CN106096423A - Method for dynamically evaluating security index of operating system - Google Patents

Method for dynamically evaluating security index of operating system Download PDF

Info

Publication number
CN106096423A
CN106096423A CN201610701739.4A CN201610701739A CN106096423A CN 106096423 A CN106096423 A CN 106096423A CN 201610701739 A CN201610701739 A CN 201610701739A CN 106096423 A CN106096423 A CN 106096423A
Authority
CN
China
Prior art keywords
operating system
service
assessment
strategy
configuration
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610701739.4A
Other languages
Chinese (zh)
Other versions
CN106096423B (en
Inventor
戴纯兴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Electronic Information Industry Co Ltd
Original Assignee
Inspur Electronic Information Industry Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur Electronic Information Industry Co Ltd filed Critical Inspur Electronic Information Industry Co Ltd
Priority to CN201610701739.4A priority Critical patent/CN106096423B/en
Publication of CN106096423A publication Critical patent/CN106096423A/en
Application granted granted Critical
Publication of CN106096423B publication Critical patent/CN106096423B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/034Test or assess a computer or a system

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a method for dynamically evaluating a security index of an operating system, which scores the running process of the operating system, the service of the operating system, a configuration file and system software, and weights each score to obtain the security evaluation of the system. Compared with the prior art, the method for dynamically evaluating the security index of the operating system is used for evaluating the overall security of the operating system running on the server or the terminal equipment, and providing the security index of the current system in a scoring mode, so that an effective means for judging whether the operating system is safe is provided for a user, a system administrator can conveniently adjust the strategy, the security of the server or the terminal equipment is ensured, the practicability is high, and the popularization is easy.

