$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Tracking and reporting of computer virus information 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-011/00
  • G06F-012/14
  • G06F-012/16
  • G06F-015/18
  • G08B-023/00
출원번호 US-0702289 (2000-10-30)
등록번호 US-7496960 (2009-02-24)
발명자 / 주소
  • Chen,Eva
  • Sun,Jimmy
  • Chou,Terrence
  • Deutsch,Steven
  • Havran,Mark
출원인 / 주소
  • Trend Micro, Inc.
대리인 / 주소
    Beyer Law Group LLP
인용정보 피인용 횟수 : 188  인용 특허 : 7

초록

An apparatus and method for providing real-time tracking of virus information as reported from various computers on a distributed computer network. Each client computer on the distributed network contacts an anti-virus scanning site. The site provides a small program or applet that resides in tempor

대표청구항

We claim: 1. A real-time virus tracking and display system for use with a distributed computer network, the system comprising: a plurality of potentially infected client end-user computers, said end-user computers being distributed over said distributed computer network; a first anti-virus scanning

이 특허에 인용된 특허 (7)

  1. Hill Douglas W. ; Lynn James T., Adaptive system and method for responding to computer network security attacks.
  2. Hailpern Brent Tzion ; Malkin Peter Kenneth ; Schloss Robert Jeffrey ; White Steve R. ; Yu Philip Shi-Lung ; Palmer Charles Campbell, Collaborative server processing of content and meta-information with application to virus checking in a server network.
  3. Chen Eva ; Lau Steven Yuen-Lam ; Liang Yung-Chang, Event triggered iterative virus detection.
  4. Milan V. Trcka ; Kenneth T. Fallon ; Mark R. Jones ; Ronald W. Walker, Network security and surveillance system.
  5. Tso Michael Man-Hak ; Bakshi Bikram Singh, System for virus-checking network data during download to a client device.
  6. Bates, Cary Lee; Crenshaw, Robert James; Day, Paul Reuben; Santosuosso, John Matthew, Virus checking and reporting for computer database search results.
  7. Bates, Cary Lee; Day, Paul Reuben; Santosuosso, John Matthew, Web server apparatus and method for virus checking.

이 특허를 인용한 특허 (188)

  1. Haq, Thoufique; Zhai, Jinjian; Pidathala, Vinay K., Advanced persistent threat (APT) detection center.
  2. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  3. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  4. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  5. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  6. Banerjee, Anirban; Faloutsos, Michail, Automated identification of phishing, phony and malicious web sites.
  7. Islam, Ali; Bu, Zheng, Classifying sets of malicious indicators for detecting command and control communications associated with malware.
  8. Magee, Joseph C.; Andrews, Alison M.; Nicholson, Mark W.; James, Jonathon Lance; Li, Henry C.; Stevenson, Christopher L.; Lathrop, Joel, Collective threat intelligence gathering system.
  9. Thioux, Emmanuel; Vashisht, Sai; Vincent, Michael, Computer exploit detection using heap spray pattern matching.
  10. Oliphant, Brett M.; Blignaut, John P., Computer program product and apparatus for multi-path remediation.
  11. Oliphant, Brett M.; Blignaut, John P., Computer program product and apparatus for multi-path remediation.
  12. Oliphant, Brett M.; Blignaut, John P., Computer program product and apparatus for multi-path remediation.
  13. Manni, Jayaraman; Eun, Philip; Berrow, Michael M., Correlation and consolidation of analytic data for holistic view of a malware attack.
  14. Manni, Jayaraman; Eun, Philip; Berrow, Michael M., Correlation and consolidation of analytic data for holistic view of malware attack.
  15. Mehra, Divyesh; Singh, Abhishek, Cyber attack early warning system.
  16. Hagar, David Eric; Eddy, Steve, Dashboards for displaying threat insight information.
  17. Hagar, David Eric; Eddy, Steve, Dashboards for displaying threat insight information.
  18. Vincent, Michael M.; Singh, Abhishek; Amin, Muhammad; Bu, Zheng, Detecting bootkits resident on compromised computers.
  19. Aziz, Ashar; Staniford, Stuart Gresley; Amin, Muhammad; Uyeno, Henry; Yie, Samuel, Detecting malicious network content.
  20. Ismael, Osman Abdoul; Yie, Samuel; Manni, Jayaraman; Amin, Muhammad; Mahbod, Bahman, Detecting malicious network content using virtual environment components.
