Processing

Please wait...

Settings

Settings

Goto Application

1. WO2020136673 - MALWARE DETECTION

Publication Number WO/2020/136673
Publication Date 02.07.2020
International Application No. PCT/IN2019/050938
International Filing Date 20.12.2019
IPC
G06F 21/53 2013.01
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
52during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure
53by executing in a restricted environment, e.g. sandbox or secure virtual machine
G06F 21/56 2013.01
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
55Detecting local intrusion or implementing counter-measures
56Computer malware detection or handling, e.g. anti-virus arrangements
CPC
G06F 21/53
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
52during program execution, e.g. stack integrity ; ; Preventing unwanted data erasure; Buffer overflow
53by executing in a restricted environment, e.g. sandbox or secure virtual machine
G06F 21/56
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
55Detecting local intrusion or implementing counter-measures
56Computer malware detection or handling, e.g. anti-virus arrangements
Applicants
  • SETH, Varun [IN]/[IN]
Inventors
  • SETH, Varun
Agents
  • LAKSHMIKUMARAN, Malathi
  • PHILLIPS, Prashant
  • RAE, Konpal
  • PANDEYA, Jaya
  • SRINIVASAN, T.
Priority Data
20181104973728.12.2018IN
Publication Language English (EN)
Filing Language English (EN)
Designated States
Title
(EN) MALWARE DETECTION
(FR) DÉTECTION DE LOGICIELS MALVEILLANTS
Abstract
(EN)
Approaches for detecting and rectifying the malware in the computing systems are described. In an example, a request by a process or is intercepted by the malware detection module. Relevant information and characteristics pertaining to the request are extracted and on the based on the extraction, operational attributes are generated. These extracted operational attributes are analyzed and compared with the baseline attributes and if there are any anomalies present, the susceptible code or process originating from the intercepted request is ascertained as malicious.
(FR)
L'invention concerne des approches de détection et de rectification du logiciel malveillant dans les systèmes informatiques. Dans un exemple, une requête par un processus est interceptée par le module de détection de logiciels malveillants. Des informations et des caractéristiques pertinentes se rapportant à la requête sont extraites et, sur la base de l'extraction, des attributs fonctionnels sont générés. Ces attributs fonctionnels extraits sont analysés et comparés aux attributs de référence et, s'il existe une quelconque anomalie présente, le code ou le processus sensible provenant de la requête interceptée est déterminé comme étant malveillant.
Latest bibliographic data on file with the International Bureau