18567308. ANALYSING OPERATING SYSTEM CONFIGURATIONS simplified abstract (Nanyang Technological University)
Contents
- 1 ANALYSING OPERATING SYSTEM CONFIGURATIONS
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 ANALYSING OPERATING SYSTEM CONFIGURATIONS - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Key Features and Innovation
- 1.6 Potential Applications
- 1.7 Problems Solved
- 1.8 Benefits
- 1.9 Commercial Applications
- 1.10 Prior Art
- 1.11 Frequently Updated Research
- 1.12 Questions about Malware Analysis
- 1.13 Original Abstract Submitted
ANALYSING OPERATING SYSTEM CONFIGURATIONS
Organization Name
Nanyang Technological University
Inventor(s)
Adrian John Baldwin of Bristol (GB)
Jonathan Griffin of Bristol (GB)
Jakub Pruzinec of Singapore (SG)
Quynh Anh Nguyen of Singapore (SG)
ANALYSING OPERATING SYSTEM CONFIGURATIONS - A simplified explanation of the abstract
This abstract first appeared for US patent application 18567308 titled 'ANALYSING OPERATING SYSTEM CONFIGURATIONS
Simplified Explanation
The patent application describes a method for analyzing an operating system configuration to generate malware samples, execute them, and detect actions using anti-malware processes.
Key Features and Innovation
- Instructions for analyzing an operating system configuration to generate malware samples
- Execution of malware samples to generate logs
- Detection of actions using anti-malware processes
Potential Applications
This technology can be used in cybersecurity to test the effectiveness of anti-malware processes and improve system security.
Problems Solved
- Testing the effectiveness of anti-malware processes
- Identifying potential vulnerabilities in operating system configurations
Benefits
- Enhanced cybersecurity measures
- Improved detection and prevention of malware attacks
Commercial Applications
The technology can be utilized by cybersecurity companies to develop more robust anti-malware solutions and enhance overall system security.
Prior Art
Readers can explore prior research on malware analysis, anti-malware processes, and operating system security to understand the background of this technology.
Frequently Updated Research
Researchers are constantly studying new malware threats and evolving anti-malware technologies to stay ahead of cyber threats.
Questions about Malware Analysis
How does this technology contribute to improving system security?
This technology helps identify vulnerabilities in operating system configurations and enhances the detection and prevention of malware attacks.
What are the potential implications of using this technology in cybersecurity?
By using this technology, cybersecurity companies can develop more effective anti-malware solutions and better protect systems from cyber threats.
Original Abstract Submitted
At least in some examples, a non-transitory machine-readable storage medium can be encoded with instructions for analysing an operating system configuration, the instructions executable by a processor of a system, whereby to cause the system to generate a set of malware samples, each malware sample defined by a set of actions forming an attack chain representing a sequence of procedures, execute each of the malware samples on an instance of the operating system configuration to generate a set of logs, and using the set of logs, determine a set of actions detected by an anti-malware process of the operating system configuration.