Movatterモバイル変換


[0]ホーム

URL:


SG11201804085SA - Systems and methods for detection of malicious code in runtime generated code - Google Patents

Systems and methods for detection of malicious code in runtime generated code

Info

Publication number
SG11201804085SA
SG11201804085SASG11201804085SASG11201804085SASG11201804085SASG 11201804085S ASG11201804085S ASG 11201804085SASG 11201804085S ASG11201804085S ASG 11201804085SASG 11201804085S ASG11201804085S ASG 11201804085SASG 11201804085S ASG11201804085S ASG 11201804085SA
Authority
SG
Singapore
Prior art keywords
runtime
code
generated code
international
match
Prior art date
Application number
SG11201804085SA
Inventor
Udi Yavo
Original Assignee
Ensilo Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ensilo LtdfiledCriticalEnsilo Ltd
Publication of SG11201804085SApublicationCriticalpatent/SG11201804085SA/en

Links

Classifications

Landscapes

Abstract

INTERNATIONAL APPLICATION PUBLISHED UNDER THE PATENT COOPERATION TREATY (PCT) (19) World Intellectual Property -' Organization International Bureau res:0) (43) International Publication Date ..... .yoreol 15 June 2017(15.06.2017) WIPO I PCT ID Hit (10) 11111111111111111111 WO International 2017/098495 11111111111111HIE Publication ME Al Number IIIIRIIIIIIIIIIIIIII (51) International Patent Classification: (81) Designated States (unless otherwise indicated, for every GOOF 21/56 (2013.01) kind of national protection available): AE, AG, AL, AM, AO, AT, AU, AZ, BA, BB, BG, BH, BN, BR, BW, BY, (21) International Application Number: BZ, CA, CH, CL, CN, CO, CR, CU, CZ, DE, DK, DM, PCT/IL2016/050987 DO, DZ, EC, EE, EG, ES, FI, GB, GD, GE, GH, GM, GT, (22) International Filing Date: HN, HR, HU, ID, IL, IN, IR, IS, JP, KE, KG, KN, KP, KR, 7 September 2016 (07.09.2016) KZ, LA, LC, LK, LR, LS, LU, LY, MA, MD, ME, MG, MK, MN, MW, MX, MY, MZ, NA, NG, NI, NO, NZ, OM, (25) Filing Language: English PA, PE, PG, PH, PL, PT, QA, RO, RS, RU, RW, SA, SC, (26) Publication Language: English SD, SE, SG, SK, SL, SM, ST, SV, SY, TH, TJ, TM, TN, TR, TT, TZ, UA, UG, US, UZ, VC, VN, ZA, ZM, ZW. (30) Priority Data: 62/264,404 8 December 2015 (08.12.2015) US (84) Designated States (unless otherwise indicated, for every kind of regional protection available): ARIPO (BW, GH, (71) Applicant: ENSILO LTD. [IL/IL]; 6 Maskit Street, P.O. GM, KE, LR, LS, MW, MZ, NA, RW, SD, SL, ST, SZ, Box 12863, 4673332 Herzlia (IL). TZ, UG, ZM, ZW), Eurasian (AM, AZ, BY, KG, KZ, RU, (72) Inventor: YAVO, Udi; 6 Maskit Street, P.O. Box 12863, TJ, TM), European (AL, AT, BE, BG, CH, CY, CZ, DE, 4673332 Herzlia (IL). DK, EE, ES, FI, FR, GB, GR, HR, HU, IE, IS, IT, LT, LU, LV, MC, MK, MT, NL, NO, PL, PT, RO, RS, SE, SI, SK, (74) Agents: EHRLICH, Gal et al.; G. E. Ehrlich (1995) LTD., SM, TR), OAPI (BF, BJ, CF, CG, CI, CM, GA, GN, GQ, 11 Menachem Begin Road, 5268104 Ramat Gan (IL). GW, KM, ML, MR, NE, SN, TD, TG). [Continued on next page] (54) Title: SYSTEMS AND METHODS FOR DETECTION OF MALICIOUS CODE IN RUNTIME GENERATED CODE (57) : According to an aspect of some embodiments of the present invention there is provided a computer-imple- Receive indication of the creation mented method for detection of malicious code within and/or execution of runtime runtime generated code executing within a computer, com- generated code the the prising executing on a processor of computer acts of: 102 receiving an indication of at least one of the creation and the execution of runtime generated code in a memory of a com- puter; identifying a match between signature data associated Identify a match between signature with the runtime generated code and a template signature of a data associated with the runtime Generate plurality of templates representing authorized source creation generated code and a template Match indication of modifies that created the runtime generated code, the tem- * signature representing an found benign code in device; plates stored a repository on a storage and trigger - authorized source creation module 110 ing a security process to handle in the malicious code runtime 104 is found. generated code when no match No match found Generate indication of malicious code 106 Il .4t In Cr \ 71° pc CT\ C --..„ IN Il C ei V Trigger security process to handle the malicious code 108 no. i O WO 2017/098495 Al IMEDIMOMMIDIIMMENIIMMENIMEMOVOIS Declarations under Rule 4.17: Published: — of inventorship (Rule 4.17(iv)) — with international search report (Art. 21(3))
SG11201804085SA2015-12-082016-09-07Systems and methods for detection of malicious code in runtime generated codeSG11201804085SA (en)

