$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Leveraging behavior-based rules for malware family classification 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-021/00
  • G06F-021/56
출원번호 US-0967180 (2015-12-11)
등록번호 US-10176321 (2019-01-08)
발명자 / 주소
  • Abbasi, Fahim H.
  • Salam, Abdul
  • Shahzad, Farrukh
출원인 / 주소
  • FireEye, Inc.
대리인 / 주소
    Rutan & Tucker, LLP
인용정보 피인용 횟수 : 0  인용 특허 : 253

초록

According to one embodiment, a malware classification scheme operating with an electronic device, configured with one or more hardware processors and a memory that stores the software handling the malware classification scheme that is conducted through analysis of behavior-based rules, is described.

대표청구항

1. An electronic device comprising: one or more hardware processors; anda memory coupled to the one or more processors, the memory comprises software that, when executed by the one or more hardware processors,(i) analyzing a plurality of behaviors by at least monitoring the plurality of behaviors of

이 특허에 인용된 특허 (253)

  1. Villa, Emilio; Zidaritz, Adrian; Varga, Michael David; Eschelbeck, Gerhard; Jones, Michael Kevin; McArdle, Mark James, Active firewall system and methodology.
  2. Thomlinson,Matthew W., Adapting input to find integer overflows.
  3. Spertus, Michael P., Adaptive instrumentation through dynamic recompilation.
  4. Demir, Tufan; Ranadive, Ameet; Rizvi, Shariq; Daswani, Neilkumar Murli, Adaptive scanning.
  5. Satish, Sourabh; Gardner, Patrick, Altering application behavior based on content provider reputation.
  6. van der Made, Peter A. J., Analytical virtual machine.
  7. Anderson,Todd A.; Putzolu,David M., Apparatus and method for secure, automated response to distributed denial of service attacks.
  8. Ben Nun, Michael; Ravid, Sagi; Weil, Ofer, Apparatus and method for wire-speed classification and pre-processing of data packets in a full duplex network.
  9. Stolfo, Salvatore J.; Wang, Ke, Apparatus method and medium for detecting payload anomaly using n-gram distribution of normal data.
  10. Kalinichenko, Michael, Application of nested behavioral rules for anti-malware processing.
  11. Danford, Robert William; Farmer, Kenneth M.; Jeffries, Clark Debs; Sisk, Robert B.; Walter, Michael A., Applying blocking measures progressively to malicious network traffic.
  12. Danford,Robert William; Farmer,Kenneth M.; Jeffries,Clark Debs; Sisk,Robert B.; Walter,Michael A., Applying blocking measures progressively to malicious network traffic.
  13. Nakae,Masayuki; Yamagata,Masaya, Attack defending system and attack defending method.
  14. Deninger, William; de la Iglesia, Erik, Attributes of captured objects in a capture system.
  15. Deninger, William; de la Iglesia, Erik, Attributes of captured objects in a capture system.
  16. Gryaznov,Dmitry, Automated Internet Relay Chat malware monitoring and interception.
  17. Enstone, Mark Richard; Cureington, James Anthony, Automated immune response for a computer.
  18. Boulay Jean-Michel Yann,FRX ; Petrillo August T. ; Swimmer Morton Gregory, Automated sample creation of polymorphic and non-polymorphic marcro viruses.
  19. Miller Christopher M. (Saratoga CA), Automated testing system.
  20. Arnold William C. (Mahopac NY) Chess David M. (Mohegan Lake NY) Kephart Jeffrey O. (Yorktown Heights NY) White Steven R. (New York NY), Automatic immune system for computers and computer networks.
  21. Liang, Yung Chang; Chen, Yi Fen, Automatic registration of a virus/worm monitor in a distributed network.
  22. Zhang, Liang, Automatic signature generation for malicious PDF files.
  23. Teragawa, Daisuke, Backlight device, display device, and television receiver.
  24. Kennedy, Mark K., Behavior blocking utilizing positive behavior system and method.
  25. Daswani, Neilkumar; Ranadive, Ameet; Rizvi, Shariq; Gagnon, Michael; Demir, Tufan; Eisenhaur, Gerry, Behavioral scanning of mobile applications.
