$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Automatic signature generation for malicious PDF files 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-021/60
  • G06F-021/56
  • H04L-029/06
출원번호 US-0115036 (2011-05-24)
등록번호 US-8695096 (2014-04-08)
발명자 / 주소
  • Zhang, Liang
출원인 / 주소
  • Palo Alto Networks, Inc.
대리인 / 주소
    Van Pelt, Yi & James LLP
인용정보 피인용 횟수 : 94  인용 특허 : 5

초록

In some embodiments, automatic signature generation for malicious PDF files includes: parsing a PDF file to extract script stream data embedded in the PDF file; determining whether the extracted script stream data within the PDF file is malicious; and automatically generating a signature for the PDF

대표청구항

1. A system, comprising: a processor configured to: parse a PDF file to extract script stream data embedded in the PDF file, wherein the PDF file is known to include malicious content; anddetermine whether to generate a signature associated with the PDF file based at least in part on at least a port

이 특허에 인용된 특허 (5)

  1. Novitchi, Mihai, Anti-malware emulation systems and methods.
  2. Farrokh, Kamron; Park, Jamie Jooyoung; Chen, Joseph, Methods and systems for tracing web-based attacks.
  3. Scales, Nicholas John, Resisting the spread of unwanted code and data.
  4. Bargeron, David M.; Brush, Alice Jane Bernheim; Gupta, Anoop, Robust anchoring of annotations to content.
  5. Weigert, Juergen, System and method for performing code provenance review in a software due diligence system.

이 특허를 인용한 특허 (94)

