Patents Assigned to FireEye, Inc.
  • Patent number: 10296437
    Abstract: A method is described that includes receiving an application and generating a representation of the application that describes specific states of the application and specific state transitions of the application. The method further includes identifying a region of interest of the application based on rules and observations of the application's execution. The method further includes determining specific stimuli that will cause one or more state transitions within the application to reach the region of interest. The method further includes enabling one or more monitors within the application's run time environment and applying the stimuli. The method further includes generating monitoring information from the one or more monitors. The method further includes applying rules to the monitoring information to determine a next set of stimuli to be applied to the application in pursuit of determining whether the region of interest corresponds to improperly behaving code.
    Type: Grant
    Filed: October 16, 2017
    Date of Patent: May 21, 2019
    Assignee: FireEye, Inc.
    Inventors: Osman Abdoul Ismael, Dawn Song, Ashar Aziz, Noah Johnson, Prashanth Mohan, Hui Xue
  • Patent number: 10282548
    Abstract: Systems and methods for detecting malicious content are provided. In an exemplary embodiment, a method for detecting malicious content is described that detects when a client device has access to a remote network server of a communication network. The client device includes one or more processors. Thereafter, a controller being a device separate from the client device, activates one or more security programs within the remote network server. The security programs enable the controller to analyze data stored within or transmitted from the remote network server. Lastly, the controller analyzing the data to determine whether the data includes malware.
    Type: Grant
    Filed: December 12, 2016
    Date of Patent: May 7, 2019
    Assignee: FireEye, Inc.
    Inventors: Ashar Aziz, Stuart Staniford, Muhammad Amin, Henry Uyeno, Samuel Yie
  • Patent number: 10284574
    Abstract: Exemplary systems and methods for malware attack detection and identification are provided. A malware detection and identification system a controller that features an analysis environment including a virtual machine. The analysis environment to (1) receive data by the virtual machine of the analysis environment and identify a portion of the data that have been received from one or more untrusted, (2) monitor state information associated with the identified portion of the data during execution by the virtual machine, (3) identify an outcome of the state information by tracking the state information during execution of the identified portion of the data by the virtual machine, and (4) determine whether the identified outcome comprises a redirection in control flow during execution by the virtual machine of the portion of the data, the redirection in the control flow constituting an unauthorized activity.
    Type: Grant
    Filed: October 31, 2014
    Date of Patent: May 7, 2019
    Assignee: FireEye, Inc.
    Inventors: Ashar Aziz, Wei-Lung Lai, Jayaraman Manni
  • Patent number: 10284575
    Abstract: A system and method for automatically analyzing an object for malware is described. Operating one or more virtual machines, the system and method provide an analysis environment variation framework to provide a more robust analysis of an object for malware. The multi-application, multi-plugin processing framework is configured within a virtual machine, where the framework generates a plurality of processes for analyzing the object for malware and each of plurality of processes is configured with a different application and plug-in combination selected based in part on a type of object being analyzed.
    Type: Grant
    Filed: November 10, 2015
    Date of Patent: May 7, 2019
    Assignee: FireEye, Inc.
    Inventors: Sushant Paithane, Sai Vashisht, Yasir Khalid, Alexandre Pilipenko, Muhammad Rizwan
  • Publication number: 20190132334
    Abstract: A system for detecting whether a file including content s associated with a cyber-attack is described. The content may include an executable file for example. The system includes an intelligence-driven analysis subsystem and a computation analysis subsystem. The intelligence-driven analysis subsystem is configured to (i) receive the file, (ii) inspect and compute features of the file for indicators associated with a cyber-attack, and (iii) produce a first output representing the detected indicators. The computational analysis subsystem includes an artificial neural network to (i) receive a network input being a first representation of at least one section of binary code from the file as input, and (ii) process the first representation of the section to produce a second output. The first output and the second output are used in determination a classification assigned to the file.