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
US201562264404P2015-12-082015-12-08
PCT/IL2016/050987WO2017098495A1 (en)2015-12-082016-09-07Systems and methods for detection of malicious code in runtime generated code

Publications (1)

Publication NumberPublication Date
SG11201804085SAtrue SG11201804085SA (en)2018-06-28

Family

ID=57113519

Family Applications (1)

Application NumberTitlePriority DateFiling Date
SG11201804085SASG11201804085SA (en)2015-12-082016-09-07Systems and methods for detection of malicious code in runtime generated code

Country Status (8)

CountryLink
US (1)US20170161498A1 (en)
EP (1)EP3387579A1 (en)
JP (1)JP6837064B2 (en)
CA (1)CA3005314A1 (en)
IL (1)IL259878B (en)
SG (1)SG11201804085SA (en)
TW (1)TWI791418B (en)
WO (1)WO2017098495A1 (en)

Families Citing this family (19)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9916448B1 (en)*2016-01-212018-03-13Trend Micro IncorporatedDetection of malicious mobile apps
US10275595B2 (en)*2016-09-292019-04-30Trap Data Security Ltd.System and method for characterizing malware
TWI668592B (en)*2017-07-282019-08-11中華電信股份有限公司 Method for automatically determining the malicious degree of Android App by using multiple dimensions
US10977368B1 (en)*2017-12-272021-04-13Ca Technologies, Inc.Detecting malware based on memory allocation patterns
US11238017B2 (en)*2018-01-302022-02-01Salesforce.Com, Inc.Runtime detector for data corruptions
US11609984B2 (en)*2018-02-142023-03-21Digital Guardian LlcSystems and methods for determining a likelihood of an existence of malware on an executable
US11481376B2 (en)2018-06-192022-10-25Salesforce, Inc.Platform for handling data corruptions
JP7672041B2 (en)*2019-06-262025-05-07久利寿 帝都 Information processing method and information processing system
US11681804B2 (en)2020-03-092023-06-20Commvault Systems, Inc.System and method for automatic generation of malware detection traps
CN112199274B (en)*2020-09-182022-05-03北京大学JavaScript dynamic tain tracking method based on V8 engine and electronic device
US11816484B2 (en)2020-10-302023-11-14Apple Inc.Hardware verification of dynamically generated code
CN112579094B (en)*2020-12-152024-05-14上海赛可出行科技服务有限公司Lightweight thermal restoration method based on template code matching
CN113868655B (en)*2021-09-292025-07-11北京天融信网络安全技术有限公司 Trojan horse detection and killing method, device, electronic device and computer-readable storage medium
US20230252162A1 (en)*2022-02-102023-08-10Cisco Technology, Inc.Application Vulnerability Score Based on Stack Traces
US12328322B2 (en)2022-04-012025-06-10Vectra Ai, Inc.Method, product, and system for network security management using software representation that embodies network configuration and policy data
US12219070B2 (en)2022-04-012025-02-04Vectra Ai, Inc.Method, product, and system for generating detection signatures based on attack paths in a computer network identified using a software representation that embodies network configuration and policy data for security management using detection signature templates
EP4254868B1 (en)*2022-04-012025-02-19Vectra AI, Inc.Method, product, and system for analyzing a computer network to identify attack paths using a software representation that embodies network configuration and policy data for security management
US12212585B2 (en)2022-04-012025-01-28Vectra Ai, Inc.Method, product, and system for analyzing a computer network to identify attack paths using a software representation that embodies network configuration and policy data for security management
US20240056481A1 (en)2022-08-092024-02-15Commvault Systems, Inc.Data storage management system integrating cyber threat deception