  26. Ott Gnther (Erlangen DEX) Kaufhold Wolfgang (Erlangen DEX), Circuit arrangement for attenuation of power oscillations in networks.
  27. Shelest, Art; Yariv, Eran; Abzarian, David, Communications traffic segregation for security purposes.
  28. Fitzgerald, Joseph; Barenboim, Oleg, Compliance-based adaptations in managed virtual systems.
  29. van der Made,Peter A. J, Computer immune system and method for detecting unwanted code in a computer system.
  30. Joram, Sharwan Kumar; Jha, Shyam Prakash; Hartley, William Matthew; Sonthalia, Madhav, Computer imposed countermeasures driven by malware lineage.
  31. Ji Shuang, Computer network malicious code scanner method and apparatus.
  32. Shostack Adam ; Allouch David,ILX, Computer security.
  33. Schnurer John ; Klemmer Timothy J., Computer virus trap.
  34. Aziz, Ashar, Computer worm defense system and method.
  35. Kanchirayappa, Virupaksha N.; Chandramouli, Natarajan, Computer-implemented PDF document management.
  36. Costa, Manuel; Castro, Miguel; Rowstron, Antony; Crowcroft, Jon, Containment of worms.
  37. Chess, Brian V; Fay, Sean Patrick, Context-sensitive taint analysis.
  38. Sprosts, Craig; Kennedy, Scot; Quinlan, Daniel; Rosenstein, Larry; Slater, Charles, Controlling a message quarantine.
  39. Pak,Michael C.; Kouznetsov,Victor, Delayed-delivery quarantining of network communications having suspicious contents.
  40. Ranjan, Supranamaya, Detecting DNS fast-flux anomalies.
  41. Vincent, Michael M.; Singh, Abhishek; Amin, Muhammad; Bu, Zheng, Detecting bootkits resident on compromised computers.
  42. Muttik, Igor; Long, Duncan V., Detecting computer viruses or malicious software by patching instructions into an emulator.
  43. Aziz, Ashar; Staniford, Stuart Gresley; Amin, Muhammad; Uyeno, Henry; Yie, Samuel, Detecting malicious network content.
  44. Ismael, Osman Abdoul; Yie, Samuel; Manni, Jayaraman; Amin, Muhammad; Mahbod, Bahman, Detecting malicious network content using virtual environment components.
  45. Szor, Peter; Ferrie, Peter, Detecting malicious software through process dump scanning.
  46. Chechik, Daniel, Detecting malware communication on an infected computing device.
  47. Nachenberg, Carey; Wilhelm, Jeffrey, Detecting polymorphic threats.
  48. Xie, Liang; Zhang, Xinwen; Seifert, Jean-Pierre; Aciicmez, Onur; Latifi, Afshin, Detecting unauthorized use of computing devices based on behavioral patterns.
  49. Chi Darren, Detection and elimination of macro viruses.
  50. Paithane, Sushant; Vashisht, Sai, Detection efficacy of virtual machine-based analysis with application specific events.
  51. Otvagin, Alexander; Kumar, Vineet; Movsesyan, Arsen, Determining duplicate objects for malware analysis using environmental/context information.
  52. Drew,James Howard; Liu,Hui, Diagnosing fault patterns in telecommunication networks.
  53. Bennett, Jeremy, Differential threat detection processing.
  54. Paithane, Sushant; Vashisht, Sai, Dynamic content activation for automated analysis of embedded objects.
  55. Carey S. Nachenberg, Dynamic heuristic method for detecting computer viruses using decryption exploration and evaluation phases.
  56. Bahl, Pradeep, Dynamic risk management.
  57. Aziz, Ashar; Radhakrishnan, Ramesh; Lai, Wei-Lung; Manni, Jayaraman, Dynamic signature creation and enforcement.
  58. Vaidya Vimal, Dynamic signature inspection-based network intrusion detection.
  59. Dadhia, Rajesh K; Field, Scott A., Dynamically computing reputation scores for objects.
  60. Vincent, Michael; Thioux, Emmanuel; Vashisht, Sai; Kindlund, Darien, Dynamically remote tuning of a malware content detection system.
