Computer Program Modification Detection By Cryptography Patents (Class 713/187)
-
Patent number: 9009818Abstract: A system and method for detecting malware in compressed data. The system and method identifies a set of search strings extracted from compressed executables, each of which is infected with malware from a family of malware. The search strings detect the presence of the family of malware in other compressed executables, fragments of compressed executables, or data streams.Type: GrantFiled: April 6, 2007Date of Patent: April 14, 2015Assignee: Pulse Secure, LLCInventors: George Tuvell, Deepak Venugopal
-
Patent number: 9003519Abstract: The present disclosure relates to verifying transactions using user devices. A client device used to complete a transaction with a server computer. The client device communicates with a user device such as a smart phone, laptop computer, or other computing device. The user device communicates with the client device and a verification server via the out-of-band communication channel. The verification server receives two or more copies of session data associated with the transaction occurring between the client device and the server computer. One copy of the session data is received from the server computer and another copy of the session data is provided by the user device. The two copies of the session data are compared by the verification server or by the user device, and mismatches are reported as suspected malicious software attacks.Type: GrantFiled: May 16, 2011Date of Patent: April 7, 2015Assignee: AT&T Intellectual Property I, L.P.Inventors: Ilija Zeljkovic, Juan Garay
-
Patent number: 9003534Abstract: Aspect of the invention are directed to antivirus scanning, by a proxy server, of data downloaded from the network onto a PC workstation. The antivirus scanning is optimized for each scan by selecting an algorithm for that scan based on a determined overall likelihood that the downloaded data contains malicious code. Determination of the overall likelihood is augmented by the strength, or confidence, of statistical data relating to malware screening of results of previous downloads having similar parameters to the instant download.Type: GrantFiled: March 31, 2011Date of Patent: April 7, 2015Assignee: Kaspersky Lab ZAOInventors: Sergey A. Zubrilin, Alexander A. Stroykov, Sergey A. Vasilyev
-
Patent number: 9003537Abstract: An automated system for automatic update of a Common Vulnerability Scoring System (CVSS) score, the system including vulnerability information analyzing functionality to analyze preexisting vulnerability information, the preexisting vulnerability information relating to at least one of at least one vulnerability and at least one attack vector thereof, the at least one vulnerability having a preexisting CVSS score, the preexisting CVSS score being based at least partially on the preexisting vulnerability information, vulnerability information extraction functionality, responsive to the analyzing preexisting vulnerability information, to extract new vulnerability information, the new vulnerability information relating to the at least one of the at least one vulnerability and the at least one attack vector thereof, and CVSS score updating functionality to employ the new vulnerability information to update the preexisting CVSS score.Type: GrantFiled: January 31, 2013Date of Patent: April 7, 2015Assignee: Hewlett-Packard Development Company, L.P.Inventors: Barak Raz, Ben Feher
-
Patent number: 9003525Abstract: Approaches for limiting exploitable or potentially exploitable sub-components in software components are disclosed. In certain implementations, a first software component in the component creation environment may be identified. The first software component may include a first sub-component that provides a function that is exploitable or potentially exploitable to compromise the first software component. The first sub-component may be disabled such that the function provided by the first sub-component is not available via the first software component when the first software component is executed. The first software component may be placed in the component repository after the first sub-component is disabled such that the first software component is placed in the component repository without availability of the function provided by the first sub-component. In some implementations, disabling the first sub-component may comprise removing the first sub-component from the first software component.Type: GrantFiled: August 25, 2014Date of Patent: April 7, 2015Assignee: Luminal, Inc.Inventors: Josha Stella, Dominic Zippilli, Matthew Brinkman
-
Patent number: 9003198Abstract: A method for processing an operating sequence of instructions of a program in a processor, wherein each instruction is represented by an assigned instruction code which comprises one execution step to be processed by the processor or a plurality of execution steps to be processed successively by the processor, includes determining an actual signature value assigned to a current execution step of the execution steps of the instruction code representing the instruction of the operating sequence; determining, in a manner dependent on an address value, a desired signature value assigned to the current execution step; and if the actual signature value does not correspond to the desired signature value, omitting at least one execution step directly available for execution and/or an execution step indirectly available for execution.Type: GrantFiled: May 22, 2013Date of Patent: April 7, 2015Assignee: Infineon Technologies AGInventors: Berndt Gammel, Stefan Mangard
