Match Document Document Title
US20140245440 Software Inspection System  
A method for software inspection analyzes a body of computer code to assess whether the body of computer code contains malware. Various embodiments extract the executable elements of the body of...
US20140366134 Malicious Code Blocking Method Using Management System for Monitoring Status of Vaccine  
The present invention relates to a malicious code blocking method using a management system for monitoring a state of a vaccine, and more specifically, to a malicious code blocking method using a...
US20150033339 Irrelevant Code Identification  
The techniques described herein identify, and/or distinguish between, legitimate code and/or irrelevant code in programs so that an analyst does not have to spend additional time sifting through...
US20150128271 APPARATUS AND METHOD FOR COLLECTING NETWORK DATA TRAFFIC  
The present invention relates to an apparatus and method for collecting network data traffic. The apparatus for collecting network data traffic includes a graph creation unit, an initialization...
US20140013433 Methods to dynamically establish overall national security for sensitivity classification...  
A method to establish virtual security perimeters for classified electronic documents on a computer system. The security perimeters are based upon a full classification determination of all...
US20140215617 SYSTEM AND METHOD FOR ADVANCED MALWARE ANALYSIS  
A system and a method for advanced malware analysis. The method filters incoming messages with a watch-list, the incoming messages including attachments, if an incoming message matches the...
US20110041179 Malware detection  
According to a first aspect of the present invention there is provided a method of detecting potential malware. The method comprises, at a server, receiving a plurality of code samples, the code...
US20140143871 METHOD OF INSPECTING MASS WEBSITES BY VISITING  
Disclosed is a method of inspecting mass websites by visiting, which inspects the mass websites by visiting at a high speed using multiple browsers and multiple frames. The method of inspecting...
US20150067763 HARDWARE AND SOFTWARE EXECUTION PROFILING  
Technologies for assembling an execution profile of an event are disclosed. The technologies may include monitoring the event for a branch instruction, generating a callback to a security module...
US20150067855 SERVER AND METHOD FOR ATTESTING APPLICATION IN SMART DEVICE USING RANDOM EXECUTABLE CODE  
The present invention discloses an application attestation server and an application attestation method. Specially, there is provided an application attestation server that attests a certain...
US20150013007 MALICIOUS CODE INFECTION CAUSE-AND-EFFECT ANALYSIS  
A malware analysis system for automating cause and effect analysis of malware infections is provided. The malware analysis system monitors and records computer system activities. Upon being...
US20120096551 INTRUSION DETECTING SYSTEM AND METHOD FOR ESTABLISHING CLASSIFYING RULES THEREOF  
A method for establishing classifying rules of an intrusion detecting system is provided with the following steps. First, at least one decision tree is provided. Internal nodes of the decision...
US20120216280 DETECTION OF CODE-BASED MALWARE  
This document describes techniques for detection of code-based malware. According to some embodiments, the techniques utilize a collection of known malicious code and know benign code and...
US20140223565 Apparatus And Method For Identifying Similarity Via Dynamic Decimation Of Token Sequence N-Grams  
An apparatus for identifying related code variants or text samples includes processing circuitry configured to execute instructions for receiving query binary code, processing the query binary...
US20140082731 Contextual Alert of an Invasion of a Computer System  
Methods, systems, and computer-readable media for providing contextual feedback to a user of a computer system upon detection of an invasion of the computer system are provided herein. An invasion...
US20120291130 Contextual Alert of an Invasion of a Computer System  
Methods, systems, and computer-readable media for providing contextual feedback to a user of a computer system upon detection of an invasion of the computer system are provided herein. An invasion...
US20100319070 Transformative rendering of internet resources  
Apparatus and method for transforming internet resources into safely rendered versions of the same. The invention provides transformative rendering of internet resources to remove malicious code...
US20140181968 Monitoring Operational Activities In Networks And Detecting Potential Network Intrusions And Misuses  
Concepts and technologies disclosed herein are for monitoring operational activities in networks and detecting potential network intrusions and misuses. According to one aspect disclosed herein,...
