会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 8. 发明授权
    • System for real traffic replay over wireless networks
    • 通过无线网络实时重播的系统
    • US08938535B2
    • 2015-01-20
    • US13486556
    • 2012-06-01
    • Ying-Dar LinChia-Yu KuPei-Hsuan LiYuan-Cheng Lai
    • Ying-Dar LinChia-Yu KuPei-Hsuan LiYuan-Cheng Lai
    • G06F15/173
    • H04W24/08
    • A real traffic replay over wireless networks with environment emulation and an event-driven automata-synchronized replay method are disclosed. The system includes a first traffic capture module configured to capture packet traces and environment effects in a real environment, a first event transform module configured to transform the packet traces into a sequence of events, and a reproduce module configured to receive the environment effects from the first traffic capture module and the sequence of events from the first event transform module such as to control a replay of the environment effects in the real environment and the sequence of events coordinately by means of automata.
    • 公开了具有环境仿真和事件驱动的自动机同步重放方法的无线网络上的实际业务重播。 该系统包括被配置为在真实环境中捕获分组跟踪和环境效果的第一流量捕获模块,被配置为将分组跟踪转换成事件序列的第一事件变换模块,以及被配置为从 第一流量捕获模块和来自第一事件变换模块的事件序列,以便通过自动机来协调地控制真实环境中的环境影响和事件顺序的重放。
    • 9. 发明申请
    • MACHINE-IMPLEMENTED METHOD AND SYSTEM FOR DETERMINING WHETHER A TO-BE-ANALYZED SOFTWARE IS A KNOWN MALWARE OR A VARIANT OF THE KNOWN MALWARE
    • 机器执行的方法和系统,用于确定无论分析的软件是已知的恶意软件还是已知的恶意软件的变体
    • US20120124667A1
    • 2012-05-17
    • US13112249
    • 2011-05-20
    • Yi-Ta ChiangYing-Dar LinYu-Sung WuYuan-Cheng Lai
    • Yi-Ta ChiangYing-Dar LinYu-Sung WuYuan-Cheng Lai
    • G06F11/00
    • G06F21/566
    • A machine-implemented method for determining whether a to-be-analyzed software is a known malware or a variant of the known malware includes the steps of: (A) configuring a processor to execute the to-be-analyzed software, and obtain a to-be-analyzed system call sequence that corresponds to the to-be-analyzed software with reference to a plurality of system calls made in sequence as a result of executing the to-be-analyzed software; (B) configuring the processor to determine a degree of similarity between the to-be-analyzed system call sequence and a reference system call sequence that corresponds to the known malware; and (C) configuring the processor to determine that the to-be-analyzed software is neither the known malware nor a variant of the known malware when the degree of similarity determined in step (B) is not greater than a predefined similarity threshold value.
    • 用于确定被分析软件是已知恶意软件还是已知恶意软件的变体的机器实现方法包括以下步骤:(A)配置处理器以执行待分析的软件,并获得 参照被执行被分析软件的结果而依次进行的多个系统调用对应于被分析软件的待分析系统调用序列; (B)配置所述处理器以确定待分析系统调用序列与对应于已知恶意软件的参考系统调用序列之间的相似度; 以及(C)当步骤(B)中确定的相似度不大于预定义的相似性阈值时,配置所述处理器以确定所述待分析软件既不是已知恶意软件也不是所述已知恶意软件的变体。