-
Patent number: 9003197Abstract: A method, device and system for authenticating a programmable hardware device, such as a programmable hardware chip, and a command received by the programmable hardware device. A secure processor or other trusted source authenticates the programmable hardware chip by verifying, with the secure processor's own verification key, a random number sent to the programmable hardware chip and encrypted using a verification key embedded within the programmable hardware chip, since the nature of the encryption is such that only the original logic function that includes the verification key can encrypt the data correctly. A command received by the programmable hardware chip is authenticated by verifying that a command authentication token received by the programmable hardware chip is generated using the correct command authentication key and consequently verifying that the command is received from the secure processor, as only the party who has the command authentication key can encrypt the data correctly.Type: GrantFiled: March 27, 2008Date of Patent: April 7, 2015Assignee: General Instrument CorporationInventors: Jiang Zhang, Peter Chen, Alexander Medvinsky
-
Patent number: 8997244Abstract: An automatic software audit system includes a client and a server. The client includes a network interface, a software installation record database, a software audit rule database, a software release database and a central processing unit (CPU). The network interface is coupled to the client. The software installation record databases stores a software installation record of the client. The software audit rule database stores a software audit rule. The software release database stores a software release record of the client. The CPU installs an agent program to the client to collect the software installation record, and generates a software audit result of the client according to the software installation record, the software audio rule and the software release record.Type: GrantFiled: January 11, 2013Date of Patent: March 31, 2015Assignee: Quanta Computer Inc.Inventors: Tien-Chin Fang, Chen-Chung Lee, Ping-Chi Lai, Chia-Hung Lin, Cheng-Yao Wang, His-Chieh Hsu, Mei-Jung Wang, Hung-Yu Yang, Wei-Chi Tai
-
Patent number: 8996854Abstract: The method is for downloading applications takes place in a network that has a server, a mobile terminal, a trusted operator and preferably, a personal computer. In the method a user selects an application to be downloaded at his computer or mobile terminal. The user then sends a request to the server for downloading the selected application to the mobile terminal. The server sends a message to the mobile terminal with instructions for downloading of the application. This message is sent via a trusted operator in order to ensure a secure downloading. Thereafter, the application is downloaded to the mobile terminal.Type: GrantFiled: February 16, 2004Date of Patent: March 31, 2015Assignee: Giesecke & Devrient GmbHInventor: Antti Hamalainen
-
Patent number: 8990945Abstract: Detecting a malicious advertisement is disclosed. An advertisement is analyzed. A determination that the advertisement is associated with malicious activity is made. An indication that the advertisement is malicious is provided as output. The indication can be provided as a report, such as to a publisher and can also be provided using an API, such as to the entity responsible for serving the advertisement.Type: GrantFiled: May 28, 2013Date of Patent: March 24, 2015Assignee: Dasient, Inc.Inventors: Ameet Ranadive, Shariq Rizvi, Neilkumar Murli Daswani
-
Patent number: 8990939Abstract: A system is described for scheduling the processing of items of suspicious network content to determine whether these items contain malicious network content. The system features a memory and an analyzer that may comprise a processor-based digital device in which at least one virtual machine (VM) and a scheduler operates. The scheduler is configured to generate an order of processing of a plurality of items of network content by the processor based on a plurality of probability scores, each corresponding to an item of network content. The analyzer is configured to process the items of network content in at least the virtual machine by replaying these items in accordance with the order of processing. The virtual machine is configured with a software profile corresponding to each of the processed items and being adapted to monitor behavior of each of the items during processing, thereby to detect malicious network content.Type: GrantFiled: June 24, 2013Date of Patent: March 24, 2015Assignee: FireEye, Inc.Inventors: Stuart Gresley Staniford, Ashar Aziz
-
Patent number: 8984296Abstract: A method for device driver self authentication is provided. The method includes accessing a device driver having encrypted authentication parameters therein including, for instance, a vendor identification, a device identification, a serial number, an expiration date and a filename. The method includes executing an authentication portion of the device driver to generate a message digest of these parameters and comparing the message digest to a stored digest for a match thereof. The method further includes loading the device driver only if the authentication portion successfully authenticates the device driver, e.g., there is a match. The method can be applied to USB device drivers and peripherals.Type: GrantFiled: March 29, 2009Date of Patent: March 17, 2015Assignee: Cypress Semiconductor CorporationInventor: David W. Young
