Automated malware signature generation
    2.
    发明申请
    Automated malware signature generation 有权
    生成自动恶意软件签名

    公开(公告)号:US20080127336A1

    公开(公告)日:2008-05-29

    申请号:US11523199

    申请日:2006-09-19

    IPC分类号: G06F21/00

    CPC分类号: G06F21/566 G06F21/564

    摘要: Automated malware signature generation is disclosed. Automated malware signature generation includes monitoring incoming unknown files for the presence of malware and analyzing the incoming unknown files based on both a plurality of classifiers of file behavior and a plurality of classifiers of file content. An incoming file is classified as having a particular malware classification based on the analyzing of incoming unknown files and a malware signature is generated for the incoming unknown file based on the particular malware classification. Access is provided to the malware signature.

    摘要翻译: 公开了自动恶意软件签名生成。 自动恶意软件签名生成包括监视传入的未知文件以存在恶意软件,并基于文件行为的多个分类器和文件内容的多个分类器分析传入的未知文件。 根据传入的未知文件的分析,传入文件被分类为具有特定的恶意软件分类,并且基于特定恶意软件分类为传入的未知文件生成恶意软件签名。 访问被提供给恶意软件签名。

    AUTOMATED MALWARE SIGNATURE GENERATION
    3.
    发明申请
    AUTOMATED MALWARE SIGNATURE GENERATION 有权
    自动恶意签名生成

    公开(公告)号:US20120260343A1

    公开(公告)日:2012-10-11

    申请号:US13486518

    申请日:2012-06-01

    IPC分类号: G06F21/00

    CPC分类号: G06F21/566 G06F21/564

    摘要: Automated malware signature generation is disclosed. Automated malware signature generation includes monitoring incoming unknown files for the presence of malware and analyzing the incoming unknown files based on both a plurality of classifiers of file behavior and a plurality of classifiers of file content. An incoming file is classified as having a particular malware classification based on the analyzing of incoming unknown files and a malware signature is generated for the incoming unknown file based on the particular malware classification. Access is provided to the malware signature.

    摘要翻译: 公开了自动恶意软件签名生成。 自动恶意软件签名生成包括监视传入的未知文件以存在恶意软件,并基于文件行为的多个分类器和文件内容的多个分类器分析传入的未知文件。 根据传入的未知文件的分析,传入文件被分类为具有特定的恶意软件分类,并且基于特定恶意软件分类为传入的未知文件生成恶意软件签名。 访问被提供给恶意软件签名。

    Automated malware signature generation
    4.
    发明授权
    Automated malware signature generation 有权
    生成自动恶意软件签名

    公开(公告)号:US08201244B2

    公开(公告)日:2012-06-12

    申请号:US11523199

    申请日:2006-09-19

    IPC分类号: G06F12/14 G08B23/00

    CPC分类号: G06F21/566 G06F21/564

    摘要: Automated malware signature generation is disclosed. Automated malware signature generation includes monitoring incoming unknown files for the presence of malware and analyzing the incoming unknown files based on both a plurality of classifiers of file behavior and a plurality of classifiers of file content. An incoming file is classified as having a particular malware classification based on the analyzing of incoming unknown files and a malware signature is generated for the incoming unknown file based on the particular malware classification. Access is provided to the malware signature.

    摘要翻译: 公开了自动恶意软件签名生成。 自动恶意软件签名生成包括监视传入的未知文件以存在恶意软件,并基于文件行为的多个分类器和文件内容的多个分类器分析传入的未知文件。 根据传入的未知文件的分析,传入文件被分类为具有特定的恶意软件分类,并且基于特定恶意软件分类为传入的未知文件生成恶意软件签名。 访问被提供给恶意软件签名。

    Binary function database system
    5.
    发明授权
    Binary function database system 有权
    二进制函数数据库系统

