WO2004008294A3 - Distributed computing using syscall proxying - Google Patents
Distributed computing using syscall proxying Download PDFInfo
- Publication number
- WO2004008294A3 WO2004008294A3 PCT/US2003/022549 US0322549W WO2004008294A3 WO 2004008294 A3 WO2004008294 A3 WO 2004008294A3 US 0322549 W US0322549 W US 0322549W WO 2004008294 A3 WO2004008294 A3 WO 2004008294A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- syscall
- remote computer
- request
- network
- local computer
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogram communication
- G06F9/547—Remote procedure calls [RPC]; Web services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer And Data Communications (AREA)
Abstract
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2003252049A AU2003252049A1 (en) | 2002-07-17 | 2003-07-17 | Distributed computing using syscall proxying |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US39681302P | 2002-07-17 | 2002-07-17 | |
US60/396,813 | 2002-07-17 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2004008294A2 WO2004008294A2 (en) | 2004-01-22 |
WO2004008294A3 true WO2004008294A3 (en) | 2004-04-01 |
Family
ID=30116057
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2003/022549 WO2004008294A2 (en) | 2002-07-17 | 2003-07-17 | Distributed computing using syscall proxying |
Country Status (3)
Country | Link |
---|---|
US (1) | US7277937B2 (en) |
AU (1) | AU2003252049A1 (en) |
WO (1) | WO2004008294A2 (en) |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050278723A1 (en) * | 2004-06-14 | 2005-12-15 | Feinleib David A | System and method for remote administration from a windows client of computer systems running the Linux operating system |
US7831995B2 (en) * | 2004-10-29 | 2010-11-09 | CORE, SDI, Inc. | Establishing and enforcing security and privacy policies in web-based applications |
US8281401B2 (en) * | 2005-01-25 | 2012-10-02 | Whitehat Security, Inc. | System for detecting vulnerabilities in web applications using client-side application interfaces |
WO2008109770A2 (en) * | 2007-03-06 | 2008-09-12 | Core Sdi, Incorporated | System and method for providing application penetration testing |
CA2691666C (en) | 2007-06-26 | 2014-03-18 | Core Sdi Incorporated | System and method for simulating computer network attacks |
EP2462716B1 (en) * | 2009-08-05 | 2019-10-09 | Help/Systems, LLC | System and method for extending automated penetration testing to develop an intelligent and cost efficient security strategy |
US9207928B2 (en) | 2011-01-17 | 2015-12-08 | Bladelogic, Inc. | Computer-readable medium, apparatus, and methods of automatic capability installation |
US9384071B2 (en) | 2011-03-31 | 2016-07-05 | Solarflare Communications, Inc. | Epoll optimisations |
US10069674B2 (en) * | 2013-12-12 | 2018-09-04 | International Business Machines Corporation | Monitoring file system operations between a client computer and a file server |
US11120106B2 (en) * | 2016-07-30 | 2021-09-14 | Endgame, Inc. | Hardware—assisted system and method for detecting and analyzing system calls made to an operating system kernel |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5600790A (en) * | 1995-02-10 | 1997-02-04 | Research In Motion Limited | Method and system for loading and confirming correct operation of an application program in a target system |
US6108715A (en) * | 1994-12-13 | 2000-08-22 | Microsoft Corporation | Method and system for invoking remote procedure calls |
US20030014669A1 (en) * | 2001-07-10 | 2003-01-16 | Caceres Maximiliano Gerardo | Automated computer system security compromise |
US20030149741A1 (en) * | 2002-02-05 | 2003-08-07 | Krooss Kevin William | Methods for implementing remote operating system procedure calls |
Family Cites Families (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US698445A (en) * | 1901-04-26 | 1902-04-29 | Valentin Charles Burel | Apparatus for torrefying coffee. |
WO1995027249A1 (en) | 1994-04-05 | 1995-10-12 | Intel Corporation | Method and appartus for monitoring and controlling programs in a network |
US5892903A (en) | 1996-09-12 | 1999-04-06 | Internet Security Systems, Inc. | Method and apparatus for detecting and identifying security vulnerabilities in an open network computer communication system |
US5812529A (en) | 1996-11-12 | 1998-09-22 | Lanquest Group | Method and apparatus for network assessment |
US6009456A (en) | 1997-07-30 | 1999-12-28 | Lockheed Martin Corp. | Information exchange by intelligent mobile agents in a network |
US6202199B1 (en) | 1997-07-31 | 2001-03-13 | Mutek Solutions, Ltd. | System and method for remotely analyzing the execution of computer programs |
US5961644A (en) | 1997-09-19 | 1999-10-05 | International Business Machines Corporation | Method and apparatus for testing the integrity of computer security alarm systems |
US6249886B1 (en) | 1997-10-17 | 2001-06-19 | Ramsesh S. Kalkunte | Computer system and computer implemented process for performing user-defined tests of a client-server system with run time compilation of test results |
US6070244A (en) | 1997-11-10 | 2000-05-30 | The Chase Manhattan Bank | Computer network security management system |