  1. Haq, Thoufique; Zhai, Jinjian; Pidathala, Vinay K., Advanced persistent threat (APT) detection center.
  2. Salsamendi, Ryan C., Automatic repair of corrupt files for a detonation engine.
  3. Thioux, Emmanuel; Vashisht, Sai; Vincent, Michael, Computer exploit detection using heap spray pattern matching.
  4. Manni, Jayaraman; Eun, Philip; Berrow, Michael M., Correlation and consolidation of analytic data for holistic view of a malware attack.
  5. Manni, Jayaraman; Eun, Philip; Berrow, Michael M., Correlation and consolidation of analytic data for holistic view of malware attack.
  6. Mehra, Divyesh; Singh, Abhishek, Cyber attack early warning system.
  7. Sawyer, David G.; Choudhury, Priyank, Data driven system for responding to security vulnerability.
  8. Sawyer, David G.; Choudhury, Priyank, Data driven system for responding to security vulnerability.
  9. Jain, Varun; Singh, Abhishek, Detecting malware based on reflection.
  10. Gomez, Joshua Lewis; Singh, Abhishek, Detection and classification of exploit kits.
  11. Paithane, Sushant; Vashisht, Sai, Detection efficacy of virtual machine-based analysis with application specific events.
  12. Paithane, Sushant; Vashisht, Sai, Detection efficacy of virtual machine-based analysis with application specific events.
  13. Mushtaq, Atif; Rosenberry, Todd; Aziz, Ashar; Islam, Ali, Distributed systems and methods for automatically detecting unknown bots and botnets.
  14. Mushtaq, Atif; Rosenberry, Todd; Aziz, Ashar; Islam, Ali, Distributed systems and methods for automatically detecting unknown bots and botnets.
  15. Paithane, Sushant; Vashisht, Sai, Dynamic content activation for automated analysis of embedded objects.
  16. Goradia, Harnish, Dynamic guest image creation and rollback.
  17. Vincent, Michael; Thioux, Emmanuel; Vashisht, Sai; Kindlund, Darien, Dynamically remote tuning of a malware content detection system.
  18. Manni, Jayaraman; Eun, Philip; Berrow, Michael M., Electronic device for aggregation, correlation and consolidation of analysis attributes.
  19. Aziz, Ashar; Uyeno, Henry; Manni, Jay; Sukhera, Amin; Staniford, Stuart, Electronic message analysis for malware detection.
  20. Aziz, Ashar; Uyeno, Henry; Manni, Jay; Sukhera, Amin; Staniford, Stuart, Electronic message analysis for malware detection.
  21. Rathor, Hirendra; Dalal, Kaushal, Exploit detection of malware and malware families.
  22. Rathor, Hirendra; Dalal, Kaushal, Exploit detection of malware and malware families.
  23. Singh, Japneet; Ramchetty, Harinath; Gupta, Anil, Exploit detection system.
  24. Thioux, Emmanuel; Amin, Muhammad; Ismael, Osman, File extraction from memory dump for malicious content analysis.
  25. Singh, Abhishek; Mesdaq, Ali; Das, Anirban; Jain, Varun, Framework for classifying an object as malicious with machine learning for deploying updated predictive models.
  26. Ismael, Osman Abdoul; Song, Dawn; Aziz, Ashar; Johnson, Noah; Mohan, Prashanth; Xue, Hui, Framework for efficient security coverage of mobile software applications.
  27. Ismael, Osman Abdoul; Song, Dawn; Aziz, Ashar; Johnson, Noah; Mohan, Prshanth; Xue, Hui, Framework for efficient security coverage of mobile software applications.
  28. Ismael, Osman Abdoul; Song, Dawn, Framework for efficient security coverage of mobile software applications installed on mobile devices.
  29. Ismael, Osman Abdoul; Song, Dawn; Xue, Hui, Framework for efficient security coverage of mobile software applications using symbolic execution to reach regions of interest within an application.
  30. Ismael, Osman Abdoul; Song, Dawn; Aziz, Ashar, Framework for iterative analysis of mobile software applications.
  31. Mesdaq, Ali; Westin, III, Paul L., Fuzzy hash of behavioral results.
  32. Mesdaq, Ali; Westin, III, Paul L., Fuzzy hash of behavioral results.
  33. Mesdaq, Ali; Westin, III, Paul L., Fuzzy hash of behavioral results.
  34. Khalid, Yasir; Paithane, Sushant; Vashisht, Sai, Intelligent context aware user interaction for malware detection.
  35. Rathor, Hirendra; Dalal, Kaushal; Gupta, Anil, Interactive infection visualization for improved exploit detection and signature generation for malware and malware families.
  36. Eyada, Hatem, Intrusion prevention and remedy system.
  37. Abbasi, Fahim H.; Salam, Abdul; Shahzad, Farrukh, Leveraging behavior-based rules for malware family classification.
  38. Khalid, Yasir; Amin, Muhammad; Jing, Emily; Rizwan, Muhammad, Malicious content analysis with multi-version application support within single operating environment.
  39. Khalid, Yasir; Amin, Muhammad; Jing, Emily; Rizwan, Muhammad, Malicious content analysis with multi-version application support within single operating environment.
  40. Singh, Abhishek, Malicious message analysis system.
  41. Vincent, Michael; Mesdaq, Ali; Thioux, Emmanuel; Singh, Abhishek; Vashisht, Sal, Malware analysis in accordance with an analysis plan.
  42. Malik, Amit; Pande, Reghav; Jain, Aakash, Method to detect application execution hijacking using memory protection.
  43. Paithane, Sushant; Vashisht, Sai; Yang, Raymond; Khalid, Yasir, Methods for detecting file altering malware in VM based analysis.
  44. Malik, Amit; Deshpande, Shivani; Singh, Abhishek; Zheng, Wei, Multistage system and method for analyzing obfuscated content for malware.
  45. Karandikar, Shrikrishna; Amin, Muhammad; Deshpande, Shivani; Khalid, Yasir, Network-based malware detection.
  46. Ismael, Osman Abdoul, Optimized resource allocation for virtual machines within a malware content detection system.
  47. Thioux, Emmanuel; Lin, Yichong, Return-oriented programming detection.
  48. Ha, Phung-Te; Xu, Wei, Selective system call monitoring.
  49. Thioux, Emmanuel, Shellcode detection.
  50. Aziz, Ashar, Subscriber based protection system.
