Patents by Inventor Amit Klein

Amit Klein has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9372990
    Abstract: Detecting heap spraying on a computer by detecting a plurality of requests to allocate portions of heap memory, measuring the plurality of requests to determine a value of a characteristic of the plurality of requests, identifying an activity consistent with heap spraying by determining that the value of the characteristic is consistent with a benchmark value of the characteristic, wherein the benchmark value of the characteristic is associated with heap spraying, and performing a computer-security-related remediation action responsive to determining that the value of the characteristic is consistent with the benchmark value of the characteristic.
    Type: Grant
    Filed: August 29, 2014
    Date of Patent: June 21, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Zohar Basil, Amit Klein, Ron Peleg, Shmuel Regev
  • Patent number: 9330259
    Abstract: A process for identifying potentially harmful malware, comprises the steps of: a) identifying an executable that is about to run; b) providing a monitoring agent that monitors all threads that are descendent of a thread initiated by the process of said executable; and c) configuring said monitoring agent to conclude that a high probability of malware presence exists, if one of said descendent threads reaches a target process in which suspicious patches are created.
    Type: Grant
    Filed: March 19, 2013
    Date of Patent: May 3, 2016
    Assignee: TRUSTEER, LTD.
    Inventors: Amit Klein, Yaron Dycian, Gal Frishman, Avner Gideoni
  • Patent number: 9323925
    Abstract: A method for preventing the acquisition of data by a screen capturing malware, comprises preventing an unidentified process that does not open a window from performing screen capture.
    Type: Grant
    Filed: May 30, 2013
    Date of Patent: April 26, 2016
    Assignee: TRUSTEER, LTD.
    Inventor: Amit Klein
  • Patent number: 9300666
    Abstract: Detecting proxy-based communications via a computer network by sending a uniform resource locator via a computer network to a recipient at a first computer network address, identifying a request associated with the uniform resource locator, where the request is associated with a second computer network address, and determining that a value of a characteristic of the second computer network address is inconsistent with a value associated with the recipient, thereby identifying the first computer network address as being associated with a proxy.
    Type: Grant
    Filed: July 10, 2014
    Date of Patent: March 29, 2016
    Assignee: International Business Machines Corporation
    Inventor: Amit Klein
  • Publication number: 20160088003
    Abstract: Detecting malware-related activity on a computer by detecting activity associated with the creation of a data object, where the activity is performed by a process, where the process is an instance of a computer software application that resides in a computer memory and that is executed by a computer, and where the data object is configured to persist after termination of the process, determining a string that identifies the data object, searching for a portion of the string that identifies the data object within any areas of the computer memory storing static portions of the computer software application, and performing a computer-security-related remediation action responsive to determining that the portion of the string that identifies the data object is absent from the searched areas of the computer memory.
    Type: Application
    Filed: November 25, 2015
    Publication date: March 24, 2016
    Inventor: AMIT KLEIN
  • Publication number: 20160063245
    Abstract: Detecting heap spraying on a computer by detecting a plurality of requests to allocate portions of heap memory, measuring the plurality of requests to determine a value of a characteristic of the plurality of requests, identifying an activity consistent with heap spraying by determining that the value of the characteristic is consistent with a benchmark value of the characteristic, wherein the benchmark value of the characteristic is associated with heap spraying, and performing a computer-security-related remediation action responsive to determining that the value of the characteristic is consistent with the benchmark value of the characteristic.
    Type: Application
    Filed: August 29, 2014
    Publication date: March 3, 2016
    Inventors: Zohar Basil, Amit Klein, Ron Peleg, Shmuel Regev
  • Patent number: 9270691
    Abstract: A method for detecting HTML-modifying malware present in a computer includes providing a server which serves a web page (HTML) to a browser. A determination is made whether a modified string exists in the page received by the browser and if a modifying element is found, determining the malware is present in the computer.
    Type: Grant
    Filed: November 1, 2010
    Date of Patent: February 23, 2016
    Assignee: TRUSTEER, LTD.
    Inventors: Amit Klein, Michael Boodaei
  • Publication number: 20160042182
    Abstract: Dynamic verification of a computer software application execution path by detecting execution of a target instruction of a computer software application, wherein the computer software application is configured to generate a token at an instruction near a waypoint instruction of the computer software application, and wherein the waypoint instruction lies along an execution path that leads to the target instruction. Determining, responsive to detecting execution of the target instruction, whether a token exists. Performing a computer-security-related remediation action responsive to determining that the token does not exist.
    Type: Application
    Filed: August 7, 2014
    Publication date: February 11, 2016
    Inventors: Amit Klein, Shmuel Regev
  • Publication number: 20160014125
    Abstract: Detecting proxy-based communications via a computer network by sending a uniform resource locator via a computer network to a recipient at a first computer network address, identifying a request associated with the uniform resource locator, where the request is associated with a second computer network address, and determining that a value of a characteristic of the second computer network address is inconsistent with a value associated with the recipient, thereby identifying the first computer network address as being associated with a proxy.
    Type: Application
    Filed: July 10, 2014
    Publication date: January 14, 2016
    Inventor: Amit Klein
  • Patent number: 9218487
    Abstract: A method for protecting a browser from malicious processes, comprises providing at least one process-proxy object and at least a browser-proxy object, interposed between the browser and a process, such that when the process invokes one of the DOM entry points, the process-proxy object isolates it from the real browser implementation and executes the process-proxy object's code instead.