  21. Jain, Varun; Singh, Abhishek, Detecting malware based on reflection.
  22. Gomez, Joshua Lewis; Singh, Abhishek, Detection and classification of exploit kits.
  23. Paithane, Sushant; Vashisht, Sai, Detection efficacy of virtual machine-based analysis with application specific events.
  24. Paithane, Sushant; Vashisht, Sai, Detection efficacy of virtual machine-based analysis with application specific events.
  25. Polyakov, Alexey A.; Sapronov, Konstantin V., Determining a security status of potentially malicious files.
  26. Andruss, William D.; Claudatos, Christopher H.; Leetch, Bruce D.; Terwilliger, Steven R., Differential virus scan.
  27. Andruss, William Dale; Claudatos, Christopher Hercules; Leetch, Bruce David; Terwilliger, Steven R., Differential virus scan.
  28. Mushtaq, Atif; Rosenberry, Todd; Aziz, Ashar; Islam, Ali, Distributed systems and methods for automatically detecting unknown bots and botnets.
  29. Mushtaq, Atif; Rosenberry, Todd; Aziz, Ashar; Islam, Ali, Distributed systems and methods for automatically detecting unknown bots and botnets.
  30. Paithane, Sushant; Vashisht, Sai, Dynamic content activation for automated analysis of embedded objects.
  31. Goradia, Harnish, Dynamic guest image creation and rollback.
  32. Aziz, Ashar; Radhakrishnan, Ramesh; Lai, Wei-Lung; Manni, Jayaraman, Dynamic signature creation and enforcement.
  33. Vincent, Michael; Mesdaq, Ali; Thioux, Emmanuel; Singh, Abhishek; Vashisht, Sai, Dynamically adaptive framework and method for classifying malware using intelligent static, emulation, and dynamic analyses.
  34. Vincent, Michael; Thioux, Emmanuel; Vashisht, Sai; Kindlund, Darien, Dynamically remote tuning of a malware content detection system.
  35. Andruss, William Dale; Claudatos, Christopher Hercules; Leetch, Bruce David; Terwilliger, Steven R., Efficient scanning of objects.
  36. Manni, Jayaraman; Eun, Philip; Berrow, Michael M., Electronic device for aggregation, correlation and consolidation of analysis attributes.
  37. Aziz, Ashar; Uyeno, Henry; Manni, Jay; Amin, Muhammad; Staniford, Stuart, Electronic message analysis for malware detection.
  38. Aziz, Ashar; Uyeno, Henry; Manni, Jay; Sukhera, Amin; Staniford, Stuart, Electronic message analysis for malware detection.
  39. Aziz, Ashar; Uyeno, Henry; Manni, Jay; Sukhera, Amin; Staniford, Stuart, Electronic message analysis for malware detection.
  40. Rathor, Hirendra; Dalal, Kaushal, Exploit detection of malware and malware families.
  41. Rathor, Hirendra; Dalal, Kaushal, Exploit detection of malware and malware families.
  42. Singh, Japneet; Ramchetty, Harinath; Gupta, Anil, Exploit detection system.
  43. Thioux, Emmanuel; Amin, Muhammad; Ismael, Osman, File extraction from memory dump for malicious content analysis.
  44. Singh, Abhishek; Mesdaq, Ali; Das, Anirban; Jain, Varun, Framework for classifying an object as malicious with machine learning for deploying updated predictive models.
  45. Ismael, Osman Abdoul; Song, Dawn; Ha, Phung-Te; Gilbert, Peter J.; Xue, Hui, Framework for computer application analysis of sensitive information tracking.
  46. Ismael, Osman Abdoul; Song, Dawn; Aziz, Ashar; Johnson, Noah; Mohan, Prashanth; Xue, Hui, Framework for efficient security coverage of mobile software applications.
  47. Ismael, Osman Abdoul; Song, Dawn; Aziz, Ashar; Johnson, Noah; Mohan, Prshanth; Xue, Hui, Framework for efficient security coverage of mobile software applications.
  48. Ismael, Osman Abdoul; Song, Dawn, Framework for efficient security coverage of mobile software applications installed on mobile devices.
  49. Ismael, Osman Abdoul; Song, Dawn; Aziz, Ashar; Johnson, Noah; Mettler, Adrian Matthew, Framework for efficient security coverage of mobile software applications that is usable to harden in the field code.
