Movatterモバイル変換


[0]ホーム

URL:


SG11201510313SA - Process evaluation for malware detection in virtual machines - Google Patents

Process evaluation for malware detection in virtual machines

Info

Publication number
SG11201510313SA
SG11201510313SASG11201510313SASG11201510313SASG11201510313SASG 11201510313S ASG11201510313S ASG 11201510313SASG 11201510313S ASG11201510313S ASG 11201510313SASG 11201510313S ASG11201510313S ASG 11201510313SASG 11201510313S ASG11201510313S ASG 11201510313SA
Authority
SG
Singapore
Prior art keywords
virtual machines
malware detection
process evaluation
evaluation
malware
Prior art date
Application number
SG11201510313SA
Inventor
Sandor Lukacs
Raul-Vasile Toşa
Paul-Daniel Boca
Gheorghe-Florin Hajmaşan
Andrei-Vlad Luţas
Original Assignee
Bitdefender Ipr Man Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bitdefender Ipr Man LtdfiledCriticalBitdefender Ipr Man Ltd
Publication of SG11201510313SApublicationCriticalpatent/SG11201510313SA/en

Links

Classifications

Landscapes

SG11201510313SA2013-07-052014-07-02Process evaluation for malware detection in virtual machinesSG11201510313SA (en)

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
US13/936,058US9117080B2 (en)2013-07-052013-07-05Process evaluation for malware detection in virtual machines
PCT/RO2014/000019WO2015152748A1 (en)2013-07-052014-07-02Process evaluation for malware detection in virtual machines

Publications (1)

Publication NumberPublication Date
SG11201510313SAtrue SG11201510313SA (en)2016-01-28

Family

ID=52133728

Family Applications (1)

Application NumberTitlePriority DateFiling Date
SG11201510313SASG11201510313SA (en)2013-07-052014-07-02Process evaluation for malware detection in virtual machines

Country Status (12)

CountryLink
US (1)US9117080B2 (en)
EP (1)EP3017392B1 (en)
JP (1)JP6378758B2 (en)
KR (1)KR101946982B1 (en)
CN (1)CN105393255B (en)
AU (1)AU2014389572B2 (en)
CA (1)CA2915888C (en)
ES (1)ES2785350T3 (en)
IL (1)IL243123B (en)
RU (1)RU2634205C2 (en)
SG (1)SG11201510313SA (en)
WO (1)WO2015152748A1 (en)

