摘要:
A system provides a way for a person to control access to digital assets, including financial accounts, through a common gateway that can interact on the person's behalf with service providers that manage the digital assets. Brokers may act as intermediaries between the gateway and the service providers, providing a common interface to the gateway and a specific interface to a service provider. Trigger events can cause the gateway to interact with the service providers, causing the service providers to take a desired action. The trigger events may include notification sent by the person, timed events, and other detected events.
摘要:
Particular embodiments described herein provide for an electronic device that can be configured to monitor code as it executes. The code can include self-modifying code. The system can log an event if the self-modifying code occurred in a GetPC address region.
摘要:
Particular embodiments described herein provide for an electronic device that can be configured to allow malware to execute in a system, record changes to the system caused by the execution of the malware, and create detection tasks for the detection of the malware in an electronic device, where the detection tasks are at least partially based on the changes to the system caused by the execution of the malware. The detection tasks can be used to identify an infected electronic device and to create mitigation tasks that mitigate the changes to the infected electronic device caused by the malware.
摘要:
Embodiments are disclosed herein for remote retrieval of information from endpoints and comprise receiving a master query at an endpoint in a network environment and executing a set of one or more subqueries defined in the master query. Embodiments also comprise an execution of a first subquery that includes executing a function to produce a first output, applying one or more conditions to the first output to determine a second output, and determining a result of the master query based, at least in part, on the second output. In specific embodiments, the master query is received from another node over a network connection. In more specific embodiments, the function is executed on the endpoint to collect real-time information based on one or more parameters. In further embodiments, the function is one of a plug-in or a script.
摘要:
In an example, there is disclosed a computing apparatus, comprising: a trusted execution environment (TEE); and a security engine operable to: identify a key negotiation for an encrypted connection between a first device and a second device; request a service appliance key for the key negotiation; receive the service appliance key; and perform a service appliance function on traffic between the first device and the second device. There is also disclosed a method of providing the security engine, and a computer-readable medium having stored thereon executable instructions for providing the security engine.
摘要:
Technologies for secure content packaging include a source computing device that transmits a secure package to a destination computing device. The destination computing device establishes a content policy trusted execution environment and a key policy trusted execution environment. The content policy trusted execution environment may be established in a secure enclave using processor support. The key policy trusted execution environment may be established using a security engine. The key policy trusted execution environment evaluates a key access policy and decrypts a content key using a master wrapping key. The content policy trusted execution environment evaluates a content access policy and decrypts the content using the decrypted content key. Similarly, the source computing device authors the secure package using a content policy trusted execution environment and a key policy trusted execution environment. The master wrapping key may be provisioned to the computing devices during manufacture. Other embodiments are described and claimed.
摘要:
Managed devices containing a Trusted Platform Module (TPM) to provide a trusted environment generate a device certificate at initialization of the TPM and send the device certificate to a management console for storing in a certificate database. Upon detecting a file of interest, the TPM signs the file, adding to a signature list created by previous managed devices. The signature list can be used to analyze the spread of the file across the system of managed devices, including tracking the file to the first managed device to have had a copy, without requiring real-time access to the managed devices during the spread of the file. In some embodiments, additional security measures may be taken responsive to determining the first managed device and the path the file has taken across the system of managed devices.
摘要:
A technique allows a user client to receive a software product from a server. The user client may determine if the software product includes other potentially unwanted programs by reading one or more graphical user interface instances that are created during installation of the software product. The graphical user interface instances are read to identify information related to software identifiers of the software product and of potentially unwanted programs. A signature file may be received from a third-party server. The software identifiers of the software product and potentially unwanted programs can be checked against the signature file during installation of the software product in order to identify the presence of potentially unwanted programs that may be bundled with software product.
摘要:
In an example, a network is described with a plurality of data sources. Each data source may provide a feature, such as a data type that the data source collects or generates. A data aggregator may be connected to the network, and configured to collect, classify, and merge features as appropriate. The data aggregator includes a discriminator for classifying features, a merger, unmerger, converter, and evaluator. Features are provided to one or more expert systems configured to control one or more systems based on the features. Feedback to the data aggregator is used to evaluate the success of a merge. When a merge is found to be unhelpful, features may be unmerged.