  50. Ismael, Osman Abdoul; Song, Dawn; Ha, Phung-Te; Gilbert, Peter J.; Xue, Hui, Framework for efficient security coverage of mobile software applications using machine learning.
  51. Ismael, Osman Abdoul; Song, Dawn; Xue, Hui, Framework for efficient security coverage of mobile software applications using symbolic execution to reach regions of interest within an application.
  52. Ismael, Osman Abdoul; Song, Dawn; Aziz, Ashar, Framework for iterative analysis of mobile software applications.
  53. Ismael, Osman Abdoul; Aziz, Ashar, Framework for multi-phase analysis of mobile applications.
  54. Mesdaq, Ali; Westin, III, Paul L., Fuzzy hash of behavioral results.
  55. Mesdaq, Ali; Westin, III, Paul L., Fuzzy hash of behavioral results.
  56. Mesdaq, Ali; Westin, III, Paul L., Fuzzy hash of behavioral results.
  57. Patton, Mark William; Chinen, Darren Kazuo; Davis, Braydon Michael; Damodaran, Ragesh; Muneeswaran, Manikandan Vellore; Velayutham, Vijay Arumugam, Generating analytical data from detection events of malicious objects.
  58. Hernacki, Brian; Sobel, William E., Global, location-aware computer security.
  59. Aziz, Ashar; Drzewiecki, Adrian; Radhakrishnan, Ramesh; Manni, Jayaraman; Amin, Muhammad, Heuristic based capture with replay to virtual machine.
  60. Hussain, Ahmed S.; Kumar, Ajith; Sandu, Catalin D.; Loh, Alvin; Reasor, Sterling M.; Chakraborty, Santanu; Faulhaber, Joseph L., Identification of telemetry data.
  61. Andruss, William Dale; Claudatos, Christopher Hercules; Leetch, Bruce David; Terwilliger, Steven R., Incremental virus scan.
  62. Nakamura, Kentaro; Sasaki, Toru; Tange, Akira; Matsuda, Masafumi; Tokuhara, Kumiko; Jung, Yongjin; Kasahara, Masaki, Information processing device, information processing method and information processing program.
  63. Khalid, Yasir; Paithane, Sushant; Vashisht, Sai, Intelligent context aware user interaction for malware detection.
  64. Rathor, Hirendra; Dalal, Kaushal; Gupta, Anil, Interactive infection visualization for improved exploit detection and signature generation for malware and malware families.
  65. Eyada, Hatem, Intrusion prevention and remedy system.
  66. Abbasi, Fahim H.; Salam, Abdul; Shahzad, Farrukh, Leveraging behavior-based rules for malware family classification.
  67. Thioux, Emmanuel; Amin, Muhammad; Kindlund, Darien; Pilipenko, Alex; Vincent, Michael, Malicious content analysis using simulated user interaction without user involvement.
  68. Thioux, Emmanuel; Amin, Muhammad; Kindlund, Darien; Pilipenko, Alex; Vincent, Michael, Malicious content analysis using simulated user interaction without user involvement.
  69. Khalid, Yasir; Amin, Muhammad; Jing, Emily; Rizwan, Muhammad, Malicious content analysis with multi-version application support within single operating environment.
  70. Khalid, Yasir; Amin, Muhammad; Jing, Emily; Rizwan, Muhammad, Malicious content analysis with multi-version application support within single operating environment.
  71. Singh, Abhishek, Malicious message analysis system.
  72. Vincent, Michael; Mesdaq, Ali; Thioux, Emmanuel; Singh, Abhishek; Vashisht, Sal, Malware analysis in accordance with an analysis plan.
  73. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, Malware containment and security analysis on connection.
  74. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, Malware containment on connection.
  75. Sun, Mingyan; Fan, Chi-Huang, Malware protection using file input/output virtualization.
  76. Glick, Adam Lyle; Smith, Spencer Dale; Graf, Nicholas Robert, Method and apparatus for detecting malicious software transmission through a web portal.
  77. Mayer, Alain Jules, Method and apparatus for network wide policy-based analysis of configurations of devices.
  78. Isokawa, Hiromi, Method for device quarantine and quarantine network system.
  79. Malik, Amit; Pande, Reghav; Jain, Aakash, Method to detect application execution hijacking using memory protection.
  80. Huang, Pei-Wen; Wen, Hsiang-An; Mao, Ching-Hao; Chen, Yu-Te; Chen, Pei Te, Method, electronic device, and user interface for on-demand detecting malware.