  61. Aziz, Ashar; Uyeno, Henry; Manni, Jay; Amin, Muhammad; Staniford, Stuart, Electronic message analysis for malware detection.
  62. Guo, Fanglu; Chiueh, Tzi-cker, Enforcing the execution exception to prevent packers from evading the scanning of dynamically created code.
  63. Rathor, Hirendra; Dalal, Kaushal, Exploit detection of malware and malware families.
  64. Ismael, Osman Abdoul; Aziz, Ashar, Exploit detection system with threat-aware microvisor.
  65. Cidon Israel,ILX ; Sidi Moshe,ILX, Fault location and performance testing of communication networks.
  66. Lowe, Rick; Broeker, Stephen; Liu, Weimin, File system for a capture system.
  67. Ramzan, Zulfikar, Filter-based identification of malicious websites.
  68. Singh, Abhishek; Mesdaq, Ali; Das, Anirban; Jain, Varun, Framework for classifying an object as malicious with machine learning for deploying updated predictive models.
  69. Ismael, Osman Abdoul; Song, Dawn; Ha, Phung-Te; Gilbert, Peter J.; Xue, Hui, Framework for computer application analysis of sensitive information tracking.
  70. Ismael, Osman Abdoul; Song, Dawn; Aziz, Ashar; Johnson, Noah; Mohan, Prashanth; Xue, Hui, Framework for efficient security coverage of mobile software applications.
  71. Ismael, Osman Abdoul; Song, Dawn; Aziz, Ashar; Johnson, Noah; Mohan, Prshanth; Xue, Hui, Framework for efficient security coverage of mobile software applications.
  72. Ismael, Osman Abdoul; Song, Dawn, Framework for efficient security coverage of mobile software applications installed on mobile devices.
  73. Ismael, Osman Abdoul; Song, Dawn; Aziz, Ashar; Johnson, Noah; Mettler, Adrian Matthew, Framework for efficient security coverage of mobile software applications that is usable to harden in the field code.
  74. Ismael, Osman Abdoul; Song, Dawn; Ha, Phung-Te; Gilbert, Peter J.; Xue, Hui, Framework for efficient security coverage of mobile software applications using machine learning.
  75. Ismael, Osman Abdoul; Song, Dawn; Xue, Hui, Framework for efficient security coverage of mobile software applications using symbolic execution to reach regions of interest within an application.
  76. Ismael, Osman Abdoul; Song, Dawn; Aziz, Ashar, Framework for iterative analysis of mobile software applications.
  77. Ismael, Osman Abdoul; Aziz, Ashar, Framework for multi-phase analysis of mobile applications.
  78. Asbj?rn S?rhaug ; Aleksandr L. Kupchik, Full-duplex medium tap apparatus and system.
  79. Mesdaq, Ali; Westin, III, Paul L., Fuzzy hash of behavioral results.
  80. Wolff,Daniel Joseph; Spurlock,Joel Robert; Edwards,Jonathan Lewis, Handling of malware scanning of files stored within a file storage device of a computer network.
  81. Aziz, Ashar; Drzewiecki, Adrian; Radhakrishnan, Ramesh; Manni, Jayaraman; Amin, Muhammad, Heuristic based capture with replay to virtual machine.
  82. Wang, Xinran; Xie, Huagang, Heuristic botnet detection.
  83. Spiegel,Mark; McCorkendale,Bruce; Sobel,William, Heuristic detection and termination of fast spreading network worm attacks.
  84. Szor,Peter, Heuristic detection of malicious computer code by page tracking.
  85. Narasimhan, Srinivasan; Hejmadi, Parthiv; Sreenath, Sheshadri, Host state monitoring.
  86. Shiffer, Jason; Ross, David, Identification of obfuscated computer items using visual algorithms.
  87. Sprosts, Craig; Kennedy, Scot; Quinlan, Daniel; Rosenstein, Larry; Slater, Charles, Identifying threats in electronic messages.