Description

A kind of method of dynamic evaluation operating system security index
Technical field
The present invention relates to computer security technique field, a kind of practical, dynamic evaluation operating system The method of safety index.
Background technology
Along with social informatization degree is more and more higher, one of data information having become as most worthy.World today's net Network aggressive behavior gets more and more.APT attack, 0day attack, virus, wooden horse etc., along with the development of intrusion prevention technology, this A little attack meanses are also constantly changing.How security from attacks behavior has become as one of current Main Topics.Such as virus killing Software, white list product, blacklist product, fire wall, application layer firewall etc. are all the derived products of these risk prevention instrumentses, also It it is all a kind of effectively mean of defense.How evaluation operation security of system, allows the relieved use of user have become as the one of these means Plant the form of expression.
Based on this, the present invention proposes a kind of method of metric operations security of system.By entering that integrated operation system is run Journey, the software of installation, the service of installation and configuration file, provide the safety parameters of current operation system.Provide the user with one Plant the effective means judging that operating system is the safest.
Summary of the invention
The technical assignment of the present invention is for above weak point, it is provided that a kind of practical, dynamic evaluation operating system The method of safety index.
A kind of method of dynamic evaluation operating system security index, by the process of operating system, operating system Service, configuration file and systems soft ware give a mark, and by every marking certain weight of distribution, drawing after weighting The safety evaluation of system.
Distributing certain weight process is: to process PR of operating system, the service SV of operating system, systems soft ware SW and configuration file C arranges weight, is WP, WV, WW, WC respectively;Wherein PR, SV, SW, C maximum is equal to 100, minima Equal to 1, WP+WV+WW+WC=100%;System evaluation safety index SP is:
SP=PR*WP+SV*WV+SW*WW+C*WC;
SP system when 90-100 is safe, and during during 80-90, system is in risk, less than 80 systems are in excessive risk.
The process of the process that evaluation operation system is run is:
These application programs are joined in the program listing that system can be run, and obtains quantity PC of inventory Program;
Detection runs process integrity, first obtains process list, and each process in process list is compared with inventory Relatively, number of processes IC in process list and not number of processes OC in process list are obtained respectively;To not arranging in process Process assessment in table provides the weight of each process;
When thinking that this process is virus or wooden horse one class, provide high weight, provide low weight when being considered general process;
When there is the process of high weight, directly think that PR is 0;
When there is not the process of high weight, PR=(IC/IC+OC) * 100, if OC=0, PR=100.
The detailed process of the service of evaluation operation system is:
When the service that evaluation operation system is installed, these services are joined in service inventory;
The service that assessment system is not installed, and these services are joined in assessment inventory;
When assessing every time, scan all of build-in services S, and be the service allowing in inventory to run by these service differentiations (S1, weight P1) and inventory do not allow service (S2, weight P2) and the Unidentified service (S3, weight P3) run, then SV=S1/S*P1+S2/S*P2+S3/S*P3, P1+P2+P3=100%.
During assessment software, the software that first have to divide into the software that must install, can install and forbidding is installed Software, and distribute different weights.Appraisal procedure is similar with service.
The assessment of configuration file is that the configuration-direct that must exist of certain configuration file of assessment system, systems soft ware are necessary The configuration-direct existed, the configuration that registration table must exist, if not existing, thinking that configuration file exists risk, specifically assessing Cheng Wei:
First strategy and quantity C3 of configuration file to be checked are given;Provide quantity C1 and not of the configuration file that there is risk There is the quantity of the configuration file of risk, finally provide whole configuration file C=C1/C3.
Based on above-mentioned process, service, software, the description of configuration, the concrete mistake of dynamic evaluation operating system security index claims For: first have to the main task according to operating system, establish its Security Target to be reached, collect relevant entering according to target Journey, service, software, configuration, and current system is estimated, obtain the safety index of current operation system, and determine current Assess whether to reach the best practice of operating system security assessment, after finding the strategy of appraisal procedure and assessment, every time to this behaviour When making system process assessment, directly providing operating system security index according to the method and strategy, manager refers to according to this Number just can directly judge current operation system whether safety.
Collection process, service, software, configuration the process being estimated current system be:
First need the process list run in collection operating system, need service list to be mounted, software matrix and needs Relevant configuration list, and these lists should be the minimal set reaching Security Target;
These set are output as a series of process strategy, service strategy, installation software strategy and configuration strategy, and as phase The input of the detection method closed;