  81. Hagar, David Eric; Eddy, Steve, Methods and systems for generating dashboards for displaying threat insight information.
  82. Jung, Yeon-Sub, Methods for blocking harmful information online.
  83. Paithane, Sushant; Vashisht, Sai; Yang, Raymond; Khalid, Yasir, Methods for detecting file altering malware in VM based analysis.
  84. Oliphant, Brett M.; Blignaut, John P., Multi-path remediation.
  85. Malik, Amit; Deshpande, Shivani; Singh, Abhishek; Zheng, Wei, Multistage system and method for analyzing obfuscated content for malware.
  86. Manni, Jayaraman; Aziz, Ashar; Gong, Fengmin; Loganathan, Upendran; Amin, Muhammad, Network-based binary file extraction and analysis for malware detection.
  87. Manni, Jayaraman; Aziz, Ashar; Gong, Fengmin; Loganathan, Upendran; Amin, Muhammad, Network-based binary file extraction and analysis for malware detection.
  88. Karandikar, Shrikrishna; Amin, Muhammad; Deshpande, Shivani; Khalid, Yasir, Network-based malware detection.
  89. Ismael, Osman Abdoul, Optimized resource allocation for virtual machines within a malware content detection system.
  90. Ha, Phung-Te; Tonkonoh, Seva; Ismael, Osman Abdoul, Page replacement code injection.
  91. Aziz, Ashar; Drzewiecki, Adrian; Radhakrishnan, Ramesh; Manni, Jayaraman; Amin, Muhammad, Policy based capture with replay to virtual machine.
  92. Walters, Robert; Schepis, Adam; Santoyo, Javier, Programmatic communication in the event of host malware infection.
  93. Aziz, Ashar, Prospective client identification using malware attack detection.
  94. Sharma, Rajesh Kumar; Lo, Winping; Papa, Joseph, Real time lockdown.
  95. Sharma, Rajesh Kumar; Lo, Winping; Papa, Joseph, Real time lockdown.
  96. Oliphant, Brett M.; Blignaut, John P., Real-time vulnerability monitoring.
  97. Oliphant, Brett M.; Blignaut, John P., Real-time vulnerability monitoring.
  98. Thioux, Emmanuel; Lin, Yichong, Return-oriented programming detection.
  99. Andruss, William; Claudatos, Christopher; Leetch, Bruce; Terwilliger, Steven, Risk-aware scanning of objects.
  100. Song, Aiyuan; Guo, Ling, Scanning method and device, and client apparatus.
  101. Ismael, Osman Abdoul; Song, Dawn; Aziz, Ashar; Johnson, Noah; Mettler, Adrian Matthew, Security cloud service framework for hardening in the field code of mobile software applications.
  102. Andruss, William Dale; Claudatos, Christopher Hercules; Leetch, Bruce David; Terwilliger, Steven R., Security for scanning objects.
  103. Ha, Phung-Te; Xu, Wei, Selective system call monitoring.
  104. Thioux, Emmanuel, Shellcode detection.
  105. Aziz, Ashar, Subscriber based protection system.
  106. Khalid, Yasir; Deshpande, Shivani, Susceptible environment detection system.
  107. Aziz, Ashar; Amin, Muhammad; Ismael, Osman Abdoul; Bu, Zheng, System and method for IPS and VM-based detection of suspicious objects.
  108. Thioux, Emmanuel; Amin, Muhammad; Ismael, Osman Abdoul, System and method for analysis of a memory dump associated with a potentially malicious content suspect.
  109. Aziz, Ashar; Radhakrishnan, Ramesh; Ismael, Osman, System and method for analyzing packets.
  110. Aziz, Ashar; Radhakrishnan, Ramesh; Ismael, Osman, System and method for analyzing suspicious network data.
  111. Britton, Douglas; Wesie, Andrew Michael, System and method for bidirectional trust between downloaded applications and mobile devices including a secure charger and malware scanner.
  112. Britton, Douglas; Wesie, Andrew Michael; Pak, Brian Sejoon, System and method for bidirectional trust between downloaded applications and mobile devices including a secure charger and malware scanner.
  113. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, System and method for bot detection.