    Type: Application
    Filed: October 27, 2017
    Publication date: May 2, 2019
    Applicant: FireEye, Inc.
    Inventors: Jeffrey Thomas Johns, Brian Sanford Jones, Scott Eric Coull
  • Patent number: 10242185
    Abstract: According to one embodiment, a computerized method comprises three operations. First, an incoming object is analyzed to determine if the incoming object is suspicious by having characteristics that suggest the object is an exploit. Next, a virtual machine is dynamically configured with a software image representing a current operating state of a targeted client device. The software image represents content and structure of a storage volume for the targeted client device at a time of configuring the virtual machine. Lastly, the object is processed by the virtual machine in order to detect any anomalous behaviors that may cause the object to be classified as an exploit.
    Type: Grant
    Filed: March 21, 2014
    Date of Patent: March 26, 2019
    Assignee: FireEye, Inc.
    Inventor: Harnish Goradia
  • Publication number: 20190089732
    Abstract: Disclosed is a cyber-security system that is configured to aggregate and unify data from multiple components and platforms on a network. The system allows security administrators can to design and implement a workflow of device-actions taken by security individuals in response to a security incident. Based on the nature of a particular threat, the cyber-security system may initiate an action plan that is tailored to the security operations center and their operating procedures to protect potentially impacted components and network resources.
    Type: Application
    Filed: November 9, 2018
    Publication date: March 21, 2019
    Applicant: FireEye, Inc.
    Inventors: Bernard THOMAS, David SCOTT, Fred BROTT, Paul SMITH
  • Patent number: 10218740
    Abstract: A computerized method for classifying objects in a malware system is described. The method includes detecting behaviors of an object for classification after processing of the object has begun. Data associated with the detected behaviors is collected, and a fuzzy hash for the received object is generated. The generation of the fuzzy hash may include (i) removing a portion of the data associated with the detected behaviors, and (ii) performing a hash operation on a remaining portion of the data associated with the detected behaviors. Thereafter, the fuzzy hash for the received object is compared to a fuzzy hash of an object in a preexisting cluster to generate a similarity measure. The received object is associated with the preexisting cluster in response to determining that the similarity measure is above a predefined threshold value. Thereafter, the results are reported.
    Type: Grant
    Filed: March 5, 2018
    Date of Patent: February 26, 2019
    Assignee: FireEye, Inc.
    Inventors: Ali Mesdaq, Paul L. Westin, III
  • Patent number: 10216927
    Abstract: A computerized method is provided for protecting processes operating within a computing device. The method comprises an operation for identifying, by a virtualization layer operating in a host mode, when a guest process switch has occurred. The guest process switch corresponds to a change as to an operating state of a process within a virtual machine. Responsive to an identified guest process switch, an operation is conducted to determine, by the virtualization layer, whether hardware circuitry within the computing device is to access a different nested page table for use in memory address translations. The different nested page table alters page permissions for one or more memory pages associated with at least the process that are executable in the virtual machine.
    Type: Grant
    Filed: June 30, 2016
    Date of Patent: February 26, 2019
    Assignee: FireEye, Inc.
    Inventor: Udo Steinberg
  • Patent number: 10210329
    Abstract: According to one embodiment, a system comprising a dynamic analysis server comprising one or more virtual machines is disclosed, wherein the one or more virtual machines may be configured to execute certain event logic with respect to a loaded module. The virtual machines may be communicatively coupled to a virtual machine manager and a database; and rule-matching logic comprising detection logic, wherein the detection logic is configured to determine (1) whether an access source is attempting to access a protected region such as a page guarded area; and (2) determine whether the access source is from the heap. The system further comprises reporting logic that is configured to generate an alert so as to notify a user and/or network administrator of a probable application-execution hijacking attack.
    Type: Grant
    Filed: September 30, 2015
    Date of Patent: February 19, 2019
    Assignee: FireEye, Inc.
