Patents by Inventor Fabrizio Biondi

Fabrizio Biondi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11861006
    Abstract: A reference file set having high-confidence malware severity classification is generated by selecting a subset of files from a group of files first observed during a recent observation period and including them in the subset. A plurality of other antivirus providers are polled for their third-party classification of the files in the subset and for their third-party classification of a plurality of files from the group of files not in the subset. A malware severity classification is determined for the files in the subset by aggregating the polled classifications from the other antivirus providers for the files in the subset after a stabilization period of time, and one or more files having a third-party classification from at least one of the polled other antivirus providers that changed during the stabilization period to the subset are added to the subset.
    Type: Grant
    Filed: January 18, 2021
    Date of Patent: January 2, 2024
    Assignee: Avast Software s.r.o.
    Inventors: Martin Bálek, Fabrizio Biondi, Dmitry Kuznetsov, Olga Petrova
  • Patent number: 11831672
    Abstract: A method and system for updating and applying a ruleset used for determining and mitigating malware threats. Communications of computing devices are monitored and first data file extracted. A first and second set of features are extracted. A first rule is applied to the first set of features of the first data file to determine a non-match. A second rule is applied to the second set of features to determine a match. A third rule is generated based on the first set of features, non-match, and match. Communications of a particular computing device are monitored and second data file extracted. A first set of features of the second data file are extracted. The third rule is applied to the first set of features of the second data file to determine a match. The second data file is disabled, blocked, or deleted based the match determination by the third rule.
    Type: Grant
    Filed: October 27, 2021
    Date of Patent: November 28, 2023
    Assignee: Avast Software s.r.o.
    Inventors: B{hacek over (r)}etislav {hacek over (S)}opík, Fabrizio Biondi, Jakub K{hacek over (r)}oustek, Olga Petrova
  • Publication number: 20230291751
    Abstract: A system and method for preventing access to potentially malicious network destinations. The method includes determining a plurality of network destinations and indicators of the plurality of network destinations including an indicator of a first network destination. A plurality of feature vectors are generated based on the plurality of network destinations including a first feature vector based on the first network destination. Access by a user via a computing device to a second network destination is detected. A second feature vector is generated, and an indicator is determined based on the second network destination. The second feature vector is compared to the plurality of feature vectors. The access by the user to the second network destination is blocked based on the indicator of the first network destination, the indicator of the second network destination, and the comparison of the second feature vector to the plurality of feature vectors.
    Type: Application
    Filed: March 10, 2022
    Publication date: September 14, 2023
    Applicant: Avast Software s.r.o.
    Inventors: Armin Wasicek, Fabrizio Biondi, Thomas Salomon
  • Publication number: 20230131525
    Abstract: A method and system for updating and applying a ruleset used for determining and mitigating malware threats. Communications of computing devices are monitored and first data file extracted. A first and second set of features are extracted. A first rule is applied to the first set of features of the first data file to determine a non-match. A second rule is applied to the second set of features to determine a match. A third rule is generated based on the first set of features, non-match, and match. Communications of a particular computing device are monitored and second data file extracted. A first set of features of the second data file are extracted. The third rule is applied to the first set of features of the second data file to determine a match. The second data file is disabled, blocked, or deleted based the match determination by the third rule.
    Type: Application
    Filed: October 27, 2021
    Publication date: April 27, 2023
    Applicant: Avast Software s.r.o.
    Inventors: Bretislav {hacek over (S)}opík, Fabrizio Biondi, Jakub Kroustek, Olga Petrova
  • Publication number: 20220237289
    Abstract: A malware classification is generated for an input data set with a human-readable explanation of the classification. An input data set having a hierarchical structure is received in a neural network that has an architecture based on a schema determined from a plurality of second input data sets and that is trained to classify received input data sets into one or more of a plurality of classes. An explanation is provided with the output of the neural network, the explanation comprising a subset of at least one input data set that caused the at least one input data set to be classified into a certain class using the schema of the generated neural network. The explanation may further be derived from the statistical contribution of one or more features of the input data set that caused the at least one input data set to be classified into a certain class.
    Type: Application
    Filed: January 27, 2021
    Publication date: July 28, 2022
    Applicant: Avast Software s.r.o.
    Inventors: Tomas Pevny, Viliam Lisy, Branislav Bosansky, Michal Pechoucek, Vaclav Smidl, Petr Somol, Jakub Kroustek, Fabrizio Biondi
  • Publication number: 20220229906
    Abstract: A reference file set having high-confidence malware severity classification is generated by selecting a subset of files from a group of files first observed during a recent observation period and including them in the subset. A plurality of other antivirus providers are polled for their third-party classification of the files in the subset and for their third-party classification of a plurality of files from the group of files not in the subset. A malware severity classification is determined for the files in the subset by aggregating the polled classifications from the other antivirus providers for the files in the subset after a stabilization period of time, and one or more files having a third-party classification from at least one of the polled other antivirus providers that changed during the stabilization period to the subset are added to the subset.
    Type: Application
    Filed: January 18, 2021
    Publication date: July 21, 2022
    Applicant: Avast Software s.r.o.
    Inventors: Martin Bálek, Fabrizio Biondi, Dmitry Kuznetsov, Olga Petrova