  88. Oshima, Akihide, Image forming system, image forming method and information terminal device.
  89. Liang,Yung Chang, Innoculation of computing devices against a selected computer virus.
  90. Khalid, Yasir; Paithane, Sushant; Vashisht, Sai, Intelligent context aware user interaction for malware detection.
  91. Roesch,Martin F.; Gula,Ronald J., Intrusion and misuse deterrence system employing a virtual network.
  92. Steven D. Shanklin ; Thomas E. Bernhard ; Gerald S. Lathem, Intrusion detection signature analysis using regular expressions and logical operators.
  93. Huang, Yong; Ye, Hua; Gan, Hong Bo; Li, Yue Feng, MBR infection detection using emulation.
  94. Ranjan, Supranamaya, Machine learning based botnet detection using real-time extracted traffic features.
  95. Ranadive, Ameet; Rizvi, Shariq; Daswani, Neilkumar Murli, Malicious advertisement detection and remediation.
  96. Thioux, Emmanuel; Amin, Muhammad; Kindlund, Darien; Pilipenko, Alex; Vincent, Michael, Malicious content analysis using simulated user interaction without user involvement.
  97. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, Malware containment and security analysis on connection.
  98. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, Malware containment on connection.
  99. Aziz, Ashar, Malware defense system and method.
  100. Ismael, Osman Abdoul, Malware detection appliance architecture.
  101. Vaystikh, Alex; Polansky, Robert; Saklikar, Samir Dilipkumar; Liptz, Liron, Malware detection using risk analysis based on file system and network activity.
  102. Tuvell, George; Venugopal, Deepak; Hu, Guoning, Malware modeling detection system and method for mobile platforms.
  103. Hursey,Nell John; McEwan,William Alexander, Malware scanning of compressed computer files.
  104. Xie, Michael, Managing network traffic flow.
  105. Chen, Yan; Li, Zhichun; Xia, Gao; Liu, Bin, Matching with a large vulnerability signature ruleset for high performance network defense.
  106. O'Toole, Jr.,James W., Method and apparatus for capturing and filtering datagrams for network security monitoring.
  107. Killean Reginald (Burntisland GB3) Robb David (Aberdeen GB3) White Norman Jackson (Tayside GB3), Method and apparatus for controlling access to and corruption of information in computer systems.
  108. Hendel Ariel (Ronkonkoma NY) Virzi John D. (Bronx NY), Method and apparatus for controlling data communication operations within stations of a local-area network.
  109. Wallman, David, Method and apparatus for implementing concurrently running jobs on an extended virtual machine using different heaps managers.
  110. Arnold, William C.; Chess, David M.; Morar, John F.; Segal, Alla; Swimmer, Morton G.; Whalley, Ian N.; White, Steve R., Method and apparatus for replicating and analyzing worm programs.
  111. Petersen, Scott E., Method and apparatus for secure execution of code.
  112. Arnold,William C.; Chess,David M.; Morar,John F.; Segal,Alla; Whalley,Ian N.; White,Steve R., Method and apparatus for the automatic determination of potentially worm-like behavior of a program.
  113. Donaldson,Albert L., Method and system for blocking e-mail having a nonexistent sender address.
  114. Poston, Robert J., Method and system for classification of software using characteristics and combinations of such characteristics.
  115. Kasper,James W.; Beriswill,Paul A.; Wiley,Kevin L., Method and system for configurable network intrusion detection.
  116. Kevin J. Ziese, Method and system for dynamically distributing updates in a network.
  117. Xue, Hui; Liu, Yixun; Guetter, Christoph; Jolly, Marie-Pierre; Gühring, Jens, Method and system for propagation of myocardial infarction from delayed enhanced cardiac imaging to cine magnetic resonance imaging using hybrid image registration.
  118. Choi, Jong-Deok; Konuru, Ravi; Srinivasan, Harini, Method and system for recording and replaying the execution of distributed java programs.
