Methods and Systems for Protecting Computing Devices from Non-Benign Software Applications via Collaborative Application Detonation

A network and its devices may be protected from non-benign behavior, malware, and cyber attacks by configuring a server computing device to work in conjunction with a multitude of client computing devices in the network. The server computing device may be configured to receive data that was collecte...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Islam Nayeem, Das Saumitra Mohan, Nandha Premnath Sriram, Chen Yin
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Islam Nayeem
Das Saumitra Mohan
Nandha Premnath Sriram
Chen Yin
description A network and its devices may be protected from non-benign behavior, malware, and cyber attacks by configuring a server computing device to work in conjunction with a multitude of client computing devices in the network. The server computing device may be configured to receive data that was collected from independent executions of different instances of the same software application on different client computing devices. The server computing device may combine the received data, and use the combined data to identify unexplored code space or potential code paths for evaluation. The server computing device may then exercise the software application through the identified unexplored code space or identified potential code paths in a client computing device emulator to generate analysis results, and use the generated analysis results to determine whether the software application is non-benign.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2018054449A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2018054449A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2018054449A13</originalsourceid><addsrcrecordid>eNqNjL0KwjAUhbs4iPoOF5wLrVbQsVbFRRGqs8T0tgbSe0MSK86-uKG4uDmdj_M3jN4H9HeuHAiqoHw5j62Dmi2cLHuUXlEDBbfm0dMGOyUxFCy3cGSK10iqISi59k9hEXJjtJLCKyYHnRJhq7W4sQ1W9xOHL8_U4zga1EI7nHx1FE1323Oxj9HwFZ0REgn99VLOknSZLLIsW-Xp_L_WB21GS6c</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Methods and Systems for Protecting Computing Devices from Non-Benign Software Applications via Collaborative Application Detonation</title><source>esp@cenet</source><creator>Islam Nayeem ; Das Saumitra Mohan ; Nandha Premnath Sriram ; Chen Yin</creator><creatorcontrib>Islam Nayeem ; Das Saumitra Mohan ; Nandha Premnath Sriram ; Chen Yin</creatorcontrib><description>A network and its devices may be protected from non-benign behavior, malware, and cyber attacks by configuring a server computing device to work in conjunction with a multitude of client computing devices in the network. The server computing device may be configured to receive data that was collected from independent executions of different instances of the same software application on different client computing devices. The server computing device may combine the received data, and use the combined data to identify unexplored code space or potential code paths for evaluation. The server computing device may then exercise the software application through the identified unexplored code space or identified potential code paths in a client computing device emulator to generate analysis results, and use the generated analysis results to determine whether the software application is non-benign.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2018</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20180222&amp;DB=EPODOC&amp;CC=US&amp;NR=2018054449A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76290</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20180222&amp;DB=EPODOC&amp;CC=US&amp;NR=2018054449A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Islam Nayeem</creatorcontrib><creatorcontrib>Das Saumitra Mohan</creatorcontrib><creatorcontrib>Nandha Premnath Sriram</creatorcontrib><creatorcontrib>Chen Yin</creatorcontrib><title>Methods and Systems for Protecting Computing Devices from Non-Benign Software Applications via Collaborative Application Detonation</title><description>A network and its devices may be protected from non-benign behavior, malware, and cyber attacks by configuring a server computing device to work in conjunction with a multitude of client computing devices in the network. The server computing device may be configured to receive data that was collected from independent executions of different instances of the same software application on different client computing devices. The server computing device may combine the received data, and use the combined data to identify unexplored code space or potential code paths for evaluation. The server computing device may then exercise the software application through the identified unexplored code space or identified potential code paths in a client computing device emulator to generate analysis results, and use the generated analysis results to determine whether the software application is non-benign.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2018</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNjL0KwjAUhbs4iPoOF5wLrVbQsVbFRRGqs8T0tgbSe0MSK86-uKG4uDmdj_M3jN4H9HeuHAiqoHw5j62Dmi2cLHuUXlEDBbfm0dMGOyUxFCy3cGSK10iqISi59k9hEXJjtJLCKyYHnRJhq7W4sQ1W9xOHL8_U4zga1EI7nHx1FE1323Oxj9HwFZ0REgn99VLOknSZLLIsW-Xp_L_WB21GS6c</recordid><startdate>20180222</startdate><enddate>20180222</enddate><creator>Islam Nayeem</creator><creator>Das Saumitra Mohan</creator><creator>Nandha Premnath Sriram</creator><creator>Chen Yin</creator><scope>EVB</scope></search><sort><creationdate>20180222</creationdate><title>Methods and Systems for Protecting Computing Devices from Non-Benign Software Applications via Collaborative Application Detonation</title><author>Islam Nayeem ; Das Saumitra Mohan ; Nandha Premnath Sriram ; Chen Yin</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2018054449A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2018</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>Islam Nayeem</creatorcontrib><creatorcontrib>Das Saumitra Mohan</creatorcontrib><creatorcontrib>Nandha Premnath Sriram</creatorcontrib><creatorcontrib>Chen Yin</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Islam Nayeem</au><au>Das Saumitra Mohan</au><au>Nandha Premnath Sriram</au><au>Chen Yin</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Methods and Systems for Protecting Computing Devices from Non-Benign Software Applications via Collaborative Application Detonation</title><date>2018-02-22</date><risdate>2018</risdate><abstract>A network and its devices may be protected from non-benign behavior, malware, and cyber attacks by configuring a server computing device to work in conjunction with a multitude of client computing devices in the network. The server computing device may be configured to receive data that was collected from independent executions of different instances of the same software application on different client computing devices. The server computing device may combine the received data, and use the combined data to identify unexplored code space or potential code paths for evaluation. The server computing device may then exercise the software application through the identified unexplored code space or identified potential code paths in a client computing device emulator to generate analysis results, and use the generated analysis results to determine whether the software application is non-benign.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US2018054449A1
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC COMMUNICATION TECHNIQUE
ELECTRIC DIGITAL DATA PROCESSING
ELECTRICITY
PHYSICS
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title Methods and Systems for Protecting Computing Devices from Non-Benign Software Applications via Collaborative Application Detonation
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-30T01%3A03%3A52IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Islam%20Nayeem&rft.date=2018-02-22&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2018054449A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true