US20140223562 System and Method for Distributed Denial of Service Identification and Prevention  
Systems and methods for discovery and classification of denial of service attacks in a distributed computing system may employ local agents on nodes thereof to detect resource-related events. An...
US20150186649 Function Fingerprinting  
Systems and methods generate and apply identification codes or “fingerprints” with respect to software functions contained in executable files. Utilizing such fingerprinting procedures, the...
US20140068768 Apparatus and Method for Identifying Related Code Variants in Binaries  
An apparatus for identifying related code variants may include processing circuitry configured to execute instructions for receiving query binary code, processing the query binary code to generate...
US20140283069 PROTECTING AGAINST THE INTRODUCTION OF ALIEN CONTENT  
In one implementation, a computer-implemented method can identify abnormal computer behavior. The method can receive, at a computer server subsystem and from a web server system, computer code to...
US20140283068 PROTECTING AGAINST THE INTRODUCTION OF ALIEN CONTENT  
In one implementation, a computer-implemented method can identify abnormal computer behavior. The method can receive, at a computer server subsystem and from a web server system, computer code to...
US20140157415 INFORMATION SECURITY ANALYSIS USING GAME THEORY AND SIMULATION  
Vulnerability in security of an information system is quantitatively predicted. The information system may receive malicious actions against its security and may receive corrective actions for...
US20140082729 SYSTEM AND METHOD FOR ANALYZING REPACKAGED APPLICATION THROUGH RISK CALCULATION  
The present invention relates to a system and method for analyzing a repackaged application through risk calculation, and more specifically, to a system and method for analyzing a repackaged...
US20140259170 Internet Security Cyber Threat Reporting System and Method  
A risk assessment and managed security system for network users provides security services for dealing with formidable cyber threats, malware creations and phishing techniques. Automated solutions...
US20150128274 SYSTEM AND METHOD FOR IDENTIFYING INFECTED NETWORKS AND SYSTEMS FROM UNKNOWN ATTACKS  
Systems and method of the present disclosure are directed to a network security monitor. The monitor can receive logs of a second computer network indicative of a status of the second computer...
US20100306847 IDENTIFYING SECURITY PROPERTIES OF SYSTEMS FROM APPLICATION CRASH TRAFFIC  
Most machines in an organization's computer network connect to the Internet and create web traffic logs which allow analysis of HTTP traffic in a simple, centralized way. The web traffic logs may...
US20150220734 MOBILE APPLICATION MANAGEMENT  
Code of a particular application is analyzed against a semantic model of a software development kit of a particular platform. The semantic model associates a plurality of application behaviors...
US20140181970 SYSTEM AND METHOD FOR IMPROVING THE EFFICIENCY OF APPLICATION EMULATION ACCELERATION  
An improved emulator for analyzing software code, and associated method. The emulator includes a virtual execution environment in which a series of virtual processing states are represented during...
US20140373148 SYSTEMS AND METHODS FOR TRAFFIC CLASSIFICATION  
Systems and methods of classifying network traffic may monitor network traffic. Monitored traffic may be compared with a control protocol template (CPT). When a similarity between the monitored...
US20140298465 APPLICATION REPUTATION SERVICE  
The claimed subject matter is directed to the use of an application reputation service to assist users with minimizing their computerized machines' exposure to and infection from malware....
US20140137250 SYSTEM AND METHOD FOR DETECTING FINAL DISTRIBUTION SITE AND LANDING SITE OF MALICIOUS CODE  
A system and method for detecting final distribution and landing sites of a malicious code. The method extracts and collecting new article URLs and advertisement banner URLs by inspecting a main...
US20150242626 METHOD OF GENERATING IN-KERNEL HOOK POINT CANDIDATES TO DETECT ROOTKITS AND THE SYSTEM THEREOF  
A method for determining whether a to-be-tested program contains malicious behavior is disclosed. The method includes steps of providing an emulator having a kernel and a plurality of installed...
US20140181969 System and Method for Uploading and Verifying a Document  
An upload and verification system allows a user to upload files which the user would like to attached to the electronic record of a certain event associated with the company, for example, an...
