摘要:
An apparatus for electromagnetic interference shielding is described herein. The apparatus includes an electromagnetic bandgap (EBG) structure. The EBG structure is attached to a surface of the apparatus such that noise propagation is mitigated. The apparatus may be a chassis of an electronic device, and the EBG structure may be attached to one surface of the chassis. Further, the apparatus may be a heat sink, and the EBG structure can be attached to one surface of the heat sink.
摘要:
A computer-implemented method for identifying malware threat vectors may include 1) identifying a computing system that includes a first human interface device, 2) detecting an introduction of a new device to the computing system that presents itself to the computing system as a second human interface device, 3) determining that the second human interface device is configured to generate a type of input event equivalent to the type of input event generated by the first human interface device, 4) determining, based on the second human interface device being configured to generate the type of input event equivalent to the type of input event generated by the first human interface device, that the second human interface device includes a potential malware attack vector. Various other methods, systems, and computer-readable media are also disclosed.
摘要:
A computer-implemented method for detecting malicious digitally-signed applications. The method may include 1) identifying an application package file that has been digitally signed, wherein the application package file is used to distribute an application, 2) comparing the application package file to a set of known application package files, 3) determining that the application package file has been repackaged from a known application package file, 4) comparing a public key associated with a digital signature of the application package file to a public key associated with a digital signature of the known application package file, 5) determining that the public key associated with the digital signature of the application package file and the public key associated with the digital signature of the known application package file are different, and 6) performing a security action on the application. Various other methods, systems, and computer-readable media are also disclosed.
摘要:
A method for using acquisitional contexts to prevent false-positive malware classifications. The method may include (1) receiving, from at least one client-side computing device within a community of users, contextual information associated with a file, (2) determining, based at least in part on the contextual information received from the client-side computing device, a reputation rating for the file, and (3) providing the reputation rating for the file to at least one additional client-side computing device within the community in order to prevent the additional client-side computing device from falsely classifying the file as untrustworthy due to acquiring an additional instance of the file via a context that is insufficient to determine that the additional instance of the file is trustworthy. Various other methods and systems are also disclosed.
摘要:
Described herein are techniques related to near field coupling and wireless power transfers. A mobile device may include an edge-emitting antenna that offers ultra slim, all-metallic chassis packaging option with no cutout, uses lesser area, has robust mechanical strength, and provides EMI/ESD protection. In one example, an inductor coil is wrapped around a magnetic core and a pair of conductive layers is configured to interpose the magnetic core and the inductor coil between them to expose an edge of the magnetic core. The inductor coil being operable in a transmit mode to generate a magnetic field in response to a current passing through it. The edge is configured to enhance outward radiation of the magnetic field. Based on simulation results, the edge-emitting antenna occupies less space and provides an acceptable level of performance for coupling coefficients compared to conventional antenna.
摘要:
A hook is set for one or more downloading functions. Subsequently, code is executed within an application process. Responsive to the executed code calling one of the hooked functions to download code, a return address of the called function is examined. If the return address is within a memory area not marked executable, the code is permitted to be downloaded and the downloaded code is submitted to a security server for analysis.
摘要:
The invention in some embodiments features a contextual content delivery system (CCDS) for enhancing conventional web content with pop-up bubbles that display information when a cursor hovers over a word, link, or icon. The CCDS is configured to identify words or links in a document, determine their context, select the appropriate bubble from a plural of bubble types for each of the words or links, select content for each bubble based, in part, on the context in which the words and hyperlinks are used. The context can be determined from various sources including the resource in which the word or link appears and the target resource to which the link points. Thereafter, the CCDS enhances the words or links so that bubbles are automatically invoked in response to the appropriate trigger.
摘要:
A computer-implemented method for creating customized confidence bands for use in malware detection may include 1) identifying a portal for receiving executable content, 2) identifying metadata relating to the portal, 3) analyzing the metadata to determine what risk executable content received via the portal poses, and then 4) creating, based on the analysis, a confidence band to apply during at least one disposition of executable content received via the portal. Various other methods, systems, and computer-readable media are also disclosed.
摘要:
A method for generating an operating status at a defined time for an operating entity, comprising the steps of: generating one or more time rules for hours of operation of the operating entity; determining an operating status value by comparing the time with the time rules; and matching an operating status to said operating status value.