Patents Assigned to Shine Security Ltd.
-
Publication number: 20180227316Abstract: A computerized method of preemptive event handling, The method comprises monitoring, in run time at kernel level, a plurality of events of a plurality of processes executed by an operating system (OS) running on a computing device, detecting, in run time, a first event of the plurality of events, the first event being performed by a first process of the plurality of processes on the computing device, classifying, in run time, the first process as a malware in response to the detection of the first event, and preventing, in run time, the first process from running on the computing device before the first event is processed by the OS.Type: ApplicationFiled: April 3, 2018Publication date: August 9, 2018Applicant: Shine Security Ltd.Inventors: Itay KATZ, Ianir IDESES, Ron PORAT, Alon BLAYER-GAT, Oren FARAGE
-
Publication number: 20180139218Abstract: A computerized method of reverting system data affected by a malware. The method comprises monitoring, in run time, a plurality of events of a plurality of processes executed by an operating system (OS) running on a computing device, logging in an event log, in run time, the plurality of events, classifying, in run time, a first process of the plurality of processes as a malware, identifying a set of events of the first process from the plurality of events using the event log, and reverting, in response to the classification, at least one system object hosted in the computing device to remove an effect of the set of events on the OS.Type: ApplicationFiled: January 15, 2018Publication date: May 17, 2018Applicant: Shine Security Ltd.Inventors: Itay Katz, Ianir Ideses, Ron Porat, Alon Blayer-Gat, Oren Farage
-
Patent number: 9942246Abstract: A computerized method of preemptive event handling, The method comprises monitoring, in run time at kernel level, a plurality of events of a plurality of processes executed by an operating system (OS) running on a computing device, detecting, in run time, a first event of the plurality of events, the first event being performed by a first process of the plurality of processes on the computing device, classifying, in run time, the first process as a malware in response to the detection of the first event, and preventing, in run time, the first process from running on the computing device before the first event is processed by the OS.Type: GrantFiled: August 31, 2014Date of Patent: April 10, 2018Assignee: Shine Security Ltd.Inventors: Itay Katz, Ianir Ideses, Ron Porat, Alon Blayer-Gat, Oren Farage
-
Publication number: 20180070261Abstract: A method of queuing network traffic events on a client terminal. The method comprises monitoring, in run time, a plurality of network traffic events triggered by a plurality of applications executed on a client terminal, extracting a plurality of network traffic event characteristics of each of the plurality of network traffic events, classifying each one of the plurality of network traffic events according to a respective the plurality of network traffic event characteristics, clustering the plurality of network traffic events in a plurality of clusters according to the classifying, and managing an opening a plurality data connections between the client terminal and a network such that the content of each cluster of the plurality of clusters is transmitted in another of the plurality data connections.Type: ApplicationFiled: October 30, 2017Publication date: March 8, 2018Applicant: Shine Security Ltd.Inventors: Ianir IDESES, Itay KATZ, Doron SHAMIA SADEH
-
Patent number: 9871809Abstract: A computerized method of reverting system data affected by a malware. The method comprises monitoring, in run time, a plurality of events of a plurality of processes executed by an operating system (OS) running on a computing device, logging in an event log, in run time, the plurality of events, classifying, in run time, a first process of the plurality of processes as a malware, identifying a set of events of the first process from the plurality of events using the event log, and reverting, in response to the classification, at least one system object hosted in the computing device to remove an effect of the set of events on the OS.Type: GrantFiled: August 26, 2014Date of Patent: January 16, 2018Assignee: Shine Security Ltd.Inventors: Itay Katz, Ianir Ideses, Ron Porat, Alon Blayer-Gat, Oren Farage
-
Patent number: 9807639Abstract: A method of queuing network traffic events on a client terminal. The method comprises monitoring, in run time, a plurality of network traffic events triggered by a plurality of applications executed on a client terminal, extracting a plurality of network traffic event characteristics of each of the plurality of network traffic events, classifying each one of the plurality of network traffic events according to a respective the plurality of network traffic event characteristics, clustering the plurality of network traffic events in a plurality of clusters according to the classifying, and managing an opening a plurality data connections between the client terminal and a network such that the content of each cluster of the plurality of clusters is transmitted in another of the plurality data connections.Type: GrantFiled: January 29, 2015Date of Patent: October 31, 2017Assignee: Shine Security Ltd.Inventors: Ianir Ideses, Itay Katz, Doron Shamia Sadeh
-
Publication number: 20160357966Abstract: A method of identifying one or more malicious threats in a computing device. The device comprises monitoring a plurality of events occurring on a computing device in run time, a plurality of processes executed on the computing device in run time, and a plurality of host activities of the computing device in run time, identifying a compliance of at least some of the plurality of events, the plurality of processes, and the plurality of host activities with a plurality of rules, generating a rule compliance status dataset generated according to the compliance, identifying a match between the rule compliance status dataset and at least one of a plurality of reference profiles each indicative of a computing device operation under a malicious threat activity, and detecting a malicious threat according to the match.Type: ApplicationFiled: August 14, 2016Publication date: December 8, 2016Applicant: Shine Security Ltd.Inventors: Ron PORAT, Andrey BAYORA, Oren FARAGE, Alon BLAYER-GAT
-
Patent number: 9419996Abstract: A method of identifying one or more malicious threats in a computing device. The device comprises monitoring a plurality of events occurring on a computing device in run time, a plurality of processes executed on the computing device in run time, and a plurality of host activities of the computing device in run time, identifying a compliance of at least some of the plurality of events, the plurality of processes, and the plurality of host activities with a plurality of rules, generating a rule compliance status dataset generated according to the compliance, identifying a match between the rule compliance status dataset and at least one of a plurality of reference profiles each indicative of a computing device operation under a malicious threat activity, and detecting a malicious threat according to the match.Type: GrantFiled: May 1, 2013Date of Patent: August 16, 2016Assignee: Shine Security Ltd.Inventors: Ron Porat, Andrey Bayora, Oren Farage, Alon Blayer-Gat