Patents by Inventor Daavid Hentunen

Daavid Hentunen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9454658
    Abstract: A method of identifying sections of code that can be disregarded when detecting features that are characteristic of malware, which features are subsequently used for detecting malware. The method includes, for each of a multiplicity of sample files, subdividing file code of the sample file into a plurality of code blocks and then removing duplicate code blocks to leave a sequence of unique code blocks. The sequence of unique code blocks is then compared with those obtained for other sample files in order to identify standard sections of code. The standard sections of code identified are then included within a database such that those sections of code can subsequently be disregarded when identifying features characteristic of malware.
    Type: Grant
    Filed: December 14, 2010
    Date of Patent: September 27, 2016
    Assignee: F-Secure Corporation
    Inventor: Daavid Hentunen
  • Publication number: 20160226889
    Abstract: The invention relates to computer security and to systems and methods for detecting and protecting against malicious content such as computer viruses. Gateway (200) and security (400) computers for protecting a client computer (300) against dynamically generated malicious content. The gateway computer includes: a receiver configured to receive original content, the original content including a call to an original function, the call including an associated input. The gateway computer further includes: a content modifier unit configured to modify the original content to produce modified content, wherein the modified content includes at least a portion of the original content and a call to a shielding function, the shielding function being operable to cause the client computer to transmit an instruction to a security computer (400) to inspect the input associated with the call to the original function.
    Type: Application
    Filed: February 3, 2015
    Publication date: August 4, 2016
    Inventor: Daavid Hentunen
  • Publication number: 20160150004
    Abstract: There are provided measures for enabling/realizing an integrity check of a DNS server setting, thereby enabling/realizing detection of DNS hacking or hijacking. Such measures could exemplarily include triggering a DNS resolution operation by a service device configured to provide a service using the DNS server setting, wherein the DNS server setting is used for DNS resolution or DNS forwarding in service provisioning, acquiring the IP address of a DNS server device, which is configured to perform DNS resolution in service provisioning, by reading the IP address of the DNS server device included in a DNS message as part of the triggered DNS resolution operation by the service device, and processing the acquired IP address of the DNS server device for evaluating integrity of the DNS server setting used in service provisioning.
    Type: Application
    Filed: November 18, 2015
    Publication date: May 26, 2016
    Inventor: Daavid Hentunen
  • Patent number: 9349003
    Abstract: There is provided a method including generating, by a security application executed in a processing device, an application list including one or more applications which are currently running in the processing device; identifying at least one network address fulfilling predetermined criteria; determining which of the at least one network address fulfilling the predetermined criteria has been connected to by the processing device within a predefined time period; and providing a post-processing entity with the application list and an indication on which of the at least one network address fulfilling the predetermined criteria has been connected to by the processing device within the predefined time period.
    Type: Grant
    Filed: November 13, 2013
    Date of Patent: May 24, 2016
    Assignee: E-Secure Corporation
    Inventors: Antti Tikkanen, Daavid Hentunen
  • Publication number: 20150161396
    Abstract: A method and apparatus for detecting a Return-Oriented Programming exploitation. At a computer device, a mechanism to detect a control transfer of a code location in a memory is established. This may be, for example, hooking the control transfer. The code location relates to an electronic file. In the event that a control transfer of the code location is detected, a comparison is made between a destination code location address with values in the freed stack. If the code location address matches any of the values in the freed stack, then it is determined that the control transfer of the code location relates to a Return-Oriented Programming exploitation.
    Type: Application
    Filed: February 18, 2015
    Publication date: June 11, 2015
    Inventor: Daavid Hentunen
  • Patent number: 8997218
    Abstract: A method and apparatus for detecting a Return-Oriented Programming exploitation. At a computer device, a mechanism to detect a control transfer of a code location in a memory is established. This may be, for example, hooking the control transfer. The code location relates to an electronic file. In the event that a control transfer of the code location is detected, a comparison is made between a destination code location address with values in the freed stack. If the code location address matches any of the values in the freed stack, then it is determined that the control transfer of the code location relates to a Return-Oriented Programming exploitation.
