions in computer systems.
  250. Griffin, Kent; Chiueh, Tzi-cker; Schneider, Scott, Systems and methods for byte-level context diversity-based automatic malware signature generation.
  251. Barrie,John M.; Sherman,Colin C., Systems and methods for conducting a peer review process and evaluating the originality of documents.
  252. Barrie, John M.; Sherman, Colin; Kang, Michael, Systems and methods for contextual mark-up of formatted documents.
  253. Barrie, John M.; Sherman, Colin; Kang, Michael, Systems and methods for contextual mark-up of formatted documents.
  254. Barrie, John M.; Kang, Michael; Chambers, Luke; Storm, Christian; Golik, Steven; Hartman, John, Systems and methods for document analysis.
  255. Barrie, John M.; Sherman, Colin C., Systems and methods for facilitating originality analysis.
  256. Griffin, Kent; Hu, Xin; Chiueh, Tzi-cker; Schneider, Scott, Systems and methods for library function identification in automatic malware signature generation.
  257. Husain, Syed Mohammad Amir; Abel, Martin Andreas, Systems and methods for using cognitive fingerprints.
  258. Stolfo, Salvatore J.; Wang, Ke; Parekh, Janak, Systems, methods, and media for outputting a dataset based upon anomaly detection.
  259. Stolfo, Salvatore J; Wang, Ke; Parekh, Janak, Systems, methods, and media for outputting a dataset based upon anomaly detection.
  260. Stolfo, Salvatore J; Wang, Ke; Parekh, Janak, Systems, methods, and media for outputting data based on anomaly detection.
  261. Stolfo, Salvatore J; Wang, Ke; Parekh, Janak, Systems, methods, and media for outputting data based upon anomaly detection.
  262. Cheng, Yun-Chian; Yu, Pei-Hsun, Techniques for identifying spam e-mail.
  263. Nachenberg,Carey S.; Sobel,William E., Temporal access control for computer virus prevention.
  264. Horne, William G.; Moor, Daniel L.; Austin, Richard D.; Sander, Tomas; Rao, Prasad V.; Bhatt, Sandeep N., Threat exchange information protection.
  265. Rihn, Jennifer; Oliver, Jonathan J., Time zero classification of messages.
  266. Rihn, Jennifer; Oliver, Jonathan J., Time zero classification of messages.
  267. Rihn, Jennifer; Oliver, Jonathan J., Time zero classification of messages.
  268. Rihn, Jennifer; Oliver, Jonathan J., Time zero detection of infectious messages.
  269. Rihn, Jennifer; Oliver, Jonathan J., Time zero detection of infectious messages.
  270. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford Fraser, James Q., Triggering actions in response to optically or acoustically capturing keywords from a rendered document.
  271. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Triggering actions in response to optically or acoustically capturing keywords from a rendered document.
  272. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Triggering actions in response to optically or acoustically capturing keywords from a rendered document.
  273. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Triggering actions in response to optically or acoustically capturing keywords from a rendered document.
  274. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Triggering actions in response to optically or acoustically capturing keywords from a rendered document.
  275. Lingafelt, Charles Steven; Murray, James William; Swantek, James Thomas; Worley, James Steven, Tuning of data loss prevention signature effectiveness.
  276. Lingafelt, Charles Steven; Murray, James William; Swantek, James Thomas; Worley, James Steven, Tuning of data loss prevention signature effectiveness.
  277. Isenberg,Henri J., Using a benevolent worm to assess and correct computer security vulnerabilities.
  278. Sallam, Ahmed, Using behavior blocking mobility tokens to facilitate distributed worm detection.
  279. King, Martin T.; Mannby, Claes-Fredrik; Valenti, William, Using gestalt information to identify locations in printed information.
  280. Sallam,Ahmed, Using mobility tokens to observe malicious mobile code.
  281. Sobel,William E.; McCorkendale,Bruce, Verification of desired end-state using a virtual machine environment.
  282. Luke, James Steven, Viral replication detection using a counter virus.
  283. Cowlard James,GB3, Virus protection in computer systems.
  284. Pak, Michael C.; Kouznetsov, Victor; Palmer, David W., Virus scanning on thin client devices using programmable assembly language.
  285. Taylor,Patrick; Mewett,Scott; Brass,Philip C.; Doty,Theodore R., Vulnerability assessment and authentication of a computer by a local scanner.
  286. Wu, Tzu-Chien, Wireless hotspot with lightweight anti-malware.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로