Scareware detection
    6.
    发明授权
    Scareware detection 有权
    Scareware检测

    公开(公告)号:US09130988B2

    公开(公告)日:2015-09-08

    申请号:US13159978

    申请日:2011-06-14

    IPC分类号: H04L29/06 G06F21/00

    摘要: A machine-implemented method for detecting scareware includes the steps of accessing one or more landing pages to be evaluated, extracting one or more features from the landing pages, and providing a classifier to compare the features extracted from the landing pages with features of known scareware and non-scareware pages. The classifier determines a likelihood that the landing page is scareware. If determined to be scareware, the landing page is removed from search results generated by a search engine. The features can be URLs, text, image interest points, image descriptors, a number of pop-ups generated, IP addresses, hostnames, domain names, text derived from images, images, metadata, identifiers of executables, and combinations thereof.

    摘要翻译: 用于检测scareware的机器实现的方法包括访问要评估的一个或多个着陆页,从着陆页提取一个或多个特征并提供分类器以将从着陆页提取的特征与已知scareware的特征进行比较的步骤 和非scareware页面。 分类器确定着陆页是scareware的可能性。 如果确定是scareware,则着陆页将从搜索引擎生成的搜索结果中删除。 特征可以是URL,文本,图像兴趣点,图像描述符,生成的弹出窗口的数量,IP地址,主机名,域名,从图像,图像,元数据,可执行文件的标识符以及它们的组合导出的文本。

    DETECTION OF CODE-BASED MALWARE
    7.
    发明申请
    DETECTION OF CODE-BASED MALWARE 有权
    检测基于代码的恶意软件

    公开(公告)号:US20120216280A1

    公开(公告)日:2012-08-23

    申请号:US13031061

    申请日:2011-02-18

    IPC分类号: G06F11/00 G06F15/18

    CPC分类号: G06N7/005

    摘要: This document describes techniques for detection of code-based malware. According to some embodiments, the techniques utilize a collection of known malicious code and know benign code and determine which features of each type of code can be used to determine whether unclassified code is malicious or benign. The features can then be used to train a classifier (e.g., a Bayesian classifier) to characterize unclassified code as malicious or benign. In at least some embodiments, the techniques can be used as part of and/or in cooperation with a web browser to inspect web content (e.g., a web page) to determine if the content includes code-based malware.

    摘要翻译: 本文档描述了基于代码的恶意软件检测技术。 根据一些实施例,该技术利用已知恶意代码的集合并且知道良性代码并且确定可以使用每种类型的代码的哪些特征来确定未分类的代码是恶意的还是良性的。 然后可以使用特征来训练分类器(例如,贝叶斯分类器)来将未分类的代码描述为恶意或良性的。 在至少一些实施例中,可以将这些技术用作网页浏览器的一部分和/或与网络浏览器合作来检查网页内容(例如,网页)以确定内容是否包括基于代码的恶意软件。

    Electrical galvanic bath contact element
    8.
    发明授权
    Electrical galvanic bath contact element 失效
    电镀浴接触元件

    公开(公告)号:US4196058A

    公开(公告)日:1980-04-01

    申请号:US938386

    申请日:1978-08-31

    申请人: Christian Seifert

    发明人: Christian Seifert

    CPC分类号: H01G4/232 C25D17/16 H05K3/241

    摘要: To provide for uniform distribution of contact element bodies which are placed in a drum immersed in a galvanic bath and to provide contact to the metallic coating on components, the metallic coating of which is to be reinforced by galvanic deposition, the contact elements comprise tiny, especially cylindrical cores made of a material having approximately the same order of magnitude of specific gravity as the components, for example being made of a similar material, of glass, plastic, or the like, and coated with a metallic coating on the outside, essentially entirely covering the cores. The coating may be nickel or copper, and for use with tiny capacitors, lead-through elements, and the like, a preferred size of about the same length as diameter of the coated e.g. cylindrical cores is suitable, for example about 3 mm length and diameter. These elements can be made by multiple dry extrusion, with the edges rounded off before being coated.

    摘要翻译: 为了提供均匀分布的接触元件体,其放置在浸入电镀浴中的滚筒中并且提供与部件上的金属涂层的接触,金属涂层将被电沉积加强,接触元件包括微小的, 特别是由具有与例如由玻璃,塑料等类似的材料制成的组分大致相同的比重量级的材料制成的圆柱形芯,并且在外部涂覆有金属涂层,基本上 完全覆盖核心。 涂层可以是镍或铜,并且用于微小的电容器,引入元件等,优选尺寸与涂覆的例如直径相同的长度。 圆柱形芯是适合的,例如约3mm长度和直径。 这些元件可以通过多次干挤出制成,边缘在被涂覆之前被倒圆。

    Execution of multiple execution paths
    9.
    发明授权
    Execution of multiple execution paths 有权
    执行多个执行路径

    公开(公告)号:US09038185B2

    公开(公告)日:2015-05-19

    申请号:US13339322

    申请日:2011-12-28

    IPC分类号: G06F11/00 G06F11/36 G06F21/56

    摘要: Techniques for execution of multiple execution paths are described. In one or more embodiments, an execution of a portion of executable code is conditioned upon a particular environment-specific value. For example, the execution of the executable code can cause one type of output if the value of the variable equals a particular value, and can cause a different type of output if the value of the variable equals a different value. Techniques discussed herein can enable the executable code to be executed such that multiple outputs are produced, e.g., by executing the code according to the different values for the variable. In implementations, the multiple outputs can be analyzed for various attributes, such as presence of malware, implementation and coding errors, and so on.

    摘要翻译: 描述用于执行多个执行路径的技术。 在一个或多个实施例中,可执行代码的一部分的执行受特定环境特定值的限制。 例如,如果变量的值等于特定值,则可执行代码的执行可能导致一种类型的输出,如果变量的值等于不同的值,则可能导致不同类型的输出。 这里讨论的技术可以使得执行可执行代码,使得例如通过根据变量的不同值执行代码来产生多个输出。 在实现中,可以分析多个输出的各种属性,例如恶意软件的存在,实现和编码错误等。

    Execution of Multiple Execution Paths
    10.
    发明申请
    Execution of Multiple Execution Paths 有权
    执行多个执行路径

    公开(公告)号:US20130174258A1

    公开(公告)日:2013-07-04

    申请号:US13339322

    申请日:2011-12-28

    IPC分类号: G06F21/00 G06F9/44

    摘要: Techniques for execution of multiple execution paths are described. In one or more embodiments, an execution of a portion of executable code is conditioned upon a particular environment-specific value. For example, the execution of the executable code can cause one type of output if the value of the variable equals a particular value, and can cause a different type of output if the value of the variable equals a different value. Techniques discussed herein can enable the executable code to be executed such that multiple outputs are produced, e.g., by executing the code according to the different values for the variable. In implementations, the multiple outputs can be analyzed for various attributes, such as presence of malware, implementation and coding errors, and so on.

    摘要翻译: 描述用于执行多个执行路径的技术。 在一个或多个实施例中,可执行代码的一部分的执行受特定环境特定值的限制。 例如,如果变量的值等于特定值,则可执行代码的执行可能导致一种类型的输出,如果变量的值等于不同的值,则可能导致不同类型的输出。 这里讨论的技术可以使得执行可执行代码,使得例如通过根据变量的不同值执行代码来产生多个输出。 在实现中,可以分析多个输出的各种属性,例如恶意软件的存在,实现和编码错误等。