Filter generation

Information security – Monitoring or scanning of software or data including attack... – Vulnerability assessment

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Reexamination Certificate

active

07634812

ABSTRACT:
A containment system may include a protection system which may protect the computing device from future attacks. For example, a patch may be automatically generated which resolves a detected vulnerability in a program. IN another example, a filter may be automatically generated which filters actions and/or messages which take advantage of a detected vulnerability in a program.

REFERENCES:
patent: 5414833 (1995-05-01), Hershey et al.
patent: 5978475 (1999-11-01), Schneier et al.
patent: 6393568 (2002-05-01), Ranger et al.
patent: 2002/0144149 (2002-10-01), Hanna et al.
patent: 2002/0178375 (2002-11-01), Whittaker et al.
patent: 2002/0199120 (2002-12-01), Schmidt
patent: 2003/0088680 (2003-05-01), Nachenberg et al.
patent: 2003/0105973 (2003-06-01), Liang et al.
patent: 2003/0163729 (2003-08-01), Buchegger
patent: 2004/0015719 (2004-01-01), Lee et al.
patent: 2004/0158725 (2004-08-01), Szor et al.
patent: 2004/0250124 (2004-12-01), Chesla et al.
patent: 2006/0053490 (2006-03-01), Herz et al.
patent: WO 03003207 (2003-01-01), None
patent: WO 03021402 (2003-03-01), None
patent: WO 03096607 (2003-11-01), None
A Netwrok Worm Vaccine Architecture by Stelios Sidiroglou and Angelos D. Keromytis published by IEEE 2003.
Castro et al., “Secure routing for structured P2P overlay networks,” 5th Usenix Symp. On Operating System Design and Implementation, Dec. 2002, pp. 299-314.
Costa et al., “Can We Contain Internet Worms,” MSR-TR-2004-83, http://research.microsoft.com/research/pubs/view.aspx?tr—id=788, Aug. 2004, pp. 1-7.
Dabek et al., “Towards a Common API for Structured Peer-to-Peer Overlays,” 2nd Int'l Workshop on P2P Systems, Feb. 2003, pp. 33-44.
Dunlap et al., “Revirt: enabling intrusion analysis through virtual-machine logging and replay,” Operating Syst. Design and Implementation, Boston, Massachusetts, Dec. 2002.
Elnozahy et al., “A survey of rollback-recovery protocols in message passing systems,” ACM Computing Surveys, vol. 32, No. 3, Sep. 2002, pp. 375-408.
Necula et al., “Safe Kernel Extensions Wihtout Run-Time Chekcing,” 2nd Symp. On Operation System Design and Implementation, Oct. 1996, pp. 229-243.
Wilander et al., A Comparison of publicaly Available Tools for Dynamic Buffer Overflow Prevention, 10th Network and Distributed Sys. Security Symp., Feb. 2003, pp. 123-130.
“Solutions for Academic Institutions,” http://www.netservers.co.uk/academic.html, Mar. 19, 2004.
“A Network Monitoring Tool for Security—NERD,” http://www.terena.nl/tech/task-forces/tf-csirt/meeting10/NERD-coolen.pdf,. Sep. 25, 2003, pp. 1-10.
“MicroWorld Launches a Revolutionary Concept to Tackle the Content Security Threats,” http://microworldtechnologies.com/antivirus/mwl1.asp, Jul. 30, 2002.
Huang et al., “Web Application Security Assessment by Fault Injection and Behavior Monitoring,” 12thInt'l Conf. World Wide Web, May 21-25, 2003, Budapest, Hungary, pp. 148-159.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Filter generation does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Filter generation, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Filter generation will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4090183

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.