AcclaimIP-ad

Match Document Document Title
US20130191918 Identifying Trojanized Applications for Mobile Environments  
Trojanized apps for mobile environments are identified. Multiple apps for a specific mobile environment are obtained from one or more external sources. Code and digital signers are extracted from...
US20110283360 IDENTIFYING MALICIOUS QUERIES  
A framework identifies malicious queries contained in search logs to uncover relationships between the malicious queries and the potential attacks launched by attackers submitting the malicious...
US20140359773 INTRA STACK FRAME RANDOMIZATION FOR PROTECTING APPLICATIONS AGAINST CODE INJECTION ATTACK  
A method of randomizing locations of variables in a stack includes: identifying a plurality of stack locations corresponding to a plurality of variables; shuffling the stack locations of the...
US20110191851 COMPUTER AND METHOD FOR SAFE USAGE OF DOCUMENTS, EMAIL ATTACHMENTS AND OTHER CONTENT THAT MAY CONTAIN VIRUS, SPY-WARD, OR MALICIOUS CODE  
System, method, computer, and computer program and computer program product for safe usage of potentially malicious code and documents or other content to may contain malicious code. System and...
US20110179490 Apparatus and Method for Detecting a Code Injection Attack  
A code injection attack detecting apparatus and method are provided. The code injection attack may be detected based on characteristics occurring when a malicious code injected by the code...
US20120290848 Emulating Mixed-Code Programs Using a Virtual Machine Instance  
The subject disclosure is directed towards a technology for efficiently emulating program code that is protected by one or more various code virtualization techniques to detect the presence of...
US20140223566 SYSTEM AND METHOD FOR AUTOMATIC GENERATION OF HEURISTIC ALGORITHMS FOR MALICIOUS OBJECT IDENTIFICATION  
A server-based system for generation of heuristic scripts for malware detection includes an automatic heuristics generation system for generating heuristic scripts for curing malware infections; a...
US20130247198 Emulator updating system and method  
One embodiment includes a method and computer program product for distributing and/or receiving a first emulator extension with respect to an emulator capable of performing an emulation using...
US20110307956 SYSTEM AND METHOD FOR ANALYZING MALICIOUS CODE USING A STATIC ANALYZER  
Analyzing computer code using a tree is described. For example, a client device generates a data request for retrieving data from a non-trusted entity via a network. A gateway is communicatively...
US20150101010 MALICIOUS CODE INFECTION CAUSE-AND-EFFECT ANALYSIS  
A malware analysis system for automating cause and effect analysis of malware infections is provided. The malware analysis system monitors and records computer system activities. Upon being...
US20120144490 MALICIOUS CODE INFECTION CAUSE-AND-EFFECT ANALYSIS  
A malware analysis system for automating cause and effect analysis of malware infections is provided. The malware analysis system monitors and records computer system activities. Upon being...
US20120137342 MALICIOUS CODE INFECTION CAUSE-AND-EFFECT ANALYSIS  
A malware analysis system for automating cause and effect analysis of malware infections is provided. The malware analysis system monitors and records computer system activities. Upon being...
US20150067861 DETECTING MALWARE USING REVISION CONTROL LOGS  
Methods, systems, computer-readable media, and apparatuses for detecting malware using revision control logs are presented. In some embodiments, a computing device may gather one or more revision...
US20120084865 False Alarm Detection For Malware Scanning  
A method of scanning files for malware on a computer system. The method includes receiving a file to be scanned in the system, and using at least one malware scanning engine to determine whether...
US20130145469 PREVENTING AND DETECTING PRINT-PROVIDER STARTUP MALWARE  
A method for preventing malware attacks includes detecting an attempt on an electronic device to modify a print service registry, determining an entity associated with the attempt to modify the...
US20120317645 THREAT LEVEL ASSESSMENT OF APPLICATIONS  
An application safety system is described herein that provides a scoring system of how dangerous an application is based on behavioral inspection of the application. Upon detecting installation of...
US20140189871 Identifying Code Signatures Using Metamorphic Code Generation  
The identification of semantically equivalent code is aided by leveraging multiple authorities to produce equivalent groups of instructions given an input group of instructions. Thus, such...