-
Patent number: 8984628Abstract: A system and method identifies mobile applications that can have an adverse effect on a mobile device or mobile network. In an implementation, a server monitors behavioral data relating to a mobile application and applies a model to determine if the application has an adverse effect or has the potential to cause an adverse effect on a mobile device or a network the mobile device may connect to. A mobile device may monitor behavioral data, apply a model to the data, and transmit a disposition to the server. The server may aggregate behavioral data or disposition information from multiple devices. The server may transmit or make available the disposition information to a subscriber through a web interface, API, email, or other mechanism. After identifying that an application may have an adverse effect, the server may enact corrective actions, such as generating device or network configuration data.Type: GrantFiled: February 23, 2011Date of Patent: March 17, 2015Assignee: Lookout, Inc.Inventors: Kevin Patrick Mahaffey, David Golombek, David Luke Richardson, Timothy Micheal Wyatt, James David Burgess, John G. Hering
-
Patent number: 8984634Abstract: A quarantine network system 100 quarantines terminals 30 and 31 connected to a network via a wireless communication. The quarantine network system 100 is provided with an access point 20 for a business NW used for connection to a business network, an access point 21 for a quarantine NW which is used for connection to a network for quarantining and restricts the number of terminals connectable thereto, and an NW switching performance server 10 transmitting to the terminal a command which makes the terminal switch SSID of an access point which the terminal uses for wireless communication, in accordance with the situation.Type: GrantFiled: September 14, 2012Date of Patent: March 17, 2015Assignee: NEC CorporationInventor: Yoshikazu Takahashi
-
Patent number: 8984632Abstract: A computer-implemented method for identifying malware is described. Event data is received from a mobile device. The event data including events performed on the mobile device and a list of one or more applications. The list of the one or more applications is compared with at least one additional list of applications received from at least one additional mobile device. An application in common across the lists of applications is identified. The identification of the application in common to is transmitted to the mobile device.Type: GrantFiled: September 14, 2012Date of Patent: March 17, 2015Assignee: Symantec CorporationInventors: Barry Laffoon, Abubakar Wawda, Jun Mao, Bruce McCorkendale
-
Patent number: 8984297Abstract: A routing protocol is used to transmit messages from a sender to a receiver over a network of nodes, where adversaries can control links between the nodes and can also control the behavior of a large number of nodes. Various techniques can be used, along or in combination, to combat these effects. In one approach, certain trigger conditions are identified, the occurrence of which signals malicious behavior within the network. When signaled, the sender requests status reports from the intermediate nodes in an effort to determine which nodes are malicious. The information for the status reports is generated by nodes as packets are passed from one node to the next.Type: GrantFiled: March 13, 2009Date of Patent: March 17, 2015Assignees: The Regents of the University of Calfiornia, The Johns Hopkins UniversityInventors: Yair Amir, Paul Bunn, Rafail Ostrovsky
-
Information processing apparatus, secure module, information processing method, and computer product
Patent number: 8984272Abstract: An information processing apparatus securely stores a program group comprising one or more programs and includes a first detector that detects an execution waiting state of a given program among the program group; a secure module that is configured such that information stored therein cannot be referred to by an external device, and when the execution waiting state is detected by the first detector, that encrypts the given program and writes the encrypted given program to a storage area that is different from that of the program group; a second detector that detects an execution request concerning the given program; a decrypter that decrypts the given program encrypted by the secure module and writes the decrypted given program to the storage area, when the execution request concerning the given program is detected by the second detector; and a program executor that executes the given program decrypted by the decrypter.Type: GrantFiled: March 29, 2012Date of Patent: March 17, 2015Assignees: Fujitsu Limited, Fujitsu Semiconductor LimitedInventors: Kiyoshi Kohiyama, Masakazu Takakusu, Kenichi Wakasugi -
Publication number: 20150074419Abstract: Embodiments of apparatuses, articles, methods, and systems for secure vault service for software components within an execution environment are generally described herein. An embodiment includes the ability for a Virtual Machine Monitor, Operating System Monitor, or other underlying platform capability to restrict memory regions for access only by specifically authenticated, authorized and verified software components, even when part of an otherwise compromised operating system environment. The underlying platform to lock and unlock secrets on behalf of the authenticated/authorized/verified software component provided in protected memory regions only accessible to the authenticated/authorized/verified software component. Other embodiments may be described and claimed.Type: ApplicationFiled: July 3, 2014Publication date: March 12, 2015Applicant: Intel CorporationInventors: David M. Durham, Hormuzd M. Khosravi, Uri Blumenthal, Men Long
