Patents Assigned to Trusteer Ltd.
  • Patent number: 8595836
    Abstract: A method for preventing malicious attacks on software, using the patching method, includes providing a database of malicious known patches (malware). The database contains characteristic signatures of the malware. The method also includes detecting whether a patch is malicious by comparing it with a signature in the database and performing one or more activities needed to prevent the malicious patch from performing undesired activities.
    Type: Grant
    Filed: August 3, 2011
    Date of Patent: November 26, 2013
    Assignee: Trusteer Ltd.
    Inventors: Amit Klein, Oleg Izmerly, Shmuel Regev, Eldan Ben-Haim
  • Publication number: 20130263264
    Abstract: A method for alerting a service provider and/or a user of a web browser of a phishing attempt comprises providing on a page that it is desired to protect against phishing, a Javascript that when caused by a phishing page to run not in the context of the original page generates an indication that a phishing attempt may exist.
    Type: Application
    Filed: April 2, 2012
    Publication date: October 3, 2013
    Applicant: TRUSTEER LTD.
    Inventors: Amit KLEIN, Michael BOODAEI
  • Publication number: 20130239214
    Abstract: A method for detecting and removing a suspicious software code in a computer system, according to which the installation process of the suspicious software code is monitored by a client agent residing within the computer system where predetermined operations of the suspicious software code are identified and registered during the installation process. The predetermined operations are compared with a known software code in order to define whether the software code is similar to the known software code. It is then determined if the suspicious software code is malware and if it is, the client agent is instructed to uninstall the suspicious software code from the OS, or to remove its entry from the boot registry.
    Type: Application
    Filed: March 6, 2012
    Publication date: September 12, 2013
    Applicant: TRUSTEER LTD.
    Inventors: Amit Klein, Mickey Boodaei
  • Publication number: 20130198842
    Abstract: System and method for determining, by a security application, whether an examined software code is a malware, according to which the system detects whenever the examined process code performs system calls and further detects a call site. Pieces of code in the surrounding area of the site and/or in branches related to the site are analyzed and the properties of the analyzed pieces of code are compared with a predefined software code patterns, for determining whether the examined process code corresponds to one of the predefined software code patterns. Then the examined process code is classified according to the comparison results.
    Type: Application
    Filed: January 31, 2012
    Publication date: August 1, 2013
    Applicant: TRUSTEER LTD.
    Inventors: Amit KLEIN, Eldan BEN-HAIM, Gal FRISHMAN
  • Patent number: 8239940
    Abstract: A method for preventing malicious attacks on software, using the patching method, includes providing a database of legitimate and known patches, the database contains characteristic code paths of said legitimate patches. The method also includes detecting whether a patch is malicious by inspecting one or more characteristic paths of the patch and matching one or more code paths against the database of legitimate and known patches. An activity needed to prevent the malicious patch from performing undesired activities is then performed.
    Type: Grant
    Filed: August 7, 2009
    Date of Patent: August 7, 2012
    Assignee: Trusteer Ltd.
    Inventors: Amit Klein, Oleg Izmerly, Shmuel Regev, Eldan Ben-Haim
  • Publication number: 20120030762
    Abstract: A method for preventing malicious attacks on software, using the patching method, includes providing a database of malicious known patches (malware). The database contains characteristic signatures of the malware. The method also includes detecting whether a patch is malicious by comparing it with a signature in the database and performing one or more activities needed to prevent the malicious patch from performing undesired activities.
    Type: Application
    Filed: August 3, 2011
    Publication date: February 2, 2012
    Applicant: TRUSTEER LTD.
    Inventors: Amit KLEIN, Oleg Izmerly, Shmuel Regev, Eldan Ben-Haim
  • Publication number: 20110239300
    Abstract: A method for detecting HTML-modifying malware present in a computer includes providing a server which serves a web page (HTML) to a browser. A determination is made whether a modified string exists in the page received by said browser and if a modifying element is found, determining the malware is present in the computer.