Families Citing this family (92)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9191435B2 (en)2012-08-232015-11-17TidalScale, Inc.Selective data migration or remapping of virtual processors to provide required data accessibility to processor cores
EP3264313B1 (en)*2013-02-102019-06-12PayPal, Inc.Method and product for providing a predictive security product and evaluating existing security products
US9824225B1 (en)*2013-09-202017-11-21EMC IP Holding Company LLCProtecting virtual machines processing sensitive information
WO2015065330A1 (en)*2013-10-292015-05-07Hewlett-Packard Development Company, L.P.Virtual machine introspection
US9692789B2 (en)2013-12-132017-06-27Oracle International CorporationTechniques for cloud security monitoring and threat intelligence
US9514317B2 (en)*2013-12-192016-12-06Intel CorporationPolicy-based trusted inspection of rights managed content
US9740857B2 (en)*2014-01-162017-08-22Fireeye, Inc.Threat-aware microvisor
US20150229659A1 (en)*2014-02-132015-08-13Guardicore Ltd.Passive detection of malicious network-mapping software in computer networks
US9836318B2 (en)*2014-02-212017-12-05Infineon Technologies AgSafety hypervisor function
US9241010B1 (en)*2014-03-202016-01-19Fireeye, Inc.System and method for network behavior detection
JP6370098B2 (en)*2014-05-162018-08-08杉中 順子 Information processing apparatus, information processing monitoring method, program, and recording medium
US10038703B2 (en)*2014-07-182018-07-31The Regents Of The University Of MichiganRating network security posture and comparing network maliciousness
US11507663B2 (en)2014-08-112022-11-22Sentinel Labs Israel Ltd.Method of remediating operations performed by a program and system thereof
US9710648B2 (en)2014-08-112017-07-18Sentinel Labs Israel Ltd.Method of malware detection and system thereof
US9552481B1 (en)*2014-12-302017-01-24Symantec CorporationSystems and methods for monitoring programs
US9189630B1 (en)*2015-01-212015-11-17AO Kaspersky LabSystems and methods for active operating system kernel protection
US10944764B2 (en)*2015-02-132021-03-09Fisher-Rosemount Systems, Inc.Security event detection through virtual machine introspection
US10127064B2 (en)*2015-02-242018-11-13Red Hat Israel, Ltd.Read-only VM function chaining for secure hypervisor access
US10417031B2 (en)*2015-03-312019-09-17Fireeye, Inc.Selective virtualization for security threat detection
US10567395B2 (en)*2015-05-102020-02-18Check Point Advanced Threat Prevention LtdDetection of potentially malicious web content by emulating user behavior and user environment
US9703956B1 (en)*2015-06-082017-07-11Symantec CorporationSystems and methods for categorizing virtual-machine-aware applications for further analysis
US10691476B2 (en)*2015-06-272020-06-23Mcafee, LlcProtection of sensitive data
US10642753B1 (en)*2015-06-302020-05-05Fireeye, Inc.System and method for protecting a software component running in virtual machine using a virtualization layer
US10726127B1 (en)2015-06-302020-07-28Fireeye, Inc.System and method for protecting a software component running in a virtual machine through virtual interrupts by the virtualization layer
US10216927B1 (en)*2015-06-302019-02-26Fireeye, Inc.System and method for protecting memory pages associated with a process using a virtualization layer
US10395029B1 (en)2015-06-302019-08-27Fireeye, Inc.Virtual system and method with threat protection
US11113086B1 (en)2015-06-302021-09-07Fireeye, Inc.Virtual system and method for securing external network connectivity
RU2589862C1 (en)2015-06-302016-07-10Закрытое акционерное общество "Лаборатория Касперского"Method of detecting malicious code in random-access memory
RU2618947C2 (en)*2015-06-302017-05-11Закрытое акционерное общество "Лаборатория Касперского"Method of preventing program operation comprising functional undesirable for user
US10033759B1 (en)2015-09-282018-07-24Fireeye, Inc.System and method of threat detection under hypervisor control
CN105389197B (en)2015-10-132019-02-26北京百度网讯科技有限公司 Operation capture method and apparatus for container-based virtualization system
JP6721329B2 (en)*2015-12-212020-07-15三菱電機株式会社 Power semiconductor device and manufacturing method thereof
US10089124B2 (en)2015-12-312018-10-02International Business Machines CorporationSecurity application for a guest operating system in a virtual computing environment
US9965313B2 (en)*2016-01-052018-05-08Bitdefender IPR Management Ltd.Systems and methods for auditing a virtual machine
JP6711000B2 (en)*2016-02-122020-06-17日本電気株式会社 Information processing apparatus, virus detection method, and program
US10536478B2 (en)*2016-02-262020-01-14Oracle International CorporationTechniques for discovering and managing security of applications
US10127368B2 (en)*2016-03-012018-11-13Filevine, Inc.Systems for identity validation and association
US12248560B2 (en)*2016-03-072025-03-11Crowdstrike, Inc.Hypervisor-based redirection of system calls and interrupt-based task offloading
US12339979B2 (en)*2016-03-072025-06-24Crowdstrike, Inc.Hypervisor-based interception of memory and register accesses
US11086660B2 (en)*2016-03-092021-08-10Hewlett Packard Enterprise Development LpServer virtual address space
US10116630B2 (en)*2016-04-042018-10-30Bitdefender IPR Management Ltd.Systems and methods for decrypting network traffic in a virtualized environment
US11379385B2 (en)*2016-04-162022-07-05Vmware, Inc.Techniques for protecting memory pages of a virtual computing instance
CN107360120B (en)*2016-05-102019-06-11华为技术有限公司 Method and device for auditing virtual network function
US10430223B2 (en)2016-05-172019-10-01Vmware, Inc.Selective monitoring of writes to protected memory pages through page table switching
US10592267B2 (en)2016-05-172020-03-17Vmware, Inc.Tree structure for storing monitored memory page data
FR3051934A1 (en)*2016-05-242017-12-01Orange METHOD FOR IDENTIFYING AT LEAST ONE FUNCTION OF A CORE OF AN OPERATING SYSTEM
US10579421B2 (en)*2016-08-292020-03-03TidalScale, Inc.Dynamic scheduling of virtual processors in a distributed system
CN106445639A (en)*2016-09-302017-02-22北京奇虎科技有限公司Methods and devices for monitoring virtual machines
US10635479B2 (en)*2016-12-192020-04-28Bitdefender IPR Management Ltd.Event filtering for virtual machine security applications
US11695800B2 (en)2016-12-192023-07-04SentinelOne, Inc.Deceiving attackers accessing network data
CN108241801B (en)*2016-12-262021-03-30华为技术有限公司 Method and apparatus for handling system calls
US9734337B1 (en)*2017-01-242017-08-15Malwarebytes Inc.Behavior-based ransomware detection
US10592664B2 (en)*2017-02-022020-03-17Cisco Technology, Inc.Container application security and protection
JP6841703B2 (en)*2017-03-292021-03-10アドソル日進株式会社 Computer equipment
US11023135B2 (en)2017-06-272021-06-01TidalScale, Inc.Handling frequently accessed pages
US10802863B2 (en)2017-07-072020-10-13Electronics And Telecommunications Research InstituteApparatus and method for storing audit trail in response to virtual-machine process execution
KR101937935B1 (en)*2017-07-072019-04-11한국전자통신연구원Apparatus and method for storing audit trail according to virtual machine process execution
US11294898B2 (en)2017-07-312022-04-05Pearson Education, Inc.System and method of automated assessment generation
US10467552B2 (en)*2017-07-312019-11-05Pearson Education, Inc.System and method for automatic content provisioning
EP3643040A4 (en)2017-08-082021-06-09SentinelOne, Inc. METHODS, SYSTEMS AND DEVICES FOR DYNAMIC MODELING AND GROUPING OF END POINTS FOR ONBOARD NETWORKING
KR20190021673A (en)*2017-08-232019-03-06주식회사 수산아이앤티Apparatus and method for preventing ransomware
US10817347B2 (en)2017-08-312020-10-27TidalScale, Inc.Entanglement of pages and guest threads
US11687654B2 (en)*2017-09-152023-06-27Intel CorporationProviding isolation in virtualized systems using trust domains
US10546120B2 (en)*2017-09-252020-01-28AO Kaspersky LabSystem and method of forming a log in a virtual machine for conducting an antivirus scan of a file
US10713357B2 (en)*2017-11-232020-07-14Nicira, Inc.Detecting lateral movement using a hypervisor
US10678922B2 (en)*2017-11-232020-06-09Nicira, Inc.Detecting arbitrary code execution using a hypervisor
CN107798236B (en)*2017-11-302021-05-04阿里巴巴(中国)有限公司Method and device for realizing safe installation of application program installation package
US11250123B2 (en)2018-02-282022-02-15Red Hat, Inc.Labeled security for control flow inside executable program code
CN108804225B (en)*2018-05-242021-01-01新华三云计算技术有限公司 A kind of virtual machine load control method and device
US11836246B2 (en)*2018-11-192023-12-05Secure Micro LtdComputer implemented method
US11295008B2 (en)*2019-02-132022-04-05Nec CorporationGraphics processing unit accelerated trusted execution environment
US11550903B1 (en)*2019-04-262023-01-10Joseph Alan EpsteinSystem and method for trustworthiness, reputation, provenance, and measurement of software
EP3973427A4 (en)2019-05-202023-06-21Sentinel Labs Israel Ltd.Systems and methods for executable code detection, automatic feature extraction and position independent code detection
US11277436B1 (en)*2019-06-242022-03-15Ca, Inc.Identifying and mitigating harm from malicious network connections by a container
US11782713B1 (en)2019-08-272023-10-10Amazon Technologies, Inc.Security vulnerability mitigation using address space co-execution
US11630900B2 (en)*2019-09-302023-04-18Mcafee, LlcDetection of malicious scripted activity in fileless attacks
US10754506B1 (en)*2019-10-072020-08-25Cyberark Software Ltd.Monitoring and controlling risk compliance in network environments
US11836247B2 (en)*2020-03-302023-12-05Fortinet, Inc.Detecting malicious behavior in a network using security analytics by analyzing process interaction ratios
IL275098A (en)*2020-06-032022-01-01Kazuar Advanced Tech LtdMulti-computing environment with compromise mitigation
RU2763112C1 (en)*2020-08-242021-12-27Акционерное общество "Лаборатория Касперского"System and method for compiling a list of virtual machines indicating the protection status
US11442770B2 (en)*2020-10-132022-09-13BedRock Systems, Inc.Formally verified trusted computing base with active security and policy enforcement
US11579857B2 (en)2020-12-162023-02-14Sentinel Labs Israel Ltd.Systems, methods and devices for device fingerprinting and automatic deployment of software in a computing network using a peer-to-peer approach
US12124568B2 (en)*2021-04-202024-10-22Assured Information Security, Inc.Prevention and remediation of malware based on selective presentation of files to processes
CN113221103B (en)*2021-05-082022-09-20山东英信计算机技术有限公司 A container safety protection method, system and medium
US11899782B1 (en)*2021-07-132024-02-13SentinelOne, Inc.Preserving DLL hooks
US20230019995A1 (en)*2021-07-192023-01-19Sri InternationalTrojan detection via distortions, nitrogen-vacancy diamond (nvd) sensors, and electromagnetic (em) probes
US12086237B2 (en)2021-10-212024-09-10Microsoft Technology Licensing, LlcSecurely redirecting system service routines
WO2023069166A1 (en)*2021-10-212023-04-27Microsoft Technology Licensing, LlcSecurely redirecting system service routines
KR102656980B1 (en)*2022-03-142024-04-15세종대학교산학협력단Method and Apparatus for Continuous Recording the Memory of an Instance in a Virtualization Environment
KR20250024970A (en)*2022-06-102025-02-20엘지전자 주식회사 Signal processing device of a vehicle and communication device for a vehicle communication device having the same
US11977496B1 (en)2022-09-292024-05-07Amazon Technologies, Inc.Security vulnerability mitigation using hardware-supported context-dependent address space hiding
US20240289151A1 (en)*2023-02-242024-08-29Ati Technologies UlcAddress-space-identifier-based security of data transfer requests