    公开(公告)号:US07802299B2

    公开(公告)日:2010-09-21

    申请号:US11784801

    申请日:2007-04-09

    IPC分类号: G06F11/00

    CPC分类号: G06F21/564 G06F21/566

    摘要: A binary function database system is provided in which binary functions are extracted from compiled and linked program files and stored in a database as robust abstractions which can be matched with others using one or more function matching heuristics. Such abstraction allows for minor variations in function implementation while still enabling matching with an identical stored function in the database, or with a stored function with a given level of confidence. Metadata associated with each function is also typically generated and stored in the database. In an illustrative example, a structured query language database is utilized that runs on a central database server, and that tracks function names, the program file from which the function is extracted, comments and other associated information as metadata during an analyst's live analysis session to enable known function information that is stored in the database to be applied to binary functions of interest that are disassembled from the program file.

    摘要翻译: 提供了一种二进制功能数据库系统,其中从编译和链接的程序文件中提取二进制函数,并将其存储在数据库中作为鲁棒抽象,可以使用一个或多个函数匹配启发式与其他抽象匹配。 这种抽象允许功能实现中的微小变化,同时仍然能够与数据库中的相同存储功能匹配,或者具有给定的置信度的存储的功能。 与每个功能相关联的元数据也通常生成并存储在数据库中。 在说明性的示例中,使用在中央数据库服务器上运行的结构化查询语言数据库,并且在分析人员的实时分析会话期间跟踪功能名称,提取功能的程序文件,作为元数据的其他关联信息作为元数据 使得存储在数据库中的已知功能信息能够应用于从程序文件反汇编的感兴趣的二进制功能。

    Binary function database system
    6.
    发明申请
    Binary function database system 有权
    二进制函数数据库系统

    公开(公告)号:US20080250018A1

    公开(公告)日:2008-10-09

    申请号:US11784801

    申请日:2007-04-09

    IPC分类号: G06F17/30

    CPC分类号: G06F21/564 G06F21/566

    摘要: A binary function database system is provided in which binary functions are extracted from compiled and linked program files and stored in a database as robust abstractions which can be matched with others using one or more function matching heuristics. Such abstraction allows for minor variations in function implementation while still enabling matching with an identical stored function in the database, or with a stored function with a given level of confidence. Metadata associated with each function is also typically generated and stored in the database. In an illustrative example, a structured query language database is utilized that runs on a central database server, and that tracks function names, the program file from which the function is extracted, comments and other associated information as metadata during an analyst's live analysis session to enable known function information that is stored in the database to be applied to binary functions of interest that are disassembled from the program file.

    摘要翻译: 提供了一种二进制功能数据库系统,其中从编译和链接的程序文件中提取二进制函数,并将其存储在数据库中作为鲁棒抽象,可以使用一个或多个函数匹配启发式与其他抽象匹配。 这种抽象允许功能实现中的微小变化,同时仍然能够与数据库中的相同存储功能匹配,或者具有给定的置信度的存储的功能。 与每个功能相关联的元数据也通常生成并存储在数据库中。 在说明性的示例中,使用在中央数据库服务器上运行的结构化查询语言数据库,并且在分析人员的实时分析会话期间跟踪功能名称,提取功能的程序文件,作为元数据的其他关联信息作为元数据 使得存储在数据库中的已知功能信息能够应用于从程序文件反汇编的感兴趣的二进制功能。

    Collecting and analyzing malware data
    7.
    发明授权
    Collecting and analyzing malware data 有权
    收集和分析恶意软件数据

    公开(公告)号:US08667583B2

    公开(公告)日:2014-03-04

    申请号:US12234717

    申请日:2008-09-22

    CPC分类号: G06F21/552 G06F21/568

    摘要: A malware analysis system is described that provides information about malware execution history on a client computer and allows automated back-end analysis for faster creation of identification signatures and removal instructions. The malware analysis system collects threat information on client computers and sends the threat information to a back-end analysis component for automated analysis. The back-end analysis component analyzes the threat information by comparing the threat information to information about known threats. The system builds a signature for identifying the threat family and a mitigation script for neutralizing the threat. The system sends the signature and mitigation data to client computers, which use the information to mitigate the threat. Thus, the malware analysis system detects and mitigates threats more quickly than previous systems by reducing the burden on technicians to manually create environments for reproducing the threats and manually analyze the threat behavior.