  51. Khalid, Yasir; Deshpande, Shivani, Susceptible environment detection system.
  52. Aziz, Ashar; Amin, Muhammad; Ismael, Osman Abdoul; Bu, Zheng, System and method for IPS and VM-based detection of suspicious objects.
  53. Thioux, Emmanuel; Amin, Muhammad; Ismael, Osman Abdoul, System and method for analysis of a memory dump associated with a potentially malicious content suspect.
  54. Aziz, Ashar; Radhakrishnan, Ramesh; Ismael, Osman, System and method for analyzing packets.
  55. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, System and method for bot detection.
  56. Aziz, Ashar, System and method for detecting anomalous behaviors using a virtual machine environment.
  57. Paithane, Sushant; Vashist, Sai; Yang, Raymond; Khalid, Yasir, System and method for detecting file altering behaviors pertaining to a malicious attack.
  58. Paithane, Sushant; Vashisht, Sai Omkar, System and method for detecting interpreter-based exploit attacks.
  59. Pidathala, Vinay; Uyeno, Henry, System and method for detecting malicious links in electronic messages.
  60. Pidathala, Vinay; Uyeno, Henry, System and method for detecting malicious links in electronic messages.
  61. Rivlin, Alexandr; Mehra, Divyesh; Uyeno, Henry; Pidathala, Vinay, System and method for determining a threat based on correlation of indicators of compromise from other sources.
  62. Chan, Eric; Ismael, Osman Abdoul; Snyder, Gregory J., System and method for enhanced security of storage devices.
  63. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, System and method for malware containment.
  64. Amin, Muhammad; Mehmood, Masood; Ramaswamy, Ramaswamy; Challa, Madhusudan; Karandikar, Shrikrishna, System and method for offloading packet processing and static analysis operations.
  65. Amin, Muhammad; Mehmood, Masood; Ramaswamy, Ramaswamy; Challa, Madhusudan; Karandikar, Shrikrishna, System and method for offloading packet processing and static analysis operations.
  66. Pidathala, Vinay K.; Bu, Zheng; Aziz, Ashar, System and method for run-time object classification.
  67. Aziz, Ashar, System and method for signature generation.
  68. Kumar, Vineet; Otvagin, Alexander; Borodulin, Nikita, System and method for triggering analysis of an object for malware in response to modification of that object.
  69. Aziz, Ashar; Radhakrishnan, Ramesh; Ismael, Osman, System and method for virtual analysis of network data.
  70. Rivlin, Alexandr; Mehra, Divyesh; Uyeno, Henry; Pidathala, Vinay, System and method of detecting delivery of malware based on indicators of compromise from different sources.
  71. Rivlin, Alexandr; Mehra, Divyesh; Uyeno, Henry; Pidathala, Vinay, System and method of detecting delivery of malware using cross-customer data.
  72. Aziz, Ashar, System and method of detecting malicious content.
  73. Pilipenko, Alex; Ha, Phung-Te, System and methods for advanced malware detection through placement of transition events.
  74. Aziz, Ashar; Amin, Muhammad; Ismael, Osman Abdoul; Bu, Zheng, System, apparatus and method for automatically verifying exploits within suspect objects and highlighting the display information associated with the verified exploits.
  75. Khalid, Yasir; Deshpande, Shivani; Amin, Muhammad, System, apparatus and method for detecting a malicious attack based on static analysis of a multi-flow object.
  76. Ismael, Osman Abdoul, System, apparatus and method for using malware analysis results to drive adaptive instrumentation of virtual machines to improve exploit detection.
  77. Ismael, Osman Abdoul, System, apparatus and method for using malware analysis results to drive adaptive instrumentation of virtual machines to improve exploit detection.
  78. Karandikar, Shrikrishna; Amin, Muhammad; Deshpande, Shivani; Khalid, Yasir, System, device and method for detecting a malicious attack based on communcations between remotely hosted virtual machines and malicious web servers.
  79. Karandikar, Shrikrishna; Amin, Muhammad; Deshpande, Shivani; Khalid, Yasir, System, device and method for detecting a malicious attack based on direct communications between remotely hosted virtual machines and malicious web servers.
  80. Staniford, Stuart Gresley; Aziz, Ashar, Systems and methods for analyzing PDF documents.
  81. Staniford, Stuart Gresley; Aziz, Ashar, Systems and methods for analyzing malicious PDF network content.
  82. Singh, Abhishek; Manni, Jayaraman, Systems and methods for automatically detecting backdoors.
  83. Aziz, Ashar, Systems and methods for computer worm defense.
  84. Staniford, Stuart Gresley; Aziz, Ashar, Systems and methods for detecting malicious PDF network content.
  85. Staniford, Stuart Gresley; Aziz, Ashar, Systems and methods for detecting malicious PDF network content.
  86. Nachenberg, Carey, Systems and methods for detecting malicious files.
  87. Satish, Sourabh; Ren, Jingjing, Systems and methods for identifying uniform resource locators that link to potentially malicious resources.
  88. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, Systems and methods for malware attack prevention by intercepting flows of information.
  89. Aziz, Ashar, Systems and methods for malware defense.
  90. Aziz, Ashar, Systems and methods for unauthorized activity defense.
  91. Keogh, Timothy Francis; Hamilton, Brian, Systems, methods, and computer readable media for extracting data from portable document format (PDF) files.
  92. Wang, Pengchao, Uploading signatures to gateway level unified threat management devices after endpoint level behavior based detection of zero day threats.
  93. Bu, Zheng; Lin, Yichong, Zero-day discovery system.
  94. Zafar, Asim; Qureshi, Eirij; Kindlund, Darien, Zero-day rotating guest image profile.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로