会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Computer exploit detection using heap spray pattern matching
    • 使用堆喷雾模式匹配的计算机利用检测
    • US09438623B1
    • 2016-09-06
    • US14311035
    • 2014-06-20
    • FireEye, Inc.
    • Emmanuel ThiouxSai VashishtMichael Vincent
    • G06F17/30H04N7/16H04L29/06
    • H04L63/1466G06F21/52
    • According to one embodiment, a threat detection system is integrated with at least a dynamic analysis engine. The dynamic analysis engine is configured to automatically to detect potential shellcode at a first storage location within a region of memory allocated for an application, conduct a first search at one or more storage locations prior to the first storage location within the region of allocated memory for at least one or more patterns, conduct a second search at one or more storage locations subsequent to the first storage location within the region of allocated memory for at least one or more patterns, detect a first pattern at one or more storage locations prior to the first storage location within the region of allocated memory, and detect a second pattern at one or more storage locations subsequent to the first storage location with the region of allocated memory, wherein at least one of the first pattern or the second pattern is absent from a predefined list of patterns.
    • 根据一个实施例,威胁检测系统与至少一个动态分析引擎集成。 动态分析引擎被配置为自动地检测分配给应用的存储器区域内的第一存储位置处的潜在shellcode,在分配的存储器区域内的第一存储位置之前的一个或多个存储位置处进行第一次搜索, 至少一个或多个图案,对于至少一个或多个图案,在分配的存储器的区域内的第一存储位置之后的一个或多个存储位置处进行第二次搜索,在第一图案之前的一个或多个存储位置检测第一图案 在分配的存储器的区域内的第一存储位置,并且在所分配的存储器的区域之后的第一存储位置之后的一个或多个存储位置处检测第二模式,其中第一模式或第二模式中的至少一个不存在于 预定义的模式列表。
    • 6. 发明授权
    • File extraction from memory dump for malicious content analysis
    • 从内存转储中提取文件进行恶意内容分析
    • US09355247B1
    • 2016-05-31
    • US13801545
    • 2013-03-13
    • FireEye, Inc.
    • Emmanuel ThiouxMuhammad AminOsman Ismael
    • G06F21/55
    • G06F21/55G06F21/53G06F21/564
    • Techniques for malicious content detection using memory dump are described herein. According to one embodiment, a monitoring module is configured to monitor activities of a malicious content suspect executed within a sandboxed operating environment. In response to detection of one or more predetermined events triggered by the malicious content suspect, a memory dump module is configured to generate a memory dump of the malicious content suspect. An analysis module is configured to analyze the memory dump to determine whether the malicious content suspect should be declared as malicious based on a set of one or more rules.
    • 本文描述了使用存储器转储进行恶意内容检测的技术。 根据一个实施例,监视模块被配置为监视在沙箱操作环境内执行的恶意内容嫌疑人的活动。 响应于检测到由恶意内容可疑者触发的一个或多个预定事件,存储器转储模块被配置为生成恶意内容可疑者的存储器转储。 分析模块被配置为分析内存转储以基于一组或多个规则来确定恶意内容是否应该被宣告为恶意的。