Patent classifications
G06F2221/033
TRANSPORT ONBOARD SECURITY CHECK
An example operation includes one or more of saving a hash of data including occupant data and transport data on a transport in response to the transport is started, performing a security check that validates the hash of data against the data in response to the transport is started, and providing a resolution when the security check fails.
ESTABLISHING TRUST BETWEEN APPLICATIONS IN A COMPUTING ENVIRONMENT
A method, system and device are disclosed. A premises device comprising a first operating system and a second operating system is described. The premises device comprises processing circuitry configured to establish a chain of trust at least between the first operating system and at least one software application associated with the second operating system. The processing circuitry is further configured to perform at least one action based at least in part on the established chain of trust.
COMPONENT ACCESS TO ROM-STORED FIRMWARE CODE OVER FIRMWARE CONTROLLER EXPOSED VIRTUAL ROM LINK
A read-only memory (ROM) stores firmware code for a hardware component. A firmware controller is directly physically connected to the hardware component and to the ROM. The firmware controller exposes a virtual ROM link to the hardware component. The hardware component accesses the firmware code over the virtual ROM link exposed by the firmware controller.
Script Classification on Computing Platform
Aspects of the disclosure are directed to a system for classifying software as malicious or benign based on predicting the effect the software has on the platform before the software is actually deployed. A system as described herein can operate in close to real-time to receive, isolate, and classify software as benign or malicious. Aspects of the disclosure provide for accurate classification of malicious programs or scripts even if ostensibly the program appears benign, and vice versa, based on the effect predicted by a machine learning model trained as described herein. The system can also be implemented to isolate and verify incoming scripts or software to the platform, to provide a predicted classification while not substantially impacting processing pipelines involving platform resources or the user experience with the platform in general.
CORRUPTION DETERMINATION OF DATA ITEMS USED BY A BUILD SERVER
In some examples, a system receives first measurements of data items used by a build server in building an executable program, the data items copied from a data repository to a storage partition that is separate from the data repository, and the storage partition to store the data items relating to building the executable program by the build server. The system determines, based on the first measurements and according to a policy specified for the storage partition, whether a corruption of the data items used by the build server in building the executable program has occurred.
OBTAINING INFORMATION FOR SECURITY CONFIGURATION
Concepts for acquiring information for identifying a security configuration for an application are proposed. In particular, the information is obtained by running the application in a development environment, detecting security requests made on behalf of the application, and then storing security information associated with the security requests in a security log. Using this concept, a security log may be obtained from which an appropriate security configuration may be determined.
PROVIDING RELEVANT INFORMATION DURING ONLINE MEETINGS
One disclosed method involves determining, by at least one computing system and based at least in part on input provided to a meeting application, at least a first topic of interest for a first user accessing the meeting application via a first client device, in response to determining the first topic of interest, querying, by the at least one computing system, at least one data source, external to the meeting application, for information corresponding to the first topic of interest, and causing, by the at least one computing system, the first client device to display a representation of the information.
SYSTEMS AND METHODS FOR PREVENTING ZERO-DAY ATTACKS
Disclosed herein are systems and method for preventing zero-day attacks. A method may include receiving a first report including information about an execution of a first script of an application that modifies a file on a first computing device, and receiving a second report including an indication that the file includes malicious code. In response to determining that an identifier of the file is present in both the first report and the second report, the method may include generating and transmitting, to the first computing device, a first rule that prevents execution of any script that shares at least one operation of the first script. The method may include, in response to determining that a vulnerability detected by the first rule is not present in a vulnerability database, generating an entry in the vulnerability database for the vulnerability as a zero-day vulnerability and transmitting an alert to the application developer.
CYBER THREAT INFORMATION PROCESSING APPARATUS, CYBER THREAT INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM STORING CYBER THREAT INFORMATION PROCESSING PROGRAM
Provided are a cyber threat information processing apparatus, a method thereof, and a storage medium storing a cyber threat information processing program. It is possible to provide a cybersecurity threat information processing method including disassembling an input executable file to obtain disassembled code, and reconstructing the disassembled code to obtain reconstructed disassembled code, into a hash function, and converting the hash function into N-gram data (N being a natural number), and performing ensemble machine learning on block-unit code of the converted N-gram data to profile the block-unit code by an identifier of an attack technique performed by the block-unit code and an identifier of an attacker generating the block-unit code. It is possible to detect and address a variant of malware, and identify malware, an attack technique, an attacker, and an attack prediction method within a significantly short time even for a variant of malware.
Secure Firmware Update through a Predefined Server
The disclosed embodiments relate to securely booting firmware images. In one embodiment, a method is disclosed comprising receiving, by a memory device, a firmware update; validating, by the memory device, a signature associated with the firmware update; copying, by the memory device, an existing firmware image to an archive location, the archive location storing a plurality of firmware images sorted by version identifiers; booting, by the memory device, and executing the firmware update; and replacing, by the memory device, the firmware update with the existing firmware image stored in the archive location upon detecting an error while booting the firmware update.