Movatterモバイル変換


[0]ホーム

URL:


SG11201704060RA - Systems and methods for malicious code detection - Google Patents

Systems and methods for malicious code detection

Info

Publication number
SG11201704060RA
SG11201704060RASG11201704060RASG11201704060RASG11201704060RASG 11201704060R ASG11201704060R ASG 11201704060RASG 11201704060R ASG11201704060R ASG 11201704060RASG 11201704060R ASG11201704060R ASG 11201704060RASG 11201704060R ASG11201704060R ASG 11201704060RA
Authority
SG
Singapore
Prior art keywords
systems
methods
malicious code
code detection
detection
Prior art date
Application number
SG11201704060RA
Inventor
Roy Katmor
Tomer Bitton
Udi Yavo
Ido Kelson
Original Assignee
Ensilo Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ensilo LtdfiledCriticalEnsilo Ltd
Publication of SG11201704060RApublicationCriticalpatent/SG11201704060RA/en

Links

Classifications

Landscapes

SG11201704060RA2014-11-252015-11-24Systems and methods for malicious code detectionSG11201704060RA (en)

Applications Claiming Priority (3)

Application NumberPriority DateFiling DateTitle
US201462083985P2014-11-252014-11-25
US201562147040P2015-04-142015-04-14
PCT/IL2015/051136WO2016084073A1 (en)2014-11-252015-11-24Systems and methods for malicious code detection

Publications (1)

Publication NumberPublication Date
SG11201704060RAtrue SG11201704060RA (en)2017-06-29

Family

ID=54979890

Family Applications (2)

Application NumberTitlePriority DateFiling Date
SG11201704060RASG11201704060RA (en)2014-11-252015-11-24Systems and methods for malicious code detection
SG11201704059RASG11201704059RA (en)2014-11-252015-11-24Systems and methods for malicious code detection accuracy assurance

Family Applications After (1)

Application NumberTitlePriority DateFiling Date
SG11201704059RASG11201704059RA (en)2014-11-252015-11-24Systems and methods for malicious code detection accuracy assurance

Country Status (9)

CountryLink
US (3)US9954980B2 (en)
EP (2)EP3225009B1 (en)
JP (2)JP6334069B2 (en)
CN (2)CN107211011A (en)
CA (2)CA2968327C (en)
HK (1)HK1244125B (en)
IL (2)IL252501B (en)
SG (2)SG11201704060RA (en)
WO (2)WO2016084073A1 (en)