-
Publication number: 20150074420Abstract: An embedded system includes a nonvolatile memory, a control section, and a firmware update section. The nonvolatile memory stores firmware and a public key in a normal area, and stores a hash value concerning the public key in an access restricted area. The control section reads and executes the firmware from the nonvolatile memory. The firmware update section receives new firmware in which the hash value is encrypted and given as an electronic signature, and updates the firmware to the new firmware. The firmware update section is configured to: read the public key from the nonvolatile memory to calculate the hash value concerning the public key; when the hash value is identical to the hash value stored in the nonvolatile memory, calculate a hash value of the new firmware; decrypt the electronic signature with the public key to restore the hash value; and when these hash values are identical to each other, update the firmware.Type: ApplicationFiled: September 8, 2014Publication date: March 12, 2015Inventor: Masaki Sone
-
Patent number: 8976943Abstract: Provided is a method and a telephone-based system with voice-verification capabilities that enable a user to safely and securely conduct transactions with his or her online financial transaction program account over the phone in a convenient and user-friendly fashion, without having to depend on an internet connection.Type: GrantFiled: September 25, 2012Date of Patent: March 10, 2015Assignee: Ebay Inc.Inventor: Will Tonini
-
Patent number: 8977756Abstract: Greater network utilization is implemented through dynamic network reconfiguration and allocation of network services and resources based on the data to be transferred and the consumer transferring it. A hierarchical system is utilized whereby requests from lower layers are aggregated before being provided to upper layers, and allocations received from upper layers are distributed to lower layers. To maximize network utilization, paths through the network are reconfigured by identifying specific types of packets that are to be flagged in a specific manner, and then by further identifying specific routing rules to be applied in the transmission of such packets. Network reconfiguration is performed on an incremental basis to avoid overloading a path, and capacity can be reserved along one or more paths to prevent such overloading. Background data is agnostic as to specific transmission times and is utilized to prevent overloading due to reconfiguration.Type: GrantFiled: January 10, 2013Date of Patent: March 10, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Vijay Gill, Chi-Yao Hong, Srikanth Kandula, Ratul Mahajan, Mohan Nanduri, Roger Peter Wattenhofer, Ming Zhang
-
Patent number: 8977862Abstract: Before an application is allowed to execute a secure function, code signing keys associated with the application are analyzed for correspondence with the class that contains the secure function as well as correspondence with the secure function. Optionally, code signing keys associated with the application are analyzed for correspondence with the input parameters to the function.Type: GrantFiled: September 14, 2012Date of Patent: March 10, 2015Assignee: BlackBerry LimitedInventors: David MacFarlane, Michael K. Brown
-
Patent number: 8972591Abstract: A method for downloading software from a host device to an electronic device through a communication line, which, even when the download is interrupted, can simplify the procedure to restart the download while maintaining security. In the method, a certificate of authenticity data, which the card reader has obtained from the HOST computer, is stored in the non volatile memory. The download of the software from the HOST computer to the card reader is executed. The verification of authenticity data is obtained by calculation with respect to the downloaded software. This verification of authenticity data is then compared with the certificate of authenticity data obtained from the HOST computer, and the downloaded software is run when the certificate of authenticity data matches the verification of authenticity data.Type: GrantFiled: January 11, 2011Date of Patent: March 3, 2015Assignee: Nidec Sankyo CorporationInventor: Tsutomu Baba
-
Patent number: 8972737Abstract: A data processing device for playing back a digital work reduces the processing load involved in verification by using only a predetermined number of encrypted units selected randomly from multiple encrypted units constituting encrypted contents recorded on a DVD. In addition, the data processing device improves the accuracy of detecting unauthorized contents by randomly selecting a predetermined number of encrypted units every time the verification is performed.Type: GrantFiled: January 15, 2014Date of Patent: March 3, 2015Assignee: Panasonic Intellectual Property Management Co., Ltd.Inventors: Masao Nonaka, Yuichi Futa, Toshihisa Nakano, Kaoru Yokota, Motoji Ohmori, Masaya Miyazaki, Masaya Yamamoto, Kaoru Murase, Senichi Onoda
-
