SOFTWARE ATTACK DETECTION DEVICE, NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM, AND SOFTWARE ATTACK DETECTION METHOD
First Claim
Patent Images
1. A software attack detection device, the device comprising:
- a memory; and
a processor coupled to the memory and the processor configured to execute a process, the process including;
generating at least one notification in response to at least one countermeasure process applied to a program to address a vulnerability to a software attack, each of the at least one notification including a countermeasure identifier to identify a countermeasure process performed;
monitoring the at least one generated notification; and
determining presence of the software attack based on the monitoring.
1 Assignment
0 Petitions
Accused Products
Abstract
A software detection device, the device including a memory and a processor coupled to the memory and the processor configured to execute a process, the process including generating at least one notification in response to at least one countermeasure process applied to a program to address a vulnerability to a software attack, each of the at least one notification including a countermeasure identifier to identify a countermeasure process performed, monitoring the at least one generated notification, and determining presence of the software attack based on the monitoring.
-
Citations
20 Claims
-
1. A software attack detection device, the device comprising:
-
a memory; and a processor coupled to the memory and the processor configured to execute a process, the process including; generating at least one notification in response to at least one countermeasure process applied to a program to address a vulnerability to a software attack, each of the at least one notification including a countermeasure identifier to identify a countermeasure process performed; monitoring the at least one generated notification; and determining presence of the software attack based on the monitoring. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A non-transitory computer-readable storage medium storing a program that causes a computer to execute a process, the process comprising:
-
generating at least one notification in response to at least one countermeasure process applied to the program to address a vulnerability to a software attack, each of the at least one notification including a countermeasure identifier to identify a countermeasure process performed; monitoring the at least one generated notification; and determining presence of the software attack based on the monitoring. - View Dependent Claims (14, 15, 16)
-
-
17. A software attack detection method executed by a computer, the software attack detection method comprising:
-
generating at least one notification in response to at least one countermeasure process applied to a program to address a vulnerability to a software attack, each of the at least one notification including a countermeasure identifier to identify a countermeasure process performed; monitoring the at least one generated notification; and determining presence of the software attack based on the monitoring. - View Dependent Claims (18, 19, 20)
-
Specification