Patents by Inventor Neeraj Thakar

Neeraj Thakar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10599846
    Abstract: Systems, computer readable media, apparatuses, and methods are disclosed for segregating executable files exhibiting network activity. An example apparatus includes at least one processor and memory including instructions which, when executed, cause the at least one processor to launch an executable file in a segmented portion of a computing system to load one or more dynamically linked libraries (DLLs) associated with the executable file into a process environment block (PEB) of the segmented portion, enumerate the PEB to generate an address list of the one or more DLLs, scan the one or more DLLs to determine whether the one or more DLLs are to perform network activity, and perform malware analysis on the executable file when at least one of the one or more DLLs are to perform network activity.
    Type: Grant
    Filed: August 23, 2018
    Date of Patent: March 24, 2020
    Assignee: MCAFEE, LLC
    Inventors: Neeraj Thakar, Amit Malik
  • Publication number: 20190163903
    Abstract: Systems and methods for detection of domain generated algorithms (DGA) and their command and control (C&C) servers are disclosed. In one embodiment, such an approach includes examining DNS queries for DNS resolution failures, and monitoring certain set of parameters such as number of levels, length of domain name, lexical complexity, and the like for each failed domain. These parameters may then be compared against certain thresholds to determine if the domain name is likely to be part of a DGA malware. Domain names identified as being part of a DGA malware may then be grouped together. Once a DGA domain name has been identified, activity from that domain name can be monitored to detect successful resolutions from the same source to see if any of the successful domain resolutions match these parameters. If they match specific thresholds, then the domain is determined to be a C&C server of the DGA malware and may be identified as such.
    Type: Application
    Filed: January 31, 2019
    Publication date: May 30, 2019
    Inventors: Neeraj Thakar, Praveen Kumar Amritaluru, Vikas Taneja
  • Patent number: 10198579
    Abstract: Systems and methods for detection of domain generated algorithms (DGA) and their command and control (C&C) servers are disclosed. In one embodiment, such an approach includes examining DNS queries for DNS resolution failures, and monitoring certain set of parameters such as number of levels, length of domain name, lexical complexity, and the like for each failed domain. These parameters may then be compared against certain thresholds to determine if the domain name is likely to be part of a DGA malware. Domain names identified as being part of a DGA malware may then be grouped together. Once a DGA domain name has been identified, activity from that domain name can be monitored to detect successful resolutions from the same source to see if any of the successful domain resolutions match these parameters. If they match specific thresholds, then the domain is determined to be a C&C server of the DGA malware and may be identified as such.
    Type: Grant
    Filed: August 22, 2014
    Date of Patent: February 5, 2019
    Assignee: MCAFEE, LLC
    Inventors: Neeraj Thakar, Praveen Kumar Amritaluru, Vikas Taneja
  • Publication number: 20190005243
    Abstract: Systems, computer readable media, apparatuses, and methods are disclosed for segregating executable files exhibiting network activity. An example apparatus includes at least one processor and memory including instructions which, when executed, cause the at least one processor to launch an executable file in a segmented portion of a computing system to load one or more dynamically linked libraries (DLLs) associated with the executable file into a process environment block (PEB) of the segmented portion, enumerate the PEB to generate an address list of the one or more DLLs, scan the one or more DLLs to determine whether the one or more DLLs are to perform network activity, and perform malware analysis on the executable file when at least one of the one or more DLLs are to perform network activity.
    Type: Application
    Filed: August 23, 2018
    Publication date: January 3, 2019
    Inventors: Neeraj Thakar, Amit Malik
  • Patent number: 10083300
    Abstract: An executable file is loaded into memory. The executable file is analyzed to determine whether one or more dynamically linked libraries are referenced in an import table of the file. It can then be determined whether one or more dynamically linked libraries is adapted to contact a network.
    Type: Grant
    Filed: December 27, 2013
    Date of Patent: September 25, 2018
    Assignee: McAfee, LLC
    Inventors: Neeraj Thakar, Amit Malik
  • Publication number: 20170032122
    Abstract: An executable file is loaded into memory. The executable file is analyzed to determine whether one or more dynamically linked libraries are referenced in an import table of the file.
    Type: Application
    Filed: December 27, 2013
    Publication date: February 2, 2017
    Applicant: McAfee, Inc.
    Inventors: Neeraj THAKAR, Amit MALIK
  • Publication number: 20160057165
    Abstract: Systems and methods for detection of domain generated algorithms (DGA) and their command and control (C&C) servers are disclosed. In one embodiment, such an approach includes examining DNS queries for DNS resolution failures, and monitoring certain set of parameters such as number of levels, length of domain name, lexical complexity, and the like for each failed domain. These parameters may then be compared against certain thresholds to determine if the domain name is likely to be part of a DGA malware. Domain names identified as being part of a DGA malware may then be grouped together. Once a DGA domain name has been identified, activity from that domain name can be monitored to detect successful resolutions from the same source to see if any of the successful domain resolutions match these parameters. If they match specific thresholds, then the domain is determined to be a C&C server of the DGA malware and may be identified as such.
    Type: Application
    Filed: August 22, 2014
    Publication date: February 25, 2016
    Inventors: Neeraj Thakar, Praveen Kumar Amritaluru, Vikas Taneja