Patents by Inventor Farrukh Shahzad

Farrukh Shahzad has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11743290
    Abstract: A system and method for detecting phishing cyberattacks. The method involves parsing a code segment retrieved using a suspect uniform resource locator (URL) to identify any links included in the code segment. From these links, additional code segments may be recovered in accordance with a code segment recovery scheme. Thereafter, analytics are performed on the retrieved and possibly recovered code segments. The analytics include determining whether any of the code segments is correlated with a code segment associated with a known prior phishing cyberattack. Upon completing the analytics, an alert message including meta-information associated with results from the analytics is generated to identify that the URL is associated with a known prior phishing cyberattack when one or perhaps a combination of code segments associated with the URL are correlated to any code segment associated with a known prior phishing cyberattack.
    Type: Grant
    Filed: December 23, 2019
    Date of Patent: August 29, 2023
    Assignee: FireEye Security Holdings US LLC
    Inventors: Muhammad Zain Ul Abadin Gardezi, Mohsin Saeed, Hassan Ahmed, Fahim Abbasi, Farrukh Shahzad
  • Publication number: 20200252428
    Abstract: A system and method for detecting phishing cyberattacks. The method involves parsing a code segment retrieved using a suspect uniform resource locator (URL) to identify any links included in the code segment. From these links, additional code segments may be recovered in accordance with a code segment recovery scheme. Thereafter, analytics are performed on the retrieved and possibly recovered code segments. The analytics include determining whether any of the code segments is correlated with a code segment associated with a known prior phishing cyberattack. Upon completing the analytics, an alert message including meta-information associated with results from the analytics is generated to identify that the URL is associated with a known prior phishing cyberattack when one or perhaps a combination of code segments associated with the URL are correlated to any code segment associated with a known prior phishing cyberattack.
    Type: Application
    Filed: December 23, 2019
    Publication date: August 6, 2020
    Inventors: Muhammad Zain ul abadin Gardezi, Mohsin Saeed, Hassan Ahmad, Fahim Abbasi, Farrukh Shahzad
  • Patent number: 10176321
    Abstract: According to one embodiment, a malware classification scheme operating with an electronic device, configured with one or more hardware processors and a memory that stores the software handling the malware classification scheme that is conducted through analysis of behavior-based rules, is described. This malware classification scheme (i) conducts a determination whether a sequence of rules correspond to potential malicious behaviors detected during analysis of a malware sample within one or more virtual machines, and in response to determining that the sequence of rules corresponds to potential malicious behaviors, (ii) conducts an attempt to classify the malware sample to at least one known malware family based on an analysis of the sequence of rules.
    Type: Grant
    Filed: December 11, 2015
    Date of Patent: January 8, 2019
    Assignee: FireEye, Inc.
    Inventors: Fahim H. Abbasi, Abdul Salam, Farrukh Shahzad
  • Publication number: 20170083703
    Abstract: According to one embodiment, a malware classification scheme operating with an electronic device, configured with one or more hardware processors and a memory that stores the software handling the malware classification scheme that is conducted through analysis of behavior-based rules, is described. This malware classification scheme (i) conducts a determination whether a sequence of rules correspond to potential malicious behaviors detected during analysis of a malware sample within one or more virtual machines, and in response to determining that the sequence of rules corresponds to potential malicious behaviors, (ii) conducts an attempt to classify the malware sample to at least one known malware family based on an analysis of the sequence of rules.
    Type: Application
    Filed: December 11, 2015
    Publication date: March 23, 2017
    Inventors: Fahim H. Abbasi, Abdul Salam, Farrukh Shahzad
  • Patent number: 8193448
    Abstract: A cable trough includes a tray having a tray portion extending along a generally horizontal plane with two opposite side edges, a first side wall portion extending along one side edge of the tray portion on a plane generally perpendicular to the plane of the tray portion, and a second side wall portion extending along the other side edge of the tray portion on a plane generally perpendicular to the plane of the tray portion. The cable trough further includes a first side wall having at least one first attachment configuration constructed and arranged to secure the first side wall to the first side wall portion of the tray, and a second side wall having at least one second attachment configuration constructed and arranged to secure the second side wall to the second side wall portion of the tray. Various cable trough systems and methods are further disclosed.
    Type: Grant
    Filed: October 29, 2009
    Date of Patent: June 5, 2012
    Assignee: American Power Conversion Corporation
    Inventor: Farrukh Shahzad Syed
  • Publication number: 20110100668
    Abstract: A cable trough includes a tray having a tray portion extending along a generally horizontal plane with two opposite side edges, a first side wall portion extending along one side edge of the tray portion on a plane generally perpendicular to the plane of the tray portion, and a second side wall portion extending along the other side edge of the tray portion on a plane generally perpendicular to the plane of the tray portion. The cable trough further includes a first side wall having at least one first attachment configuration constructed and arranged to secure the first side wall to the first side wall portion of the tray, and a second side wall having at least one second attachment configuration constructed and arranged to secure the second side wall to the second side wall portion of the tray. Various cable trough systems and methods are further disclosed.
    Type: Application
    Filed: October 29, 2009
    Publication date: May 5, 2011
    Applicant: American Power Conversion Corporation
    Inventor: Farrukh Shahzad Syed