Families Citing this family (89)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9330119B2 (en)2013-04-112016-05-03Oracle International CorporationKnowledge intensive data management system for business process and case management
CN107211011A (en)2014-11-252017-09-26恩西洛有限公司System and method for Malicious Code Detection
US20160225652A1 (en)2015-02-032016-08-04Applied Materials, Inc.Low temperature chuck for plasma processing systems
US10594731B2 (en)*2016-03-242020-03-17Snowflake Inc.Systems, methods, and devices for securely managing network connections
WO2017175158A1 (en)*2016-04-062017-10-12Karamba SecurityReporting and processing controller security information
WO2017175157A1 (en)*2016-04-062017-10-12Karamba SecuritySecure controller operation and malware prevention
US10467123B2 (en)2016-05-092019-11-05Oracle International CorporationCompression techniques for encoding stack trace information
US10348755B1 (en)*2016-06-302019-07-09Symantec CorporationSystems and methods for detecting network security deficiencies on endpoint devices
CN106101130B (en)*2016-07-082019-05-17北京易华录信息技术股份有限公司A kind of network malicious data detection method, apparatus and system
JP2018019207A (en)*2016-07-272018-02-01富士ゼロックス株式会社Cooperation management device and communication system
RU2634174C1 (en)*2016-10-102017-10-24Акционерное общество "Лаборатория Касперского"System and method of bank transaction execution
US10778722B2 (en)*2016-11-082020-09-15Massachusetts Institute Of TechnologyDynamic flow system
US10169576B2 (en)2016-11-152019-01-01International Business Machines CorporationMalware collusion detection
US10298605B2 (en)*2016-11-162019-05-21Red Hat, Inc.Multi-tenant cloud security threat detection
TWI617940B (en)*2016-12-012018-03-11財團法人資訊工業策進會Data protection method and data protection system
US10325108B2 (en)*2016-12-302019-06-18Intel CorporationMethod and apparatus for range based checkpoints in a storage device
CN106790292A (en)*2017-03-132017-05-31摩贝(上海)生物科技有限公司The web application layer attacks detection and defence method of Behavior-based control characteristic matching and analysis
CN108664519B (en)*2017-04-012021-03-30北京京东尚科信息技术有限公司Business rule management method and device, electronic equipment and storage medium
TWI648650B (en)*2017-07-202019-01-21中華電信股份有限公司 Gateway device, detection method of malicious domain and host host, and non-transitory computer readable media
US11102219B2 (en)*2017-08-242021-08-24At&T Intellectual Property I, L.P.Systems and methods for dynamic analysis and resolution of network anomalies
TWI650671B (en)*2017-10-172019-02-11中華電信股份有限公司Method and apparatus for analysing malware
US10990975B2 (en)*2017-11-082021-04-27Paypal, Inc.Detecting malware by monitoring client-side memory stacks
US11017084B2 (en)*2017-11-212021-05-25International Business Machines CorporationDetection of malicious code fragments via data-flow isolation
US12058160B1 (en)2017-11-222024-08-06Lacework, Inc.Generating computer code for remediating detected events
US11785104B2 (en)2017-11-272023-10-10Lacework, Inc.Learning from similar cloud deployments
US11973784B1 (en)2017-11-272024-04-30Lacework, Inc.Natural language interface for an anomaly detection framework
US12368745B1 (en)2017-11-272025-07-22Fortinet, Inc.Using natural language queries to conduct an investigation of a monitored system
US12355793B1 (en)2017-11-272025-07-08Fortinet, Inc.Guided interactions with a natural language interface
US12284197B1 (en)2017-11-272025-04-22Fortinet, Inc.Reducing amounts of data ingested into a data warehouse
US12401669B1 (en)2017-11-272025-08-26Fortinet, Inc.Container vulnerability management by a data platform
US12355626B1 (en)2017-11-272025-07-08Fortinet, Inc.Tracking infrastructure as code (IaC) asset lifecycles
US12309236B1 (en)2017-11-272025-05-20Fortinet, Inc.Analyzing log data from multiple sources across computing environments
US12309182B1 (en)2017-11-272025-05-20Fortinet, Inc.Customer onboarding and integration with anomaly detection systems
US12407701B1 (en)2017-11-272025-09-02Fortinet, Inc.Community-based generation of policies for a data platform
US11765249B2 (en)2017-11-272023-09-19Lacework, Inc.Facilitating developer efficiency and application quality
US12095796B1 (en)2017-11-272024-09-17Lacework, Inc.Instruction-level threat assessment
US12126643B1 (en)2017-11-272024-10-22Fortinet, Inc.Leveraging generative artificial intelligence (‘AI’) for securing a monitored deployment
US11792284B1 (en)2017-11-272023-10-17Lacework, Inc.Using data transformations for monitoring a cloud compute environment
US11894984B2 (en)2017-11-272024-02-06Lacework, Inc.Configuring cloud deployments based on learnings obtained by monitoring other cloud deployments
US12348545B1 (en)2017-11-272025-07-01Fortinet, Inc.Customizable generative artificial intelligence (‘AI’) assistant
US20220232024A1 (en)2017-11-272022-07-21Lacework, Inc.Detecting deviations from typical user behavior
US12309185B1 (en)2017-11-272025-05-20Fortinet, Inc.Architecture for a generative artificial intelligence (AI)-enabled assistant
US12323449B1 (en)2017-11-272025-06-03Fortinet, Inc.Code analysis feedback loop for code created using generative artificial intelligence (‘AI’)
US12381901B1 (en)2017-11-272025-08-05Fortinet, Inc.Unified storage for event streams in an anomaly detection framework
