会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Detection of malicious system calls
    • 检测恶意系统调用
    • US08561198B2
    • 2013-10-15
    • US12775773
    • 2010-05-07
    • Baibhav SinghRahul Kashyap
    • Baibhav SinghRahul Kashyap
    • G06F21/00
    • G06F21/52
    • Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for detecting malicious system calls. In one aspect, a method includes monitoring a function vulnerable to a buffer overflow attack; receiving a call to the function, the call associated with a call stack, the call stack including one or more base pointers, and a destination buffer associated with the function; identifying a first critical memory address vulnerable to the buffer overflow attack comprising: determining the first critical memory address based on a base pointer of the one or more base pointers, wherein the base pointer address is greater than an address of the destination buffer; identifying a first address based on the base pointer of the one or more base pointers; and determining that the first address is a critical memory address in response to the first memory address is greater than the address of the destination buffer.
    • 方法,系统和装置,包括在计算机存储介质上编码的用于检测恶意系统呼叫的计算机程序。 一方面,一种方法包括监视易受缓冲器溢出攻击的功能; 接收对该功能的呼叫,与呼叫栈相关联的呼叫,该呼叫栈包括一个或多个基本指针以及与该功能相关联的目的地缓冲器; 识别易受到缓冲器溢出攻击的第一关键存储器地址,包括:基于所述一个或多个基本指针的基本指针来确定所述第一关键存储器地址,其中所述基准指针地址大于所述目的地缓冲器的地址; 基于所述一个或多个基本指针的基本指针来识别第一地址; 以及响应于所述第一存储器地址确定所述第一地址是关键存储器地址大于所述目的地缓冲器的地址。
    • 2. 发明授权
    • Securing file trust with file format conversions
    • 使用文件格式转换保护文件信任
    • US08667594B1
    • 2014-03-04
    • US13419356
    • 2012-03-13
    • Gaurav BangaRahul KashyapAndrew Southgate
    • Gaurav BangaRahul KashyapAndrew Southgate
    • G06F21/00
    • G06F21/568G06F21/56
    • Approaches for ensuring a digital file does not contain malicious code. A digital file in an original format may or may not contain malicious code. An intermediate copy of the digital file in an intermediate format is created from the digital file in the original format. The intermediate format preserves a visual or audio presentation of the digital file without supporting metadata or file format data structures of the original format. A sterilized copy of the digital file is created from the intermediate copy. The sterilized copy is in the original format. The sterilized copy comprises a digital signature indicating that the sterilized copy has been converted from the intermediate format to the original format. Advantageously, the sterilized copy is guaranteed to not possess any malicious code.
    • 确保数字文件的方法不包含恶意代码。 原始格式的数字文件可能包含或不包含恶意代码。 以原始格式从数字文件创建中间格式的数字文件的中间拷贝。 中间格式保留数字文件的视觉或音频呈现,而不支持原始格式的元数据或文件格式数据结构。 从中间拷贝创建数字文件的无菌拷贝。 灭菌副本是原始格式。 灭菌副本包括指示灭菌副本已经从中间格式转换为原始格式的数字签名。 有利地,保证无菌拷贝不具有任何恶意代码。
    • 3. 发明申请
    • Detection of Malicious System Calls
    • 检测恶意系统调用
    • US20110277035A1
    • 2011-11-10
    • US12775773
    • 2010-05-07
    • Baibhav SinghRahul Kashyap
    • Baibhav SinghRahul Kashyap
    • G06F12/14G06F12/00G06F3/00
    • G06F21/52
    • Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for detecting malicious system calls. In one aspect, a method includes monitoring a function vulnerable to a buffer overflow attack; receiving a call to the function, the call associated with a call stack, the call stack including one or more base pointers, and a destination buffer associated with the function; identifying a first critical memory address vulnerable to the buffer overflow attack comprising: determining the first critical memory address based on a base pointer of the one or more base pointers, wherein the base pointer address is greater than an address of the destination buffer; identifying a first address based on the base pointer of the one or more base pointers; and determining that the first address is a critical memory address in response to the first memory address is greater than the address of the destination buffer.
    • 方法,系统和装置,包括在计算机存储介质上编码的用于检测恶意系统呼叫的计算机程序。 一方面,一种方法包括监视易受缓冲器溢出攻击的功能; 接收对该功能的呼叫,与呼叫栈相关联的呼叫,该呼叫栈包括一个或多个基本指针以及与该功能相关联的目的地缓冲器; 识别易受到缓冲器溢出攻击的第一关键存储器地址,包括:基于所述一个或多个基本指针的基本指针来确定所述第一关键存储器地址,其中所述基准指针地址大于所述目的地缓冲器的地址; 基于所述一个或多个基本指针的基本指针来识别第一地址; 以及响应于所述第一存储器地址确定所述第一地址是关键存储器地址大于所述目的地缓冲器的地址。