    Type: Grant
    Filed: October 13, 2014
    Date of Patent: December 22, 2015
    Assignee: TRUSTEER, LTD.
    Inventors: Amit Klein, Eldan Ben-Haim, Oleg Izmerly, Shmuel Regev, Michael Boodaei
  • Publication number: 20150365433
    Abstract: A method for alerting a service provider and/or a user of a web browser of a phishing attempt comprises providing on a page that it is desired to protect against phishing, a Javascript that when caused by a phishing page to run not in the context of the original page generates an indication that a phishing attempt may exist.
    Type: Application
    Filed: August 18, 2015
    Publication date: December 17, 2015
    Inventors: AMIT KLEIN, MICHAEL BOODAEI
  • Publication number: 20150363595
    Abstract: A computer security method including periodically recording a screenshot of what is displayed on a display of a computer, thereby recording a plurality of screenshots, selecting, in accordance with predefined selection criteria, any of the screenshots that were recorded near detection of a security-related condition, and providing any of the selected screenshots in association with the detection of the security-related condition.
    Type: Application
    Filed: June 11, 2014
    Publication date: December 17, 2015
    Inventors: Amit Klein, Shmulik Regev
  • Publication number: 20150278521
    Abstract: Detecting malware-related activity on a computer by detecting activity associated with the creation of a data object, where the activity is performed by a process, where the process is an instance of a computer software application that resides in a computer memory and that is executed by a computer, and where the data object is configured to persist after termination of the process, determining a string that identifies the data object, searching for a portion of the string that identifies the data object within any areas of the computer memory storing static portions of the computer software application, and performing a computer-security-related remediation action responsive to determining that the portion of the string that identifies the data object is absent from the searched areas of the computer memory.
    Type: Application
    Filed: March 31, 2014
    Publication date: October 1, 2015
    Applicant: International Business Machines Corporation
    Inventor: Amit Klein
  • Publication number: 20150277950
    Abstract: Detecting the operation of a virtual machine by identifying seed candidates from sets of random numbers generated at a computer, where each of the sets includes multiple random numbers, identifying candidate performance counter frequencies from the seed candidates and from timing information associated with the sets of random numbers, and determining that the computer is operating as a virtual machine if any of the candidate performance counter frequencies is consistent with a predefined virtual machine performance counter frequency.
    Type: Application
    Filed: March 28, 2014
    Publication date: October 1, 2015
    Applicant: International Business Machines Corporation
    Inventor: Amit Klein
  • Publication number: 20150235026
    Abstract: A process for finding potentially harmful malware dropper on an infected computer system includes the steps of a) identifying an executable file that is about to run, and b) providing a storage agent that stores a copy of said executable file for a later inspection.
    Type: Application
    Filed: February 17, 2014
    Publication date: August 20, 2015
    Applicant: Trusteer Ltd.
    Inventor: Amit Klein
  • Patent number: 9111090
    Abstract: A method for alerting a service provider and/or a user of a web browser of a phishing attempt comprises providing on a page that it is desired to protect against phishing, a Javascript that when caused by a phishing page to run not in the context of the original page generates an indication that a phishing attempt may exist.
    Type: Grant
    Filed: April 2, 2012
    Date of Patent: August 18, 2015
    Assignee: TRUSTEER, LTD.
    Inventors: Amit Klein, Michael Boodaei
  • Patent number: 9081956
    Abstract: A method for protecting a browser from malicious processes, comprises providing at least one process-proxy object and at least a browser-proxy object, interposed between the browser and a process, such that when the process invokes one of the DOM entry points, the process-proxy object isolates it from the real browser implementation and executes the process-proxy object's code instead.
    Type: Grant
    Filed: May 22, 2009
    Date of Patent: July 14, 2015
    Assignee: Trusteer Ltd.
    Inventors: Amit Klein, Eldan Ben-Haim, Oleg Izmerly, Shmuel Regev, Michael Boodaei
  • Publication number: 20150128273
    Abstract: A method for protecting a browser from malicious processes, comprises providing at least one process-proxy object and at least a browser-proxy object, interposed between the browser and a process, such that when the process invokes one of the DOM entry points, the process-proxy object isolates it from the real browser implementation and executes the process-proxy object's code instead.
    Type: Application
    Filed: October 13, 2014
    Publication date: May 7, 2015
    Inventors: Amit KLEIN, Eldan BEN-HAIM, Oleg IZMERLY, Shmuel REGEV, Michael BOODAEI
  • Publication number: 20150113644
    Abstract: An Agent for detecting and/or preventing an Exploit attack, comprises: a) means for monitoring the operation of one or more process elements in a computer system; b) means for determining whether said one or more process elements has initiated, or is about to initiate a “create process” operation; and c) means for performing preventive activities as a result of the determination.
    Type: Application
    Filed: October 21, 2013
    Publication date: April 23, 2015
    Applicant: Trusteer, Ltd.
    Inventors: Amit KLEIN, Gal Frishman, Yaron Dycian, Avner Gideoni, Eldan Ben Haim, Ilan Fraiman
  • Publication number: 20140359766
    Abstract: A method for preventing the acquisition of data by a screen capturing malware, comprises preventing an unidentified process that does not open a window from performing screen capture.
    Type: Application
    Filed: May 30, 2013
    Publication date: December 4, 2014
    Inventors: Amit KLEIN, Michael Boodaei