Detection of malware and malicious applications

    公开(公告)号:US10305928B2

    公开(公告)日:2019-05-28

    申请号:US14820265

    申请日:2015-08-06

    Abstract: A method comprises receiving, at a network infrastructure device, a flow of packets, determining, using the network infrastructure device and for a first subset of the packets, that the first subset corresponds to a first datagram and determining a first length of the first datagram, determining, using the network infrastructure device and for a second subset of the packets, that the second subset corresponds to a second datagram that was received after the first datagram, and determining a second length of the second datagram, determining, using the network infrastructure device, a duration value between a first arrival time of the first datagram and a second arrival time of the second datagram, sending, to a collector device that is separate from the network infrastructure device, the first length, the second length, and the duration value for analysis.

    Methods and apparatus providing automatic signature generation and enforcement
    25.
    发明授权
    Methods and apparatus providing automatic signature generation and enforcement 有权
    提供自动签名生成和执行的方法和设备

    公开(公告)号:US09148442B2

    公开(公告)日:2015-09-29

    申请号:US14458096

    申请日:2014-08-12

    Abstract: A system inserts at least one notifying identifier in the computer system. The at least one notifying identifier provides execution information associated with the computer system. The system receives execution information from the at least one notifying identifier, the execution information identifies details associated with a traffic flow on the computer system. The system then generates a signature based on a deterministic link provided by the execution information provided by the at least one notifying identifier. The signature is utilized to prevent further damage caused to the computer system by at least one attack.

    Abstract translation: 系统在计算机系统中插入至少一个通知标识符。 所述至少一个通知标识符提供与计算机系统相关联的执行信息。 系统从至少一个通知标识符接收执行信息,执行信息识别与计算机系统上的业务流相关联的细节。 然后,系统基于由至少一个通知标识符提供的执行信息提供的确定性链路来生成签名。 该签名用于通过至少一次攻击来防止对计算机系统的进一步损坏。

    HASH VALUE FILTERING FOR CONTROL FLOW INTEGRITY

    公开(公告)号:US20250021348A1

    公开(公告)日:2025-01-16

    申请号:US18221833

    申请日:2023-07-13

    Abstract: Techniques and systems described herein relate to monitoring executions of computer instructions on computing devices based on observing and generating a control flow directed graph. The techniques and systems include determining an observation phase for a process or application on a computing device. During the observation phase, CPU telemetry is determined and used to generate a control flow directed graph. After the control flow directed graph is generated, a hash table associated with frequently traversed execution paths is generated. A monitoring phase may be entered where transfers of instruction pointers are monitored based on the control flow directed graph to identify invalid transfers. The frequently traversed execution paths may be identified based on the hash table and be identified as valid if the hash value corresponds to the table.

    Data packet prioritization in multiplexed sessions

    公开(公告)号:US11902168B2

    公开(公告)日:2024-02-13

    申请号:US17357461

    申请日:2021-06-24

    CPC classification number: H04L47/24

    Abstract: A method of defining priority of a number of data packets within a queue includes generating a policy. The policy defines a first multiplexed channel of a plurality of multiplexed channels. The first multiplexed channel having a first priority. The policy also defines a second multiplexed channel of the plurality of multiplexed channels. The second multiplexed channel having a second priority. The first priority is defined as being of a higher priority relative to the second priority. The method further includes receiving the number of data packets over the plurality of multiplexed channels associated with a session based at least in part on the policy.

    CONTROL FLOW INTEGRITY MONITORING FOR APPLICATIONS RUNNING ON PLATFORMS

    公开(公告)号:US20240028724A1

    公开(公告)日:2024-01-25

    申请号:US18198244

    申请日:2023-05-16

    CPC classification number: G06F21/566 G06F21/552

    Abstract: Techniques and systems described herein relate to monitoring executions of computer instructions on computing devices based on observing and generating a control flow directed graph. The techniques and systems include determining an observation phase for a process or application on a computing device. During the observation phase, CPU telemetry is determined and used to generate a control flow directed graph. After the control flow directed graph is generated, a monitoring phase may be entered where transfers of instruction pointers are monitored based on the control flow directed graph to identify invalid transfers. Transition to the monitoring phase may be based on determining a confidence score in the observed control flow directed graph and causing the transition when the confidence score is above a threshold.

Patent Agency Ranking