Match Document Document Title
US20150047031 SECURING EXECUTION OF CUSTOMER-SUPPLIED NETWORK PAGE GENERATION CODE  
Disclosed are various embodiments for securing execution of page generation code supplied by customers. The page generation code may be instrumented with code that facilitates monitoring of one or...
US20110099629 AUTHENTICATING A WEB PAGE WITH EMBEDDED JAVASCRIPT  
A method for detecting if a digital document (e.g. an HTML document) is changed by others than authenticated script code (e.g. JavaScript code) is presented. The method comprises loading the...
US20110219447 Identification of Unauthorized Code Running in an Operating System's Kernel  
Computer implemented methods, system and apparatus for managing execution of a running-page in a virtual machine include associating an execution trace code with the running page by a security...
US20140033304 METHOD AND APPARATUS FOR PREVENTING AN IDT-BASED SECURITY SANDBOX FROM CAUSING A KERNEL PANIC WHEN USING A CALL GATE  
A method and apparatus for preventing an IDT-based security sandbox from causing a kernel panic when using a call gate is disclosed. The method comprises receiving a request from an application to...
US20130205388 SELECTIVE RANDOMIZATION FOR NON-DETERMINISTICALLY COMPILED CODE  
A method and an apparatus for runtime compilation that generates non-deterministic and unpredictable code to protect against un-trusted code attacks are described. The runtime compilation may be...
US20140020046 SOURCE CODE ANALYSIS OF INTER-RELATED CODE BASES  
A method and system for analyzing source code is disclosed. A computer identifies a call in a first source code to an application programming interface in a second source code. Responsive to...
US20140283027 Auditing User Actions in Treatment Related Files  
The subject matter disclosed herein provides methods for monitoring treatment related files for the occurrence of audit events and logging these occurrences. In one aspect, there is provided a...
US20120227104 SYSTEMS AND METHODS FOR DETECTING EMAIL SPAM AND VARIANTS THEREOF  
The present disclosure provides systems and methods for detecting email spam and variants thereof. The systems and methods are configured to detect spam messages and variations thereof for...
US20140026214 Method of Securing Non-Native Code  
A method to secure a non-native application. The non-native application is processed to obtain an application stub to be triggered within a virtual machine. The processing of the non-native...
US20110283356 Security Monitoring  
Disclosed are systems, apparatus, methods, and computer readable media for determining a combined trust level for a website. In one embodiment, a user account associated with the creation or...
US20150186648 SYSTEM AND METHOD FOR IDENTIFYING AND COMPARING CODE BY SEMANTIC ABSTRACTIONS  
Certain embodiments of the present invention are configured to facilitate analyzing computer code more efficiently. For example, by conducting a first level abstraction (e.g., symbolic...
US20150188933 DYNAMIC SELECTION OF NETWORK TRAFFIC FOR FILE EXTRACTION AND SHELLCODE DETECTION  
A method for network security includes, in a computer network that exchanges traffic among multiple network endpoints using one or more network switches, configuring at least one network switch to...
US20150089641 COMPUTER SYSTEM AND SIGNATURE VERIFICATION SERVER  
Disclosed are a computer system, a signature verification server, a method of supporting signature verification by a computer system, and a method of verifying signature. Embodiments of the...
US20140059680 LOCAL SECURE SERVICE PARTITIONS FOR OPERATING SYSTEM SECURITY  
Systems and methods provide multiple partitions hosted on an isolation technology such as a hypervisor where at least one of the partitions, a local secure service partition (LSSP), provides...
US20140359765 Method for Validating an Untrusted Native Code Module  
A system that validates a native code module. During operation, the system receives a native code module comprised of untrusted native program code. The system validates the native code module by:...
US20140090065 Method and Apparatus for Paralleling and Distributing Static Source Code Security Analysis Using Loose Synchronization  
A method of static source code analysis is provided. A forward search of source code is performed from each of a plurality of source nodes. A backward search of source code is performed from each...
US20110023117 Method and System for Restricting Access to User Resources  
A user's set top box (STB), or other client, executes a shell and has an application program interface (API) by which certain features of the client can be controlled. The client is in...