  119. Kuzkin, Maxim A.; Tormasov, Alexander G., Method and system for remote device access in virtual environment.
  120. Kejriwal, Nidhi Govindram; Judge, Paul, Method for detecting malicious javascript.
  121. Carpenter,Brian Edward; Himberger,Kevin David; Jeffries,Clark Debs; Peyravian,Mohammad, Method of responding to a truncated secure session attack.
  122. Chiriac, Mihai, Method, computer program and computer for analyzing an executable computer file.
  123. Ivchenko,Olexiy; Kraplin,Denys L., Methods and apparatus for performing data acquisition and control.
  124. Zimmer,Vincent J.; Rothman,Michael A., Methods and apparatus to provide network traffic support and physical security support.
  125. Paithane, Sushant; Vashisht, Sai; Yang, Raymond; Khalid, Yasir, Methods for detecting file altering malware in VM based analysis.
  126. Schmid, Matthew N.; Weber, Michael; Haddox-Schatz, Michael; Geyer, David, Methods for identifying malicious software.
  127. Stolfo, Salvatore J.; Li, Wei-Jen; Keromylis, Angelos D.; Androulaki, Elli, Methods, media, and systems for detecting attack on a digital processing device.
  128. Capek Peter G. ; Cuomo Gennaro A. ; Unger Jay H., Methods, systems and computer program products for providing insertions during delays in interactive systems.
  129. Rieschick, Gary; Dunne, Cameron Ross; McNamee, Alan; Hogan, Joe, Methods, systems and devices for the detection and prevention of malware within a network.
  130. Daswani, Neilkumar Murli; Ranadive, Ameet; Rizvi, Shariq, Mitigating malware.
  131. Tzadikario, Rephael, Mitigating network attacks using automatic signature generation.
  132. Miller, Michael D.; Ulaszek, Ryan R., Model-based testing using branches, decisions, and options.
  133. Schneider, Scott; Griffin, Kent, Modeling goodware characteristics to reduce false positive malware signatures.
  134. Baker, Stephen M., Multilayered intrusion detection system and method.
  135. Branscomb,Brian; Black,Darryl; Perry,James R, Network device identity authentication.
  136. Sobchuk, Gregory M.; Subramaniam, Shekhar; Zaheer, Khurram; Gelfenshteyn, Alexander; Shetty, Ramesh; Brady, Michael; Donnegan, George; McGuire, Roger, Network intrusion mitigation.
  137. Liang,Yung Chang; Chen,Yi Fen, Network isolation techniques suitable for virus protection.
  138. Gordy, Stephen C.; Poelstra, Henry D.; Otis, Robert W.; Gallatin, Tom, Network security tap for use with intrusion detection system.
  139. Manni, Jayaraman; Aziz, Ashar; Gong, Fengmin; Loganathan, Upendran; Amin, Muhammad, Network-based binary file extraction and analysis for malware detection.
  140. Manni, Jayaraman; Aziz, Ashar; Gong, Fengmin; Loganathan, Upendran; Amin, Muhammad, Network-based binary file extraction and analysis for malware detection.
  141. Tuvell, George; Venugopal, Deepak; Pfefferle, Matthew, Non-signature malware detection system and method for mobile platforms.
  142. Eker, Johan; Johansson, Björn; Von Platen, Carl, Obfuscating computer program code.
  143. Zhang, Yufeng; Chen, Xiaoxin; Le, Bich Cau; Krishnan, Jagannath Gopal; Uluski, Derek, On-access anti-virus mechanism for virtual machine architecture.
  144. Amit, Yair; Hay, Roee; Saltzman, Roi; Sharabani, Adi, Pinpointing security vulnerabilities in computer software applications.
  145. Aziz, Ashar; Drzewiecki, Adrian; Radhakrishnan, Ramesh; Manni, Jayaraman; Amin, Muhammad, Policy based capture with replay to virtual machine.
  146. Ball, Thomas J., Predicate-based test coverage and generation.
  147. Wu, Handong; Genes, Raimund Alexander, Preventing malicious codes from performing malicious actions in a computer system.
  148. Green, David E.; Payne, Richard; Wood, Trevor, Preventing propagation of malicious software during execution in a virtual machine.
