Monitoring real-time processor instruction stream execution

    公开(公告)号:US11093605B2

    公开(公告)日:2021-08-17

    申请号:US16150679

    申请日:2018-10-03

    Abstract: In one example embodiment, a computing device has a processor that executes a processor instruction stream that causes the processor to perform one or more operations for the computing device. The computing device generates one or more trace data packets including a first instruction pointer of the processor instruction stream, a second instruction pointer of the processor instruction stream subsequent to the first instruction pointer, and a string of characters derived from instructions associated with a control flow transfer between the first instruction pointer of the processor instruction stream and the second instruction pointer of the processor instruction stream. The computing device determines whether the one or more trace data packets are consistent with a secure processor instruction stream known or determined to be secure from malicious processor instructions and, if not, generates an indication that the processor instruction stream is not secure.

    METHODS AND APPARATUS PROVIDING AUTOMATIC SIGNATURE GENERATION AND ENFORCEMENT
    6.
    发明申请
    METHODS AND APPARATUS PROVIDING AUTOMATIC SIGNATURE GENERATION AND ENFORCEMENT 有权
    提供自动签名生成和执行的方法和装置

    公开(公告)号:US20130312104A1

    公开(公告)日:2013-11-21

    申请号:US13949173

    申请日:2013-07-23

    Abstract: A system inserts at least one notifying identifier in the computer system. The at least one notifying identifier provides execution information associated with the computer system. The system receives execution information from the at least one notifying identifier, the execution information identifies details associated with a traffic flow on the computer system. The system then generates a signature based on a deterministic link provided by the execution information provided by the at least one notifying identifier. The signature is utilized to prevent further damage caused to the computer system by at least one attack.

    Abstract translation: 系统在计算机系统中插入至少一个通知标识符。 所述至少一个通知标识符提供与计算机系统相关联的执行信息。 系统从至少一个通知标识符接收执行信息,执行信息识别与计算机系统上的业务流相关联的细节。 然后,系统基于由至少一个通知标识符提供的执行信息提供的确定性链路来生成签名。 该签名用于通过至少一次攻击来防止对计算机系统的进一步损坏。

    INLINE CONTROL FLOW MONITOR WITH ENFORCEMENT

    公开(公告)号:US20240028709A1

    公开(公告)日:2024-01-25

    申请号:US18084065

    申请日:2022-12-19

    CPC classification number: G06F21/54 G06F21/552

    Abstract: Techniques and systems described herein relate to monitoring executions of computer instructions on computing devices based on learning and generating a control flow directed graph. The techniques and systems include determining a learned control flow directed graph for a process executed on the computing system. A system call is identified during execution of the process as well as a predetermined number of transitions leading to the system call. A validity of the transitions leading the system call is determined based on the learned control flow directed graph and the computing system may perform an action based on the validity.

    Detection of malware and malicious applications

    公开(公告)号:US11057420B2

    公开(公告)日:2021-07-06

    申请号:US16370853

    申请日:2019-03-29

    Abstract: A method comprises receiving, at a network infrastructure device, a flow of packets, determining, using the network infrastructure device and for a first subset of the packets, that the first subset corresponds to a first datagram and determining a first length of the first datagram, determining, using the network infrastructure device and for a second subset of the packets, that the second subset corresponds to a second datagram that was received after the first datagram, and determining a second length of the second datagram, determining, using the network infrastructure device, a duration value between a first arrival time of the first datagram and a second arrival time of the second datagram, sending, to a collector device that is separate from the network infrastructure device, the first length, the second length, and the duration value for analysis.

Patent Agency Ranking