Patents by Inventor AMIT MALIK
AMIT MALIK has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240031016Abstract: There are provided measures for satellite coverage change handling. Such measures exemplarily include, at a network entity managing a first cell of a mobile network and a second cell of said mobile network, the first cell covering a geographical area, and the second cell covering said geographical area, maintaining assignment of a first satellite beam corresponding to a first passing satellite to said first cell, a first satellite beam coverage of said first satellite beam overlapping with said geographical area, determining entrance of a second satellite beam coverage of a second satellite beam corresponding to a second passing satellite into said geographical area, assigning said second satellite beam to said second cell, and deciding to trigger handover of a terminal located within said second satellite beam coverage within said geographical area and served by said first cell to said second cell.Type: ApplicationFiled: July 20, 2023Publication date: January 25, 2024Inventors: Amit Malik, Liwa WANG, Timothy CURTIS, Alan MATTEN, Andrew REPOZA, Zai CHEN
-
Patent number: 11244044Abstract: According to one embodiment, a malware detection software being loaded into non-transitory computer readable medium for execution by a processor. The malware detection software comprises exploit detection logic, rule-matching logic, reporting logic and user interface logic. The exploit detection logic is configured to execute certain event logic with respect to a loaded module. The rule-matching logic includes detection logic that is configured to determine whether an access source is attempting to access a protected region and determine whether the access source is from a dynamically allocated memory. The reporting logic includes alert generating logic that is configured to generate an alert while the user interface logic is configured to notify a user or a network administrator of a potential cybersecurity attack.Type: GrantFiled: February 15, 2019Date of Patent: February 8, 2022Assignee: Fireeye Security Holdings US LLCInventors: Amit Malik, Raghav Pande, Aakash Jain
-
Patent number: 10657251Abstract: A malware detection system configured to detect suspiciousness in obfuscated content. A multi-stage static detection logic is utilized to detect obfuscation, make the obfuscated content accessible, identify suspiciousness in the accessible content and filter non-suspicious non-obfuscated content from further analysis. The multi-stage static detection logic includes a controller, a de-constructor, and a post-processor. The controller is configured to receive content while the de-constructor configured to receive content from the controller and deconstruct the content using the analysis technique selected by the controller. The post-processor is configured to receive the de-constructed content from the de-constructor, determine whether a specimen within the de-constructed content is suspicious, and remove non-suspicious content from further analysis.Type: GrantFiled: June 26, 2017Date of Patent: May 19, 2020Assignee: FireEye, Inc.Inventors: Amit Malik, Shivani Deshpande, Abhishek Singh, Wei Zheng
-
Patent number: 10599846Abstract: Systems, computer readable media, apparatuses, and methods are disclosed for segregating executable files exhibiting network activity. An example apparatus includes at least one processor and memory including instructions which, when executed, cause the at least one processor to launch an executable file in a segmented portion of a computing system to load one or more dynamically linked libraries (DLLs) associated with the executable file into a process environment block (PEB) of the segmented portion, enumerate the PEB to generate an address list of the one or more DLLs, scan the one or more DLLs to determine whether the one or more DLLs are to perform network activity, and perform malware analysis on the executable file when at least one of the one or more DLLs are to perform network activity.Type: GrantFiled: August 23, 2018Date of Patent: March 24, 2020Assignee: MCAFEE, LLCInventors: Neeraj Thakar, Amit Malik
-
Patent number: 10311233Abstract: By hooking application programming interfaces in an execution environment, the return address for hooked application programming interface calls can be logged and used to determine when a packed binary has been unpacked. In one approach, memory allocations are detected and the return address is checked against the memory regions allocated. In another approach, the contents of memory at the return address in a pre-execution copy of the executable binary is compared with the contents of memory at the return address in the executing copy of the binary. This allows efficient detection of the completion of unpacking without knowledge of the unpacking technique. The unpacked binary may then be analyzed for possible malware.Type: GrantFiled: December 23, 2014Date of Patent: June 4, 2019Assignee: McAfee, LLCInventors: Amit Malik, Vikas Taneja, Benjamin Cruz
-
Patent number: 10210329Abstract: According to one embodiment, a system comprising a dynamic analysis server comprising one or more virtual machines is disclosed, wherein the one or more virtual machines may be configured to execute certain event logic with respect to a loaded module. The virtual machines may be communicatively coupled to a virtual machine manager and a database; and rule-matching logic comprising detection logic, wherein the detection logic is configured to determine (1) whether an access source is attempting to access a protected region such as a page guarded area; and (2) determine whether the access source is from the heap. The system further comprises reporting logic that is configured to generate an alert so as to notify a user and/or network administrator of a probable application-execution hijacking attack.Type: GrantFiled: September 30, 2015Date of Patent: February 19, 2019Assignee: FireEye, Inc.Inventors: Amit Malik, Reghav Pande, Aakash Jain
-
Publication number: 20190005243Abstract: Systems, computer readable media, apparatuses, and methods are disclosed for segregating executable files exhibiting network activity. An example apparatus includes at least one processor and memory including instructions which, when executed, cause the at least one processor to launch an executable file in a segmented portion of a computing system to load one or more dynamically linked libraries (DLLs) associated with the executable file into a process environment block (PEB) of the segmented portion, enumerate the PEB to generate an address list of the one or more DLLs, scan the one or more DLLs to determine whether the one or more DLLs are to perform network activity, and perform malware analysis on the executable file when at least one of the one or more DLLs are to perform network activity.Type: ApplicationFiled: August 23, 2018Publication date: January 3, 2019Inventors: Neeraj Thakar, Amit Malik