  149. Alperovitch, Dmitri; Greve, Paula; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele, Prioritizing network traffic.
  150. Aziz, Ashar, Prospective client identification using malware attack detection.
  151. Zaitsev, Oleg V.; Denisov, Vitaly I., Protection against malware on web resources.
  152. Kraemer, Jeffrey A., Protection of computer resources.
  153. Kraemer, Jeffrey A., Protection of computer resources.
  154. Rogel, Lawrence S., Providing security in mobile devices via a virtualization software layer.
  155. Batenin, Vyacheslav A., Rapid analysis of data stream for malware presence.
  156. Nachenberg, Carey S.; Griffin, Kent E., Reducing malware signature set size through server-side processing.
  157. Hutton, Samuel Harrison; Goddard, Trevor, Resisting the spread of unwanted code and data.
  158. Bucher,Tim, Restoration of data corrupted by viruses using pre-infected copy of data.
  159. Thioux, Emmanuel; Lin, Yichong, Return-oriented programming detection.
  160. Zhao, Xiaoming; Chen, Gang; Chang, Eric, Scheduled gateway scanning arrangement and methods thereof.
  161. Sobel, William E.; Satish, Sourabh, Secure network cache content.
  162. Wang, Jiahe Helen; Lorch, Jacob R.; Parno, Bryan Jeffrey, Securing anti-virus software with virtualization.
  163. Ha, Phung-Te; Xu, Wei, Selective system call monitoring.
  164. Natvig,Kurt, Simulated computer system for monitoring of software performance.
  165. Mann, Uriel; Doshi, Nishant, Software object corruption detection.
  166. Viljoen, Petrus Johannes; Meggers, Jens, Streaming malware definition updates.
  167. Aziz, Ashar, Subscriber based protection system.
  168. Edwards, Jonathan L.; Teddy, John D., Subsequent processing of scanning task utilizing subset of virtual machines predetermined to have scanner process and adjusting amount of subsequest VMs processing based on load.
  169. Dansey, Stephen Thomas; Kuc, Zenon, Switching device, method, and computer program for efficient intrusion detection.
  170. Hibbs James D. ; Brodhecker John W., System and method for alerting safety personnel of unsafe air temperature conditions.
  171. Aziz, Ashar; Radhakrishnan, Ramesh; Ismael, Osman, System and method for analyzing packets.
  172. Aziz, Ashar; Radhakrishnan, Ramesh; Ismael, Osman, System and method for analyzing suspicious network data.
  173. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, System and method for bot detection.
  174. Jordan,Myles, System and method for computer virus detection utilizing heuristic analysis.
  175. Silberman, Peter J.; Butler, II, James R.; Harbour, Nick J., System and method for detecting executable machine instructions in a data stream.
  176. Kindlund, Darien; Wolf, Julia; Bennett, James, System and method for detecting exfiltration content.
  177. Paithane, Sushant; Vashist, Sai; Yang, Raymond; Khalid, Yasir, System and method for detecting file altering behaviors pertaining to a malicious attack.
  178. Kindlund, Darien; Wolf, Julia; Bennett, James, System and method for detecting malicious activity based on at least one environmental property.
  179. Pavlyushchik, Mikhail A., System and method for detecting malicious code executed by virtual machine.
  180. Pidathala, Vinay; Uyeno, Henry, System and method for detecting malicious links in electronic messages.
  181. Pidathala, Vinay; Uyeno, Henry, System and method for detecting malicious links in electronic messages.
  182. Aziz, Ashar, System and method for detecting malicious traffic using a virtual machine configured with a select software environment.
  183. Parshin, Yury G.; Pintiysky, Vladislav V., System and method for detecting malware targeting the boot process of a computer using boot process emulation.
  184. Polyakov, Alexey A.; Martynenko, Vladislav V.; Slobodyanuk, Yuri G.; Nazarov, Denis A.; Pavlyushchik, Mikhail A., System and method for detection of complex malware.