US20150067844 SYSTEM AND METHODOLOGY PROVIDING AUTOMATION SECURITY ANALYSIS, VALIDATION, AND LEARNING IN AN INDUSTRIAL CONTROLLER ENVIRONMENT  
The present invention relates to a system and methodology facilitating automation security in a networked-based industrial controller environment. Various components, systems and methodologies are...
US20110107419 SYSTEMS AND METHODS FOR IMPROVED IDENTIFICATION AND ANALYSIS OF THREATS TO A COMPUTING SYSTEM  
A security tool can access a tagging tool and the history generated by the tagging tool in order to identify potential threats and analyze the identified threats. When a potential threat is...
US20150150125 CORRELATION BASED SECURITY RISK IDENTIFICATION  
Methods and systems are disclosed for identifying security risks, arising from credentials existing on machines in the networks that enable access to other machines on the networks. Account...
US20140189871 Identifying Code Signatures Using Metamorphic Code Generation  
The identification of semantically equivalent code is aided by leveraging multiple authorities to produce equivalent groups of instructions given an input group of instructions. Thus, such...
US20140344926 SYSTEM AND METHOD EMPLOYING STRUCTURED INTELLIGENCE TO VERIFY AND CONTAIN THREATS AT ENDPOINTS  
A system and method to detect and contain threatening executable code by employing a threat monitor, verifier, endpoint agent, and a security information and event management module.
US20130305356 SYSTEM AND METHOD FOR DETERMINING A RISK ROOT CAUSE  
A system and method for determining a risk root cause are provided. A first and second fraud related risk scores respectively associated with a first and second nodes may be determined. A relation...
US20080077987 Anti-viral scanning in network attached storage  
In one embodiment a method comprises initiating, by a network attached storage device, a virus scan process on the network attached storage device, receiving, by the network attached storage...
US20140189863 Distributed Client Side User Monitoring and Attack System  
An embodiment invention provides a new way of creating a distributed client side user monitoring and attack system for use within the security market. In one embodiment of the invention, a...
US20150229655 SYSTEMS AND METHODS FOR INFORMING USERS ABOUT APPLICATIONS AVAILABLE FOR DOWNLOAD  
A computer-implemented method for informing users about applications available for download may include (1) identifying, through sharing functionality provided by an operating system, shared...
US20140143863 ENHANCED NETWORK SECURITY  
According to one embodiment, a system may receive a plurality of security threats and categorize each security threat in the plurality of security threats into security threat categories. The...
US20120297479 METHOD FOR EXECUTING AN APPLICATION  
A method for executing an application (A) which includes executable native or interpretable code and calls functions of an operating system (BS), whereby the operating system (BS) transmits a...
US20140189862 VIRTUAL MACHINE MONITOR (VMM) EXTENSION FOR TIME SHARED ACCELERATOR MANAGEMENT AND SIDE-CHANNEL VULNERABILITY PREVENTION  
Technologies are presented for automatically generating accelerator code for datacenter users, detecting multiple hardware tenants with overlapping accelerator needs, and managing the accelerator...
US20130291107 System and Method for Mitigating Application Layer Distributed Denial of Service Attacks Using Human Behavior Analysis  
A method of mitigating an application distributed denial of service (DDoS) attack on a network includes receiving at an application DDoS mitigation appliance application layer logs, parsing the...
US20100251363 MODIFIED FILE TRACKING ON VIRTUAL MACHINES  
In embodiments of the present invention improved capabilities are described for tracking modified files on a virtual machine including the steps of identifying an altered disk sector, associating...
US20140033307 SYSTEM AND METHOD TO PROVIDE AUTOMATIC CLASSIFICATION OF PHISHING SITES  
A phishing classification model that detects a phishing website based on one or more feature vectors for the website is provided. The phishing classification model may operate on a server and may...
US20130254880 SYSTEM AND METHOD FOR CROWDSOURCING OF MOBILE APPLICATION REPUTATIONS  
A system and method in one embodiment includes modules for obtaining a collection of attributes of a mobile application, comparing one or more of the attributes with crowdsourced data associated...
