Methods and Systems for Protecting Computing Devices from Non-Benign Software Applications via Collaborative Application Detonation
A network and its devices may be protected from non-benign behavior, malware, and cyber attacks by configuring a server computing device to work in conjunction with a multitude of client computing devices in the network. The server computing device may be configured to receive data that was collecte...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Islam Nayeem Das Saumitra Mohan Nandha Premnath Sriram Chen Yin |
description | A network and its devices may be protected from non-benign behavior, malware, and cyber attacks by configuring a server computing device to work in conjunction with a multitude of client computing devices in the network. The server computing device may be configured to receive data that was collected from independent executions of different instances of the same software application on different client computing devices. The server computing device may combine the received data, and use the combined data to identify unexplored code space or potential code paths for evaluation. The server computing device may then exercise the software application through the identified unexplored code space or identified potential code paths in a client computing device emulator to generate analysis results, and use the generated analysis results to determine whether the software application is non-benign. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2018054449A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2018054449A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2018054449A13</originalsourceid><addsrcrecordid>eNqNjL0KwjAUhbs4iPoOF5wLrVbQsVbFRRGqs8T0tgbSe0MSK86-uKG4uDmdj_M3jN4H9HeuHAiqoHw5j62Dmi2cLHuUXlEDBbfm0dMGOyUxFCy3cGSK10iqISi59k9hEXJjtJLCKyYHnRJhq7W4sQ1W9xOHL8_U4zga1EI7nHx1FE1323Oxj9HwFZ0REgn99VLOknSZLLIsW-Xp_L_WB21GS6c</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Methods and Systems for Protecting Computing Devices from Non-Benign Software Applications via Collaborative Application Detonation</title><source>esp@cenet</source><creator>Islam Nayeem ; Das Saumitra Mohan ; Nandha Premnath Sriram ; Chen Yin</creator><creatorcontrib>Islam Nayeem ; Das Saumitra Mohan ; Nandha Premnath Sriram ; Chen Yin</creatorcontrib><description>A network and its devices may be protected from non-benign behavior, malware, and cyber attacks by configuring a server computing device to work in conjunction with a multitude of client computing devices in the network. The server computing device may be configured to receive data that was collected from independent executions of different instances of the same software application on different client computing devices. The server computing device may combine the received data, and use the combined data to identify unexplored code space or potential code paths for evaluation. The server computing device may then exercise the software application through the identified unexplored code space or identified potential code paths in a client computing device emulator to generate analysis results, and use the generated analysis results to determine whether the software application is non-benign.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2018</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20180222&DB=EPODOC&CC=US&NR=2018054449A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76290</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20180222&DB=EPODOC&CC=US&NR=2018054449A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Islam Nayeem</creatorcontrib><creatorcontrib>Das Saumitra Mohan</creatorcontrib><creatorcontrib>Nandha Premnath Sriram</creatorcontrib><creatorcontrib>Chen Yin</creatorcontrib><title>Methods and Systems for Protecting Computing Devices from Non-Benign Software Applications via Collaborative Application Detonation</title><description>A network and its devices may be protected from non-benign behavior, malware, and cyber attacks by configuring a server computing device to work in conjunction with a multitude of client computing devices in the network. The server computing device may be configured to receive data that was collected from independent executions of different instances of the same software application on different client computing devices. The server computing device may combine the received data, and use the combined data to identify unexplored code space or potential code paths for evaluation. The server computing device may then exercise the software application through the identified unexplored code space or identified potential code paths in a client computing device emulator to generate analysis results, and use the generated analysis results to determine whether the software application is non-benign.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2018</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNjL0KwjAUhbs4iPoOF5wLrVbQsVbFRRGqs8T0tgbSe0MSK86-uKG4uDmdj_M3jN4H9HeuHAiqoHw5j62Dmi2cLHuUXlEDBbfm0dMGOyUxFCy3cGSK10iqISi59k9hEXJjtJLCKyYHnRJhq7W4sQ1W9xOHL8_U4zga1EI7nHx1FE1323Oxj9HwFZ0REgn99VLOknSZLLIsW-Xp_L_WB21GS6c</recordid><startdate>20180222</startdate><enddate>20180222</enddate><creator>Islam Nayeem</creator><creator>Das Saumitra Mohan</creator><creator>Nandha Premnath Sriram</creator><creator>Chen Yin</creator><scope>EVB</scope></search><sort><creationdate>20180222</creationdate><title>Methods and Systems for Protecting Computing Devices from Non-Benign Software Applications via Collaborative Application Detonation</title><author>Islam Nayeem ; Das Saumitra Mohan ; Nandha Premnath Sriram ; Chen Yin</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2018054449A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2018</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>Islam Nayeem</creatorcontrib><creatorcontrib>Das Saumitra Mohan</creatorcontrib><creatorcontrib>Nandha Premnath Sriram</creatorcontrib><creatorcontrib>Chen Yin</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Islam Nayeem</au><au>Das Saumitra Mohan</au><au>Nandha Premnath Sriram</au><au>Chen Yin</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Methods and Systems for Protecting Computing Devices from Non-Benign Software Applications via Collaborative Application Detonation</title><date>2018-02-22</date><risdate>2018</risdate><abstract>A network and its devices may be protected from non-benign behavior, malware, and cyber attacks by configuring a server computing device to work in conjunction with a multitude of client computing devices in the network. The server computing device may be configured to receive data that was collected from independent executions of different instances of the same software application on different client computing devices. The server computing device may combine the received data, and use the combined data to identify unexplored code space or potential code paths for evaluation. The server computing device may then exercise the software application through the identified unexplored code space or identified potential code paths in a client computing device emulator to generate analysis results, and use the generated analysis results to determine whether the software application is non-benign.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_US2018054449A1 |
source | esp@cenet |
subjects | CALCULATING COMPUTING COUNTING ELECTRIC COMMUNICATION TECHNIQUE ELECTRIC DIGITAL DATA PROCESSING ELECTRICITY PHYSICS TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
title | Methods and Systems for Protecting Computing Devices from Non-Benign Software Applications via Collaborative Application Detonation |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-30T01%3A03%3A52IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Islam%20Nayeem&rft.date=2018-02-22&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2018054449A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |