会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • Scalable rundown protection for object lifetime management
    • 可扩展的防范对象生命周期管理
    • US20060200635A1
    • 2006-09-07
    • US11402493
    • 2006-04-11
    • Ravisankar PudipeddiNeill CliftNeal Christiansen
    • Ravisankar PudipeddiNeill CliftNeal Christiansen
    • G06F12/00
    • G06F12/0261
    • A system and method for object rundown protection that scales with the number of processors in a shared-memory computer system is disclosed. In an embodiment of the present invention, prior to object rundown, a cache-aware reference count data structure is used to prevent cache-pinging that would otherwise result from data sharing across processors in a multiprocessor computer system. In this data structure, a counter of positive references and negative dereferences, aligned on a particular cache line, is maintained for each processor. When an object is to be destroyed, a rundown wait process is begun, during which new references on the object are prohibited, and the total number of outstanding references is added to an on-stack global counter. Destruction is delayed until the global reference count is reduced to zero. In an embodiment of the invention suited to implementation on non-uniform memory access multiprocessor machines, each processor's reference count is additionally allocated in a region of main memory that is physically close to that processor.
    • 公开了一种与共享存储器计算机系统中的处理器数量相比较的对象破坏保护的系统和方法。 在本发明的一个实施例中,在对象清除之前,使用高速缓存感知引用计数数据结构来防止否则将在多处理器计算机系统中的处理器之间的数据共享导致的高速缓存ping。 在这种数据结构中,为每个处理器维护在特定高速缓存线上对齐的正引用和负解除引用的计数器。 当一个对象被破坏时,开始一个等待时间的过程,在该过程中,禁止对对象的新引用,并将未完成引用的总数添加到堆栈中的全局计数器。 破坏延迟,直到全局引用计数减少为零。 在适于在非均匀存储器访问多处理器机器上实现的本发明的实施例中,每个处理器的引用计数额外分配在物理上靠近该处理器的主存储器的区域中。
    • 3. 发明授权
    • Scalable rundown protection for object lifetime management
    • 可扩展的防范对象生命周期管理
    • US07571288B2
    • 2009-08-04
    • US11480799
    • 2006-07-03
    • Ravisankar PudipeddiNeill CliftNeal R. Christiansen
    • Ravisankar PudipeddiNeill CliftNeal R. Christiansen
    • G06F12/00
    • G06F12/0261
    • Object rundown protection that scales with the number of processors in a shared-memory computer system is disclosed. Prior to object rundown, a cache-aware reference count data structure is used to prevent cache-pinging that would otherwise result from data sharing across processors in a multiprocessor computer system. In this data structure, a counter of positive references and negative dereferences, aligned on a particular cache line, is maintained for each processor. When an object is to be destroyed, a rundown wait process is begun, during which new references on the object are prohibited, and the total number of outstanding references is added to an on-stack global counter. Destruction is delayed until the global reference count is reduced to zero. In an implementation on non-uniform memory access multiprocessor machines, each processor's reference count is additionally allocated in a region of main memory that is physically close to that processor.
    • 公开了与共享存储器计算机系统中的处理器数量相比较的对象破坏保护。 在对象清除之前,使用缓存感知引用计数数据结构来防止否则会在多处理器计算机系统中的处理器之间的数据共享导致的缓存ping。 在这种数据结构中,为每个处理器维护在特定高速缓存线上对齐的正引用和负解除引用的计数器。 当一个对象被销毁时,就会开始一个破坏的等待过程,在这个过程中,对对象的新引用被禁止,并且未完成引用的总数被添加到一个堆栈全局计数器中。 破坏延迟,直到全局引用计数减少为零。 在非均匀内存访问多处理器机器上的实现中,每个处理器的引用计数额外分配在物理上靠近该处理器的主存储器的区域中。
    • 6. 发明申请
    • Identifying malware that employs stealth techniques
    • 识别使用隐身技术的恶意软件
    • US20070101431A1
    • 2007-05-03
    • US11263599
    • 2005-10-31
    • Neill CliftThushara Wijeratna
    • Neill CliftThushara Wijeratna
    • G06F12/14
    • G06F21/56
    • A method, software system, and computer-readable medium are provided for determining whether a malware that implements stealth techniques is resident on a computer. In one exemplary embodiment, a method is provided that obtains a first set of data that describes the processes that are reported as being active on the computer in a non-interrupt environment. Then, the method causes program execution to be interrupted at runtime so that an analysis of the active processes on the computer may be performed. After program execution is interrupted, a second set data that describes the processes that are reported as being active on the computer in a interrupt environment is obtained. By performing a comparison between the first and second sets of data, a determination may be made regarding whether the collected data contains inconsistencies that are characteristic of malware.
    • 提供了一种方法,软件系统和计算机可读介质,用于确定实施隐形技术的恶意软件是否驻留在计算机上。 在一个示例性实施例中,提供了一种方法,其获得在非中断环境中描述在计算机上被报告为活动的进程的第一组数据。 然后,该方法使得程序执行在运行时被中断,从而可以对计算机上的活动进程进行分析。 在程序执行中断之后,获得描述在中断环境中报告为在计算机上被激活的进程的第二组数据。 通过执行第一和第二组数据之间的比较,可以确定收集的数据是否包含恶意软件的特征的不一致。
    • 10. 发明授权
    • Identifying malware that employs stealth techniques
    • 识别使用隐身技术的恶意软件
    • US07743418B2
    • 2010-06-22
    • US11263599
    • 2005-10-31
    • Neill CliftThushara K. Wijeratna
    • Neill CliftThushara K. Wijeratna
    • G06F12/14G06F7/04G08B23/00
    • G06F21/56
    • A method, software system, and computer-readable medium are provided for determining whether a malware that implements stealth techniques is resident on a computer. In one exemplary embodiment, a method is provided that obtains a first set of data that describes the processes that are reported as being active on the computer in a non-interrupt environment. Then, the method causes program execution to be interrupted at runtime so that an analysis of the active processes on the computer may be performed. After program execution is interrupted, a second set data that describes the processes that are reported as being active on the computer in a interrupt environment is obtained. By performing a comparison between the first and second sets of data, a determination may be made regarding whether the collected data contains inconsistencies that are characteristic of malware.
    • 提供了一种方法,软件系统和计算机可读介质,用于确定实施隐形技术的恶意软件是否驻留在计算机上。 在一个示例性实施例中,提供了一种方法,其获得在非中断环境中描述在计算机上被报告为活动的进程的第一组数据。 然后,该方法使得程序执行在运行时被中断,从而可以对计算机上的活动进程进行分析。 在程序执行中断之后,获得描述在中断环境中报告为在计算机上被激活的进程的第二组数据。 通过执行第一和第二组数据之间的比较,可以确定收集的数据是否包含恶意软件的特征的不一致。