  114. Aziz, Ashar, System and method for detecting anomalous behaviors using a virtual machine environment.
  115. Kindlund, Darien; Wolf, Julia; Bennett, James, System and method for detecting exfiltration content.
  116. Paithane, Sushant; Vashist, Sai; Yang, Raymond; Khalid, Yasir, System and method for detecting file altering behaviors pertaining to a malicious attack.
  117. Paithane, Sushant; Vashisht, Sai Omkar, System and method for detecting interpreter-based exploit attacks.
  118. Islam, Ali; Bu, Zheng, System and method for detecting malicious activity and classifying a network communication based on different indicator types.
  119. Kindlund, Darien; Wolf, Julia; Bennett, James, System and method for detecting malicious activity based on at least one environmental property.
  120. Pidathala, Vinay; Uyeno, Henry, System and method for detecting malicious links in electronic messages.
  121. Pidathala, Vinay; Uyeno, Henry, System and method for detecting malicious links in electronic messages.
  122. Aziz, Ashar, System and method for detecting malicious traffic using a virtual machine configured with a select software environment.
  123. Amin, Muhammad; Samuelraj, Mohan; Uyeno, Henry, System and method for detecting phishing using password prediction.
  124. Paithane, Sushant; Vincent, Michael; Vashisht, Sai; Kindlund, Darien, System and method for detecting time-bomb malware.
  125. Paithane, Sushant; Vincent, Michael; Vashisht, Sai; Kindlund, Darien, System and method for detecting time-bomb malware.
  126. Polyakov, Alexey A.; Sapronov, Konstantin V., System and method for determining a security status of potentially malicious files.
  127. Rivlin, Alexandr; Mehra, Divyesh; Uyeno, Henry; Pidathala, Vinay, System and method for determining a threat based on correlation of indicators of compromise from other sources.
  128. Chan, Eric; Ismael, Osman Abdoul; Snyder, Gregory J., System and method for enhanced security of storage devices.
  129. Yablokov, Victor V.; Tikhomirov, Anton V.; Martynenko, Vladislav V., System and method for filtering spam messages based on user reputation.
  130. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, System and method for malware containment.
  131. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, System and method for malware containment.
  132. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, System and method for malware containment.
  133. Bennett, James; Bu, Zheng, System and method for network behavior detection.
  134. Amin, Muhammad; Mehmood, Masood; Ramaswamy, Ramaswamy; Challa, Madhusudan; Karandikar, Shrikrishna, System and method for offloading packet processing and static analysis operations.
  135. Amin, Muhammad; Mehmood, Masood; Ramaswamy, Ramaswamy; Challa, Madhusudan; Karandikar, Shrikrishna, System and method for offloading packet processing and static analysis operations.
  136. Pidathala, Vinay K.; Bu, Zheng; Aziz, Ashar, System and method for run-time object classification.
  137. Aziz, Ashar, System and method for signature generation.
  138. Parish, Sandy; Goostree, Peter, System and method for tracking computer viruses.
  139. Hall, Richard; Hodgson, David Charles Alexander, System and method for tracking the network viral spread of a digital media content item.
  140. Kumar, Vineet; Otvagin, Alexander; Borodulin, Nikita, System and method for triggering analysis of an object for malware in response to modification of that object.
  141. Aziz, Ashar; Radhakrishnan, Ramesh; Ismael, Osman, System and method for virtual analysis of network data.
  142. Aziz, Ashar, System and method of containing computer worms.
  143. Aziz, Ashar, System and method of detecting computer worms.
  144. Rivlin, Alexandr; Mehra, Divyesh; Uyeno, Henry; Pidathala, Vinay, System and method of detecting delivery of malware based on indicators of compromise from different sources.
  145. Rivlin, Alexandr; Mehra, Divyesh; Uyeno, Henry; Pidathala, Vinay, System and method of detecting delivery of malware using cross-customer data.
  146. Aziz, Ashar, System and method of detecting malicious content.
  147. Aziz, Ashar, System and method of detecting malicious traffic while reducing false positives.
  148. Aziz, Ashar, System and method of detecting time-delayed malicious traffic.
  149. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  150. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  151. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  152. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  153. Kester, Harold M.; Hegli, Ronald B; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  154. Pilipenko, Alex; Ha, Phung-Te, System and methods for advanced malware detection through placement of transition events.
  155. Aziz, Ashar; Amin, Muhammad; Ismael, Osman Abdoul; Bu, Zheng, System, apparatus and method for automatically verifying exploits within suspect objects and highlighting the display information associated with the verified exploits.
