会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明公开
    • THWARTING MAP-LOADED MODULE MASQUERADE ATTACKS
    • 摧毁地图加载的模块MASQUERADE攻击
    • EP1247150A2
    • 2002-10-09
    • EP01904858.6
    • 2001-01-11
    • SYMANTEC CORPORATION
    • SOBEL, William, E.GRAWROCK, David
    • G06F1/00
    • G06F21/565G06F21/552
    • Apparatus, computer-implemented method, and computer-readable medium for thwarting map-loaded module (8) attacks on a digital computer (1). Within the computer (1) is a registry (10) containing mappings from generic names (4) of map-loaded modules (8) to specific locations (5) of the map-loaded modules (8). Coupled to the registry (10) is a registry monitor module (20) adapted to monitor attempts to replace existing mappings (5) of map-loaded modules (8) with replacement mappings (5). Coupled to the map-loaded modules (8) is a file system monitor module (70) adapted to monitor attempts to insert new map-loaded modules (8) into the computer (1). Coupled to the registry monitor module (20) and to the file system monitor module (70) is a programmable control module (30) adapted to determine when a change in mapping constitutes a malicious code attack. Such determinations are made when one or more pre-established rules (50) are satisfied. Two categories of rules (50) can be pre-established for use by control module (30): a first set of rules (50) for which programmable control module (30) can make decisions on its own, and a second set of rules (50) for which programmable control module (30) passes control to a system administrator (40).
    • 用于阻止对数字计算机(1)上的映射加载模块(8)攻击的设备,计算机实现的方法和计算机可读介质。 在计算机(1)内是注册表(10),注册表(10)包含从加载地图的模块(8)的通用名称(4)到加载地图的模块(8)的特定位置(5)的映射。 耦合到注册表(10)的是注册表监视模块(20),其适于监视用替换映射(5)替换映射加载模块(8)的现有映射(5)的尝试。 耦合到加载地图的模块(8)的是文件系统监视模块(70),其适于监视将新的加载地图的模块(8)插入计算机(1)的尝试。 耦合到注册表监视器模块(20)和文件系统监视器模块(70)的是可编程控制模块(30),其适于确定映射中的变化何时构成恶意代码攻击。 当满足一个或多个预先建立的规则(50)时,做出这样的确定。 可以预先建立两类规则(50)供控制模块(30)使用:第一组规则(50),可编程控制模块(30)可以自己做出决定,第二组规则 (50),可编程控制模块(30)将控制传递给系统管理员(40)。
    • 3. 发明授权
    • THWARTING MAP-LOADED MODULE MASQUERADE ATTACKS
    • 预防MAP活化MODULMASKERADEANGRIFFE的
    • EP1247150B1
    • 2004-03-31
    • EP01904858.6
    • 2001-01-11
    • SYMANTEC CORPORATION
    • SOBEL, William, E.GRAWROCK, David
    • G06F1/00
    • G06F21/565G06F21/552
    • Apparatus, computer-implemented method, and computer-readable medium for thwarting map-loaded module (8) attacks on a digital computer (1). Within the computer (1) is a registry (10) containing mappings from generic names (4) of map-loaded modules (8) to specific locations (5) of the map-loaded modules (8). Coupled to the registry (10) is a registry monitor module (20) adapted to monitor attempts to replace existing mappings (5) of map-loaded modules (8) with replacement mappings (5). Coupled to the map-loaded modules (8) is a file system monitor module (70) adapted to monitor attempts to insert new map-loaded modules (8) into the computer (1). Coupled to the registry monitor module (20) and to the file system monitor module (70) is a programmable control module (30) adapted to determine when a change in mapping constitutes a malicious code attack. Such determinations are made when one or more pre-established rules (50) are satisfied. Two categories of rules (50) can be pre-established for use by control module (30): a first set of rules (50) for which programmable control module (30) can make decisions on its own, and a second set of rules (50) for which programmable control module (30) passes control to a system administrator (40).