US12418555B1 (en)2017-11-272025-09-16Fortinet Inc.Guiding query creation for a generative artificial intelligence (AI)-enabled assistant
US12335348B1 (en)2017-11-272025-06-17Fortinet, Inc.Optimizing data warehouse utilization by a data ingestion pipeline
US12130878B1 (en)2017-11-272024-10-29Fortinet, Inc.Deduplication of monitored communications data in a cloud environment
US11741238B2 (en)2017-11-272023-08-29Lacework, Inc.Dynamically generating monitoring tools for software applications
US10614071B1 (en)2017-11-272020-04-07Lacework Inc.Extensible query interface for dynamic data compositions and filter applications
US12267345B1 (en)2017-11-272025-04-01Fortinet, Inc.Using user feedback for attack path analysis in an anomaly detection framework
US20220232025A1 (en)2017-11-272022-07-21Lacework, Inc.Detecting anomalous behavior of a device
US11770398B1 (en)2017-11-272023-09-26Lacework, Inc.Guided anomaly detection framework
US20220224707A1 (en)2017-11-272022-07-14Lacework, Inc.Establishing a location profile for a user device
US12261866B1 (en)2017-11-272025-03-25Fortinet, Inc.Time series anomaly detection
US11849000B2 (en)2017-11-272023-12-19Lacework, Inc.Using real-time monitoring to inform static analysis
US11979422B1 (en)2017-11-272024-05-07Lacework, Inc.Elastic privileges in a secure access service edge
US11818156B1 (en)2017-11-272023-11-14Lacework, Inc.Data lake-enabled security platform
US12407702B1 (en)2017-11-272025-09-02Fortinet, Inc.Gathering and presenting information related to common vulnerabilities and exposures
US12034754B2 (en)2017-11-272024-07-09Lacework, Inc.Using static analysis for vulnerability detection
CN108846287A (en)*2018-06-262018-11-20北京奇安信科技有限公司A kind of method and device of detection loophole attack
US20190347408A1 (en)*2018-05-112019-11-14Npx Usa, Inc.Process identifier transition monitoring and assessment
US10997289B2 (en)*2018-05-212021-05-04International Business Machines CorporationIdentifying malicious executing code of an enclave
US11438357B2 (en)2018-06-222022-09-06Senseon Tech LtdEndpoint network sensor and related cybersecurity infrastructure
GB201810294D0 (en)*2018-06-222018-08-08Senseon Tech LtdCybe defence system
GB2602254B (en)2020-12-152023-04-05Senseon Tech LtdNetwork traffic monitoring
GB201812171D0 (en)2018-07-262018-09-12Senseon Tech LtdCyber defence system
CN110020530B (en)*2018-12-242023-07-04中国银联股份有限公司Method for determining security of application program in running time and device thereof
US11108790B1 (en)*2019-04-302021-08-31Rapid7, Inc.Attack signature generation
US11538038B2 (en)*2019-05-312022-12-27Paypal, Inc.Systems and methods for remote detection of computer device attributes
US11178178B2 (en)2019-07-292021-11-16Material Security Inc.Secure communications service for intercepting suspicious messages and performing backchannel verification thereon
CN110532768A (en)*2019-08-212019-12-03东软医疗系统股份有限公司System safety encryption and device
US11463443B2 (en)2019-09-192022-10-04Bank Of America CorporationReal-time management of access controls
GB201915265D0 (en)2019-10-222019-12-04Senseon Tech LtdAnomaly detection
US11722520B2 (en)*2019-11-212023-08-08Royal Bank Of CanadaSystem and method for detecting phishing events
TWI747093B (en)*2019-12-032021-11-21中華電信股份有限公司Method and system for verifying malicious encrypted connection
US11201955B1 (en)2019-12-232021-12-14Lacework Inc.Agent networking in a containerized environment
US11256759B1 (en)2019-12-232022-02-22Lacework Inc.Hierarchical graph analysis
US11627113B2 (en)2020-04-012023-04-11The Westem Union CompanyNetwork-based authentication rule cleaning and optimization
US11146472B1 (en)2020-07-212021-10-12Bank Of America CorporationArtificial intelligence-based lateral movement identification tool
CN112488246A (en)*2020-08-062021-03-12蔡淦祺Information processing method and system based on network live broadcast and online e-commerce delivery
CN114257386B (en)*2020-09-102023-03-21华为技术有限公司 Detection model training method, system, device and storage medium
US11386197B1 (en)2021-01-112022-07-12Bank Of America CorporationSystem and method for securing a network against malicious communications through peer-based cooperation
US11641366B2 (en)2021-01-112023-05-02Bank Of America CorporationCentralized tool for identifying and blocking malicious communications transmitted within a network
US11989188B2 (en)2021-08-252024-05-21Bank Of America CorporationAggregating access to third party data sources and intelligently managing access through request quotas
US20230099241A1 (en)*2021-09-272023-03-30Bank Of America CorporationSystems and methods for identifying malicious events using deviations in user activity for enhanced network and data security
SE2151287A1 (en)*2021-10-212023-04-22Assa Abloy AbTransmitting data for detecting suspicious activity by an electronic device
US12335303B2 (en)*2023-01-032025-06-17Bank Of America CorporationSystem and method for detecting and countering malicious code
GB2626375A (en)*2023-01-232024-07-24Withsecure CorpAn arrangement and a method of threat detection in a computing device or a computer network
US12437060B2 (en)2023-10-122025-10-07International Business Machines CorporationUsing hierarchical reinforcement learning (HRL) to identify application programming interfaces (API) vulnerabilities