    Inventors: Amit Malik, Reghav Pande, Aakash Jain
  • Patent number: 10200384
    Abstract: A system and method for detecting malicious activity through one or more local analyzers and a central analyzer. The local analyzer captures packets that are part of communications over a network, generates a signature from information obtained from one or more of the captured packets, and determines whether the signature matches any signature of a first plurality of signatures stored in a first storage device that is accessible to the first local analyzer. The central analyzer remotely receives a portion of the information and the signature from the first local analyzer in response to the signature failing to match any of the signatures stored in the first storage device. The central analyzer determines whether the signature matches any global signature stored within a second storage device that is accessible to the central analyzer.
    Type: Grant
    Filed: August 29, 2016
    Date of Patent: February 5, 2019
    Assignee: FireEye, Inc.
    Inventors: Atif Mushtaq, Todd Rosenberry, Ashar Aziz, Ali Islam
  • Patent number: 10198574
    Abstract: A network device for detecting malware is described. The network device features a memory storage device and a controller. The controller operating in cooperation with one or more virtual machines that are based on software modules stored within the memory storage device. The controller is configured to (i) monitor behaviors of at least a first virtual machine of the one or more virtual machines processing data received over a network, (ii) identify at least one anomalous behavior that includes either a communication anomaly or an execution anomaly, and (iii) detect, based on the identified at least one anomalous behavior, a presence of malware in the first virtual machine in response to identifying the at least one anomalous behavior.
    Type: Grant
    Filed: May 27, 2016
    Date of Patent: February 5, 2019
    Assignee: FireEye, Inc.
    Inventors: Emmanuel Thioux, Muhammad Amin, Osman Abdoul Ismael
  • Patent number: 10191861
    Abstract: A technique implements memory views using a virtualization layer of a virtualization architecture executing on a node of a network environment. The virtualization layer may include a user mode portion having hyper-processes and a kernel portion having a micro-hypervisor that cooperate to virtualize a guest operating system kernel within a virtual machine (VM) of the node. The micro-hypervisor may further cooperate with the hyper-processes, such as a guest monitor, of the virtualization layer to implement one or more memory views of the VM. As used herein, a memory view is illustratively a hardware resource (i.e., a set of nested page tables) used as a container (i.e., to constrain access to memory of the node) for one or more guest processes of the guest operating system kernel.
    Type: Grant
    Filed: September 6, 2016
    Date of Patent: January 29, 2019
    Assignee: FireEye, Inc.
    Inventors: Udo Steinberg, Osman Abdoul Ismael
  • Patent number: 10192052
    Abstract: According to one embodiment, a computerized method comprises conducting a first static scan on content within a file. Thereafter, if the first static scan did not result in the file being classified as malicious, the file is deconstructed to gain access to one or more objects within the file. A second static scan associated with the one or more objects is performed to determine whether the one or more objects are suspected of including malware. The file may then be classified as malicious based on results of the second static scan.
    Type: Grant
    Filed: September 30, 2013
    Date of Patent: January 29, 2019
    Assignee: FireEye, Inc.
    Inventors: Abhishek Singh, Yichong Lin, Angshuman Mukherjee, Zheng Bu
  • Patent number: 10181029
    Abstract: A method for hardening in the field code of mobile software applications is described that includes receiving, by a cloud service framework, an application via a user interface over a network. The method also includes generating, by the cloud service framework, a representation of the code of the application and determining, by the cloud service framework, changes to code of the application based at least in part on the representation, wherein the changes to the code preclude the application from performing one or more unwanted behaviors. The method also includes instrumenting, by a static instrumentation unit within the cloud service framework, the application with the changes to the code to create an instrumented application that does not perform the one or more unwanted behaviors.
    Type: Grant
    Filed: November 17, 2017
    Date of Patent: January 15, 2019
    Assignee: FireEye, Inc.