Patent number: 8966620Abstract: Campaign detection techniques are described. In implementations, a signature is computed for each of a plurality of emails to be communicated by a service provider to respective intended recipients. A determination is made that two or more of the plurality of emails is similar based on the respective signatures. Responsive to a finding that a number of similar emails exceeds a threshold, an indication is output that the similar emails have a likelihood of being involved in a spam campaign.Type: GrantFiled: May 27, 2010Date of Patent: February 24, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Douglas J. Hines, Mihai Costea, Yuxiang Xu, Harsh S. Dangayach, Krishna Vitaldevara, Eliot C. Gillum, Jason D. Walter, Aleksander R. Kolcz
-
Patent number: 8966278Abstract: Systems and methods enabling parallel processing of hash functions are provided. A data string including a plurality of pieces arranged in an order is hashed using a hash function to determine a plurality of authentication checkpoint hashes associated with the pieces. To authenticate the data string, the pieces are grouped into sets, and the authentication checkpoint hash associated with the piece following all other pieces of that set in the order is associated with that set. The system simultaneously performs a separate hash process on each set. That is, the system hashes the pieces of that set using the hash function to determine a result hash, and compares that result hash with the authentication checkpoint hash associated with that set. The initial input to the hash function for the hash process for each set includes one of the pieces and either a default seed or an authentication checkpoint hash.Type: GrantFiled: December 24, 2013Date of Patent: February 24, 2015Assignee: IGTInventor: Bryan D. Wolf
-
Patent number: 8966646Abstract: A method of managing a software license comprises loading a software program into volatile memory, obtaining authorization data, modifying a portion of the volatile memory relied upon by the program in accordance with the authorization data, executing the program, and causing the modifications to be deleted from the volatile memory. In some embodiments, selection criteria compared with the authorization data does not contain information corresponding to all of the content of the authorization data, thereby denying a software attacker the benefit of identifying and exploiting the selection criteria.Type: GrantFiled: December 24, 2012Date of Patent: February 24, 2015Inventor: Kelce S. Wilson
-
Patent number: 8966631Abstract: A malicious behavior detector (100) for detecting malicious behavior on a network, comprises a processor unit (120) and associated system memory (130) containing computer program code. The computer program code provides a signature matching module (132) to perform malicious partial signature detection by reading the contents of packets of data passing through the network to look for partial signatures associated with malicious programs; a Domain Name Service, DNS, request and/or response detection module (134) to monitor the requests made by hosts connected to the network and/or responses thereto; and an evidence assessment module (138) to analyze the results of the partial signature detection and the DNS monitoring make a determination of the suspected presence of malicious behavior on the network based upon the analysis of the results of both the partial signature detection and the DNS monitoring.Type: GrantFiled: February 23, 2010Date of Patent: February 24, 2015Assignee: British Telecommunications PLCInventor: Fadi El-Moussa
-
Patent number: 8966638Abstract: A system, method, and computer program product are provided for selecting a wireless network based on security information. In use, a plurality of wireless networks is identified. Further, security information associated with each of the wireless networks is collected, such that one of the wireless networks is selected based on the security information.Type: GrantFiled: August 23, 2013Date of Patent: February 24, 2015Assignee: McAfee, Inc.Inventor: Sankha S. Dey
-
Patent number: 8966644Abstract: An information storing device includes a storage section configured to store revocation information that is a list of an identifier of an unauthorized device, and a data processor configured to execute determination processing of unauthorized equipment in accordance with the revocation information. The data processor extracts version information enabling identification of the issue order of the revocation information from the revocation information and transmits the extracted version information to a communication counterpart device. If the data processor receives the revocation information of a new version of the issue order held by the communication counterpart device from the communication counterpart device, the data processor executes revocation information synchronization processing of substituting the received revocation information of the new version for the revocation information of an old version stored in the storage section to store the revocation information of the new version.Type: GrantFiled: August 13, 2012Date of Patent: February 24, 2015Assignee: Sony CorporationInventors: Takamichi Hayashi, Hiroshi Kuno
-
