Match
|
Document |
Document Title |
|
US20120290848 |
Emulating Mixed-Code Programs Using a Virtual Machine Instance
The subject disclosure is directed towards a technology for efficiently emulating program code that is protected by one or more various code virtualization techniques to detect the presence of... |
|
US20110219238 |
Method and System for Detecting Malware Using a Remote Server
The present disclosure is directed to a method and system for detecting malware using a remote server. In accordance with a particular embodiment of the present disclosure a hash value for a file... |
|
US20060112281 |
Anti virus device
Anti virus device is an electric mechanical circuitry to protect the hard disks of computers from virus, hooked up to the hard disk, with electric mechanical selection for the hard disk protected... |
|
US20060015942 |
Systems and methods for classification of messaging entities
Methods and systems for operation upon one or more data processors for assigning a reputation to a messaging entity. A method can include receiving data that identifies one or more characteristics... |
|
US20050050334 |
Network traffic management by a virus/worm monitor in a distributed network
A network level virus monitoring system capable of monitoring a flow of network traffic in any of a number of inspection modes depending upon the particular needs of a system administrator. The... |
|
US20120159181 |
Virus Localization Using Cryptographic Hashing
Methods for using integrity checking techniques to identify and locate computer viruses are provided. A method for virus localization for each of three types of virus infections is provided,... |
|
US20100313035 |
Anti-virus trusted files database
A method and apparatus for populating a trusted files database for an anti-virus application. A determination is made from several files stored in a file system of a set of files likely to be... |
|
US20070079377 |
Virus scanning in a computer system
The present invention provides a method, data processing system and program product in which scanning for a virus is improved by prioritizing the scan of executable files, such as applications,... |
|
US20070044154 |
Mail reception system
There is provided a mail reception system in which a mail relay device is communicatably connected to a virus check device. In the system, the mail relay device comprises a data reception unit to... |
|
US20060230288 |
Source code classification method for malicious code detection
A classification mechanism within the source code management system for customizing malicious code searches. This classification mechanism is used to limit the number of searches that are... |
|
US20110004770 |
ENCRYPTION SYSTEM THAT PREVENTS ACTIVATION OF COMPUTER VIRUSES
System for preventing activation of computer viruses operates in such a way that all executable files must be kept separated from other files and encrypted when written to Hard Disk Drive or Solid... |
|
US20060095966 |
Method of detecting, comparing, blocking, and eliminating spam emails
A method of detecting, comparing, blocking, and eliminating spam emails sent through email servers of Internet service providers (ISPs) or to email users' email-boxes. The method includes the... |
|
US20070016955 |
Practical threat analysis
The following subject matter provides a computer-implemented method and system for calculation of cost-effectiveness of countermeasures in mitigating the threats on a system through calculating... |
|
US20070118759 |
Undesirable email determination
Included is a method for preventing spam dissemination. The method can include monitoring an Internet communication by a user, determining whether the monitored Internet communication includes a... |
|
US20050251862 |
Security arrangement, method and apparatus for repelling computer viruses and isolating data
A security system, method and apparatus for repelling computer viruses and isolating data. The security system includes sub-systems 1-3, which sub-system 1 includes an addition to anti-virus... |
|
US20060005043 |
Method of scanning computer virus within internet packet
Disclosed is a method of scanning computer virus within internet packets, where a TSR anti-virus program that is stay-resident in the internet equipment at user's site, which anti-virus program is... |
|
US20060277605 |
Displaying a security element to help detect spoofing
A security element is displayed that provides information to a user to help ensure that they are not confused or misled into believing that content originates from a trusted source when in fact it... |
|
US20070094735 |
METHOD TO CONSOLIDATE AND PRIORITIZE WEB APPLICATION VULNERABILITIES
This invention relates to a method for consolidating and prioritizing web application vulnerabilities. Specifically, this invention relates to a method for consolidating the root causes for... |
|
US20060294590 |
Automated immune response for a computer
Systems, methodologies, media, and other embodiments associated with making an automated immune response on a computer that may be infected with a malicious software like a virus are described.... |
|
US20050240781 |
Prioritizing intrusion detection logs
A method for displaying an alert log including one or more alerts, the method including prioritizing the one or more alerts according to an importance of each of the one or more alerts and... |
|
US20060236398 |
Selective virus scanning system and method
A virus scanning system and method. A system is provide that includes: a full scanning system for performing a full scan of each file in a file system; a file inventory system for inventorying... |
|
US20110167275 |
MALWARE DETECTION METHOD AND APPARATUS
According to a first aspect of the present invention there is provided a malware detection method implemented within a computer. The method includes, for a given electronic file, determining if... |
|
US20070289018 |
RESOURCE INDICATOR TRAP DOORS FOR DETECTING AND STOPPING MALWARE PROPAGATION
A method and system for detecting and stopping malware propagation using false resource entries is provided. A detection system uses trap door entries that are intentionally inserted into resource... |
|
US20070143841 |
Defense device, defense method, defense program, and network-attack defense system
A repeater selecting unit selects at least one repeater that becomes a notification destination of route information for routing a malicious packet through a defense device, from among a plurality... |
|
US20050120230 |
System for preventing a computer virus accessing email addresses
A system for preventing a computer virus from accessing message addresses is described. The system comprises an interception component or client plug-in that communicates with a messaging client... |
|
US20060212942 |
Semantically-aware network intrusion signature generator