US20130291107 System and Method for Mitigating Application Layer Distributed Denial of Service Attacks Using Human Behavior Analysis  
A method of mitigating an application distributed denial of service (DDoS) attack on a network includes receiving at an application DDoS mitigation appliance application layer logs, parsing the...
US20150106931 CLASSIFYING MALWARE BY ORDER OF NETWORK BEHAVIOR ARTIFACTS  
The present invention generally relates to systems and methods for classifying executable files as likely malware or likely benign. The techniques utilize temporally-ordered network behavioral...
US20120255008 Method of Handling Malicious Application in Telco's Application Store System and Related Communication Device  
A method of handling a malicious application for a client of a service system is disclosed. The method comprises transmitting a malicious application report message to a storefront of the service...
US20110314544 EVALUATING SHELL CODE FINDINGS  
Concepts and technologies are described herein for evaluating shellcode findings. In accordance with the concepts and technologies disclosed herein, shellcode findings can be evaluated to...
US20120096550 PROVIDING SECURITY FOR A VIRTUAL MACHINE BY SELECTIVELY TRIGGERING A HOST SECURITY SCAN  
The disclosed embodiments provide a system that protects an application from malware on a host system. During operation, the system receives a command to commence execution of the application on...
US20150205966 Industrial Control System Emulator for Malware Analysis  
Embodiments of the present invention may provide an Industrial Control System (ICS) Emulator for Malware Analysis. The ICS Emulator may be embodied in a software. The software may be developed by...
US20130254888 SYSTEM AND METHOD FOR IDENTIFYING SECURITY BREACH ATTEMPT OF A WEBSITE  
The present invention is a method, circuit and system for detecting, reporting and preventing an attempted security breach of a commercial website (for example a banking website), such as identity...
US20110072262 System and Method for Identifying Security Breach Attempts of a Website  
The present invention is a method, circuit and system for detecting, reporting and preventing an attempted security breach of a commercial website (for example a banking website), such as identity...
US20140215614 SYSTEM AND METHOD FOR A SECURITY ASSESSMENT OF AN APPLICATION UPLOADED TO AN APPSTORE  
A method for assessing the level of security of an application to be uploaded to an App Store, comprises: (i) Providing a security system comprising an attack dictionary relevant to a specific...
US20100306826 METHODS AND SYSTEMS FOR IMPLEMENTING A SELF DEFENDING/REPAIRING DATABASE  
This disclosure describes, generally, methods and systems for self defending and repairing a database. The method includes monitoring, at a database server, code modifications to a database...
US20130081140 METHODS AND SYSTEM FOR DETERMINING PERFORMANCE OF FILTERS IN A COMPUTER INTRUSION PREVENTION DETECTION SYSTEM  
An intrusion prevention/detection system filter (IPS filter) performance evaluation is provided. The performance evaluation is performed at both the security center and at the customer sites to...
US20130152163 SECURITY SYSTEM FOR PROTECTING NETWORKS FROM VULNERABILITY EXPLOITS  
A system for protecting networks from vulnerability exploits comprises a security engine operable to receive a packet destined for a user's network and forward the packet to at least one host...
US20140317736 METHOD AND SYSTEM FOR DETECTING FAKE ACCOUNTS IN ONLINE SOCIAL NETWORKS  
A system and method for detecting fake accounts in OSNs is proposed to aid the OSN provider 20 against fake users, wherein a social graph G of the OSN, with n nodes, a non-Sybil region GH and a...
US20150096021 METHOD AND SYSTEM FOR METADATA DRIVEN TESTING OF MALWARE SIGNATURES  
Techniques are disclosed for evaluating the effectiveness of a malware signature. A query tool translates a markup language malware signature definition into a database query. The query is then...
US20140208426 SYSTEMS AND METHODS FOR DYNAMIC CLOUD-BASED MALWARE BEHAVIOR ANALYSIS  
A cloud-based method, a behavioral analysis system, and a cloud-based security system can include a plurality of nodes communicatively coupled to one or more users, wherein the plurality of nodes...