摘要:
Computer implemented methods, apparati, and computer readable media for determining whether an electronic message (30) is likely to contain spam. A method embodiment of the present invention comprises the steps of comparing (11) addresses associated with the electronic message (30) with addresses in an address book (21) of a recipient (20) of the electronic message (30); counting (12) instances for which an address associated with the electronic message (30) matches an address in the address book (21); and determining (13) whether spam is likely present in the electronic message (30) by calculating whether a pre-selected condition (70) is satisfied, said pre-selected condition (70) being based upon a count of said matches and at least one predetermined threshold (80).
摘要:
A computer-implemented method for determining the health impact of an application based on information obtained from like-profiled computing systems may comprise: 1) obtaining a plurality of computing-system profiles, 2) obtaining system-health-evaluation results for each of the plurality of computing-system profiles, 3) identifying, by analyzing the plurality of computing-system profiles, a first set of like-profiled computing systems, 4) identifying, by analyzing the plurality of computing-system profiles, a second set of like-profiled computing systems that is substantially identical to the first set of like-profiled computing systems but for a first application installed on the second set of like-profiled computing systems, and 5) determining the health impact of the first application by comparing system-health-evaluation results from the first set of like-profiled computing systems with system-health-evaluation results from the second set of like-profiled computing systems. Corresponding systems and computer-readable media are also disclosed.
摘要:
Method and apparatus for searching a storage system for confidential data is described. One aspect of the invention relates to searching a computer for confidential data related to user. User information comprising the confidential data is obtained from a digital identity for the user. A rule that provides a secure representation of the user information is generated. A storage system in the computer is searched using the rule to detect one or more instances of the user information within at least one file.
摘要:
A method includes determining if an attempt to recreate a requested resource is made, and, if so, if the requested resource is a suspicious resource. If the requested resource is a suspicious resource, identification of an originating process is made. A determination is made if the originating process is a non-trusted originating process or a trusted originating process. If the originating process is the non-trusted originating process, a protective action is taken. In this manner, self-repairing and persistent malicious code is identified and removed with minimal adverse impact on system functionality.
摘要:
An anti-spyware manager uses domain name service resolution queries to combat spyware. The anti-spyware manager maintains a list of domain names associated with spyware, monitors domain name service queries, and detects queries on domain names on the list. Responsive to detecting a domain name service query on a domain name associated with spyware, the anti-spyware manager forces the domain name service query to resolve to an address not associated with the domain name. Because attempts by spyware to communicate with its home server are now routed to the forced address, the spyware is unable to communicate with its homer server, and thus can neither steal information nor download updates of itself. Additionally, the anti-spyware manager can identify computers that are infected with spyware and clean or quarantine them.
摘要:
A computer-implemented method for detecting man-in-the-browser attacks may include identifying a transaction fingerprint associated with a web site. The method may also include tracking a user's input to the web site. The user's input may be received through a web browser. The method may further include intercepting an outgoing submission to the web site. The method may additionally include determining whether, in light of the transaction fingerprint, the user's input generated the outgoing submission. Various other methods, systems, and computer-readable media are also disclosed.
摘要:
Providing security comprises accessing a database configured to store operational information associated with a process, determining a first behavior using the operational information wherein the first behavior is associated with the process, monitoring the process, and comparing a second behavior with the first behavior wherein the second behavior is attempted by the process.
摘要:
Certain events, such as data input operating system calls, are likely to initiate a buffer overflow attack. A timing module generates timestamps that indicate when such possible initiating events occur. The timestamp is associated with a particular process and/or thread executing on the computer. If subsequent evidence of a buffer overflow attack is detected on the computer, the timestamps are consulted to determine if a possible initiating event occurred recently. If there is a recent initiating event, a buffer overflow attack is declared. Evidence of a buffer overflow attack can include receiving a signal from the processor indicating that the processor was asked to execute an instruction residing in non-executable memory. Evidence of a buffer overflow attack can also include detecting an action on the computer that malicious software is likely to perform, such as opening a file or network connection, being performed by an instruction residing in non-executable memory.
摘要:
On start up of a process, a critical imported functions table including resolved addresses of critical imported functions that an application, such as a host intrusion detection system application depends upon to have data integrity, is dynamically allocated and marked read only to impede modification by malicious code. The critical imported functions are hooked so that execution of a call to a critical imported function is made using a corresponding entry in the critical imported functions table rather than an entry in a current process IAT, which may have been modified by malicious code. The current process IAT is evaluated to determine whether it has changed from an initial start up state, in a way that is indicative of an evasion attempt by malicious code. If an evasion attempt is detected, a notification is provided to a user and/or system administrator. Optionally, protective action is taken, such as saving a copy of the current process IAT to permit later analysis of the change.
摘要:
Computer-implemented methods and systems for creating or updating approved-file and trusted-domain databases and verifying the legitimacy of files are disclosed. A method for creating or updating an approved-file database may comprise intercepting a first file, identifying a source domain associated with the first file, identifying a trusted-domain database, determining whether a database record for the source domain associated with the first file exists within the trusted-domain database, creating a hash value for the first file if a database record for the source domain associated with the first file exists within the trusted-domain database, and storing the hash value for the first file in an approved-file database. Methods and systems for verifying the legitimacy of a file and for creating or updating a trusted-domain database are also disclosed.