  185. Zaitsev, Oleg V., System and method for detection of malware using behavior model scripts of security rating rules.
  186. Zaitsev, Oleg V., System and method for detection of malware using behavior model scripts of security rating rules.
  187. McMillan, Chad; Garman, Jason, System and method for determining data entropy to identify malware.
  188. Doukhvalov, Andrey P.; Tikhomirov, Anton V., System and method for dynamically allocating computing resources for processing security information.
  189. Eric David O'Brien ; James Robert Tryon, Jr., System and method for dynamically sensing an asynchronous network event within a modular framework for network event processing.
  190. David Robert Wray GB; David John Blanchfield GB, System and method for extensible positive client identification.
  191. Hibbs, James D.; Brodhecker, John W., System and method for identifying unsafe temperature conditions.
  192. James D. Hibbs ; John W. Brodhecker, System and method for identifying unsafe temperature conditions.
  193. Appelt,Daren R.; Brunson,Kevin K.; Hibbs,James D., System and method for identifying, monitoring and evaluating equipment, environmental and physiological conditions.
  194. Hoefelmeyer,Ralph S.; Phillips,Theresa E., System and method for malicious code detection.
  195. Green, David E.; Payne, Richard; Kilmer, William, System and method for malicious software detection in multiple protocols.
  196. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, System and method for malware containment.
  197. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, System and method for malware containment.
  198. Ivancic,Franjo; Ashar,Pranav N.; Ganai,Malay; Gupta,Aarti; Yang,Zijiang, System and method for modeling, abstraction, and analysis of software.
  199. Bennett, James; Bu, Zheng, System and method for network behavior detection.
  200. Amin, Muhammad; Mehmood, Masood; Ramaswamy, Ramaswamy; Challa, Madhusudan; Karandikar, Shrikrishna, System and method for offloading packet processing and static analysis operations.
  201. Amin, Muhammad; Mehmood, Masood; Ramaswamy, Ramaswamy; Challa, Madhusudan; Karandikar, Shrikrishna, System and method for offloading packet processing and static analysis operations.
  202. Aziz, Ashar, System and method for signature generation.
  203. Aziz, Ashar; Radhakrishnan, Ramesh; Ismael, Osman, System and method for virtual analysis of network data.
  204. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  205. Aziz, Ashar, System and method of containing computer worms.
  206. Aziz, Ashar, System and method of detecting computer worms.
  207. Aziz, Ashar, System and method of detecting malicious traffic while reducing false positives.
  208. Aziz, Ashar, System and method of detecting time-delayed malicious traffic.
  209. Wilson, Theodore, System and method to visualize user sessions.
  210. Apap,Frank; Honig,Andrew; Shlomo,Hershkop; Eskin,Eleazar; Stolfo,Salvatore J., System and methods for detecting intrusions in a computer system by monitoring operating system registry accesses.
  211. Tso Michael Man-Hak ; Bakshi Bikram Singh, System for virus-checking network data during download to a client device.
  212. Aziz, Ashar; Amin, Muhammad; Ismael, Osman Abdoul; Bu, Zheng, System, apparatus and method for automatically verifying exploits within suspect objects and highlighting the display information associated with the verified exploits.
  213. Islam, Ali, System, apparatus and method for conducting on-the-fly decryption of encrypted objects for malware detection.
  214. Islam, Ali, System, apparatus and method for conducting on-the-fly decryption of encrypted objects for malware detection.
  215. Khalid, Yasir; Deshpande, Shivani; Amin, Muhammad, System, apparatus and method for detecting a malicious attack based on static analysis of a multi-flow object.
  216. Ahn, Tae Jin; Park, Taejoon, System, apparatus and method of malware diagnosis mechanism based on immunization database.
  217. Singh, Abhishek; Manni, Jayaraman, Systems and methods for automatically detecting backdoors.
  218. McCorkendale, Bruce; Tian, Xue Feng; Gong, Sheng; Zhu, Xiaole; Mao, Jun; Meng, Qingchun; Huang, Ge Hua; Hu, Wei Guo Eric, Systems and methods for combining static and dynamic code analysis.