Family Cites Families (31)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
EP1358559A4 (en)*2001-01-312009-04-29Lancope IncNetwork port profiling
US7793346B1 (en)*2003-01-172010-09-07Mcafee, Inc.System, method, and computer program product for preventing trojan communication
US7287281B1 (en)*2003-06-172007-10-23Symantec CorporationSend blocking system and method
GB0426176D0 (en)*2004-11-292004-12-29Tang BobImmediate ready implementation of virtually congestion free guaranteed service capable network
JP4091528B2 (en)2003-11-202008-05-28日本電信電話株式会社 Unauthorized access countermeasure rule generation method, unauthorized access countermeasure method, unauthorized access countermeasure rule generation apparatus, unauthorized access countermeasure apparatus, and stack smashing attack countermeasure system
JP2006053788A (en)*2004-08-122006-02-23Ntt Docomo Inc Software operation monitoring apparatus and software operation monitoring method
US7756932B2 (en)*2005-07-292010-07-13Research In Motion LimitedSystem and method for processing messages being composed by a user
US7948977B2 (en)*2006-05-052011-05-24Broadcom CorporationPacket routing with payload analysis, encapsulation and service module vectoring
US8032940B1 (en)*2006-10-252011-10-04Chaperon, LLCMethod and system for generating and employing a secure integrated development environment
KR100843701B1 (en)2006-11-072008-07-04소프트캠프(주) How Apia checks the information recorded in the call stack
CN101207475B (en)*2006-12-152010-05-26友劲科技股份有限公司Method for preventing unauthorized connection of network system
CN101206467B (en)*2006-12-222010-09-29南京理工大学 General NC code analysis method
US9392452B2 (en)*2007-12-262016-07-12General Motors LlcProcessing electronic messages wirelessly sent to a vehicle
US8931086B2 (en)*2008-09-262015-01-06Symantec CorporationMethod and apparatus for reducing false positive detection of malware
US20100293618A1 (en)*2009-05-122010-11-18Microsoft CorporationRuntime analysis of software privacy issues
CN101594269B (en)*2009-06-292012-05-02成都市华为赛门铁克科技有限公司Method, device and gateway device for detecting abnormal connection
KR101122650B1 (en)*2010-04-282012-03-09한국전자통신연구원Apparatus, system and method for detecting malicious code injected with fraud into normal process
US8925101B2 (en)*2010-07-282014-12-30Mcafee, Inc.System and method for local protection against malicious software
US9189363B2 (en)2010-10-072015-11-17Mcafee, Inc.System, method, and computer program product for monitoring an execution flow of a function
EP2715599B1 (en)2011-05-312019-07-03EntIT Software LLCApplication security testing
US8893278B1 (en)2011-07-122014-11-18Trustwave Holdings, Inc.Detecting malware communication on an infected computing device
CN102360408A (en)*2011-09-282012-02-22国家计算机网络与信息安全管理中心Detecting method and system for malicious codes
US8984331B2 (en)2012-09-062015-03-17Triumfant, Inc.Systems and methods for automated memory and thread execution anomaly detection in a computer network
CN102932329B (en)*2012-09-262016-03-30北京奇虎科技有限公司A kind of method, device and client device that the behavior of program is tackled
CN103716284B (en)*2012-09-292016-12-21清华大学Procotol automatization conversed analysis method
JP5727991B2 (en)*2012-11-122015-06-03株式会社オプティム User terminal, unauthorized site information management server, unauthorized request blocking method, and unauthorized request blocking program
US9355247B1 (en)*2013-03-132016-05-31Fireeye, Inc.File extraction from memory dump for malicious content analysis
GB201306628D0 (en)2013-04-112013-05-29F Secure OyjDetecting and marking client devices
CN103281301B (en)*2013-04-282017-02-08上海海事大学System and method for judging cloud safety malicious program
CN103428212A (en)*2013-08-082013-12-04电子科技大学Malicious code detection and defense method
CN107211011A (en)2014-11-252017-09-26恩西洛有限公司System and method for Malicious Code Detection

