会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • Detecting exploit code in network flows
    • 检测网络流中的漏洞利用代码
    • US20090328185A1
    • 2009-12-31
    • US11260914
    • 2005-10-28
    • Eric Van den BergRamkumar Chinchani
    • Eric Van den BergRamkumar Chinchani
    • G06F11/30G06F17/00G06F15/173
    • H04L63/0245H04L63/1416H04L63/145
    • Disclosed is a method and apparatus for detecting exploit code in network flows. Network data packets are intercepted by a flow monitor which generates data flows from the intercepted data packets. A content filter filters out legitimate programs from the data flows, and the unfiltered portions are provided to a code recognizer which detects executable code. Any embedded executable code in the unfiltered data flow portions is identified as a suspected exploit in the network flow. The executable code recognizer recognizes executable code by performing convergent binary disassembly on the unfiltered portions of the data flows. The executable code recognizer then constructs a control flow graph and performs control flow analysis, data flow analysis, and constraint enforcement in order to detect executable code. In addition to identifying detected executable code as a potential exploit, the detected executable code may then be used in order to generate a signature of the potential exploit, for use by other systems in detecting the exploit.
    • 公开了一种用于检测网络流中的利用代码的方法和装置。 网络数据包被流量监视器拦截,流量监视器从拦截的数据包生成数据流。 内容过滤器从数据流过滤掉合法程序,并且将未过滤的部分提供给检测可执行代码的代码识别器。 未过滤的数据流部分中的任何嵌入的可执行代码被识别为网络流中的可疑漏洞。 可执行代码识别器通过对数据流的未过滤部分执行收敛二进制拆卸来识别可执行代码。 然后,可执行代码识别器构建控制流程图,并执行控制流分析,数据流分析和约束执行,以便检测可执行代码。 除了将检测到的可执行代码识别为潜在利用之外,然后可以使用检测到的可执行代码,以便生成潜在利用的签名,供其他系统用于检测利用。