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
JP4412156B2 (en)*2004-11-302010-02-10沖電気工業株式会社 Processing equipment
US8516583B2 (en)*2005-03-312013-08-20Microsoft CorporationAggregating the knowledge base of computer systems to proactively protect a computer from malware
US7996836B1 (en)2006-12-292011-08-09Symantec CorporationUsing a hypervisor to provide computer security
US8380987B2 (en)*2007-01-252013-02-19Microsoft CorporationProtection agents and privilege modes
US7797748B2 (en)*2007-12-122010-09-14Vmware, Inc.On-access anti-virus mechanism for virtual machine architecture
US8561182B2 (en)*2009-01-292013-10-15Microsoft CorporationHealth-based access to network resources
US8387046B1 (en)2009-03-262013-02-26Symantec CorporationSecurity driver for hypervisors and operating systems of virtualized datacenters
EP2691908B1 (en)*2011-03-282018-12-05McAfee, LLCSystem and method for virtual machine monitor based anti-malware security
US20120254993A1 (en)*2011-03-282012-10-04Mcafee, Inc.System and method for virtual machine monitor based anti-malware security
US8099596B1 (en)2011-06-302012-01-17Kaspersky Lab ZaoSystem and method for malware protection using virtualization
US9069586B2 (en)*2011-10-132015-06-30Mcafee, Inc.System and method for kernel rootkit protection in a hypervisor environment