US6081665A (en) | 1997-12-19 | 2000-06-27 | Newmonics Inc. | Method for efficient soft real-time execution of portable byte code computer programs |
US6205551B1 (en) | 1998-01-29 | 2001-03-20 | Lucent Technologies Inc. | Computer security using virus probing |
US6298445B1 (en) | 1998-04-30 | 2001-10-02 | Netect, Ltd. | Computer security |
US6408391B1 (en) | 1998-05-06 | 2002-06-18 | Prc Inc. | Dynamic system defense for information warfare |
WO1999066383A2 (en) | 1998-06-15 | 1999-12-23 | Dmw Worldwide, Inc. | Method and apparatus for assessing the security of a computer system |
US6185689B1 (en) | 1998-06-24 | 2001-02-06 | Richard S. Carson & Assoc., Inc. | Method for network self security assessment |
US6205122B1 (en) | 1998-07-21 | 2001-03-20 | Mercury Interactive Corporation | Automatic network topology analysis |
US6286047B1 (en) | 1998-09-10 | 2001-09-04 | Hewlett-Packard Company | Method and system for automatic discovery of network services |
US6301668B1 (en) | 1998-12-29 | 2001-10-09 | Cisco Technology, Inc. | Method and system for adaptive network security using network vulnerability assessment |
US6205552B1 (en) | 1998-12-31 | 2001-03-20 | Mci Worldcom, Inc. | Method and apparatus for checking security vulnerability of networked devices |
US6636898B1 (en) * | 1999-01-29 | 2003-10-21 | International Business Machines Corporation | System and method for central management of connections in a virtual private network |
CA2388306A1 (en) | 1999-11-03 | 2001-05-10 | Vigilante A/S | Testing of access security of computers on a data communication network |
EP1107108A1 (en) * | 1999-12-09 | 2001-06-13 | Hewlett-Packard Company, A Delaware Corporation | System and method for managing the configuration of hierarchically networked data processing devices |
-
2003
- 2003-07-16 US US10/621,840 patent/US7277937B2/en active Active
- 2003-07-17 WO PCT/US2003/022549 patent/WO2004008294A2/en not_active Application Discontinuation
- 2003-07-17 AU AU2003252049A patent/AU2003252049A1/en not_active Abandoned
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6108715A (en) * | 1994-12-13 | 2000-08-22 | Microsoft Corporation | Method and system for invoking remote procedure calls |
US5600790A (en) * | 1995-02-10 | 1997-02-04 | Research In Motion Limited | Method and system for loading and confirming correct operation of an application program in a target system |
US20030014669A1 (en) * | 2001-07-10 | 2003-01-16 | Caceres Maximiliano Gerardo | Automated computer system security compromise |
US20030149741A1 (en) * | 2002-02-05 | 2003-08-07 | Krooss Kevin William | Methods for implementing remote operating system procedure calls |
Also Published As
Publication number | Publication date |
---|---|
WO2004008294A2 (en) | 2004-01-22 |
US7277937B2 (en) | 2007-10-02 |
AU2003252049A8 (en) | 2004-02-02 |
US20040128667A1 (en) | 2004-07-01 |
AU2003252049A1 (en) | 2004-02-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2001082075A3 (en) | System and method for scheduling execution of cross-platform computer processes | |
WO2001014961A3 (en) | System and method for the establishment and utilization of networked idle computational processing power | |
WO2001091033A3 (en) | Security architecture for integration of enterprise information system with j2ee platform | |
WO2001025919A3 (en) | Architectures for netcentric computing systems | |
WO2004102438A3 (en) | Business process management for a message-based exchange infrastructure | |
CN106445705A (en) | Platform cascading method and system based on Rabbit MQ and Socket.io | |
WO2007023391A3 (en) | System and method for providing a remote user interface for an application executing on a computing device | |
WO2004008294A3 (en) | Distributed computing using syscall proxying | |
GB2398203A (en) | Dynamic RDF groups | |
JP2007512617A5 (en) | ||
WO2003102745A3 (en) | Trusted client utilizing security kernel under secure execution mode | |
WO2000051031A8 (en) | Proxy server augmenting a client request with user profile data | |
HK1100250A1 (en) | Mobile access to lightweight directory access protocol (ldap) server | |
WO2004012417A3 (en) | Storage management bridges | |
WO2006055342A3 (en) | Energy efficient inter-processor management method and system | |
CN102591726A (en) | Multiprocess communication method | |
CN101729562A (en) | Reliable data transmission method under unreliable network connection | |
KR100365910B1 (en) | System for transmitting/receiving file | |
US20020129122A1 (en) | Storage operating data control system | |
WO2003105419A3 (en) | Managing a communication device via gprs and gsm connection | |
WO2004114143A3 (en) | Cluster arrangement | |
JP2002358273A5 (en) | ||
CN202798801U (en) | Universal communication system for achieving distributed data interaction | |
WO2001079999A3 (en) | Method and system for accepting precompiled information | |
US20050060529A1 (en) | Remote reboot method and system for network-linked computer platform |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
122 | Ep: pct application non-entry in european phase | ||
NENP | Non-entry into the national phase |
Ref country code: JP |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: JP |