US20140283037 System and Method to Extract and Utilize Disassembly Features to Classify Software Intent  
A system and method operable to identify malicious software by extracting one or more features disassembled from software suspected to be malicious software and employing one or more of those...
US20130276104 System, method and computer program product for displaying security actions for undo purposes  
A security system, method and computer program product are provided. In use, a plurality of security actions is conducted. The plurality of security actions are further displayed to a user. In...
US20150026803 Native Code Module Security for Arm Instruction Set Architectures  
Some embodiments provide a system that executes a native code module. During operation, the system obtains the native code module. Next, the system loads the native code module into a secure...
US20140013430 Native Code Module Security for Arm Instruction Set Architectures  
Some embodiments provide a system that executes a native code module. During operation, the system obtains the native code module. Next, the system loads the native code module into a secure...
US20130067572 SECURITY EVENT MONITORING DEVICE, METHOD, AND PROGRAM  
The security event monitoring device includes: a storage module which stores in advance a correlation rule; a log collection unit which receives each log from each monitoring target device; a...
US20150074801 SECURITY VERIFICATION DEVICE AND A SECURITY VERIFICATION METHOD  
The present invention provides a security verification device and a security verification method which are capable of verifying that elements for implementing security measures necessary for a...
US20120210426 ANALYSIS SYSTEM FOR UNKNOWN APPLICATION LAYER PROTOCOLS  
An analysis system for unknown application layer protocols, which could automatically discover unknown applications existing in a network, and then obtain keywords, attribute values, status codes...
US20150242619 SECURITY MANAGEMENT SYSTEM  
The invention relates to a system for providing an automated security management framework for an enterprise based on the enterprise's operations, infrastructure, and user-based processes, as well...
US20120137362 COLLABORATIVE SECURITY SYSTEM FOR RESIDENTIAL USERS  
The invention relates to a collaborative system for security information exchange between users, based on the fact that a determined function (whether storing or processing) is spread out at...
US20100306826 METHODS AND SYSTEMS FOR IMPLEMENTING A SELF DEFENDING/REPAIRING DATABASE  
This disclosure describes, generally, methods and systems for self defending and repairing a database. The method includes monitoring, at a database server, code modifications to a database...
US20140068764 METHOD AND SYSTEM FOR PERFORMING SECURITY MONITORING ON FILE DOWNLOADING  
The present invention discloses method and system for performing security monitoring on file downloading, and a non-transitory computer-readable medium that stores instructions for performing...
US20140173726 METHODS AND SYSTEMS FOR PREVENTING UNAUTHORIZED ACQUISITION OF USER INFORMATION  
The embodiments provide methods and systems for detecting and preventing phishing of a user's information, such as their username and password. In one embodiment, a website detects as a threshold...
US20130291051 SYSTEM CALL INTERCEPTION  
System call interception is activated for an application process. It is recorded that system call interception is active for the application process. Ongoing checking is performed to determine...
US20110023115 HOST INTRUSION PREVENTION SYSTEM USING SOFTWARE AND USER BEHAVIOR ANALYSIS  
In embodiments of the present invention improved capabilities are described for threat detection using a behavioral-based host-intrusion prevention method and system for monitoring a user...
US20110167474 SYSTEMS AND METHODS FOR MOBILE APPLICATION SECURITY CLASSIFICATION AND ENFORCEMENT  
The present disclosure provides systems and methods for mobile application security classification and enforcement. In particular, the present invention includes a method, a mobile device, and a...
US20140380414 METHOD AND SYSTEM FOR APPLICATION-BASED POLICY MONITORING AND ENFORCEMENT ON A MOBILE DEVICE  
A method and system for application-based monitoring and enforcement of security, privacy, performance and/or other policies on a mobile device includes incorporating monitoring and policy...
US20130232573 METHOD AND SYSTEM FOR APPLICATION-BASED POLICY MONITORING AND ENFORCEMENT ON A MOBILE DEVICE  
A method and system for application-based monitoring and enforcement of security, privacy, performance and/or other policies on a mobile device includes incorporating monitoring and policy...