Also Published As

Publication numberPublication date
KR101946982B1 (en)2019-05-10
HK1216930A1 (en)2016-12-09
EP3017392B1 (en)2020-01-22
CN105393255A (en)2016-03-09
CA2915888C (en)2021-05-04
CA2915888A1 (en)2015-10-08
US20150013008A1 (en)2015-01-08
IL243123B (en)2019-11-28
AU2014389572A1 (en)2016-01-21
AU2014389572B2 (en)2019-03-07
JP6378758B2 (en)2018-08-22
US9117080B2 (en)2015-08-25
RU2634205C2 (en)2017-10-24
ES2785350T3 (en)2020-10-06
CN105393255B (en)2019-07-12
WO2015152748A1 (en)2015-10-08
EP3017392A1 (en)2016-05-11
JP2016526730A (en)2016-09-05
KR20160030385A (en)2016-03-17
RU2016103212A (en)2017-08-10

Similar Documents

PublicationPublication DateTitle
IL243123B (en)Process evaluation for malware detection in virtual machines
IL244861B (en)Complex scoring for malware detection
GB201621103D0 (en)Virtual sensor data generation for wheel stop detection
GB201602099D0 (en)Securityevent detection through virtual machine introspection
EP2987277A4 (en)Hypervisor and physical machine and respective methods therein for performance measurement
GB201404226D0 (en)Fault detection in induction machines
EP2879049A4 (en)Method and device for creating virtual machine
SG11201505652UA (en)Secure virtual machine migration
EP2946357A4 (en)Unauthorized product detection techniques
PL3008236T3 (en)Washing machine
EP2987282A4 (en)Virtual machine migration
IL234004A0 (en)Detecting co-occurrence patterns in dns
GB201312422D0 (en)Virtual Machine Backup
GB201307980D0 (en)Method, apparatus and computer program for detecting collision
GB2532902B (en)Methods for improving processing speed for object inspection
EP2982832A4 (en)Rotating machine
SG11201503974SA (en)Method, apparatus and system for virtual clothes modelling
GB2510701B (en)Improved malware detection
GB2518902B (en)Early depth testing in graphics processing
GB201312417D0 (en)Virtual Machine Backup
SG11201510354QA (en)Washing machine
PL2796046T3 (en)Meat mass processing machine
PL3028011T3 (en)Rotation detection apparatus
TWM476263U (en)Optics detecting machine
EP2980300A4 (en)Washing machine

[8]ページ先頭

©2009-2025 Movatter.jp