Patent number: 8959643Abstract: A method for detecting a malicious activity in a network. The method includes obtaining file download flows from the network, analyzing, the file download flows to generate malicious indications using a pre-determined malicious behavior detection algorithm, extracting a file download attribute from a suspicious file download flow of a malicious indication, wherein the file download attribute represents one or more of the URL, the FQDN, the top-level domain name, the URL path, the URL file name, and the payload of the suspicious file download flow, determining the file download attribute as being shared by at least two suspicious file download flows, identifying related suspicious file download flows and determining a level of association between based at least on the file download attribute, computing a malicious score of the suspicious file download flow based on the level of association, and presenting the malicious score to an analyst user of the network.Type: GrantFiled: August 9, 2013Date of Patent: February 17, 2015Assignee: Narus, Inc.Inventors: Luca Invernizzi, Stanislav Miskovic, Ruben Torres, Sabyasachi Saha, Christopher Kruegel, Antonio Nucci, Sung-Ju Lee, Giovanni Vigna
-
Patent number: 8959362Abstract: A system includes a controller configured to control a process, and store at least one binary file, wherein the at least one binary files is generated from at least one source file, wherein the at least one source file comprises instructions configured to be executed by a processor in the controller. The controller may also be configured to retrieve a whitelist file comprising a first hash key value derived from the at least one binary file, and execute an executable file based on the whitelist file, wherein the executable file comprises the source file.Type: GrantFiled: April 30, 2012Date of Patent: February 17, 2015Assignee: General Electric CompanyInventors: William Robert Pettigrew, Justin Brandon Chong, Manas Ranjan Sahoo
-
Patent number: 8959640Abstract: The present invention relates to a method of controlling the download of anti-virus software updates to a device. The device is configured to transmit an update query to a network device requesting information on whether any updates are available for the anti-virus software. When the device receives the response it stores the response in the cache. The cache can then be queried following a trigger and, if the cache indicates an update to the anti-virus software is available the device downloads an update to the anti-virus software. In an alternative embodiment the device may download and install an update upon receiving the response to the query if the response to the query indicates that an update is available. The query may be transmitted during a scan or upon determining a change in a connection at a device.Type: GrantFiled: March 29, 2012Date of Patent: February 17, 2015Assignee: F-Secure CorporationInventors: Paolo Palumbo, Andrew Patel
-
Patent number: 8959641Abstract: A method of foiling a document exploit type attack on a computer, where the attack attempts to extract malware code from within a document stored on the computer. The method includes monitoring the computer in order to detect repeated function calls made by a given process in respect of the same function but different file descriptors; and in the event that such repeated function calls are detected or the number of such repeated function calls exceeds some threshold, terminating the process that initiated the function calls.Type: GrantFiled: May 15, 2013Date of Patent: February 17, 2015Assignee: F-Secure CorporationInventor: Timo Hirvonen
-
Patent number: 8958554Abstract: A process and system for enciphering and deciphering Unicode characters that is compatible with scripting languages such as JAVASCRIPT®, JSCRIPT® and VBSCRIPT®. The process and system can encipher each character individually and maintain the size of the character. The enciphered character is deciphered at the application layer at the client to provide endpoint security.Type: GrantFiled: November 30, 2009Date of Patent: February 17, 2015Assignee: Red Hat, Inc.Inventor: James Paul Schneider
-
Patent number: 8959327Abstract: A security processor may be embedded within a digital cable ready (DCR) digital TV (DTV) system-on-chip to performing content protection operations during digital TV signal processing. The embedded security processor may be used to perform operations that are currently performed by an external entity, such as, for an example, a CableCard. The embedded security processor maybe configured to use a conditional access function including, but not limited to, CableLabs® Downloadable Conditional Access System (DCAS) based function. The security processor may be reprogrammable to enable the system-on-chip to be reconfigured with a different function and/or to allow operation with a new cable service provider. The security processor may enable secure reprogrammability of the system-on-chip utilizing security algorithms and/or other mechanisms including use of chip-specific identification information. The SoC may be enabled to operate with a CableCard whenever the security processor may be disabled.Type: GrantFiled: April 27, 2007Date of Patent: February 17, 2015Inventor: Xuemin Chen
-
Patent number: 8959626Abstract: A method and apparatus for detecting a suspicious entity in a communication network. A receiving device receives a message from a sender. A processor obtains domain information or a user identity, and further contact information from data contained in the message. A reputation query message is sent to a Network Reputation Server (NRS), the reputation query message including the domain information or user identity. A reply is received from the NRS that indicates that the domain information or user identity is related to a suspicious entity. The receiving device then associates the contact information with the suspicious entity. In this way, if a user of the receiving device attempts to use the contact information, they can be prevented from doing this or informed that it relates to a suspicious entity.Type: GrantFiled: December 14, 2010Date of Patent: February 17, 2015Assignee: F-Secure CorporationInventor: Jarno Niemelä
