Detecting pirated applications
    3.
    发明授权
    Detecting pirated applications 有权
    检测盗版应用程序

    公开(公告)号:US08875303B2

    公开(公告)日:2014-10-28

    申请号:US13565304

    申请日:2012-08-02

    摘要: A method includes receiving a plurality of trusted assets, generating a first signature set for a known software application, and generating a second signature set for a subject software application. Each trusted asset is associated with at least a threshold number of trusted authors. Each signature in the first signature set corresponds to a known asset that is associated with the known software application. Each signature in the second signature set corresponds to a subject asset that is associated with the subject software application. The method further includes generating first and second filtered signature set based on the first and second signature sets, respectively, by excluding signatures corresponding to the trusted assets. The method also includes generating a similarity rating for the subject application based on a comparison of the first filtered signature set and the second filtered signature set.

    摘要翻译: 一种方法包括接收多个可信资产,为已知软件应用生成第一签名集,以及为主题软件应用生成第二签名集。 每个可信资产与至少一个阈值数量的可信作者相关联。 第一签名集中的每个签名对应于与已知软件应用相关联的已知资产。 第二签名集中的每个签名对应于与主题软件应用相关联的主题资产。 该方法还包括通过排除与可信资产相对应的签名,分别基于第一和第二签名集来生成第一和第二过滤签名集。 该方法还包括基于第一过滤签名集和第二过滤签名集的比较来生成针对主题应用的相似性等级。

    Worm propagation mitigation
    5.
    发明申请
    Worm propagation mitigation 有权
    蠕虫传播减轻

    公开(公告)号:US20070226801A1

    公开(公告)日:2007-09-27

    申请号:US11387092

    申请日:2006-03-21

    IPC分类号: G06F12/14

    CPC分类号: H04L63/145 G06F21/564

    摘要: A system, method, and computer program product for identifying a worm are disclosed. The system, method, and computer product are configured to generate a signature for a computer worm by identifying a set of bits representing the signature, generate a first worm signature based on the signature, and generate a second worm signature based on the signature. The first worm signature is formatted for a first device and the second worm signature is formatted for a second, different device. The first worm signature and the second worm signature are different.

    摘要翻译: 公开了一种用于识别蠕虫的系统,方法和计算机程序产品。 系统,方法和计算机产品被配置为通过标识表示签名的一组位来生成针对计算机蠕虫的签名,基于签名生成第一蠕虫签名,并且基于签名生成第二蠕虫签名。 第一个蠕虫签名被格式化为第一个设备,第二个蠕虫签名被格式化为第二个不同的设备。 第一个蠕虫签名和第二个蠕虫签名是不同的。

    Worm propagation mitigation
    6.
    发明授权
    Worm propagation mitigation 有权
    蠕虫传播减轻

    公开(公告)号:US08578479B2

    公开(公告)日:2013-11-05

    申请号:US11387092

    申请日:2006-03-21

    IPC分类号: G06F11/00

    CPC分类号: H04L63/145 G06F21/564

    摘要: A system, method, and computer program product for identifying a worm are disclosed. The system, method, and computer product are configured to generate a signature for a computer worm by identifying a set of bits representing the signature, generate a first worm signature based on the signature, and generate a second worm signature based on the signature. The first worm signature is formatted for a first device and the second worm signature is formatted for a second, different device. The first worm signature and the second worm signature are different.

    摘要翻译: 公开了一种用于识别蠕虫的系统,方法和计算机程序产品。 系统,方法和计算机产品被配置为通过标识表示签名的一组位来生成针对计算机蠕虫的签名,基于签名生成第一蠕虫签名,并且基于签名生成第二蠕虫签名。 第一个蠕虫签名被格式化为第一个设备,第二个蠕虫签名被格式化为第二个不同的设备。 第一个蠕虫签名和第二个蠕虫签名是不同的。

    Exploit-based worm propagation mitigation
    8.
    发明申请
    Exploit-based worm propagation mitigation 有权
    基于漏洞的蠕虫传播减轻

    公开(公告)号:US20070226802A1

    公开(公告)日:2007-09-27

    申请号:US11387114

    申请日:2006-03-21

    IPC分类号: G06F12/14

    摘要: A system, method and computer program product for exploit-based worm detection and mitigation are disclosed. The system, method, and computer program product are configured to identify a signature representing content prevalent in network traffic, determine if the traffic including the signature exhibits propagation, determine if the traffic including the signature exhibits connectedness, and generate a worm signature based on the signature if the signature exhibits both connectedness and propagation.

    摘要翻译: 公开了一种用于基于漏洞的蠕虫检测和缓解的系统,方法和计算机程序产品。 系统,方法和计算机程序产品被配置为标识表示网络流量中普遍存在的内容的签名,确定包括签名的流量是否展现传播,确定包括签名的流量是否呈现连续性,并且基于 签名如果签名具有连接性和传播性。

    Exploit-based worm propagation mitigation
    9.
    发明授权
    Exploit-based worm propagation mitigation 有权
    基于漏洞的蠕虫传播减轻

    公开(公告)号:US08006306B2

    公开(公告)日:2011-08-23

    申请号:US11387114

    申请日:2006-03-21

    IPC分类号: G06F21/00

    摘要: A system, method and computer program product for exploit-based worm detection and mitigation are disclosed. The system, method, and computer program product are configured to identify a signature representing content prevalent in network traffic, determine if the traffic including the signature exhibits propagation, determine if the traffic including the signature exhibits connectedness, and generate a worm signature based on the signature if the signature exhibits both connectedness and propagation.

    摘要翻译: 公开了一种用于基于漏洞的蠕虫检测和缓解的系统,方法和计算机程序产品。 系统,方法和计算机程序产品被配置为标识表示网络流量中普遍存在的内容的签名,确定包括签名的流量是否展现传播,确定包括签名的流量是否呈现连续性,并且基于 签名如果签名具有连接性和传播性。