Abstract:
PROBLEM TO BE SOLVED: To provide a system and method for efficiently determining that a received file is not malware. SOLUTION: In operation, when a file is received at a computing device, an evaluation is made as to whether the file includes user-modifiable or superficial data areas i.e., areas of the file that by their nature do not typically carry or embed malware. If the file includes superficial data areas, those superficial data areas are filtered out and a file signature is generated based on the remaining portions of the received file. The file can then be compared to a list of known malware to determine if the file is malware. Alternatively, the file can be compared to a list of known, trusted files to determine whether the file is trustworthy. COPYRIGHT: (C)2006,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To conquer the disadvantage of a conventional method to patching such as the increase of a labor related with the reception and application of patch. SOLUTION: A facility receives, in a computing system, a distinguished patch package for modifying the behavior of a programmatic entity. The facility automatically extracts, from the distinguished patch package, (1) patch application information that identifies a distinguished programmatic entity to which the patches are applied, and (2) patch behavior information that specifies a manner to modify the behavior of the distinguished programmatic entity. The facility automatically adds, to a patch table, a distinguished entry containing the extracted patch application information and patch behavior information. COPYRIGHT: (C)2006,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To explain a facility for augmenting the software of a target computer system. SOLUTION: The facility receives augmentation specification in the target computer system. The augmentation specification specifies: (a) a function to be augmented, (b) the parameter of a function to be tested, (c) a test to be applied to the specified parameter, and (d) modification to be executed to the behavior of the function when the specified test is not satisfied by the specified parameter. When the specified function is invoked on the target computer system, if the specified test is not satisfied by the specified parameter, the facility performs the specified modification to the behavior of the specified function. COPYRIGHT: (C)2006,JPO&NCIPI
Abstract:
Systems and methods for validating integrity of an executable file are described. In one aspect, the systems and methods determine that an executable file is being introduced into a path of execution. The executable file is then automatically evaluated in view of multiple malware checks to detect if the executable file represents a type of malware. If the executable file represents a type of malware, a protection path is implemented.
Abstract:
Prevention of executable code modification is provided by making the act of allocating and modifying existing memory backed code pages a highly privileged operating system (OS) function. The integrity of loaded code is also optionally checked at load time inside the OS kernel. A privilege check in the system is invoked when executable pages are allocated or modified. This privilege is assigned only to the operating system kernel and highly trusted identities in the operating system.
Abstract:
Systems and methods for performing integrity verifications for computer programs to run on computing systems are provided. An integrity check is completed before passing execution control to the next level of an operating system or before allowing a program to run. The integrity check involves the use of a locally stored key to determine if a program has been modified or tampered with prior to execution. If the check shows that the program has not been altered, the program will execute and, during the boot process, allow execution control to be transferred to the next level. If, however, the check confirms that the program has been modified, the computing system does not allow the program to run.
Abstract:
PROBLEM TO BE SOLVED: To provide a system, methods and a computer-readable medium for efficiently performing a backup of data in a networking environment. SOLUTION: In embodiments of the present invention, a backup of a file from a local computing device to a remote computing device is performed. Aspects of the present invention determine whether the file is already stored on the remote computing device by another user or by an operating system and/or application program provider. In this regard, a signature of the file is generated and compared to signatures of files stored on a back end computing system. Only in instances when a match to the signature is not found, the complete file is transmitted to the back end computing device and stored in a database. COPYRIGHT: (C)2007,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a security scheme that provides security to one or more self-contained operating environment instances executed on a computer. SOLUTION: The security scheme may include implementing a set of security applications that may be controlled by a supervisory process, or the like. Both the set of security applications and the supervisory process may operate on a host system of the computer, which may also provide a platform for execution of one or more self-contained operating environments. The security scheme protects processes running in the one or more self-contained operating environments and processes running on the computer outside of the self-contained operating environments. COPYRIGHT: (C)2006,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide a device that can self-heal from malicious software attacks such as viruses and worms. SOLUTION: Changes made between the time that an infection resulting from an attack on the device is detected and an earlier point in time to which the device is capable of being restored may be recovered based, at least in part, on what kinds of changes are made, whether the changes are bona fide or malware-induced, whether the changes are made after the time that the infection likely occurred, and whether new software is installed. COPYRIGHT: (C)2006,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide a facility for setting and revoking policies. SOLUTION: The facility receives from a controlling process a request to set a policy on a controlled process, and determines whether the controlling process has privilege to set the policy on the controlled process. If the facility determines that the controlling process has privilege to set the policy on the controlled process, the facility sets the policy on the controlled process, which causes the policy to be applied to the controlled process to determine whether the controlled process has authorization to access one or more resources. COPYRIGHT: (C)2006,JPO&NCIPI