DYNAMIC ADDITION OF CODE IN SHARED LIBRARIES
    22.
    发明申请
    DYNAMIC ADDITION OF CODE IN SHARED LIBRARIES 审中-公开
    动态添加共享库中的代码

    公开(公告)号:WO2017172163A1

    公开(公告)日:2017-10-05

    申请号:PCT/US2017/019710

    申请日:2017-02-27

    Abstract: Various embodiments include methods for dynamically modifying shared libraries on a client computing device. Various embodiment methods may include receiving a first set of code segments and a first set of code sites associated with a first application. Each code in the first set of code sites may include an address within a compiled shared library stored on the client computing device. The compiled shared library may include one or more dummy instructions inserted at each code site in the first set of code sites, and each code segment in the first set of code segments may be associated with a code site in the first set of code sites. The client computing device may insert each code segment in the first set of code segments at its associated code site in the compiled shared library.

    Abstract translation: 各种实施例包括用于动态修改客户端计算设备上的共享库的方法。 各种实施例方法可以包括接收与第一应用相关联的第一组代码段和第一组代码站点。 第一组代码站点中的每个代码可以包括存储在客户端计算设备上的编译共享库内的地址。 编译的共享库可以包括在第一组代码站点中的每个代码站点处插入的一个或多个伪指令,并且第一组代码段中的每个代码段可以与第一组代码站点中的代码站点相关联。 客户端计算设备可以将每个代码段插入到编译的共享库中的其相关代码站点处的第一组代码段中。

    INFORMATION FLOW TRACKING USING INCREMENTAL PROFILING
    23.
    发明申请
    INFORMATION FLOW TRACKING USING INCREMENTAL PROFILING 审中-公开
    使用增量式分析进行信息流跟踪

    公开(公告)号:WO2017127214A1

    公开(公告)日:2017-07-27

    申请号:PCT/US2016/068217

    申请日:2016-12-22

    Abstract: Various embodiments may include methods, devices, and non-transitory processor-readable media for performing information flow tracking during execution of a software application. A hybrid static/dynamic analysis may be used to track information flow during execution of a software application. In various embodiments, the method may predict a multiple paths of execution, and may utilize these predictions to analyze only actually executing software code. By analyzing only actually executed software code, the method may provide a lightweight and resource-efficient way of detecting actual data leaks as they occur during execution of a software application.

    Abstract translation: 各种实施例可以包括用于在执行软件应用程序期间执行信息流跟踪的方法,设备和非暂时性处理器可读介质。 混合静态/动态分析可用于在执行软件应用程序期间跟踪信息流。 在各种实施例中,该方法可以预测多个执行路径,并且可以利用这些预测来仅分析实际执行的软件代码。 通过仅分析实际执行的软件代码,该方法可以提供轻量且资源有效的方式来检测在软件应用程序执行期间发生的实际数据泄漏。

    BEHAVIORAL ANALYSIS TO AUTOMATE DIRECT AND INDIRECT LOCAL MONITORING OF INTERNET OF THINGS DEVICE HEALTH
    24.
    发明申请
    BEHAVIORAL ANALYSIS TO AUTOMATE DIRECT AND INDIRECT LOCAL MONITORING OF INTERNET OF THINGS DEVICE HEALTH 审中-公开
    自动进行直接和间接监控互联网设备健康的行为分析

    公开(公告)号:WO2016140912A1

    公开(公告)日:2016-09-09

    申请号:PCT/US2016/020072

    申请日:2016-02-29

    Abstract: The disclosure generally relates to behavioral analysis to automate monitoring Internet of Things (IoT) device health in a direct and/or indirect manner. In particular, normal behavior associated with an IoT device in a local IoT network may be modeled such that behaviors observed at the IoT device may be compared to the modeled normal behavior to determine whether the behaviors observed at the IoT device are normal or anomalous. Accordingly, in a distributed IoT environment, more powerful "analyzer" devices can collect behaviors locally observed at other (e.g., simpler) "observer" devices and conduct behavioral analysis across the distributed IoT environment to detect anomalies potentially indicating malicious attacks, malfunctions, or other issues that require customer service and/or further attention. Furthermore, devices with sufficient capabilities may conduct (local) on-device behavioral analysis to detect anomalous conditions without sending locally observed behaviors to another aggregator device and/or analyzer device.

