18567308. ANALYSING OPERATING SYSTEM CONFIGURATIONS simplified abstract (Nanyang Technological University)

From WikiPatents
Jump to navigation Jump to search

ANALYSING OPERATING SYSTEM CONFIGURATIONS

Organization Name

Nanyang Technological University

Inventor(s)

Adrian John Baldwin of Bristol (GB)

Jonathan Griffin of Bristol (GB)

Jakub Pruzinec of Singapore (SG)

Quynh Anh Nguyen of Singapore (SG)

ANALYSING OPERATING SYSTEM CONFIGURATIONS - A simplified explanation of the abstract

This abstract first appeared for US patent application 18567308 titled 'ANALYSING OPERATING SYSTEM CONFIGURATIONS

Simplified Explanation

The patent application describes a method for analyzing an operating system configuration to generate malware samples, execute them, and detect actions using anti-malware processes.

Key Features and Innovation

  • Instructions for analyzing an operating system configuration to generate malware samples
  • Execution of malware samples to generate logs
  • Detection of actions using anti-malware processes

Potential Applications

This technology can be used in cybersecurity to test the effectiveness of anti-malware processes and improve system security.

Problems Solved

  • Testing the effectiveness of anti-malware processes
  • Identifying potential vulnerabilities in operating system configurations

Benefits

  • Enhanced cybersecurity measures
  • Improved detection and prevention of malware attacks

Commercial Applications

The technology can be utilized by cybersecurity companies to develop more robust anti-malware solutions and enhance overall system security.

Prior Art

Readers can explore prior research on malware analysis, anti-malware processes, and operating system security to understand the background of this technology.

Frequently Updated Research

Researchers are constantly studying new malware threats and evolving anti-malware technologies to stay ahead of cyber threats.

Questions about Malware Analysis

How does this technology contribute to improving system security?

This technology helps identify vulnerabilities in operating system configurations and enhances the detection and prevention of malware attacks.

What are the potential implications of using this technology in cybersecurity?

By using this technology, cybersecurity companies can develop more effective anti-malware solutions and better protect systems from cyber threats.


Original Abstract Submitted

At least in some examples, a non-transitory machine-readable storage medium can be encoded with instructions for analysing an operating system configuration, the instructions executable by a processor of a system, whereby to cause the system to generate a set of malware samples, each malware sample defined by a set of actions forming an attack chain representing a sequence of procedures, execute each of the malware samples on an instance of the operating system configuration to generate a set of logs, and using the set of logs, determine a set of actions detected by an anti-malware process of the operating system configuration.