An automatic technique for generating signatures for malicious network traffic performs a cluster analysis of known malicious traffic to create a signature in the form of a state machine. The... |
|
US20050050337 |
Anti-virus security policy enforcement
In a first embodiment, in a distributed network having a number of server computers and associated client devices, method of enforcing an anti-virus security policy is described. The method is... |
|
US20060161987 |
Detecting and remedying unauthorized computer programs
Spyware may be detected by using a detection agent in a communications network to monitor one or more communication streams from one or more clients. An indication of spyware residing on a suspect... |
|
US20050015606 |
Malware scanning using a boot with a non-installed operating system and download of malware detection files
A computer 2 is booted with a removable physical media 10 which bears a clean non-installed operating system. Network support code is also loaded from the removable physical media 10 and used to... |
|
US20060265598 |
Access to a computing environment by computing devices
A method for managing access to a computing environment by a computing device includes providing at least one credential that identifies both the computing device and a user of the computing... |
|
US20050262559 |
Method and systems for computer security
A method for computer security, includes intercepting an incoming communication, placing the communication into a quarantine queue; selecting a communication from the quarantine queue, determining... |
|
US20060156397 |
A New Anti-spy method without using scan
Various known ways to make a Spyware are analyzed and countered. Spy-ware works by replacing the function address/value/body of certain Windows APIs with its own spying code. The Anti-spy... |
|
US20100005291 |
APPLICATION REPUTATION SERVICE
The claimed subject matter is directed to the use of an application reputation service to assist users with minimizing their computerized machines' exposure to and infection from malware.... |
|
US20050268112 |
Managing spyware and unwanted software through auto-start extensibility points
A monitoring service is provided that detects spyware or other unwanted software at the time it is installed and/or allows for the spyware's removal. The service monitors “Auto-Start Extensibility... |
|
US20110231669 |
Computer Virus Protection
A network is protected from e-mail viruses through the use of a sacrificial server. Any executable programs or other suspicious parts of incoming e-mail messages are forwarded to a sacrificial... |
|
US20050193429 |
Integrated data traffic monitoring system
The present invention includes an integrated data traffic monitoring system monitoring data traffic received from a communication network and destined for a protected network. The monitoring... |
|
US20070039053 |
Security server in the cloud
Apparatus and methods for providing proxy and security services to one or more users via a publicly accessible network (e.g. the Internet) are disclosed Upon receiving a user request for content... |
|
US20070226803 |
System and method for detecting internet worm traffics through classification of traffic characteristics by types
A system and method for detecting Internet worm traffics through classification of traffic characteristics by types is disclosed. The system and method defines Internet worm as a characteristic... |
|
US20060117387 |
Propagation protection of email within a network
Described are methods and apparatus, including computer program products, for propagation protection within a network. A network appliance repeatedly stores received portions of data associated... |
|
US20070136814 |
Critical function monitoring and compliance auditing system
A system and method for monitoring, auditing and flagging compliance issues or other user defined exceptions with user defined systems for internal monitoring of adherence to critical functions... |
|
US20060230289 |
Source code management method for malicious code detection
A system and method for enhancing source code management by using existing virus detection methods in a library management system to detect potentially malicious code. With the mechanism of the... |
|
US20070192859 |
Architecture for identifying electronic threat patterns
The invention is a comprehensive conceptual and computational architecture that enables monitoring accumulated time-oriented data using knowledge related to the operation of elements of a computer... |
|
US20050172140 |
Encryption device, encryption system including the encryption device, decryption device and a semiconductor system including the decryption device
A data/code conversion device receives confidential information, converts the confidential information into instruction codes for making a CPU provided in a semiconductor device perform its... |
|
US20050091538 |
Method, a network protection means, a network node, a network, and a computer software product for disinfection
The invention relates to a method for screening and disinfecting a communication network for viral infection, the communication network comprising interconnected network nodes and a designated... |
|
US20060136722 |
Secure communication system and communication route selecting device
A communication system for realizing a secure communication comprises a selecting device for making a selection between a communication route for a direct communication with a communication... |
|
US20070101424 |
Apparatus and Method for Improving Security of a Bus Based System Through Communication Architecture Enhancements
A security policy associated with a system is evaluated. The system includes a communication bus having a data bus and a plurality of components interconnected via the communication bus. The... |
|
US20070214503 |
Correlation engine for detecting network attacks and detection method
A method for detecting network attacks is provided. In one implementation, the method receives a plurality of attack indications based on data transmitted on the network and applies rules to the... |
|
US20050210272 |
Method and apparatus for regulating unsolicited electronic mail
A method and apparatus for preventing unsolicited electronic mail from unwanted or illegitimate commercial entities while allowing legitimate commercial entities, subject to compliance with a... |
|
US20070094734 |
MALWARE MUTATION DETECTOR
A method for classifying polymorphic computer software by extracting features from a suspect file and comparing the extracted features to features of known classes of software. |
|
US20060130143 |
Method and system for utilizing informaiton worms to generate information channels
Provided are methods and systems that facilitate automated networked distribution of information. In particular, a plurality of information worms are evaluated, one or more of the information... |