-
Publication number: 20150046717Abstract: A semiconductor apparatus of an embodiment is provided with: a NAND memory configured to store a startup program; a ROM configured to store firmware activating the startup program; an OTP memory configured to store a hash value of the startup program; and a CPU configured to perform falsification detection of the startup program by comparing the hash value stored in the OTP memory and a hash value calculated from the startup program stored in the NAND memory, to execute the startup program if falsification is not detected, and to stop a startup process if falsification is detected.Type: ApplicationFiled: February 28, 2014Publication date: February 12, 2015Applicant: KABUSHIKI KAISHA TOSHIBAInventors: Masayuki Hagiwara, Takeshi Obara
-
Patent number: 8955125Abstract: A mechanism is provided for identifying a snooping device in a network environment. A snoop echo response extractor generates an echo request packet with a bogus MAC address that will only be received by a snooping device. The snoop echo response extractor also uses an IP address that will cause the snooping device to respond to the echo request.Type: GrantFiled: November 29, 2011Date of Patent: February 10, 2015Assignee: International Business Machines CorporationInventors: Tristan Anthony Brown, Shawn Patrick Mullen, Venkat Vankatsubra
-
Patent number: 8955104Abstract: A host system integrity monitor for monitoring memory, operating systems, applications, domain manager, and other host system's structures of interest is isolated and independent of the CPU and operating system of commodity systems. The system requires no modifications to the protected (monitored) host's software, and operates correctly even when the host system is compromised. Either arranged as a stand-alone computer on the add-in card which communicates with the monitored host system through the PCI bus, or as the co-processor based monitor located on the motherboard of the host system, or residing on one of the virtual CPU while the monitored system resides on another virtual CPU, or residing within the domain manager of the host system, the monitor monitors the integrity of the examined structure by calculating hash values of the structure, comparing them with expected hash values, and sending error reports once the discrepancy between these values is detected.Type: GrantFiled: July 6, 2005Date of Patent: February 10, 2015Assignee: University of Maryland College ParkInventors: William A. Arbaugh, Nick Louis Petroni, Jr., Timothy Jon Fraser, Jesus Maria Molina-Terriza
-
Patent number: 8955134Abstract: A malware analysis system for automating cause and effect analysis of malware infections is provided. The malware analysis system monitors and records computer system activities. Upon being informed of a suspected malware infection, the malware analysis system creates a time-bounded snapshot of the monitored activities that were conducted within a time frame prior to the notification of the suspected malware infection. The malware analysis system may also create a time-bounded snapshot of the monitored activities that are conducted within a time frame subsequent to the notification of the suspected malware infection. The malware analysis system provides the created snapshot or snapshots for further analysis.Type: GrantFiled: February 8, 2012Date of Patent: February 10, 2015Assignee: Microsoft CorporationInventors: Gregory D. Hartrell, David J. Steeves, Efim Hudis
-
Patent number: 8955149Abstract: Disclosed are various embodiments for granting permission to another user on a computer network to impersonate himself or herself on the network for duration of a specified period. One embodiment of such a method describes receiving instructions from a second user to grant impersonation permission to a first user to have access to user data of the second user; establishing an access policy authorizing access to the user data of the second user; and assigning the access policy to the first user.Type: GrantFiled: December 6, 2011Date of Patent: February 10, 2015Assignee: Amazon Technologies, Inc.Inventors: Graeme D. Baer, Gregory B. Roth, Eric J. Brandwine
-
Patent number: 8955121Abstract: A system, method, and computer program product are provided for dynamically adjusting a level of security applied to a system. In use, predetermined activity that is at least potentially associated with unwanted activity is identified on a system. Further, a level of security applied to the system is dynamically adjusted, in response to the identification of the predetermined activity.Type: GrantFiled: December 5, 2013Date of Patent: February 10, 2015Assignee: McAfee, Inc.Inventor: Gregory W. Dalcher
-
Patent number: 8955118Abstract: A computer implemented method, apparatus, and program code for detecting malicious software components. A series of calls made by a software component is monitored to identify an identified respective series of call types to components named in said calls. A determination is made as to whether the identified respective series of call types to components named in said calls is indicative of malicious behavior.Type: GrantFiled: March 13, 2013Date of Patent: February 10, 2015Assignee: Palo Alto Networks, Inc.Inventor: Douglas North Franklin
-