US20120151589 INTELLIGENT SYSTEM AND METHOD FOR MITIGATING CYBER ATTACKS IN CRITICAL SYSTEMS THROUGH CONTROLLING LATENCY OF MESSAGES IN A COMMUNICATIONS NETWORK  
A system and method are provided for controlling the latency of messages to enable a network of devices to detect and respond to potential malware. The system and method receiving a message at a...
US20140130167 SYSTEM AND METHOD FOR PERIODICALLY INSPECTING MALICIOUS CODE DISTRIBUTION AND LANDING SITES  
A system and method for periodically inspecting malicious code distribution and landing sites, which receives a malicious-suspected URL from a management server; collects a file which is created...
US20100306847 IDENTIFYING SECURITY PROPERTIES OF SYSTEMS FROM APPLICATION CRASH TRAFFIC  
Most machines in an organization's computer network connect to the Internet and create web traffic logs which allow analysis of HTTP traffic in a simple, centralized way. The web traffic logs may...
US20120131676 SECURITY MANAGEMENT METHOD IN VIRTUALIZED ENVIRONMENT, VIRTUAL SERVER MANAGEMENT SYSTEM, AND MANAGEMENT SERVER  
Disclosed are a security management method in a virtualized environment, virtual server management system, and management server capable of improving security in the virtualized environment. A...
US20140245445 Preventing Propagation Of Hardware Viruses In A Computing System  
Preventing propagation of hardware viruses in a computing system, including: determining, by a hardware virus detection module, whether an empty connector in the computing system is damaged,...
US20120272321 ANTIVIRUS COMPUTING SYSTEM  
An antivirus computing system includes: a storage device having an operating partition that has stored therein a to-be-scanned file, and a hidden partition that has stored therein a virus code;...
US20110296527 INTEGRATED FIREWALL, IPS, AND VIRUS SCANNER SYSTEM AND METHOD  
A system, method and computer program product are provided including a router and a security sub-system coupled to the router. Such security sub-system includes a plurality of virtual firewalls, a...
US20110010774 MULTIMEDIA PLAY APPARATUS AND METHOD  
Provided are a multimedia play apparatus and method. The multimedia play apparatus and method enable synchronization between an audio and a video through existing multimedia play time information,...
US20120005756 NETWORK SECURITY ARCHITECTURE  
A network security system is deployed between an internet backbone and intranets that belong to subscribing organizations. The system includes a scanning system that scans incoming electronic mail...
US20130318612 ROOTKIT MONITORING AGENT BUILT INTO AN OPERATING SYSTEM KERNEL  
An approach for detecting a kernel-level rootkit is presented. A changed entry in a System Service Descriptor Table (SSDT) or an Interrupt Descriptor Table (IDT) is detected. The changed entry...
US20120023585 Method and Systems for Computer Security  
A method for computer security, includes intercepting an incoming communication, placing the communication into a quarantine queue, selecting a communication from the quarantine queue, determining...
US20110083183 ANALYSIS OF SCRIPTS  
A method and system for analyzing scripts. A script is processed, which executes text blocks of code derived from the script and copied to an output file in a sequential order. The script is the...
US20150106938 EMAIL DELIVERY SYSTEM USING METADATA ON EMAILS TO MANAGE VIRTUAL STORAGE  
E-mail system which organizes e-mails into queues based on their locations and characterizes the e-mails. Metadata, indicative of the e-mail, is appended to the e-mail. The queues are organized...
US20110185429 METHOD AND SYSTEM FOR PROACTIVE DETECTION OF MALICIOUS SHARED LIBRARIES VIA A REMOTE REPUTATION SYSTEM  
A method for proactively detecting shared libraries suspected of association with malware includes the steps of determining one or more shared libraries loaded on an electronic device, determining...
US20130276121 SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR IDENTIFYING A FILE USED TO AUTOMATICALLY LAUNCH CONTENT AS UNWANTED  
A system, method, and computer program product are provided for identifying a file utilized to automatically launch content as unwanted. In one embodiment, a file is identified in response to a...
US20140090061 SYSTEM AND METHOD FOR AUTOMATED MACHINE-LEARNING, ZERO-DAY MALWARE DETECTION  
Improved systems and methods for automated machine-learning, zero-day malware detection. Embodiments include a method for improved zero-day malware detection that receives a set of training files...
