Patents by Inventor CELESTE R. FRALICK
CELESTE R. FRALICK has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11847215Abstract: A method for halting malware includes: monitoring plural file system events with a system driver to detect an occurrence of a file system event having a predetermined file type and log event type; triggering a listening engine for file system event stream data of a file associated with the detection of the file system event, the file system event stream data indicating data manipulation associated with the file due to execution of a process; obtaining one or more feature values for each of plural different feature combinations of plural features of the file based on the file system event stream data; inputting one or more feature values into a data analytics model to predict a target label value based on the one or more feature values of the plural different feature combinations and agnostic to the process; and performing a predetermined operation based on the target label value.Type: GrantFiled: December 23, 2020Date of Patent: December 19, 2023Assignee: McAfee, LLCInventors: Celeste R. Fralick, Jonathan King, Carl D. Woodward, Andrew V. Holtzmann, Kunal Mehta, Sherin M. Mathews
-
Patent number: 11790237Abstract: Methods, apparatus, systems and articles of manufacture to defend against adversarial machine learning are disclosed. An example apparatus includes memory; computer readable instructions; and processor circuitry to execute the computer readable instructions to: generate a first output indicating a feature that contributed to the generation of a classification by a machine learning model; compare the first output with a second output generated by a server that trained the machine learning model; and flag the machine learning model as corresponding to at least one of model drift or an adversarial attack when first output differs from the second output by more than a threshold.Type: GrantFiled: January 30, 2023Date of Patent: October 17, 2023Assignee: McAfee, LLCInventors: Sherin M. Mathews, Celeste R. Fralick
-
Patent number: 11720821Abstract: A non-transitory computer readable medium includes computer executable instructions that, when executed, cause at least one processor to train a model to perform at least one of a prediction operation, a diagnostic operation, or a classification operation based on a training dataset, deploy the model in a production computer system to perform the at least one operation on field data, monitor signal data associated with the model, the signal data including specific or derived signal data representing characteristics of an ecosystem in which the model is deployed and new observations in incoming field data, monitor accuracy of the model by applying a statistical tool to a plurality of data points of the signal data, apply a secondary machine learning predictive engine to the plurality of data points of the signal data to predict future data points of the signal data, determine whether the signal data represents an unstable process by identifying future outlier data points from among the plurality of future dataType: GrantFiled: December 4, 2020Date of Patent: August 8, 2023Assignee: McAfee, LLCInventors: Lynda M. Grindstaff, Celeste R. Fralick
-
Publication number: 20230186097Abstract: Methods, apparatus, systems and articles of manufacture to defend against adversarial machine learning are disclosed. An example apparatus includes memory; computer readable instructions; and processor circuitry to execute the computer readable instructions to: generate a first output indicating a feature that contributed to the generation of a classification by a machine learning model; compare the first output with a second output generated by a server that trained the machine learning model; and flag the machine learning model as corresponding to at least one of model drift or an adversarial attack when first output differs from the second output by more than a threshold.Type: ApplicationFiled: January 30, 2023Publication date: June 15, 2023Inventors: Sherin M. Mathews, Celeste R. Fralick
-
Patent number: 11568049Abstract: Methods, apparatus, systems and articles of manufacture to defend against adversarial machine learning are disclosed. An example apparatus includes a model trainer to train a classification model based on files with expected classifications; and a model modifier to select a convolution layer of the trained classification model based on an analysis of the convolution layers of the trained classification model; and replace the convolution layer with a tree-based structure to generate a modified classification model.Type: GrantFiled: September 27, 2019Date of Patent: January 31, 2023Assignee: McAfee, LLCInventors: Sherin M. Mathews, Celeste R. Fralick
-
Patent number: 11562254Abstract: Example apparatus disclosed herein generate blocks of a blockchain, the blockchain to store a neural network that has input nodes, hidden nodes and output nodes, with respective ones of the blocks of the blockchain including respective code and respective data to represent corresponding ones of the output nodes of the neural network, a first one of the blocks including first code and first data to implement operations to be performed by a first one of the output nodes, the hidden nodes and the input nodes on input data applied to the neural network to determine an output of the first one of the output nodes. Disclosed example apparatus also train the neural network to determine at least portions of the respective data to include in the respective ones of the blocks of the blockchain, and forward the blockchain to a server that is to distribute the neural network to client(s).Type: GrantFiled: July 30, 2019Date of Patent: January 24, 2023Assignee: McAfee, LLCInventors: Amanda House, Celeste R. Fralick, Eric Wuehler, Sherin Mathews
-
Publication number: 20220350886Abstract: There is disclosed in one example a ransomware mitigation engine, including: a processor; a convolutional neural network configured to provide file type identification (FTI) services including: identifying an access operation of a file as a write to the file or newly creating the file; computing a byte correlation factor for the file; classifying the file as belonging to a file type; determining with a screening confidence that the file type is correct for the file; determining that the screening confidence is below a screening confidence threshold; and circuitry and logic to provide heuristic analysis including: receiving notification that the confidence is below the confidence threshold; performing a statistical analysis of the file to determine a difference between an expected value and a computed value; determining from the difference, with a detection confidence, that the file has been compromised; and identifying the file as having been compromised by a ransomware attack.Type: ApplicationFiled: July 18, 2022Publication date: November 3, 2022Applicant: McAfee, LLCInventors: Kunal Mehta, Sherin Mary Mathews, Carl D. Woodward, Celeste R. Fralick, Jonathan B. King
-
Patent number: 11392695Abstract: There is disclosed in one example a computer-implemented anti-ransomware method, including: selecting a file for inspection; assigning the file to a type class according to a file type identifier; receiving an expected byte correlation for the type class; computing, according to a byte distribution of the file, a byte correlation for the file; comparing, via statistical analysis, the byte correlation to the expected byte correlation; and determining that the file has been compromised, including determining that the file has a byte correlation that deviates from the expected byte correlation by more than a threshold, taking a ransomware remediation action for the file.Type: GrantFiled: October 5, 2020Date of Patent: July 19, 2022Assignee: McAfee, LLCInventors: Kunal Mehta, Sherin Mary Mathews, Carl D. Woodward, Celeste R. Fralick, Jonathan B. King
-
Patent number: 11200318Abstract: Methods and apparatus to detect adversarial malware are disclosed. An example adversarial malware detector includes a machine learning engine to classify a first feature representation representing features of a program as benign or malware, a feature perturber to, when the first feature representation is classified as benign, remove a first one of the features to form a second feature representation, and a decider to classify the program as adversarial malware when the machine learning engine classifies the second feature representation as malware.Type: GrantFiled: December 28, 2018Date of Patent: December 14, 2021Assignee: McAfee, LLCInventors: Yonghong Huang, Raj Vardhan, Celeste R. Fralick, Gabriel G. Infante-Lopez, Dattatraya Kulkarni, Srikanth Nalluri, Sonam Bothra
-
Publication number: 20210157913Abstract: A method for halting malware includes: monitoring plural file system events with a system driver to detect an occurrence of a file system event having a predetermined file type and log event type; triggering a listening engine for file system event stream data of a file associated with the detection of the file system event, the file system event stream data indicating data manipulation associated with the file due to execution of a process; obtaining one or more feature values for each of plural different feature combinations of plural features of the file based on the file system event stream data; inputting one or more feature values into a data analytics model to predict a target label value based on the one or more feature values of the plural different feature combinations and agnostic to the process; and performing a predetermined operation based on the target label value.Type: ApplicationFiled: December 23, 2020Publication date: May 27, 2021Inventors: CELESTE R. FRALICK, JONATHAN KING, CARL D. WOODWARD, ANDREW V. HOLTZMANN, KUNAL MEHTA, SHERIN M. MATHEWS
-
Publication number: 20210110211Abstract: A non-transitory computer readable medium includes computer executable instructions that, when executed, cause at least one processor to train a model to perform at least one of a prediction operation, a diagnostic operation, or a classification operation based on a training dataset, deploy the model in a production computer system to perform the at least one operation on field data, monitor signal data associated with the model, the signal data including specific or derived signal data representing characteristics of an ecosystem in which the model is deployed and new observations in incoming field data, monitor accuracy of the model by applying a statistical tool to a plurality of data points of the signal data, apply a secondary machine learning predictive engine to the plurality of data points of the signal data to predict future data points of the signal data, determine whether the signal data represents an unstable process by identifying future outlier data points from among the plurality of future dataType: ApplicationFiled: December 4, 2020Publication date: April 15, 2021Inventors: LYNDA M. GRINDSTAFF, CELESTE R. FRALICK
-
Publication number: 20210097176Abstract: Methods, apparatus, systems and articles of manufacture to defend against adversarial machine learning are disclosed. An example apparatus includes a model trainer to train a classification model based on files with expected classifications; and a model modifier to select a convolution layer of the trained classification model based on an analysis of the convolution layers of the trained classification model; and replace the convolution layer with a tree-based structure to generate a modified classification model.Type: ApplicationFiled: September 27, 2019Publication date: April 1, 2021Inventors: Sherin M. Mathews, Celeste R. Fralick
-
Publication number: 20210097382Abstract: Methods, apparatus, systems and articles of manufacture to improve deepfake detection with explainability are disclosed. An example apparatus includes a deepfake classification model trainer to train a classification model based on a first portion of a dataset of media with known classification information, the classification model to output a classification for input media from a second portion of the dataset of media with known classification information; an explainability map generator to generate an explainability map based on the output of the classification model; a classification analyzer to compare the classification of the input media from the classification model with a known classification of the input media to determine if a misclassification occurred; and a model modifier to, when the misclassification occurred, modify the classification model based on the explainability map.Type: ApplicationFiled: September 27, 2019Publication date: April 1, 2021Inventors: Sherin M. Mathews, Shivangee Trivedi, Amanda House, Celeste R. Fralick, Steve Povolny, Steve Grobman
-
Patent number: 10956568Abstract: A method for halting malware includes: monitoring plural file system events with a system driver to detect an occurrence of a file system event having a predetermined file type and log event type; triggering a listening engine for file system event stream data of a file associated with the detection of the file system event, the file system event stream data indicating data manipulation associated with the file due to execution of a process; obtaining one or more feature values for each of plural different feature combinations of plural features of the file based on the file system event stream data; inputting one or more feature values into a data analytics model to predict a target label value based on the one or more feature values of the plural different feature combinations and agnostic to the process; and performing a predetermined operation based on the target label value.Type: GrantFiled: April 30, 2018Date of Patent: March 23, 2021Assignee: Mcafee, LLCInventors: Celeste R. Fralick, Jonathan King, Carl D. Woodward, Andrew V. Holtzmann, Kunal Mehta, Sherin M. Mathews
-
Publication number: 20210034986Abstract: Example apparatus disclosed herein generate blocks of a blockchain, the blockchain to store a neural network that has input nodes, hidden nodes and output nodes, with respective ones of the blocks of the blockchain including respective code and respective data to represent corresponding ones of the output nodes of the neural network, a first one of the blocks including first code and first data to implement operations to be performed by a first one of the output nodes, the hidden nodes and the input nodes on input data applied to the neural network to determine an output of the first one of the output nodes. Disclosed example apparatus also train the neural network to determine at least portions of the respective data to include in the respective ones of the blocks of the blockchain, and forward the blockchain to a server that is to distribute the neural network to client(s).Type: ApplicationFiled: July 30, 2019Publication date: February 4, 2021Inventors: Amanda House, Celeste R. Fralick, Eric Wuehler, Sherin Mathews
-
Publication number: 20210019403Abstract: There is disclosed in one example a computer-implemented anti-ransomware method, including: selecting a file for inspection; assigning the file to a type class according to a file type identifier; receiving an expected byte correlation for the type class; computing, according to a byte distribution of the file, a byte correlation for the file; comparing, via statistical analysis, the byte correlation to the expected byte correlation; and determining that the file has been compromised, including determining that the file has a byte correlation that deviates from the expected byte correlation by more than a threshold, taking a ransomware remediation action for the file.Type: ApplicationFiled: October 5, 2020Publication date: January 21, 2021Applicant: McAfee, LLCInventors: Kunal Mehta, Sherin Mary Mathews, Carl D. Woodward, Celeste R. Fralick, Jonathan B. King
-
Patent number: 10860893Abstract: A method for automated assessment of a model includes: training a model to perform a prediction, diagnostic, or classification operation based on a training dataset; deploying the model in production to perform the operation on field data; monitoring signal data associated with the model automatically, the signal data including specific or derived signal data representing characteristics of an ecosystem in which the model is deployed and new observations in incoming field data; monitoring accuracy of the model by applying a statistical tool to a plurality of data points of the signal data; determining whether the signal data represents an unstable process by identifying outlier data points from among the plurality of data points of the signal data; generating an indication that a corrective action should be taken on the model based on a result of the determination; and displaying the indication on a display.Type: GrantFiled: March 29, 2018Date of Patent: December 8, 2020Assignee: McAfee, LLCInventors: Lynda M. Grindstaff, Celeste R. Fralick
-
Patent number: 10795994Abstract: There is disclosed in one example a ransomware mitigation engine, including: a processor; a convolutional neural network configured to provide file type identification (FTI) services including: identifying an access operation of a file as a write to the file or newly creating the file; computing a byte correlation factor for the file; classifying the file as belonging to a file type; determining with a screening confidence that the file type is correct for the file; determining that the screening confidence is below a screening confidence threshold; and circuitry and logic to provide heuristic analysis including: receiving notification that the confidence is below the confidence threshold; performing a statistical analysis of the file to determine a difference between an expected value and a computed value; determining from the difference, with a detection confidence, that the file has been compromised; and identifying the file as having been compromised by a ransomware attack.Type: GrantFiled: September 26, 2018Date of Patent: October 6, 2020Assignee: McAfee, LLCInventors: Kunal Mehta, Sherin Mary Mathews, Carl D. Woodward, Celeste R. Fralick, Jonathan B. King
-
Publication number: 20200210575Abstract: Methods and apparatus to detect adversarial malware are disclosed. An example adversarial malware detector includes a machine learning engine to classify a first feature representation representing features of a program as benign or malware, a feature perturber to, when the first feature representation is classified as benign, remove a first one of the features to form a second feature representation, and a decider to classify the program as adversarial malware when the machine learning engine classifies the second feature representation as malware.Type: ApplicationFiled: December 28, 2018Publication date: July 2, 2020Inventors: Yonghong Huang, Raj Vardhan, Celeste R. Fralick, Gabriel G. Infante-Lopez, Dattatraya Kulkarni, Srikanth Nalluri, Sonam Bothra
-
Publication number: 20200097653Abstract: There is disclosed in one example a ransomware mitigation engine, including: a processor; a convolutional neural network configured to provide file type identification (FTI) services including: identifying an access operation of a file as a write to the file or newly creating the file; computing a byte correlation factor for the file; classifying the file as belonging to a file type; determining with a screening confidence that the file type is correct for the file; determining that the screening confidence is below a screening confidence threshold; and circuitry and logic to provide heuristic analysis including: receiving notification that the confidence is below the confidence threshold; performing a statistical analysis of the file to determine a difference between an expected value and a computed value; determining from the difference, with a detection confidence, that the file has been compromised; and identifying the file as having been compromised by a ransomware attack.Type: ApplicationFiled: September 26, 2018Publication date: March 26, 2020Inventors: Kunal Mehta, Sherin Mary Mathews, Carl D. Woodward, Celeste R. Fralick, Jonathan B. King