首页> 外国专利> METHODS AND SYSTEMS FOR PROTECTING COMPUTING DEVICES FROM NON-BENIGN SOFTWARE APPLICATIONS VIA COLLABORATIVE APPLICATION DETONATION

METHODS AND SYSTEMS FOR PROTECTING COMPUTING DEVICES FROM NON-BENIGN SOFTWARE APPLICATIONS VIA COLLABORATIVE APPLICATION DETONATION

机译:通过协同应用引爆从非良性软件应用程序保护计算设备的方法和系统

摘要

A network and its devices may be protected from non-benign behavior, malware, and cyber attacks by configuring a server computing device to work in conjunction with a multitude of client computing devices in the network. The server computing device may be configured to receive data that was collected from independent executions of different instances of the same software application on different client computing devices. The server computing device may combine the received data, and use the combined data to identify unexplored code space or potential code paths for evaluation. The server computing device may then exercise the software application through the identified unexplored code space or identified potential code paths in a client computing device emulator to generate analysis results, and use the generated analysis results to determine whether the software application is non-benign.
机译:通过将服务器计算设备配置为与网络中的众多客户端计算设备结合使用,可以保护网络及其设备免受非良性行为,恶意软件和网络攻击。服务器计算设备可以被配置为接收从不同客户端计算设备上的相同软件应用的不同实例的独立执行中收集的数据。服务器计算设备可以组合接收到的数据,并使用组合的数据来标识未探索的代码空间或潜在的代码路径以进行评估。然后,服务器计算设备可以通过客户端计算设备仿真器中的所标识的未开发代码空间或所标识的潜在代码路径来运行软件应用程序,以生成分析结果,并使用所生成的分析结果来确定软件应用程序是否是非良性的。

著录项

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号