Patents by Inventor Alexander Vermaning

Alexander Vermaning has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12242608
    Abstract: Embodiments disclosed herein include an apparatus with a processor configured to receive an indication of a function call to an identified shared library and configured to perform an identified function. The processor is configured to insert a function hook in the shared library. The function hook is configured to pause the execution of the shared library when called. In response to the function hook, the processor is configured to identify a source location in one or more memories associated with an origin of the function call to the shared library. The processor is configured to scan a range of memory addresses associated with the source location in the one or more memories, and identify, based on the scanning, a potentially malicious process within the range of memory addresses.
    Type: Grant
    Filed: December 27, 2022
    Date of Patent: March 4, 2025
    Assignee: Sophos Limited
    Inventors: Mark Willem Loman, Lute Edwin Engels, Ronny Henk Gert Tijink, Alexander Vermaning
  • Patent number: 12210617
    Abstract: A compute instance is instrumented to detect certain kernel memory allocation functions, in particular functions that allocate heap memory and/or make allocated memory executable. Dynamic shell code exploits can then be detected when code executing from heap memory allocates additional heap memory and makes that additional heap memory executable.
    Type: Grant
    Filed: December 18, 2023
    Date of Patent: January 28, 2025
    Assignee: Sophos Limited
    Inventors: Lute Edwin Engels, Mark Willem Loman, Alexander Vermaning, Erik Jan Loman, Victor Marinus Johann Simon van Hillo
  • Publication number: 20240223537
    Abstract: Secrets such as secure session cookies for a web browser can be protected on a compute instance with multiple layers of encryption, such as by encrypting key material that in turn controls cryptographic access to the secret. A compute instance can be instrumented to detect when a process attempts to decrypt this key material so that the process requesting decryption can be compared to authorized or legitimate users of the secret.
    Type: Application
    Filed: March 10, 2024
    Publication date: July 4, 2024
    Inventors: Mark Willem Loman, Lute Edwin Engels, Ronny Henk Gert Tijink, Victor Marinus Johann Simon van Hillo, Alexander Vermaning, Jeroen Harmsen
  • Publication number: 20240220609
    Abstract: A compute instance is instrumented to detect certain kernel memory allocation functions, in particular functions that allocate heap memory and/or make allocated memory executable. Dynamic shell code exploits can then be detected when code executing from heap memory allocates additional heap memory and makes that additional heap memory executable.
    Type: Application
    Filed: December 18, 2023
    Publication date: July 4, 2024
    Inventors: Lute Edwin Engels, Mark Willem Loman, Alexander Vermaning, Erik Jan Loman, Victor Marinus Johann Simon van Hillo
  • Publication number: 20240211597
    Abstract: Embodiments disclosed herein include an apparatus with a processor configured to receive an indication of a function call to an identified shared library and configured to perform an identified function. The processor is configured to insert a function hook in the shared library. The function hook is configured to pause the execution of the shared library when called. In response to the function hook, the processor is configured to identify a source location in one or more memories associated with an origin of the function call to the shared library. The processor is configured to scan a range of memory addresses associated with the source location in the one or more memories, and identify, based on the scanning, a potentially malicious process within the range of memory addresses.
    Type: Application
    Filed: December 27, 2022
    Publication date: June 27, 2024
    Inventors: Mark Willem LOMAN, Lute Wdwin ENGELS, Ronny Henk Gert TIJINK, Alexander VERMANING
  • Publication number: 20240184880
    Abstract: A computer-implemented method includes detecting, by a computing device, a request from a macro included in a document file that is open in a software application executing on the computing device, where the macro comprises executable code and where the document file further includes non-executable document content. The method further includes determining if the request includes simulation of a physical keystroke based on detecting that the request includes a function call to a function that synthesizes keystrokes. The method further includes responsive to determining that the request includes simulation of the physical keystroke, preventing the request from being satisfied.
    Type: Application
    Filed: December 6, 2022
    Publication date: June 6, 2024
    Applicant: SOPHOS LIMITED
    Inventors: Alexander Vermaning, Ronny Henk Gert Tijink, Mark Willem Loman, Lute Edwin Engels
  • Patent number: 11929992
    Abstract: Secrets such as secure session cookies for a web browser can be protected on a compute instance with multiple layers of encryption, such as by encrypting key material that in turn controls cryptographic access to the secret. A compute instance can be instrumented to detect when a process attempts to decrypt this key material so that the process requesting decryption can be compared to authorized or legitimate users of the secret.
    Type: Grant
    Filed: September 7, 2021
    Date of Patent: March 12, 2024
    Assignee: Sophos Limited
    Inventors: Mark Willem Loman, Lute Edwin Engels, Ronny Henk Gert Tijink, Victor Marinus Johann Simon van Hillo, Alexander Vermaning, Jeroen Harmsen
  • Patent number: 11880453
    Abstract: A compute instance is instrumented to detect certain kernel memory allocation functions, in particular functions that allocate heap memory and/or make allocated memory executable. Dynamic shell code exploits can then be detected when code executing from heap memory allocates additional heap memory and makes that additional heap memory executable.
    Type: Grant
    Filed: January 9, 2023
    Date of Patent: January 23, 2024
    Assignee: Sophos Limited
    Inventors: Lute Edwin Engels, Mark Willem Loman, Alexander Vermaning, Erik Jan Loman, Victor Marinus Johann Simon van Hillo
  • Patent number: 11550900
    Abstract: A compute instance is instrumented to detect certain kernel memory allocation functions, in particular functions that allocate heap memory and/or make allocated memory executable. Dynamic shell code exploits can then be detected when code executing from heap memory allocates additional heap memory and makes that additional heap memory executable.
    Type: Grant
    Filed: November 13, 2019
    Date of Patent: January 10, 2023
    Assignee: Sophos Limited
    Inventors: Lute Edwin Engels, Mark Willem Loman, Alexander Vermaning, Erik Jan Loman, Victor Marinus Johann Simon van Hillo
  • Publication number: 20220321540
    Abstract: Secrets such as secure session cookies for a web browser can be protected on a compute instance with multiple layers of encryption, such as by encrypting key material that in turn controls cryptographic access to the secret. A compute instance can be instrumented to detect when a process attempts to decrypt this key material so that the process requesting decryption can be compared to authorized or legitimate users of the secret.
    Type: Application
    Filed: September 7, 2021
    Publication date: October 6, 2022
    Inventors: Mark Willem Loman, Lute Edwin Engels, Ronny Henk Gert Tijink, Victor Marinus Johann Simon van Hillo, Alexander Vermaning, Jeroen Harmsen