Also Published As

Publication numberPublication date
CA2968201A1 (en)2016-06-02
HK1244125B (en)2019-08-02
US10334083B2 (en)2019-06-25
EP3225010A1 (en)2017-10-04
US10264104B2 (en)2019-04-16
US20160149937A1 (en)2016-05-26
US20180241853A1 (en)2018-08-23
US20160149887A1 (en)2016-05-26
CN107211011A (en)2017-09-26
EP3225009B1 (en)2024-01-03
IL252501B (en)2020-09-30
IL252500A0 (en)2017-07-31
CA2968201C (en)2021-01-05
EP3225009A1 (en)2017-10-04
IL252500B (en)2018-07-31
CN107251513A (en)2017-10-13
JP6758581B2 (en)2020-09-23
IL252501A0 (en)2017-07-31
CA2968327A1 (en)2016-06-02
WO2016084076A1 (en)2016-06-02
CA2968327C (en)2021-04-06
JP2018501591A (en)2018-01-18
JP2017539039A (en)2017-12-28
CN107251513B (en)2020-06-09
EP3225010B1 (en)2018-09-26
US9954980B2 (en)2018-04-24
JP6334069B2 (en)2018-05-30
WO2016084073A1 (en)2016-06-02
SG11201704059RA (en)2017-06-29

Similar Documents

PublicationPublication DateTitle
IL252501B (en)Systems and methods for malicious code detection
IL250521A0 (en)Method of malware detection and system thereof
GB201800793D0 (en)Methods and systems for sequencing-based variant detection
EP3798444C0 (en)Avian detection system and method
GB2520099B (en)Intruder detection method and system
EP3111331A4 (en)Systems and methods for malware detection and mitigation
ZA201606932B (en)System and method for position detection
EP3142072A4 (en)Object detection device, object detection method, and object detection system
EP3185164A4 (en)System and method for detecting malicious code using visualization
EP3171156A4 (en)Detection system and detection method
IL250926A0 (en)System and method for location-based security
GB201510957D0 (en)Systems and Methods For Verification And Anomaly Detection
GB201418499D0 (en)Malware detection method
SG11201609822VA (en)Kick detection systems and methods
EP3224764A4 (en)Systems and methods for object detection
SG10201510491QA (en)Methods and systems for flash detection
SG10201403334XA (en)Detection system and method
ZA201701178B (en)Security system and method
ZA201605659B (en)Arc detection system and method
SG11201610262TA (en)Object detection system
GB201409426D0 (en)Improved molecular detection system
GB201707731D0 (en)Detection system
GB201415393D0 (en)System and method for condition detection
GB201417309D0 (en)Sensing methods and systems
GB201409427D0 (en)Improved molecular detection system

[8]ページ先頭

©2009-2025 Movatter.jp