Generic method for detecting attack programs hidden in data chains
    1.
    发明授权
    Generic method for detecting attack programs hidden in data chains 失效
    用于检测隐藏在数据链中的攻击程序的通用方法

    公开(公告)号:US07891002B2

    公开(公告)日:2011-02-15

    申请号:US10491851

    申请日:2002-09-20

    CPC classification number: G06F21/563

    Abstract: This invention concerns a method for processing computer system input data including at least one detection step for a specific word INSTR present among said data.In the method according to the invention, the specific word to be detected represents an instruction necessary for the execution of a program present among said data.Because it focuses detection on the means necessary for the execution of an attack program that thus reveal the presence of said program, the invention can be used to simply and effectively detect different types of attacks.

    Abstract translation: 本发明涉及一种用于处理计算机系统输入数据的方法,该方法包括在所述数据中存在的特定字INSTR的至少一个检测步骤。 在根据本发明的方法中,要检测的特定字表示执行所述数据中存在的程序所需的指令。 因为它将检测集中在执行攻击程序所必需的手段,从而揭示所述程序的存在,所以本发明可以用于简单有效地检测不同类型的攻击。

    Generic method of detecting attack programs hidden in data chains
    2.
    发明申请
    Generic method of detecting attack programs hidden in data chains 失效
    检测隐藏在数据链中的攻击程序的通用方法

    公开(公告)号:US20050091528A1

    公开(公告)日:2005-04-28

    申请号:US10491851

    申请日:2002-09-20

    CPC classification number: G06F21/563

    Abstract: This invention concerns a method for processing computer system input data including at least one detection step for a specific word INSTR present among said data. In the method according to the invention, the specific word to be detected represents an instruction necessary for the execution of a program present among said data. Because it focuses detection the means necessary for the execution of an attack program that thus reveal the presence of said program, the invention can be used to simply and effectively detect different types of attacks.

    Abstract translation: 本发明涉及一种用于处理计算机系统输入数据的方法,该方法包括在所述数据中存在的特定字INSTR的至少一个检测步骤。 在根据本发明的方法中,要检测的特定字表示执行所述数据中存在的程序所需的指令。 因为它集中检测执行攻击程序所必需的手段,从而揭示出所述程序的存在,本发明可以用于简单有效地检测不同类型的攻击。

Patent Agency Ranking