Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

81 results about "Memory analysis" patented technology

Electronic evidence fixing and network evidence obtaining method and system based on memory evidence obtaining and block chain

The invention discloses an electronic evidence fixing and network evidence obtaining method and system based on memory evidence obtaining and a block chain. An electronic evidence fixing terminal downloads a credible evidence obtaining tool through the block chain network. The legality of the evidence obtaining tool execution code is verified. The evidence obtaining tool is operated, electronic data are obtained, an operation log is generated, meanwhile, computer memory information is obtained through the memory evidence obtaining technology, and evidence fixing is conducted. A hash value is generated.and uploaded to the block chain network. A returned corresponding block chain address is received. The data is sent to a judicial certification authority terminal. A judicial certification mechanism terminal receives the block chain address sent by the electronic evidence fixing terminal. Information on the block chain is inquired, and legality is verified. The memory information is analyzed by adopting a memory evidence obtaining technology. The system state is extracted when the electronic evidence is obtained, and verifying the conformity. A judgment is verified whether the evidence obtaining tool is hooked or injected during operation or not through memory analysis, and the reliability of the operation environment of the evidence obtaining tool is verified. Judicial authentication reports are generated.
Owner:SHANDONG COMP SCI CENTNAT SUPERCOMP CENT IN JINAN

Remote evidence taking system based on physical memory analysis

The invention provides a remote evidence taking system based on physical memory analysis. The remote evidence taking system is characterized by comprising a client and a server, wherein a physical memory of the client is mirrored and stored locally, and a mirror image file is subjected to hash value calculation; the mirror image file is analyzed by calling a physical memory analysis line program, and an analysis result and the mirror image file are sent to the server together; the server is used for monitoring the client; if a client connection request is provided, a client fixing character string is sent, and the physical memory mirror image file and the corresponding mirror image file analysis result of the client are mainly collected; the server collects multiple threads and can simultaneously collect the physical memory mirror image files of multiple clients and memory analysis result information and store the memory analysis results into a database; on the other hand, the server is connected with a remote control terminal to mainly send log information of the client to the remote control terminal; retrieval information meeting retrieval conditions are searched from the database according to the conditions of the remote control terminal.
Owner:SHANDONG COMP SCI CENTNAT SUPERCOMP CENT IN JINAN

Virtual machine-based dynamic introspection function-level virtual machine kernel detection system and method

The invention discloses a virtual machine-based dynamic introspection function-level virtual machine kernel detection system and method, and belongs to the field of cloud safety. The device compriseshardware which is used for providing hardware basis for a secure virtual machine, a target virtual machine and a virtual machine management layer; the secure virtual machine comprises a monitoring framework; the secure virtual machine interacts with the target virtual machine through the virtual machine management layer; the virtual machine management layer comprises a connection extraction module; and the extraction module is connected with each of the learning module and a monitoring module through page execution information. The method comprises the following steps of: starting a monitor, injecting a monitoring point to the target virtual machine by the extraction module, so as to ensure that the virtual machine management layer can monitor sub-functions in calling; carrying out staticanalysis by utilizing a static memory analysis method and dynamic tracking, so as to obtain subsequent sub-functions and carry out monitoring; and carrying out loop execution until system calling is returned. According to the system and method, execution information is modeled through three learning methods, so that integrity of kernel control flows is detected, and the kernel control flows are prevented from being detected and broken through by attackers.
Owner:HARBIN INST OF TECH +1

SSL/TLS network encryption communication information real-time decryption method based on memory analysis

The invention discloses an SSL / TLS network encryption communication information real-time decryption method based on memory analysis. The method comprises the following steps: monitoring a network encryption communication session key generation function and an encryption communication session ID generation function by using a process injection technology and an API Hook technology through an Agentto obtain an encryption communication session ID and a corresponding encryption key; obtaining a local IP address of the client through the Agent; encrypting the acquired encryption communication session ID, the network encryption communication session key and the local IP address of the client through a temporarily generated symmetric encryption key, and sending the encrypted data to a network decryption end; and after receiving the encrypted data, obtaining a local IP address of the client, the encryption communication session ID and a decryption key of the corresponding session, and decrypting and storing the corresponding network encryption communication session in real time. According to the invention, the extraction of the network communication encryption key and the real-time decryption of the network encryption communication content can be effectively realized, and the detection efficiency is improved.
Owner:成都安舟信息技术有限公司

Virtual machine non-agent monitoring method and apparatus based on online memory analysis

The invention belongs to the field of cloud computing server management technology, and particularly relates to a virtual machine non-agent monitoring method and apparatus based on online memory analysis. The method comprises the following steps: setting a monitoring virtual machine in a server to receive a monitoring strategy; when a monitored virtual machine is caught in a virtualization layer due to a normal exit event, executing memory analysis on the monitored virtual machine according to the monitoring strategy; and periodically reading the analysis result by the monitoring virtual machine, and performing multi-dimensional display on the user. According to the monitoring method, all security monitoring modules deployed on the virtualization layer at the outside of the virtual machine, thereby effectively avoiding all kinds of possible interference of malicious software in the virtual machine and ensuring high reliability and high security. Because no other hardware is trapped, the method does not cause redundant hardware except for normal virtualization, and avoids the frequent switch loss of a root mode and a non root mode. By virtue of the dynamics created by the virtual machine, the method can be extended very well, and the adaptability of the monitoring service is high.
Owner:成都灵跃云创科技有限公司

Performance monitoring platform for office management system

The invention discloses a performance monitoring platform for an office management system. The platform comprises a log acquisition sub-system, a log analysis sub-system and a warning-intervention sub-system; the log acquisition sub-system is divided into a memory log acquisition module, a thread log acquisition module and a SQL execution log acquisition module; the log analysis sub-system comprises a performance bottleneck analysis module, a thread execution analysis module and a memory analysis module; the warning-intervention sub-system comprises a warning module and an enforcement intervention module. Through the adoption of the platform disclosed by the invention, the running generation system can be immediately analyzed without deployment and introducing the special dependency of the third-party, the analysis can be implemented only needing to use a built-in tool of jdk run on the system; meanwhile, through the development of a log analysis tool, the log can be intelligently analyzed at the permissible time to assist elimination of the reasons of the downtime problem and the performance problem, thereby accomplishing the monitoring and the acquisition of the data; the influence to the system performance is tiny, and the platform guarantees that the production system cannot be influenced by the monitoring tool.
Owner:上海泛微网络科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products