    Inventors: Osman Abdoul Ismael, Dawn Song, Ashar Aziz, Noah Johnson, Adrian Matthew Mettler
  • Patent number: 10176321
    Abstract: According to one embodiment, a malware classification scheme operating with an electronic device, configured with one or more hardware processors and a memory that stores the software handling the malware classification scheme that is conducted through analysis of behavior-based rules, is described. This malware classification scheme (i) conducts a determination whether a sequence of rules correspond to potential malicious behaviors detected during analysis of a malware sample within one or more virtual machines, and in response to determining that the sequence of rules corresponds to potential malicious behaviors, (ii) conducts an attempt to classify the malware sample to at least one known malware family based on an analysis of the sequence of rules.
    Type: Grant
    Filed: December 11, 2015
    Date of Patent: January 8, 2019
    Assignee: FireEye, Inc.
    Inventors: Fahim H. Abbasi, Abdul Salam, Farrukh Shahzad
  • Patent number: 10169585
    Abstract: A non-transitory storage medium including instructions that are executable by one or more processors to perform operations including instrumenting a VM is shown. The VM is used to process an object to determine whether the object is associated with malware. Logic within the VM analyzes memory allocated for a process within the VM for a point of interest (POI), the POI being an address of one of a set predetermined instructions likely to be associated with malware. The VMM detects a memory violation during processing of the object and responsive to detecting the memory violation, injects a transition event at the POI on the page on which the POI is located in memory. Further, responsive to detecting an attempted execution of the transition event, the VMM (i) emulates an instruction located at the POI, and (ii) the logic within the VM performs one or more malware detection routines.
    Type: Grant
    Filed: June 22, 2016
    Date of Patent: January 1, 2019
    Assignee: FireEye, Inc.
    Inventors: Alex Pilipenko, Phung-Te Ha
  • Patent number: 10165000
    Abstract: Systems and methods for malware attack prevention are provided. The malware attack prevention system features a heuristic module, an analysis environment and an interception module. The heuristic module is configured to (i) receive incoming data from a particular source over a first communication path and (ii) analyze the incoming data to determine whether the incoming data is suspicious, where the suspicious incoming data represents a prescribed likelihood that the incoming data is associated with a malware attack. The analysis environment is configured to analyze the suspicious incoming data to identify whether the suspicious incoming data is associated with a malware attack. Lastly, the interception module is configured to redirect a subsequent flow of data from the particular source to the malware attack prevention system in response to determining, by at least the heuristic module, that the incoming data is suspicious.
    Type: Grant
    Filed: November 24, 2014
    Date of Patent: December 25, 2018
    Assignee: FireEye, Inc.
    Inventors: Ashar Aziz, Wei-Lung Lai, Jayaraman Manni
  • Patent number: 10148693
    Abstract: According to one embodiment, a virtualized malware detection system is integrated with a virtual machine host including a plurality of virtual machines and a security virtual machine. Logic within the virtual machines are configured to perform a dynamic analysis of an object and monitor for the occurrence of a triggering event. Upon detection of a triggering event within a virtual machine, the logic within the virtual machine provides the security virtual machine with information associated with the triggering event for further analysis. Based on the further analysis, the object may then be classified as “non-malicious,” or “malicious.
    Type: Grant
    Filed: June 15, 2015
    Date of Patent: December 4, 2018
    Assignee: FireEye, Inc.
    Inventors: Japneet Singh, Harinath Ramchetty, Anil Gupta
  • Patent number: 10146810
    Abstract: A system and method for analyzing data from a plurality of computer environments. The computer environments are authenticated and data is imported to a memory location. The data is converted into a uniform format to enable expedited searching by one or more authenticated users. The data may be marked so that a user may determine which computer environment provided the data. The system may also create one or more indexes of the data to assist one or more users in searching the data.
    Type: Grant
    Filed: August 2, 2013
    Date of Patent: December 4, 2018
    Assignee: FireEye, Inc.
    Inventors: Jason Shiffer, Matthew Frazier, Sean Cunningham, Scott Hogsten, Eric Helvey, James Butler, Peter Villadsen