بعض محتويات هذا التطبيق غير متوفرة في الوقت الحالي.
إذا استمرت هذه الحالة ، يرجى الاتصال بنا علىتعليق وإتصال
1. (WO2017153983) SYSTEM AND METHOD FOR PERFORMING IN-CLOUD SECURITY OPERATIONS ON CONNECTED DEVICES‏
ملاحظة: نص مبني على عمليات التَعرف الضوئي على الحروف. الرجاء إستخدام صيغ PDF لقيمتها القانونية

CLAIMS

1. A system for protecting IoT devices from malicious code, which comprises '·

a. a memory extracting module at each of said IoT devices, for extracting a copy of at least a portion of the memory content from the IoT device, and sending the same to an in-cloud server; and

b. an in-cloude server for receiving said memory content, and performing an integrity check for a possible existance of malicious code within said memory content.

2. A system according to claim 1, wherein said in-cloud server performs one or more of the following:

a. analysis of the memory to find malware using static analysis methods;

b. analysis of the memory to find malicious behavior using behavioral and heuristics methods!

c. reconstruction of the state of an OS of the IoT to determine and report important structural elements!

d. check of the integrity of the OS and its memory to possibly find fault in the integrity or hidden processes!

e. a cross-view check on resources to find rootkits and hidden operations! and f. a cross-view check and validation of memory contents of plurality of IoT devices.

3. A system according to claim 1, wherein following said integrity check, said in- cloud server performs one or more of the following:

(1) logging of the results!

(2) reporting the results, raising a warning or an alert in a case of detection of an unexpected code or behaveior! or

(3) communicating and responding to an IoT request.

4. A system according to claim 1, wherein the memory, a copy of which is sent to the in-cloud server, is either a persistent memory or a non-persistent memory.

5. A system according to claim 1, wherein said memory extraction module is embedded within a kernel of a respective operating system of the IoT device.

6. A system according to claim 1, wherein said memory extraction module is positioned within a trusted layer at the IoT device.

7. A system according to claim 1, wherein said memory extraction module is positioned within a Trusted Execution Environment at the processor of the IoT device.