    Type: Application
    Filed: November 1, 2010
    Publication date: September 29, 2011
    Applicant: TRUSTEER LTD.
    Inventors: Amit KLEIN, Michael Boodaei
  • Publication number: 20100169969
    Abstract: A method for preventing malicious attacks on software, using the patching method, includes providing a database of legitimate and known patches, the database contains characteristic code paths of said legitimate patches. The method also includes detecting whether a patch is malicious by inspecting one or more characteristic paths of the patch and matching one or more code paths against the database of legitimate and known patches. An activity needed to prevent the malicious patch from performing undesired activities is then performed.
    Type: Application
    Filed: August 7, 2009
    Publication date: July 1, 2010
    Applicant: TRUSTEER LTD.
    Inventors: Amit KLEIN, Oleg Izmerly, Shmuel Regev, Eldan Ben-Haim
  • Publication number: 20090293102
    Abstract: A method for protecting a browser from malicious processes, comprises providing at least one process-proxy object and at least a browser-proxy object, interposed between the browser and a process, such that when the process invokes one of the DOM entry points, the process-proxy object isolates it from the real browser implementation and executes the process-proxy object's code instead.
    Type: Application
    Filed: May 22, 2009
    Publication date: November 26, 2009
    Applicant: TRUSTEER LTD.
    Inventors: Amit KLEIN, Eldan BEN-HAIM, Oleg IZMERLY, Shmuel REGEV, Michael BOODAEI
  • Publication number: 20090064309
    Abstract: A browser plug-in firewall manages data exchanged between a browser and a plug-in according to a pre-defined list of rights.
    Type: Application
    Filed: August 11, 2008
    Publication date: March 5, 2009
    Applicant: TRUSTEER LTD.
    Inventors: Michael Boodaei, Amit Klein, Oleg Izmerly
  • Publication number: 20090007243
    Abstract: A method for rendering a login theft ineffective includes detecting a submission of a first login request from the user's client to a Web site; redirecting the first login request to the traffic processor for copying at least one of the user supplied login fields; forwarding the first login request from the traffic processor to the site; requesting replacements of at least one of the user supplied login fields from the site; and replacing the at least one of user supplied login fields with at least one new corresponding login field(s) in the site.
    Type: Application
    Filed: June 27, 2007
    Publication date: January 1, 2009
    Applicant: TRUSTEER LTD.
    Inventors: Michael Boodaei, Amit Klein
  • Publication number: 20080222299
    Abstract: The present invention relates to a method for preventing the theft of a session token comprising the steps of: (a) detecting a submission of a first request from the client's browser to a protected site; (b) redirecting said first request to the traffic processor for monitoring said first request; (c) forwarding said first request from said traffic processor to said protected site; (d) receiving the response containing the session token from said protected site by said traffic processor; (e) storing said session token in the session table; (f) providing a token index for indexing said session token stored in said session table; (g) modifying the content of said response by changing said session token to said token index; and (h) forwarding the modified response from said traffic processor to said browser.
    Type: Application
    Filed: March 7, 2007
    Publication date: September 11, 2008
    Applicant: TRUSTEER LTD.
    Inventor: Michael Boodaei
  • Publication number: 20080222736
    Abstract: The present invention relates to a method for preventing an unauthorized activity including a transaction in a web site comprising the steps of: (a) receiving a response containing at least one HTML page, from said site, by the traffic processor; (b) modifying said response by obfuscating said at least one HTML page of said response; (c) storing de-obfuscation information in a transaction table; (d) forwarding the modified response from said traffic processor to the client's browser; (e) redirecting a request from said browser to the traffic processor, by the redirector; (f) checking said request for an unauthorized command; (g) de-obfuscating said request using the stored information in said transaction table; and (h) forwarding the modified request to said site.
    Type: Application
    Filed: March 7, 2007
    Publication date: September 11, 2008
    Applicant: TRUSTEER LTD.
    Inventors: Michael Boodaei, Amit Klein