Current system is estimated by the strategy of input, and draws respective valuation, when estimating by process, service, software, configuration After being worth, these are estimated as input by overall merit module, and draw the safety index of current operation system and draw finger The correlation log of number;
Safety index according to current operation system and daily record, assess whether to reach the best practice of operating system security assessment: If reaching, then complete operating system security Index Assessment method, if not reaching, then according to daily record reappraise needs process, Service, software, configured list and strategy, regenerate strategy, again assesses operating system security situation process, as following Ring, until finding the last appraisal procedure of operating system.
The method of a kind of dynamic evaluation operating system security index of the present invention, has the advantage that
A kind of method of the dynamic evaluation operating system security index of the present invention, for evaluating server or terminal unit its The general safety of the operating system run, and by the way of marking, provide the safety parameters of current system, provide the user with A kind of effective means judging that operating system is the safest, facilitates system manager's adjustable strategies, it is ensured that server or end simultaneously The safety of end equipment, practical, it is easy to promote.
Detailed description of the invention
Below in conjunction with specific embodiment, the invention will be further described.
The present invention provides a kind of method of dynamic evaluation operating system security index, and the method is by operating system Process, the service of operating system, configuration file and systems soft ware give a mark, and by every marking distribution certain Weight, draws the safety evaluation of system after weighting.The method can be used in the safety evaluation of server, terminal unit.
The process that system is run is the cardinal index of assessment security of system, and all generations destroy the behavior of security of system It is all to occur in process running.Propose to ensure operation process the most in the method by the way of process white list Credibility, and the integrity of process operation list.
Service is to run core component in systems, usually default setting, the most managed member or the control of user, Therefore proposing service integrity concept in this method, all services to installing under operating system are given a mark, to detect clothes The integrity of business.
Configuration file is the guide of system, software, service activation process.After system start-up provide envelop of function, State when state when software starts, service start is all based on configuration file.Therefore the configuration to some sensitivities Parameter configuration in file and configuration file carries out detecting and giving a mark also being able to reflect the safe condition of current system.
In system operation, the software of installation is the most, and the probability of occurrence risk is the biggest.Therefore should to specific system Customize the scope of institute's software to be installed on it.If being in the state of danger beyond this system of this range specification.Pass through The software installing system is estimated and gives a mark also being able to reflect the safety index that system is current.
Finally by the strategy certain to process, service, configuration file, software arrangements with arrange suitable weight, with plan Slightly give a mark to every in evaluation process for foundation with weight, finally draw the safety parameters of system.
Distributing certain weight process is: to process PR of operating system, the service SV of operating system, systems soft ware SW and configuration file C arranges weight, is WP, WV, WW, WC respectively;Wherein PR, SV, SW, C maximum is equal to 100, minima Equal to 1, WP+WV+WW+WC=100%;System evaluation safety index SP is:
SP=PR*WP+SV*WV+SW*WW+C*WC;
SP system when 90-100 is safe, and during during 80-90, system is in risk, less than 80 systems are in excessive risk.
The process of the process that evaluation operation system is run is:
These application programs are joined in the program listing that system can be run, and obtains quantity PC of inventory Program;
Detection runs process integrity, first obtains process list, and each process in process list is compared with inventory Relatively, number of processes IC in process list and not number of processes OC in process list are obtained respectively;To not arranging in process Process assessment in table provides the weight of each process;
When thinking that this process is virus or wooden horse one class, provide high weight, provide low weight when being considered general process;
When there is the process of high weight, directly think that PR is 0;
When there is not the process of high weight, PR=(IC/IC+OC) * 100, if OC=0, PR=100.
The detailed process of the service of evaluation operation system is:
When the service that evaluation operation system is installed, these services are joined in service inventory;
The service that assessment system is not installed, and these services are joined in assessment inventory;
When assessing every time, scan all of build-in services S, and be the service allowing in inventory to run by these service differentiations (S1, weight P1) and inventory do not allow service (S2, weight P2) and the Unidentified service (S3, weight P3) run, then SV=S1/S*P1+S2/S*P2+S3/S*P3, P1+P2+P3=100%.
During assessment software, the software that first have to divide into the software that must install, can install and forbidding is installed Software, and distribute different weights.Appraisal procedure is similar with service.
The assessment of configuration file is the configuration-direct what certain configuration file of assessment system must have.Systems soft ware must Must there is which type of configuration-direct.Which type of registration table must have configure.If not existing, think that configuration file exists risk. First strategy and the quantity (CC1/C3) of configuration file to be checked are given.Provide the quantity (C1) of the configuration file that there is risk There is not the quantity of the configuration file of risk.Finally provide whole configuration file C=C1/C3.
