会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 22. 发明授权
    • Verifiable integrity guarantees for machine code programs
    • 可验证的机器代码程序完整性保证
    • US08104021B2
    • 2012-01-24
    • US11450493
    • 2006-06-09
    • Ulfar ErlingssonMartin AbadiMichael Vrable
    • Ulfar ErlingssonMartin AbadiMichael Vrable
    • G06F9/45
    • G06F21/52G06F12/1441
    • A verifier performs static checks of machine code to ensure that the code will execute safely. After verification is performed, the code is executed. The code modules generated by the rewriter and verified by the verifier prevent runtime code modifications so that properties established by the verifier cannot be invalidated during execution. Guards ensure that control flows only as expected. Stack data that must be shared within a code module, and which may therefore be corrupted during execution, is placed on a separate data stack. Other stack data remains on the regular execution stack, called the control stack. Multiple memory accesses can be checked by a single memory-range guard, optimized for fast access to the most-frequently used memory.
    • 验证者执行机器代码的静态检查,以确保代码将安全执行。 执行验证后,执行代码。 由重写器生成并由验证者验证的代码模块防止运行时代码修改,以便验证者建立的属性在执行过程中不能被无效。 护卫员确保控制只能按预期方式流动。 必须在代码模块中共享的堆栈数据,并且可能在执行期间被破坏的堆栈数据被放置在单独的数据堆栈上。 其他堆栈数据保留在常规执行堆栈中,称为控制堆栈。 多个存储器访问可以由单个存储器范围保护来检查,优化用于快速访问最常用的存储器。
    • 24. 发明申请
    • BLOCKING MALICIOUS ACTIVITY USING BLACKLIST
    • 阻止使用黑名单的恶意活动
    • US20100313264A1
    • 2010-12-09
    • US12479860
    • 2009-06-08
    • Yinglian XieFang YuMartin Abadi
    • Yinglian XieFang YuMartin Abadi
    • G06F21/00
    • H04L63/101H04L2463/144
    • An IP (Internet Protocol) address is a directly observable identifier of host network traffic in the Internet and a host's IP address can dynamically change. Analysis of traffic (e.g., network activity or application request) logs may be performed and a host tracking graph may be generated that shows hosts and their bindings to IP addresses over time. A host tracking graph may be used to determine host accountability. This can enable host-based blacklisting instead of the traditional IP address based blacklisting. Host tracking results can be leveraged for forensic analysis to understand an attacker's traces and identify malicious activities in a postmortem fashion. The host tracking information may be used to build a tracklist which can block future attacks.
    • IP(互联网协议)地址是互联网中主机网络流量的直接可观察标识符,主机的IP地址可以动态更改。 可以执行流量分析(例如,网络活动或应用请求)日志,并且可以生成显示主机及其与IP地址的绑定的主机跟踪图。 可以使用主机跟踪图来确定主机责任。 这可以启用基于主机的黑名单,而不是基于传统的基于IP地址的黑名单。 主机跟踪结果可以用于法医分析,以了解攻击者的踪迹,并以死后的方式识别恶意活动。 主机跟踪信息可用于构建可以阻止未来攻击的轨道列表。
    • 29. 发明授权
    • Dynamic fine-grained dependency analysis for a functional language
    • 功能语言的动态细粒度依赖性分析
    • US5940619A
    • 1999-08-17
    • US738150
    • 1996-10-25
    • Martin AbadiJames J. HorningButler W. LampsonRoy LevinJean-Jacques LevyYuan Yu
    • Martin AbadiJames J. HorningButler W. LampsonRoy LevinJean-Jacques LevyYuan Yu
    • G06F9/44G06F9/45
    • G06F8/311G06F8/433G06F9/45508
    • In a computerized method, a computer program is analyzed while the program is interpreted. The program is expressed in a first memory as input values and functions. Some of the input values are complex values which can have a plurality of component values. Each function operates on combinations of the input values and the functions of the program. The program is interpreted in a processor connected to the first memory. The processor is also connected to a second memory to store result values produced during the interpretation. Selected input values, components of the complex values, and functions are named only if the selected values, components, and functions are necessary to produce a selected result value. For each function of the program, the function which is interpreted, the input values on which the function depends, and the result value produced by the function during interpretation, are recorded in the second memory to dynamically perform a precise dependency analysis of the program.
    • 在计算机化方法中,在解释程序时分析计算机程序。 该程序在第一个存储器中表示为输入值和函数。 一些输入值是可以具有多个分量值的复数值。 每个功能按照程序的输入值和功能的组合进行操作。 该程序在连接到第一存储器的处理器中解释。 处理器还连接到第二存储器以存储在解释期间产生的结果值。 选定的输入值,复数值的组成部分和功能仅在选定的值,组件和功能需要产生选定的结果值时进行命名。 对于程序的每个功能,解释的功能,功能所依赖的输入值和解释期间由功能产生的结果值被记录在第二存储器中以动态地执行程序的精确的依赖性分析。