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20070192863A1 (en)*2005-07-012007-08-16Harsh KapoorSystems and methods for processing data flows
US7478431B1 (en)*2002-08-022009-01-13Symantec CorporationHeuristic detection of computer viruses
US7984304B1 (en)*2004-03-022011-07-19Vmware, Inc.Dynamic verification of validity of executable code
US8176554B1 (en)*2008-05-302012-05-08Symantec CorporationMalware detection through symbol whitelisting
US20110191848A1 (en)*2010-02-032011-08-04Microsoft CorporationPreventing malicious just-in-time spraying attacks
US20120331303A1 (en)*2011-06-232012-12-27Andersson Jonathan EMethod and system for preventing execution of malware
CN102819697B (en)*2011-12-262015-07-22哈尔滨安天科技股份有限公司Method and system for detecting multi-platform malicious codes based on thread decompiling
TWI528216B (en)*2014-04-302016-04-01財團法人資訊工業策進會Method, electronic device, and user interface for on-demand detecting malware

Also Published As

Publication numberPublication date
IL259878B (en)2021-07-29
TWI791418B (en)2023-02-11
JP2019502197A (en)2019-01-24
WO2017098495A1 (en)2017-06-15
US20170161498A1 (en)2017-06-08
IL259878A (en)2018-07-31
EP3387579A1 (en)2018-10-17
TW201721497A (en)2017-06-16
CA3005314A1 (en)2017-06-15
JP6837064B2 (en)2021-03-03

Similar Documents

PublicationPublication DateTitle
SG11201804085SA (en)Systems and methods for detection of malicious code in runtime generated code
SG11201907394UA (en)Two-dimensional code generation method and device, and two-dimensional code recognition method and device
SG11201903604PA (en)Iot security service
SG11201809582PA (en)A method and system for verifying ownership of a digital asset using a distributed hash table and a peer-to-peer distributed ledger
SG11201809866PA (en)Cryptographic applications for a blockchain system
SG11201901572PA (en)System for distributed intelligent remote sensing systems
SG11201909410VA (en)Machine learned decision guidance for alerts originating from monitoring systems
SG11201809963XA (en)Application framework using blockchain-based asset ownership
SG11201806785YA (en)Tokenisation method and system for implementing exchanges on a blockchain
SG11201905460SA (en)Data unsealing with a sealing enclave
SG11201804361YA (en)Method for managing a trusted identity
SG11201710238QA (en)Autonomic incident triage prioritization by performance modifier and temporal decay parameters
SG11201806712RA (en)A method and system for securing computer software using a distributed hash table and a blockchain
SG11201905463TA (en)Abstract enclave identity
SG11201900052XA (en)Method and system for verification of identity attribute information
SG11201905461VA (en)Data sealing with a sealing enclave
SG11201905462WA (en)Cross-platform enclave identity
SG11201905456UA (en)Addressing a trusted execution environment using encryption key
SG11201900752PA (en)Cybersecurity vulnerability management system and method
SG11201900979VA (en)Network-based automated prediction modeling
SG11201811213XA (en)Updating virtual memory addresses of target application functionalities for an updated version of application binary code
SG11201809117QA (en)Operating system for blockchain iot devices
SG11201903276VA (en)Virtual reality identity verification
SG11201903286RA (en)User identity authentication using virtual reality
SG11201710236RA (en)Quantitative unified analytic neural networks

[8]ページ先頭

©2009-2025 Movatter.jp