The method is applicable to the system that operating system environment infrequently changes.When providing safety index, it is necessary to give simultaneously Go out there may be point or the configuration item of risk.For system manager's adjustable strategies.
Describing based on above-mentioned steps and understand, the method is the most constantly loop test and a process for amendment, finally reaches Optimum method to system security assessment.
It implements process:
First have to the main task according to operating system, establish its Security Target to be reached, collect operating system according to target Upper process list, need service list to be mounted, software matrix and the relevant configuration list of needs needing to run.
These lists should be the minimal set reaching Security Target.These set are output as a series of process Strategy, service strategy, installation software strategy and configuration strategy, and as the input of relevant detection method.Process, service, soft Current system is estimated by the strategy of input, and draws respective valuation according to relevant method by part, configuration, works as valuation After drawing, these are estimated, as input, to show that according to certain algorithm the safety of current operation system refers to by overall merit module Number, and draw the correlation log of index.
Safety index according to current operation system and daily record, assess whether to reach the optimum side of operating system security assessment Method.If reaching, then completing operating system security Index Assessment method, if not reaching, then reappraising entering of needs according to daily record Journey, service, software, configured list and strategy, regenerate strategy, again assesses operating system security situation process, with this For circulation, until finding the last appraisal procedure of operating system.
After finding the strategy of appraisal procedure and assessment, when this operating system process being assessed, directly according to being somebody's turn to do the most every time Method and strategy provide operating system security index.Manager just can directly judge current operation system according to this index Whether safety.
For making the method have operability, the core position in method should have one for the one of operating system The strategy set of the process of individual minimum, service, software and configuration file.
Performability and the operation now of the operating system not installing any software should be ensure that by this strategy The safety index of system should be good or optimum.
The method also should possess one in the case of operating system does not install any software, it is possible to gives tacit consent to plan by it Revise the relevant configuration of the configuration of current system, service, software, process the most automatically, so that the assessment of operating system reaches The figure of merit.
User is after installing operating system, it should strategy and optimization method optimization operation first by acquiescence are System, installs different software and differently configured strategy further according to different purpose, and by said method by the software installed, Service, process, configuration are brought in the detection method of assessment system, and make the effectiveness of assessment strategy in aforementioned manners, so that The safety evaluation of operating system has an optimum algorithm.And whenever readjusting the software of operating system and state During, all the change after adjusting should be brought in strategy.Thus can be during operating system, dynamically The safety of evaluation operation system and provide the safety index of response.
The method should have a behavior that can change in monitor operating system running.Can monitor Newly installed software, executable file and configuration file.And according to these change can be manager and strategy configuration person provide One configuration suggestion.To facilitate the use of the method.
The method should have one can provide, according to assessment daily record, the suggestion that security policies adjusts, and this advises bag Include the configuration suggestion of process, software, service, configuration file.
Process, in using strategy process evaluation process, should be able to scan the current executable file of whole system, The file run also is estimated with strategy.Whether each process can be run by strategy and should have different indexes.
The all mounted services of service scanning system in evaluation process installed, and obtain the state of current service with In strategy, the state of service compares the integrity assessment index of the service of providing.
Install software in evaluation process, the software that direct scanning system has been installed, carry out with the software in strategy Relatively, assessment index is given.
Configuration file includes the configuration file etc. of the software and services of the configuration file of system, installation.In evaluation process The state directly should having according to configuration file compares with the state of current configuration file under system.Provide assessment to refer to Number.
Process, service, software, configuration file are while providing assessment index, it should operation system when providing assessment index The current state of system, as adjusting appraisal procedure, the foundation of assessment strategy.
Above-mentioned detailed description of the invention is only the concrete case of the present invention, and the scope of patent protection of the present invention includes but not limited to Above-mentioned detailed description of the invention, the claim of the method for any a kind of dynamic evaluation operating system security index meeting the present invention Suitably change that it is done by book and any described technical field those of ordinary skill or replace, all should fall into the present invention's Scope of patent protection.