  156. Singh, Abhishek; Lin, Yichong; Mukherjee, Angshuman; Bu, Zheng, System, apparatus and method for classifying a file as malicious using static scanning.
  157. Islam, Ali, System, apparatus and method for conducting on-the-fly decryption of encrypted objects for malware detection.
  158. Islam, Ali, System, apparatus and method for conducting on-the-fly decryption of encrypted objects for malware detection.
  159. Khalid, Yasir; Deshpande, Shivani; Amin, Muhammad, System, apparatus and method for detecting a malicious attack based on static analysis of a multi-flow object.
  160. Ismael, Osman Abdoul, System, apparatus and method for using malware analysis results to drive adaptive instrumentation of virtual machines to improve exploit detection.
  161. Ismael, Osman Abdoul, System, apparatus and method for using malware analysis results to drive adaptive instrumentation of virtual machines to improve exploit detection.
  162. Karandikar, Shrikrishna; Amin, Muhammad; Deshpande, Shivani; Khalid, Yasir, System, device and method for detecting a malicious attack based on communcations between remotely hosted virtual machines and malicious web servers.
  163. Karandikar, Shrikrishna; Amin, Muhammad; Deshpande, Shivani; Khalid, Yasir, System, device and method for detecting a malicious attack based on direct communications between remotely hosted virtual machines and malicious web servers.
  164. Muttik, Igor; Hearnden, Steve O.; Spurlock, Joel Robert, System, method, and computer program product for enabling communication between security systems.
  165. Muttik, Igor; Hearnden, Steve O.; Spurlock, Joel Robert, System, method, and computer program product for enabling communication between security systems.
  166. Mariswamy, Hariprasad; Barton, Christopher; Kelly, Nick P.; Roberts, Guy William Welch; Sargent, John; Umashankar, Karthik; Walker, Paul D., System, method, and computer program product for reacting based on a frequency in which a compromised source communicates unsolicited electronic messages.
  167. Staniford, Stuart Gresley; Aziz, Ashar, Systems and methods for analyzing PDF documents.
  168. Staniford, Stuart Gresley; Aziz, Ashar, Systems and methods for analyzing malicious PDF network content.
  169. Singh, Abhishek; Manni, Jayaraman, Systems and methods for automatically detecting backdoors.
  170. Aziz, Ashar, Systems and methods for computer worm defense.
  171. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, Systems and methods for detecting communication channels of bots.
  172. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, Systems and methods for detecting encrypted bot command and control communication channels.
  173. Staniford, Stuart Gresley; Aziz, Ashar, Systems and methods for detecting malicious PDF network content.
  174. Staniford, Stuart Gresley; Aziz, Ashar, Systems and methods for detecting malicious PDF network content.
  175. Staniford, Stuart Gresley; Aziz, Ashar, Systems and methods for detecting malicious network content.
  176. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, Systems and methods for malware attack detection and identification.
  177. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, Systems and methods for malware attack prevention.
  178. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, Systems and methods for malware attack prevention by intercepting flows of information.
  179. Aziz, Ashar, Systems and methods for malware defense.
  180. Staniford, Stuart Gresley; Aziz, Ashar, Systems and methods for scheduling analysis of network content for malware.
  181. Aziz, Ashar, Systems and methods for unauthorized activity defense.
  182. Aziz, Ashar, Systems and methods for unauthorized activity defense.
  183. Goradia, Harnish; Ismael, Osman Abdoul; Johnson, Noah M.; Mettler, Adrian; Aziz, Ashar, User interface with real-time visual playback along with synchronous textual analysis log display and event/time index for anomalous behavior detection in applications.
  184. Goradia, Harnish; Ismael, Osman Abdoul; Johnson, Noah M.; Mettler, Adrian; Aziz, Ashar, User interface with real-time visual playback along with synchronous textual analysis log display and event/time index for anomalous behavior detection in applications.
  185. Lee, Andrew, Verification of web page integrity.
  186. Aziz, Ashar; Radhakrishnan, Ramesh; Ismael, Osman, Virtual machine with dynamic data flow analysis.
  187. Bu, Zheng; Lin, Yichong, Zero-day discovery system.
  188. Zafar, Asim; Qureshi, Eirij; Kindlund, Darien, Zero-day rotating guest image profile.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로