Patent number: 8955135Abstract: A malware analysis system for automating cause and effect analysis of malware infections is provided. The malware analysis system monitors and records computer system activities. Upon being informed of a suspected malware infection, the malware analysis system creates a time-bounded snapshot of the monitored activities that were conducted within a time frame prior to the notification of the suspected malware infection. The malware analysis system may also create a time-bounded snapshot of the monitored activities that are conducted within a time frame subsequent to the notification of the suspected malware infection. The malware analysis system provides the created snapshot or snapshots for further analysis.Type: GrantFiled: February 8, 2012Date of Patent: February 10, 2015Assignee: Microsoft CorporationInventors: Gregory D. Hartrell, David J. Steeves, Efim Hudis
-
Publication number: 20150039900Abstract: A method for program execution in a system including a decryption apparatus that prevents external referencing and an information processing apparatus communicating therewith and accessing first and third storage areas, includes: the decryption apparatus detecting a series of commands from a command group obtained by decrypting at least a portion of a program stored in the first storage area; obfuscating and storing the series of commands to a second storage area storing the decrypted portion and within the first storage area; assigning, when an execution request is received from the information processing apparatus, the third storage area having a capacity equivalent to any one series of commands; and storing to the third storage area, a series of certain commands stored in the second area and obtained by canceling obfuscation of the commands that correspond to the execution request; and the information processing unit executing the series of certain commands.Type: ApplicationFiled: June 30, 2014Publication date: February 5, 2015Inventor: Tatsuro KAWAKAMI
-
Patent number: 8949994Abstract: A method, including storing a test payload to a persistent state of an application and performing a static analysis to identify a first code location in the application that retrieves the test payload, to identify a first path from an entry point to the first code location, and to identify a second path from the first code location to a second code location that executes a security sensitive operation using the retrieved data. A dynamic analysis is then performed to retrieve the test payload via the first path, and to convey the test payload to the second code location via the second path.Type: GrantFiled: March 15, 2012Date of Patent: February 3, 2015Assignee: International Business Machines CorporationInventors: Yair Amit, Omer Tripp
-
Patent number: 8949992Abstract: A method, including storing a test payload to a persistent state of an application and performing a static analysis to identify a first code location in the application that retrieves the test payload, to identify a first path from an entry point to the first code location, and to identify a second path from the first code location to a second code location that executes a security sensitive operation using the retrieved data. A dynamic analysis is then performed to retrieve the test payload via the first path, and to convey the test payload to the second code location via the second path.Type: GrantFiled: May 31, 2011Date of Patent: February 3, 2015Assignee: International Business Machines CorporationInventors: Yair Amit, Omer Tripp
-
Publication number: 20150033031Abstract: Embodiments of a system and method for detecting a security compromise on a device are described. Embodiments may be implemented by a content consumption application configured to protect content decryption keys on a device, such as a computer system (e.g., a desktop or notebook computer) or a mobile device (e.g., a smartphone or tablet). For instance, the content consumption application may be configured to provide decryption keys for respective content to a media component (or another component of the operating system) if multiple conditions have been met. For instance, in various embodiments, the content consumption application may pass the key to the media component after ensuring that i) one or more security mechanisms of the device operating system have not been compromised and ii) one or more executable instructions of the content consumption application have not been tampered (e.g., instructions corresponding to a function that handles the decryption key(s)).Type: ApplicationFiled: October 10, 2014Publication date: January 29, 2015Inventors: Viswanathan Swaminathan, Sheng Wei
-
Publication number: 20150033030Abstract: A method and an apparatus for establishing an operating environment by certifying a code image received from a host over a communication link are described. The code image may be digitally signed through a central authority server. Certification of the code image may be determined by a fingerprint embedded within a secure storage area such as a read only memory (ROM) of the portable device based on a public key certification process. A certified code image may be assigned a hash signature to be stored in a storage of the portable device. An operating environment of the portable device may be established after executing the certified code.Type: ApplicationFiled: August 5, 2014Publication date: January 29, 2015Inventors: Dallas Blake de ATLEY, Joshua de CESARE, Michael SMITH, Matthew REDA, Shantonu SEN, John Andrew WRIGHT