    摘要翻译: 描述了恶意软件分析系统,其提供关于客户端计算机上的恶意软件执行历史的信息,并允许自动后端分析,以更快地创建身份签名和删除指令。 恶意软件分析系统在客户端计算机上收集威胁信息,并将威胁信息发送到后端分析组件进行自动分析。 后端分析组件通过将威胁信息与已知威胁信息进行比较来分析威胁信息。 该系统构建一个用于识别威胁系列的签名和用于中和威胁的缓解脚本。 系统将签名和缓解数据发送到客户端计算机,客户端计算机使用该信息来减轻威胁。 因此,恶意软件分析系统通过减轻技术人员手动创建用于再现威胁的环境并手动分析威胁行为的负担,可以更快地检测和减轻威胁。

    COLLECTING AND ANALYZING MALWARE DATA
    8.
    发明申请
    COLLECTING AND ANALYZING MALWARE DATA 有权
    收集和分析恶意软件数据

    公开(公告)号:US20100077481A1

    公开(公告)日:2010-03-25

    申请号:US12234717

    申请日:2008-09-22

    IPC分类号: G06F21/00

    CPC分类号: G06F21/552 G06F21/568

    摘要: A malware analysis system is described that provides information about malware execution history on a client computer and allows automated back-end analysis for faster creation of identification signatures and removal instructions. The malware analysis system collects threat information on client computers and sends the threat information to a back-end analysis component for automated analysis. The back-end analysis component analyzes the threat information by comparing the threat information to information about known threats. The system builds a signature for identifying the threat family and a mitigation script for neutralizing the threat. The system sends the signature and mitigation data to client computers, which use the information to mitigate the threat. Thus, the malware analysis system detects and mitigates threats more quickly than previous systems by reducing the burden on technicians to manually create environments for reproducing the threats and manually analyze the threat behavior.

    摘要翻译: 描述了恶意软件分析系统,其提供关于客户端计算机上的恶意软件执行历史的信息,并允许自动后端分析,以更快地创建身份签名和删除指令。 恶意软件分析系统在客户端计算机上收集威胁信息,并将威胁信息发送到后端分析组件进行自动分析。 后端分析组件通过将威胁信息与已知威胁信息进行比较来分析威胁信息。 该系统构建一个用于识别威胁系列的签名和用于中和威胁的缓解脚本。 系统将签名和缓解数据发送到客户端计算机,客户端计算机使用该信息来减轻威胁。 因此,恶意软件分析系统通过减轻技术人员手动创建用于再现威胁的环境并手动分析威胁行为的负担,可以更快地检测和减轻威胁。

    Generating financial data documents using templates
    10.
    发明授权
    Generating financial data documents using templates 有权
    使用模板生成财务数据文档

    公开(公告)号:US08707168B2

    公开(公告)日:2014-04-22

    申请号:US13222425

    申请日:2011-08-31

    IPC分类号: G06F17/00

    摘要: A computing system is disclosed including a computer processor configured to receive a selection of a template and identify a data field in the template. The data field indicates financial data to fill in the data field. The computer processor is configured to retrieve the financial data for the data field from stored financial data and generate a document according to the selected template. The generated document has the financial data within the data field.

    摘要翻译: 公开了一种计算系统,包括被配置为接收模板的选择并识别模板中的数据字段的计算机处理器。 数据字段指示要填充数据字段的财务数据。 计算机处理器被配置为从存储的财务数据检索数据字段的财务数据,并根据所选择的模板生成文档。 生成的文档具有数据字段内的财务数据。