Claims (8)

1. the method for a dynamic evaluation operating system security index, it is characterised in that by the process of operating system, The service of operating system, configuration file and systems soft ware are given a mark, and by the weight certain to every marking distribution, add The safety evaluation of system is drawn after power.
The method of a kind of dynamic evaluation operating system security index the most according to claim 1, it is characterised in that distribution one Fixed weight process is: process PR, the service SV of operating system, systems soft ware SW and the configuration file to operating system C arranges weight, is WP, WV, WW, WC respectively;Wherein PR, SV, SW, C maximum is equal to 100, and minima is equal to 1, WP+WV+WW+ WC=100%;System evaluation safety index SP is:
SP=PR*WP+SV*WV+SW*WW+C*WC;
SP system when 90-100 is safe, and during during 80-90, system is in risk, less than 80 systems are in excessive risk.
The method of a kind of dynamic evaluation operating system security index the most according to claim 2, it is characterised in that assessment behaviour The process making the process that system is run is:
These application programs are joined in the program listing that system can be run, and obtains quantity PC of inventory Program;
Detection runs process integrity, first obtains process list, and each process in process list is compared with inventory Relatively, number of processes IC in process list and not number of processes OC in process list are obtained respectively;To not arranging in process Process assessment in table provides the weight of each process;
When thinking that this process is virus or wooden horse one class, provide high weight, provide low weight when being considered general process;
When there is the process of high weight, directly think that PR is 0;
When there is not the process of high weight, PR=(IC/IC+OC) * 100, if OC=0, PR=100.
The method of a kind of dynamic evaluation operating system security index the most according to claim 2, it is characterised in that assessment behaviour The detailed process of the service making system is:
When the service that evaluation operation system is installed, these services are joined in service inventory;
The service that assessment system is not installed, and these services are joined in assessment inventory;
When assessing every time, scan all of build-in services S, and be the service allowing in inventory to run by these service differentiations (S1, weight P1) and inventory do not allow service (S2, weight P2) and the Unidentified service (S3, weight P3) run, then SV=S1/S*P1+S2/S*P2+S3/S*P3, P1+P2+P3=100%.
The method of a kind of dynamic evaluation operating system security index the most according to claim 4, it is characterised in that assess soft During part, first distinguish the software for installing, the software that can install and forbid the software installed, and distributing different Weight, then uses the assessment mode of operating system service to be estimated.
The method of a kind of dynamic evaluation operating system security index the most according to claim 2, it is characterised in that configuration literary composition The assessment of part is that the configuration that the configuration-direct that must exist of certain configuration file of assessment system, systems soft ware must exist refers to Order, the configuration that registration table must exist, if not existing, think that configuration file exists risk, concrete evaluation process is:
First strategy and quantity C3 of configuration file to be checked are given;Provide quantity C1 and not of the configuration file that there is risk There is the quantity of the configuration file of risk, finally provide whole configuration file C=C1/C3.
7. according to the method for the arbitrary described a kind of dynamic evaluation operating system security index of claim 1-6, it is characterised in that Based on above-mentioned process, service, software, the description of configuration, the concrete mistake of dynamic evaluation operating system security index is referred to as: first have to According to the main task of operating system, establish its Security Target to be reached, collect relevant process, service, soft according to target Part, configuration, and current system is estimated, obtain the safety index of current operation system, and determine whether evaluation reaches To the best practice of operating system security assessment, after finding the strategy of appraisal procedure and assessment, every time to this operating system process During assessment, directly providing operating system security index according to the method and strategy, manager just can be straight according to this index Connect and judge current operation system whether safety.
The method of a kind of dynamic evaluation operating system security index the most according to claim 7, it is characterised in that collect into Journey, service, software, configuration the process being estimated current system be:
First need the process list run in collection operating system, need service list to be mounted, software matrix and needs Relevant configuration list, and these lists should be the minimal set reaching Security Target;
These set are output as a series of process strategy, service strategy, installation software strategy and configuration strategy, and as phase The input of the detection method closed;
Current system is estimated by the strategy of input, and draws respective valuation, when estimating by process, service, software, configuration After being worth, these are estimated as input by overall merit module, and draw the safety index of current operation system and draw finger The correlation log of number;
Safety index according to current operation system and daily record, assess whether to reach the best practice of operating system security assessment: If reaching, then complete operating system security Index Assessment method, if not reaching, then according to daily record reappraise needs process, Service, software, configured list and strategy, regenerate strategy, again assesses operating system security situation process, as following Ring, until finding the last appraisal procedure of operating system.
CN201610701739.4A 2016-08-22 2016-08-22 Method for dynamically evaluating security index of operating system Active CN106096423B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610701739.4A CN106096423B (en) 2016-08-22 2016-08-22 Method for dynamically evaluating security index of operating system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610701739.4A CN106096423B (en) 2016-08-22 2016-08-22 Method for dynamically evaluating security index of operating system

Publications (2)

Publication Number Publication Date
CN106096423A true CN106096423A (en) 2016-11-09
CN106096423B CN106096423B (en) 2018-12-14

Family

ID=57226401

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610701739.4A Active CN106096423B (en) 2016-08-22 2016-08-22 Method for dynamically evaluating security index of operating system

Country Status (1)