  219. Aziz, Ashar, Systems and methods for computer worm defense.
  220. Aziz, Ashar, Systems and methods for computer worm defense.
  221. Stolfo, Salvatore J.; Keromytis, Angelos D.; Misra, Vishal; Locasto, Michael E.; Parekh, Janak, Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems.
  222. Stolfo, Salvatore J.; Malkin, Tal; Keromytis, Angelos D.; Misra, Vishal; Locasto, Michael; Parekh, Janak, Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems.
  223. Sidiroglou, Stylianos; Keromytis, Angelos D.; Anagnostakis, Kostas G., Systems and methods for detecting and inhibiting attacks using honeypots.
  224. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, Systems and methods for detecting communication channels of bots.
  225. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, Systems and methods for detecting encrypted bot command and control communication channels.
  226. Staniford, Stuart Gresley; Aziz, Ashar, Systems and methods for detecting malicious PDF network content.
  227. Staniford, Stuart Gresley; Aziz, Ashar, Systems and methods for detecting malicious PDF network content.
  228. Staniford, Stuart Gresley; Aziz, Ashar, Systems and methods for detecting malicious network content.
  229. Bodke, Anand, Systems and methods for detecting malware on mobile platforms.
  230. Gubin, Maxim; Newstadt, Keith, Systems and methods for emulating the behavior of a user in a computer-human interaction environment.
  231. Judge,Paul; Rajan,Guru, Systems and methods for enhancing electronic communication security.
  232. Bodke, Anand, Systems and methods for identifying polymorphic malware.
  233. Edwards, Sr., Thomas Scott, Systems and methods for improving virtual machine performance.
  234. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, Systems and methods for malware attack detection and identification.
  235. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, Systems and methods for malware attack prevention.
  236. Petry, Scott M.; Akamine, Shinya; Lund, Peter Kevin; Cox, Fred; Oswall, Michael John, Systems and methods for managing the transmission of electronic messages through active message date updating.
  237. Judge,Paul, Systems and methods for message threat management.
  238. Staniford, Stuart Gresley; Aziz, Ashar, Systems and methods for scheduling analysis of network content for malware.
  239. Merkle, Jr.,James A.; LeVine,Richard B.; Lee,Andrew R.; Howard,Daniel G.; Goldman,Daniel M.; Pagliarulo,Jeffrey A.; Hart, III,John J.; Bouza,Jose L., Systems and methods for the prevention of unauthorized use and manipulation of digital content.
  240. Aziz, Ashar, Systems and methods for unauthorized activity defense.
  241. Judge,Paul, Systems and methods for upstream threat pushback.
  242. Stolfo, Salvatore J; Wang, Ke; Parekh, Janak, Systems, methods, and media for outputting a dataset based upon anomaly detection.
  243. Leake, Edward N.; Pike, Geoffrey, Taint tracking mechanism for computer security.
  244. Durham,David M.; Sahita,Ravi; Rajagopal,Priya; Kardach,James; Hahn,Scott; Yavatkar,Raj, Techniques for self-isolation of networked devices.
  245. Thrower, Woodrow A.; Bhattacharya, Sourav S., Threat analysis.
  246. Chen,Eva; Sun,Jimmy; Chou,Terrence; Deutsch,Steven; Havran,Mark, Tracking and reporting of computer virus information.
  247. Izatt,David, Undetectable firewall.
  248. Goradia, Harnish; Ismael, Osman Abdoul; Johnson, Noah M.; Mettler, Adrian; Aziz, Ashar, User interface with real-time visual playback along with synchronous textual analysis log display and event/time index for anomalous behavior detection in applications.
  249. Reed,Eugene R., Virtual machine use and optimization of hardware configurations.
  250. Aziz, Ashar; Radhakrishnan, Ramesh; Ismael, Osman, Virtual machine with dynamic data flow analysis.
  251. Zhao,Guangyu; Liu,Meyer; Badrinath,Subramaniam, Virus detection and removal system and method for network-based systems.
  252. Marsden, Walter L.; Green, David E., Virus detection by executing e-mail code in a virtual machine.
  253. Liang, Yung Chang; Chen, Yi Fen, Virus monitor and methods of use thereof.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로