-
Patent number: 10083300Abstract: An executable file is loaded into memory. The executable file is analyzed to determine whether one or more dynamically linked libraries are referenced in an import table of the file. It can then be determined whether one or more dynamically linked libraries is adapted to contact a network.Type: GrantFiled: December 27, 2013Date of Patent: September 25, 2018Assignee: McAfee, LLCInventors: Neeraj Thakar, Amit Malik
-
Patent number: 9690936Abstract: A malware detection system configured to detect suspiciousness in obfuscated content. A multi-stage static detection logic is utilized to detect obfuscation, make the obfuscated content accessible, identify suspiciousness in the accessible content and filter non-suspicious non-obfuscated content from further analysis. The system is configured to identify obfuscated content, de-obfuscate obfuscated content, identify suspicious characteristics in the de-obfuscated content, execute a virtual machine to process the suspicious network content and detect malicious network content while removing from further analysis non-suspicious network content.Type: GrantFiled: July 1, 2014Date of Patent: June 27, 2017Assignee: FireEye, Inc.Inventors: Amit Malik, Shivani Deshpande, Abhishek Singh, Wei Zheng
-
Publication number: 20170032122Abstract: An executable file is loaded into memory. The executable file is analyzed to determine whether one or more dynamically linked libraries are referenced in an import table of the file.Type: ApplicationFiled: December 27, 2013Publication date: February 2, 2017Applicant: McAfee, Inc.Inventors: Neeraj THAKAR, Amit MALIK
-
Patent number: 9479979Abstract: A method is disclosed that includes selecting at an apparatus a user equipment for an automatic neighbor relations measurement based on a determination one or more parameters associated with the user equipment meet one or more scenarios. The method includes initiating by the apparatus an automatic neighbor relations measurement procedure for the selected user equipment. The method includes awaiting at the apparatus for a conclusion of the initiated automatic neighbor relations measurement procedure. Apparatus and program products are also disclosed.Type: GrantFiled: June 29, 2012Date of Patent: October 25, 2016Assignee: Nokia Solutions and Networks OyInventors: Eric Drury, Amit Malik, Shreesha Ramanna
-
Publication number: 20160292417Abstract: By hooking application programming interfaces in an execution environment, the return address for hooked application programming interface calls can be logged and used to determine when a packed binary has been unpacked. In one approach, memory allocations are detected and the return address is checked against the memory regions allocated. In another approach, the contents of memory at the return address in a pre-execution copy of the executable binary is compared with the contents of memory at the return address in the executing copy of the binary. This allows efficient detection of the completion of unpacking without knowledge of the unpacking technique. The unpacked binary may then be analyzed for possible malware.Type: ApplicationFiled: December 23, 2014Publication date: October 6, 2016Inventors: Amit Malik, Vikas Taneja, Benjamin Cruz
-
Publication number: 20160205595Abstract: Systems and techniques for improved mobility robustness optimization. A user device experiencing a radio link failure sends a radio link failure report upon successfully connecting to a cell. The radio link failure report is routed to an appropriate cell, such as the cell where the radio link failure occurred. Radio conditions measurement information appearing in the radio link failure report is compared against each possible applicable threshold that might have been used by the user device, and a failure event is recorded for each comparison that indicates a failure, such as a radio link failure or handover failure. The failure event information is forwarded to suitable network elements for analysis and improvement of mobility robustness optimization operations.Type: ApplicationFiled: January 9, 2015Publication date: July 14, 2016Inventors: Sue Stewart, Rossella De Benedittis, Amit Malik
-
Patent number: 9380500Abstract: Systems and techniques for improved mobility robustness optimization. A user device experiencing a radio link failure sends a radio link failure report upon successfully connecting to a cell. The radio link failure report is routed to an appropriate cell, such as the cell where the radio link failure occurred. Radio conditions measurement information appearing in the radio link failure report is compared against each possible applicable threshold that might have been used by the user device, and a failure event is recorded for each comparison that indicates a failure, such as a radio link failure or handover failure. The failure event information is forwarded to suitable network elements for analysis and improvement of mobility robustness optimization operations.Type: GrantFiled: January 9, 2015Date of Patent: June 28, 2016Assignee: Nokia Solutions and Networks OyInventors: Sue Stewart, Rossella De Benedittis, Amit Malik
-
Publication number: 20140004859Abstract: A method is disclosed that includes selecting at an apparatus a user equipment for an automatic neighbor relations measurement based on a determination one or more parameters associated with the user equipment meet one or more scenarios. The method includes initiating by the apparatus an automatic neighbor relations measurement procedure for the selected user equipment. The method includes awaiting at the apparatus for a conclusion of the initiated automatic neighbor relations measurement procedure. Apparatus and program products are also disclosed.Type: ApplicationFiled: June 29, 2012Publication date: January 2, 2014Inventors: Eric Drury, Amit Malik, Shreesha Ramanna
-
Publication number: 20080242264Abstract: A system includes an access network and an authentication server. The access network: requests and receives a hardware ID for a terminal attempting access to a network that provides access to a service; constructs a user ID that includes the hardware ID; forwards the user ID for use in a first authentication process for the terminal; and receives a response that indicates an authorization status for the terminal. The authentication server: receives the user ID; determines, from the user ID, the authorization status for the terminal, which identifies at least one of whether the terminal is authorized to use the service and whether the terminal is local or roaming; and provides the response to the access network, which indicates the authorization status.Type: ApplicationFiled: March 30, 2007Publication date: October 2, 2008Applicant: MOTOROLA, INC.Inventors: AMIT MALIK, SHREESHA RAMANNA