    Abstract translation: 本公开通常涉及以直接和/或间接方式自动监视物联网(IoT)设备健康状况的行为分析。 特别地,可以建模与本地IoT网络中的IoT设备相关联的正常行为,使得可以将在IoT设备处观察到的行为与建模的正常行为进行比较,以确定在IoT设备处观察到的行为是正常还是异常。 因此,在分布式IoT环境中,更强大的“分析器”设备可以收集在其他(例如更简单的)“观察者”设备本地观察到的行为,并在分布式IoT环境中进行行为分析,以检测潜在地指示恶意攻击,故障或 其他需要客户服务和/或进一步关注的问题。 此外,具有足够能力的设备可以进行(本地)设备上行为分析以检测异常情况,而不将本地观察到的行为发送到另一聚合器设备和/或分析仪设备。

    RETURN ORIENTED PROGRAMMING ATTACK DETECTION VIA MEMORY MONITORING
    25.
    发明申请
    RETURN ORIENTED PROGRAMMING ATTACK DETECTION VIA MEMORY MONITORING 审中-公开
    通过记忆监控返回面向编程攻击检测

    公开(公告)号:WO2016137579A1

    公开(公告)日:2016-09-01

    申请号:PCT/US2016/012320

    申请日:2016-01-06

    CPC classification number: G06F21/554 G06F21/52 G06F21/566

    Abstract: Aspects include computing devices, systems, and methods for implementing detecting return oriented programming (ROP) attacks on a computing device. A memory traversal map for a program called to run on the computing device may be loaded. A memory access request of the program to a memory of the computing device may be monitored and a memory address of the memory from the memory access request may be retrieved. The retrieved memory address may be compared to the memory traversal map and a determination of whether the memory access request indicates a ROP attack may be made. The memory traversal map may include a next memory address adjacent to a previous memory address in the memory traversal map. A cumulative anomaly score based on mismatches between the retrieved memory address and the memory traversal map may be calculated and used to determine whether to load a finer grain memory traversal map.

    Abstract translation: 方面包括用于在计算设备上实现检测返回定向编程(ROP)攻击的计算设备,系统和方法。 可以加载被称为在计算设备上运行的程序的存储器遍历映射。 可以监视程序对计算设备的存储器的存储器访问请求,并且可以检索存储器访问请求中的存储器的存储器地址。 可以将检索的存储器地址与存储器遍历映射进行比较,并且可以确定存储器访问请求是否指示ROP攻击。 存储器遍历映射可以包括与存储器遍历映射中的先前存储器地址相邻的下一个存储器地址。 可以计算基于检索的存储器地址和存储器遍历映射之间的不匹配的累积异常得分,并用于确定是否加载更精细的存储器遍历映射。

    DATA FLOW TRACKING VIA MEMORY MONITORING
    26.
    发明申请
    DATA FLOW TRACKING VIA MEMORY MONITORING 审中-公开
    数据流跟踪通过记忆监控

    公开(公告)号:WO2016122799A1

    公开(公告)日:2016-08-04

    申请号:PCT/US2015/066442

    申请日:2015-12-17

    Abstract: Methods and devices for tracking data flows in a computing device include monitoring memory in a hardware component of the computing device to identify a read operation that reads information from a tainted memory address, using heuristics to identify a first, second, and third number of operations performed after the identified read operation, marking memory addresses of write operations performed after first number of operations and before the second number of operations as tainted, and marking memory addresses of write operations performed after the third number of operations and before the second number of operations as untainted.

    Abstract translation: 用于在计算设备中跟踪数据流的方法和设备包括监视计算设备的硬件组件中的存储器,以识别从污染存储器地址读取信息的读取操作,使用启发式来识别第一,第二和第三数量的操作 在所识别的读取操作之后执行,标记在第一次操作之后和在第二次操作之前执行的写入操作的存储器地址,并且标记在第三次操作之后和第二次操作之前执行的写入操作的存储器地址 没有了。

    APPROXIMATION OF EXECUTION EVENTS USING MEMORY HIERARCHY MONITORING
    27.
    发明申请
    APPROXIMATION OF EXECUTION EVENTS USING MEMORY HIERARCHY MONITORING 审中-公开
    使用记忆层次监测对执行事件的近似

    公开(公告)号:WO2016060737A1

    公开(公告)日:2016-04-21

    申请号:PCT/US2015/046097

    申请日:2015-08-20

    Abstract: Aspects include computing devices, systems, and methods for implementing monitoring communications between components and a memory hierarchy of a computing device. The computing device may determine at least one identifying factor for identifying execution of the processor-executable code. A communication between the components and the memory hierarchy of the computing device may be monitored for at least one communication factor of a same type as the at least one identifying factor. A determination whether a value of the at least one identifying factor matches a value of the at least one communication factor may be made. The computing device may determine that the processor-executable code is executed in response to determining that the value of the at least one identifying factor matches the value of the at least one communication factor.

    Abstract translation: 方面包括用于实现组件之间的监视通信和计算设备的存储器层次结构的计算设备,系统和方法。 计算设备可以确定用于识别处理器可执行代码的执行的至少一个识别因素。 可以针对与至少一个识别因素相同类型的至少一个通信因素来监视计算设备的组件和存储器层次之间的通信。 可以进行至少一个识别因素的值是否与至少一个通信因素的值相匹配的确定。 响应于确定至少一个识别因子的值与至少一个通信因子的值相匹配,计算设备可以确定执行处理器可执行代码。

Patent Agency Ranking