Country Link
CN (1) CN106096423B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109684429A (en) * 2018-12-18 2019-04-26 南京云灿信息科技有限公司 A kind of low flyer identifying system and algorithm based on three-dimensional digital earth
CN113127882A (en) * 2021-04-23 2021-07-16 杭州安恒信息安全技术有限公司 Terminal safety protection method, device, equipment and readable storage medium
CN116205605A (en) * 2023-03-08 2023-06-02 广东省技术经济研究发展中心 Intelligent evaluation method, system and medium for quality of science and technology project file

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101339593A (en) * 2007-07-04 2009-01-07 联想(北京)有限公司 Software security evaluation system, user capability and confidence level evaluation system and method
CN101488168A (en) * 2008-01-17 2009-07-22 北京启明星辰信息技术股份有限公司 Integrated risk computing method and system of computer information system
CN103761480A (en) * 2014-01-13 2014-04-30 北京奇虎科技有限公司 Method and device for detecting file security

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101339593A (en) * 2007-07-04 2009-01-07 联想(北京)有限公司 Software security evaluation system, user capability and confidence level evaluation system and method
CN101488168A (en) * 2008-01-17 2009-07-22 北京启明星辰信息技术股份有限公司 Integrated risk computing method and system of computer information system
CN103761480A (en) * 2014-01-13 2014-04-30 北京奇虎科技有限公司 Method and device for detecting file security

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
陈帅: "基于主机的安全评估***的研究与设计", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109684429A (en) * 2018-12-18 2019-04-26 南京云灿信息科技有限公司 A kind of low flyer identifying system and algorithm based on three-dimensional digital earth
CN109684429B (en) * 2018-12-18 2022-06-21 南京云灿信息科技有限公司 Low-altitude flight target identification system and algorithm based on three-dimensional digital earth
CN113127882A (en) * 2021-04-23 2021-07-16 杭州安恒信息安全技术有限公司 Terminal safety protection method, device, equipment and readable storage medium
CN116205605A (en) * 2023-03-08 2023-06-02 广东省技术经济研究发展中心 Intelligent evaluation method, system and medium for quality of science and technology project file
CN116205605B (en) * 2023-03-08 2024-04-19 广东省技术经济研究发展中心 Intelligent evaluation method, system and medium for quality of science and technology project file

Also Published As

Publication number Publication date
CN106096423B (en) 2018-12-14

Similar Documents

Publication Publication Date Title
US9547765B2 (en) Validating a type of a peripheral device
US11157300B2 (en) Managing virtual machine security resources
US10360388B2 (en) Statistical analytic method for the determination of the risk posed by file based content
EP2447877B1 (en) System and method for detection of malware and management of malware-related information
US11086983B2 (en) System and method for authenticating safe software
CN104462970B (en) A kind of Android application program privilege abuse detection methods based on process communication
KR101558715B1 (en) System and Method for Server-Coupled Malware Prevention
US10484400B2 (en) Dynamic sensors
CN103065088B (en) Based on the system and method for the ruling detection computations machine security threat of computer user
US9659172B2 (en) System and method of preventing execution of undesirable programs
CN105531692A (en) Security policies for loading, linking, and executing native code by mobile applications running inside of virtual machines
CN104077532A (en) Linux virtualization platform safety detection method and system
CN105631312A (en) Method and system for processing rogue programs
CN106096423A (en) Method for dynamically evaluating security index of operating system
CN109361692B (en) Web protection method based on asset type identification and self-discovery vulnerability
US20130247129A1 (en) System, method and computer program product for obtaining a reputation associated with a file
CN109981573B (en) Security event response method and device
Yermalovich et al. Formalization of attack prediction problem
RU2587424C1 (en) Method of controlling applications
Lagesse et al. Securing pervasive systems against adversarial machine learning
RU2571725C2 (en) System and method of controlling parameters of applications on computer user devices
KR102560483B1 (en) Method and apparatus for providing security service using messenger
JP2019008568A (en) Whitelist management system and whitelist management method
Papamartzivanos et al. A Perfect Match: Converging and Automating Privacy & Security Impact Assessment On-the-Fly. Future Internet 2021, 13, 30
Refsdal et al. Risk Identification

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant