Patents by Inventor Clemens Kolbitsch

Clemens Kolbitsch has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230385413
    Abstract: The disclosure herein describes executing unknown processes while preventing sandbox-evading malware therein from performing malicious behavior. A process execution event associated with an executable is detected, wherein the executable is to be executed in a production environment. The executable is determined to be an unknown executable (e.g., an executable that has not been analyzed for malware) using signature data in the process execution event. A function call hook interface of a sandbox simulator is activated, and a process of the executable is executed in the production environment. Any function calls from the executing process are intercepted by the activated function call hook interface, and sandbox-style responses to the intercepted function call are generated using sandbox response data of the sandbox simulator. The generated sandbox responses are provided to the executing process, whereby malware included in the executable behaves as if the executing process is executing in a sandbox environment.
    Type: Application
    Filed: May 26, 2022
    Publication date: November 30, 2023
    Inventors: Rayanagouda Bheemanagouda PATIL, Kedar Bhalchandra CHAUDHARI, Clemens KOLBITSCH, Laxmikant Vithal GUNDA, Vaibhav KULKARNI
  • Publication number: 20200366694
    Abstract: Malicious network activity can be detected using methods and systems that monitor execution of code on computing nodes. The computing nodes may be network-connected nodes, may be infected with malicious code or malware, and/or may be protected by the monitor to prevent such infection or to mitigate impact of such infection. In some implementations, a monitoring system monitors execution of malicious code on an infected network node, detects an interaction between the infected network node and a remote node, and records information representative of actions taken by the malicious code subsequent to the interaction. In some implementations, the monitoring system monitors execution of suspect code on a protected computing node, records information representative of a network interaction between the protected computing node and a remote node, and detects actions taken by the suspect code consistent with the actions taken by the malicious code represented in the recorded information recorded.
    Type: Application
    Filed: August 5, 2020
    Publication date: November 19, 2020
    Inventors: Clemens Kolbitsch, Roman Vasilenko
  • Patent number: 10474819
    Abstract: A shadow sandbox is maintained for malware detection. The shadow sandbox is a virtual machine replica of a target computing environment from a protected computing system. The shadow sandbox is maintained through all change events that occur to the target computing environment. The described systems and methods of detecting or preventing malware execution include maintaining a virtual machine replica of a target computing system by monitoring the target computing system for a plurality of possible events, the plurality of possible events including change events and risk events, detecting a change event on the target computing system, and updating the virtual machine based on the detected change event. The described systems and methods detect a risk event on the target computing system, execute the risk event on the virtual machine, and determine whether the risk event is malicious based on observation of execution of the risk event on the virtual machine.
    Type: Grant
    Filed: November 20, 2015
    Date of Patent: November 12, 2019
    Assignee: Lastline, Inc.
    Inventors: Roman Vasilenko, Clemens Kolbitsch
  • Publication number: 20170147819
    Abstract: A shadow sandbox is maintained for malware detection. The shadow sandbox is a virtual machine replica of a target computing environment from a protected computing system. The shadow sandbox is maintained through all change events that occur to the target computing environment. The described systems and methods of detecting or preventing malware execution include maintaining a virtual machine replica of a target computing system by monitoring the target computing system for a plurality of possible events, the plurality of possible events including change events and risk events, detecting a change event on the target computing system, and updating the virtual machine based on the detected change event. The described systems and methods detect a risk event on the target computing system, execute the risk event on the virtual machine, and determine whether the risk event is malicious based on observation of execution of the risk event on the virtual machine.
    Type: Application
    Filed: November 20, 2015
    Publication date: May 25, 2017
    Inventors: Roman Vasilenko, Clemens Kolbitsch
  • Publication number: 20170149804
    Abstract: Malicious network activity can be detected using methods and systems that monitor execution of code on computing nodes. The computing nodes may be network-connected nodes, may be infected with malicious code or malware, and/or may be protected by the monitor to prevent such infection or to mitigate impact of such infection. In some implementations, a monitoring system monitors execution of malicious code on an infected network node, detects an interaction between the infected network node and a remote node, and records information representative of actions taken by the malicious code subsequent to the interaction. In some implementations, the monitoring system monitors execution of suspect code on a protected computing node, records information representative of a network interaction between the protected computing node and a remote node, and detects actions taken by the suspect code consistent with the actions taken by the malicious code represented in the recorded information recorded.
    Type: Application
    Filed: November 20, 2015
    Publication date: May 25, 2017
    Inventors: Clemens Kolbitsch, Roman Vasilenko
  • Patent number: 9361459
    Abstract: The present disclosure is directed to methods and systems for malware detection based on environment-dependent behavior. Generally, an analysis environment is used to determine how input collected from an execution environment is used by suspicious software. The methods and systems described identify use of environmental information to decide between execution paths leading to malicious behavior or benign activity. In one aspect, one embodiment of the invention relates to a method comprising monitoring execution of suspect computer instructions; recognizing access by the instructions of an item of environmental information; identifying a plurality of execution paths in the instructions dependant on a branch in the instructions based on a value of the accessed item of environmental information; and determining that a first execution path results in benign behavior and that a second execution path results in malicious behavior.
    Type: Grant
    Filed: April 19, 2013
    Date of Patent: June 7, 2016
    Assignee: LASTLINE, INC.
    Inventors: Clemens Kolbitsch, Paolo Milani Comparetti, Ludovico Cavedon
  • Patent number: 9038185
    Abstract: Techniques for execution of multiple execution paths are described. In one or more embodiments, an execution of a portion of executable code is conditioned upon a particular environment-specific value. For example, the execution of the executable code can cause one type of output if the value of the variable equals a particular value, and can cause a different type of output if the value of the variable equals a different value. Techniques discussed herein can enable the executable code to be executed such that multiple outputs are produced, e.g., by executing the code according to the different values for the variable. In implementations, the multiple outputs can be analyzed for various attributes, such as presence of malware, implementation and coding errors, and so on.
    Type: Grant
    Filed: December 28, 2011
    Date of Patent: May 19, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Benjamin Livshits, Benjamin Goth Zorn, Christian Seifert, Clemens Kolbitsch
  • Patent number: 8910285
    Abstract: The present disclosure is directed to methods and systems for reciprocal generation of watch-lists and traffic models characteristic of malicious network activity. In some aspects, the described methods and systems relate to maintaining data for recognition of malicious network activity. In general, the methods include monitoring network traffic; comparing endpoint data from monitored data packets to endpoints in a watch-list of network endpoints and comparing packet data from monitored data packets to traffic models in a catalog of traffic models characterizing malicious network activity; and determining, based on the comparisons, that a set of data packets comprise suspect network activity. The methods include adding a network endpoint to the watch-list when the determination is based on comparing packet data to a traffic model or adding a traffic model to the catalog when the determination is based on comparing endpoint data.
    Type: Grant
    Filed: April 19, 2013
    Date of Patent: December 9, 2014
    Assignee: Lastline, Inc.
    Inventors: Clemens Kolbitsch, Paolo Milani Comparetti, Ludovico Cavedon
  • Publication number: 20140317735
    Abstract: The present disclosure is directed to methods and systems for reciprocal generation of watch-lists and traffic models characteristic of malicious network activity. In some aspects, the described methods and systems relate to maintaining data for recognition of malicious network activity. In general, the methods include monitoring network traffic; comparing endpoint data from monitored data packets to endpoints in a watch-list of network endpoints and comparing packet data from monitored data packets to traffic models in a catalog of traffic models characterizing malicious network activity; and determining, based on the comparisons, that a set of data packets comprise suspect network activity. The methods include adding a network endpoint to the watch-list when the determination is based on comparing packet data to a traffic model or adding a traffic model to the catalog when the determination is based on comparing endpoint data.
    Type: Application
    Filed: April 19, 2013
    Publication date: October 23, 2014
    Applicant: LASTLINE, INC.
    Inventors: Clemens Kolbitsch, Paolo Milani Comparetti, Ludovico Cavedon
  • Publication number: 20130174258
    Abstract: Techniques for execution of multiple execution paths are described. In one or more embodiments, an execution of a portion of executable code is conditioned upon a particular environment-specific value. For example, the execution of the executable code can cause one type of output if the value of the variable equals a particular value, and can cause a different type of output if the value of the variable equals a different value. Techniques discussed herein can enable the executable code to be executed such that multiple outputs are produced, e.g., by executing the code according to the different values for the variable. In implementations, the multiple outputs can be analyzed for various attributes, such as presence of malware, implementation and coding errors, and so on.
    Type: Application
    Filed: December 28, 2011
    Publication date: July 4, 2013
    Applicant: Microsoft Corporation
    Inventors: Benjamin Livshits, Benjamin Goth Zorn, Christian Seifert, Clemens Kolbitsch