Method and apparatus for monitoring communications from a communications device
    1.
    发明授权
    Method and apparatus for monitoring communications from a communications device 有权
    用于监视来自通信设备的通信的方法和装置

    公开(公告)号:US08555379B1

    公开(公告)日:2013-10-08

    申请号:US11864810

    申请日:2007-09-28

    IPC分类号: H04L29/06

    摘要: A method and apparatus for monitoring communications from a communications device comprising monitoring communications from a communications device by storing a data acquisition address in a contact list of the communications device that identifies a location of a monitoring device. Further, when malicious software uses the contact list to send messages, a message is sent using the malicious software to the monitoring device using the data acquisition address.

    摘要翻译: 一种用于监测来自通信设备的通信的方法和装置,包括通过将数据采集地址存储在识别监视设备的位置的通信设备的联系人列表中来监视来自通信设备的通信。 此外,当恶意软件使用联系人列表发送消息时,使用数据采集地址将使用恶意软件的消息发送到监视设备。

    Method for scanning protected components of electronic messages
    2.
    发明授权
    Method for scanning protected components of electronic messages 有权
    扫描电子信息的受保护组件的方法

    公开(公告)号:US07730540B1

    公开(公告)日:2010-06-01

    申请号:US11007889

    申请日:2004-12-08

    IPC分类号: G06F7/04 G06F11/30

    摘要: An security module includes a detection module for determining that an electronic message received for scanning includes a protected component. The security module also includes a parsing module for parsing the electronic message to identify potential passwords for the protected component. The security module further includes an analysis module for attempting to access the protected component of the electronic message using the identified potential passwords. A submission module submits potential passwords to a decomposition module for accessing the protected component. If the correct password is found, the decomposition module opens the protected component and/or extracts the contents of the archive. An analyzer module analyzes or scans the contents of the protected component.

    摘要翻译: 安全模块包括检测模块,用于确定接收到的用于扫描的电子消息包括受保护的组件。 安全模块还包括解析模块,用于解析电子消息以识别受保护组件的潜在密码。 安全模块还包括分析模块,用于使用所识别的潜在密码尝试访问电子消息的受保护组件。 提交模块将潜在密码提交给分解模块,以访问受保护的组件。 如果找到正确的密码,分解模块将打开受保护的组件和/或提取存档的内容。 分析器模块分析或扫描受保护组件的内容。

    Capturing a security breach
    3.
    发明授权
    Capturing a security breach 有权
    捕获安全漏洞

    公开(公告)号:US07725937B1

    公开(公告)日:2010-05-25

    申请号:US10775764

    申请日:2004-02-09

    申请人: Elias Levy

    发明人: Elias Levy

    IPC分类号: G06F12/14 G06F11/00

    摘要: A technique is disclosed for capturing a security breach. In one embodiment, the technique comprises initially deploying a honey pot; detecting a breach of the honey pot; and automatically redeploying the honey pot.

    摘要翻译: 公开了一种用于捕获安全漏洞的技术。 在一个实施方案中,该技术包括最初部署蜂蜜罐; 检测到蜂蜜罐的破裂; 并自动重新部署蜂蜜罐。

    Method and system for detecting IA32 targeted buffer overflow attacks
    4.
    发明授权
    Method and system for detecting IA32 targeted buffer overflow attacks 有权
    检测IA32目标缓冲区溢出攻击的方法和系统

    公开(公告)号:US07650640B1

    公开(公告)日:2010-01-19

    申请号:US10968225

    申请日:2004-10-18

    申请人: Elias Levy

    发明人: Elias Levy

    CPC分类号: G06F21/554 G06F21/52

    摘要: Data streams are scanned to detect malicious jump-call-pop shellcode constructs used in attacks against stack-based buffer overflow vulnerabilities on software executing in the IA32 architecture prior to execution. Upon a detection of a malicious jump-call-pop shellcode construct, protective action is taken, such as preventing the malicious shellcode from executing.

    摘要翻译: 扫描数据流以检测在执行之前在IA32架构中执行的软件上的基于堆栈的缓冲区溢出漏洞的攻击中使用的恶意跳转呼叫 - shell代码结构。 在检测到恶意的跳转通话shellcode构造时,采取保护措施,例如防止恶意shellcode执行。