US20150169874 METHOD, DEVICE, AND SYSTEM FOR IDENTIFYING SCRIPT VIRUS  
A method, a device and a system for identifying script virus are provided to improve identification rate of the script virus. The method includes: loading a script file runtime environment;...
US20130333042 STORAGE SYSTEM AND STORAGE SYSTEM MANAGEMENT METHOD  
The present invention removes a computer virus-infected benchmark file by re-creating the benchmark file referenced by a reference-source file. One or more clone files, which serve as reference...
US20100017880 Website content regulation  
A method of facilitating the scanning of web pages for suspect and/or malicious hyperlinks that includes receiving at a content hosting website, user generated content. A web page or web page...
US20090172816 DETECTING ROOTKITS OVER A STORAGE AREA NETWORK  
Embodiments of the invention improve the detection of malicious software applications, such as a rootkit, on hosts configured to access storage volumes over a storage area network (SAN). A rootkit...
US20090037496 Diagnostic Virtual Appliance  
A virtual appliance environment (VAE) consists of components residing on a computer BIOS ROM and also on a mass storage device. The VAE includes a virtual appliance (VA) for diagnosing...
US20130312098 NEGATIVE LIGHT-WEIGHT RULES  
A method for securing an electronic device includes, at a level below all of the operating systems of an electronic device, trapping a first attempt and second attempt to access sensitive system...
US20080134335 Storage system, virus infection spreading prevention method, and virus removal support method  
In order to provide a storage system, virus infection spreading prevention method, and virus removal support method capable of performing an operation to prevent spreading of a virus infection and...
US20140082732 System and Method for Bidirectional Trust Between Downloaded Applications and Mobile Devices Including a Secure Charger and Malware Scanner  
A system and method are described that will enable mobile smart devices, such as a cellular phones, PDAs, or iPads, smartphones, mobile payment systems, mobile healthcare systems, handheld law...
US20130239216 System and Method for Bidirectional Trust Between Downloaded Applications and Mobile Devices Including a Secure Charger and Malware Scanner  
A system and method are described that will enable mobile smart devices, such as a cellular phones, PDAs, or iPads, smartphones, mobile payment systems, mobile healthcare systems, handheld law...
US20130117854 System and Method for Bidirectional Trust Between Downloaded Applications and Mobile Devices Including a Secure Charger and Malware Scanner  
A system and method are described that will enable mobile smart devices, such as a cellular phones, PDAs, or iPads, smartphones, mobile payment systems, mobile healthcare systems, handheld law...
US20080027891 THREAT IDENTIFICATION  
A method, system, computer program product, and/or computer readable medium of instructions for identifying a malicious entity in a processing system, comprising determining an entity threat value...
US20110252468 METHOD AND SYSTEM FOR PROTECTING A COMPUTER AGAINTS MALICIOUS SOFTWARE  
A method of protecting a computer by having security software be set to clean mode where the clean mode acts as if files installed or modified before the clean date are safe and installed or...
US20150235026 MALWARE DROPPER DISCOVERY METHOD AND SYSTEM  
A process for finding potentially harmful malware dropper on an infected computer system includes the steps of a) identifying an executable file that is about to run, and b) providing a storage...
US20140109226 Kernel-Level Security Agent  
A kernel-level security agent is described herein. The kernel-level security agent is configured to observe events, filter the observed events using configurable filters, route the filtered events...
US20130333040 Kernel-Level Security Agent  
A kernel-level security agent is described herein. The kernel-level security agent is configured to observe events, filter the observed events using configurable filters, route the filtered events...
US20110055047 INTEGRATED IDENTITY AND FINANCIAL FRAUD PROTECTION AND PROXY SERVICES DELIVERY SYSTEM AND METHOD  
A system and method providing a collection of associated servers in a data center connected to the Internet. The servers, each being related to a service, deliver a client to a user, encapsulating...
US20120324579 CLOUD MALWARE FALSE POSITIVE RECOVERY  
Methods, systems, and computer program products are provided for recovering from false positives of malware detection. Malware signatures that are defective may be causing false positives during...