    Type: Grant
    Filed: December 22, 2010
    Date of Patent: March 31, 2015
    Assignee: F-Secure Corporation
    Inventor: Daavid Hentunen
  • Patent number: 8904537
    Abstract: A method and apparatus for detecting malware in which a computer device that has an operating system and a memory executes an untrusted computer program. In the event that the untrusted program directly accesses a region of the memory used to store information relating to the operating system, a determination is made that the untrusted program is likely to be malware.
    Type: Grant
    Filed: May 9, 2011
    Date of Patent: December 2, 2014
    Assignee: F—Secure Corporation
    Inventors: Jarkko Turkulainen, Samuli Larvala, Dmitriy Komashinskiy, Antti Tikkanen, Daavid Hentunen
  • Publication number: 20140310811
    Abstract: Methods, apparatus, connection systems, and client devices are described. The apparatus receives a multiplicity of DNS query messages from multiple client devices. For each received DNS query message to a malware domain name or a particular domain name, the apparatus sends a marker DNS response message to the corresponding client device for use in detecting whether the client device is infected with malware or is accessing the particular domain name. The connection system receives a connection request from a client device of the multiple client devices for access to the communication network, and sends marker detection information to the client device for use in identifying whether client device is marked as infected with malware or accessing a particular domain name. It is determined whether the client device is infected with malware or accessed the particular domain name. The client device may be blocked or granted access to the communication network.
    Type: Application
    Filed: April 10, 2014
    Publication date: October 16, 2014
    Applicant: F-SECURE CORPORATION
    Inventor: Daavid HENTUNEN
  • Patent number: 8763121
    Abstract: A method of identifying a potential attack in network traffic includes payload data transmitted to a host entity in the network. The method includes: performing a first data-check on one or more data bytes of the payload data at the host entity; performing a second data-check, equivalent to the first data-check, on data of the network equivalent to the one or more bytes of payload data; and comparing the results of the first and second data-checks to determine if there is a mismatch, the mismatch being an indication of a potential attack.
    Type: Grant
    Filed: January 20, 2011
    Date of Patent: June 24, 2014
    Assignee: F-Secure Corporation
    Inventor: Daavid Hentunen
  • Publication number: 20140143875
    Abstract: There is provided a method including generating, by a security application executed in a processing device, an application list including one or more applications which are currently running in the processing device; identifying at least one network address fulfilling predetermined criteria; determining which of the at least one network address fulfilling the predetermined criteria has been connected to by the processing device within a predefined time period; and providing a post-processing entity with the application list and an indication on which of the at least one network address fulfilling the predetermined criteria has been connected to by the processing device within the predefined time period.
    Type: Application
    Filed: November 13, 2013
    Publication date: May 22, 2014
    Applicant: F-Secure Corporation
    Inventors: Antti TIKKANEN, Daavid HENTUNEN
  • Publication number: 20120291131
    Abstract: A method and apparatus for detecting malware in which a computer device that has an operating system and a memory executes an untrusted computer program. In the event that the untrusted program directly accesses a region of the memory used to store information relating to the operating system, a determination is made that the untrusted program is likely to be malware.
    Type: Application
    Filed: May 9, 2011
    Publication date: November 15, 2012
    Inventors: Jarkko Turkulainen, Samuli Larvala, Dmitriy Komashinskiy, Antti Tikkanen, Daavid Hentunen
  • Publication number: 20120192272
    Abstract: Aspects of the invention relate to a method of identifying a potential attack in network traffic that includes payload data transmitted to a host entity in the network. The method includes: performing a first data-check on one or more data bytes of the payload data at the host entity; performing a second data-check, equivalent to the first data-check, on data of the network equivalent to the one or more bytes of payload data; and comparing the results of the first and second data-checks to determine if there is a mismatch, the mismatch being an indication of a potential attack.
    Type: Application
    Filed: January 20, 2011
    Publication date: July 26, 2012
    Inventor: Daavid Hentunen
  • Publication number: 20120167120
    Abstract: A method and apparatus for detecting a Return-Oriented Programming exploitation. At a computer device, a mechanism to detect a control transfer of a code location in a memory is established. This may be, for example, hooking the control transfer. The code location relates to an electronic file. In the event that a control transfer of the code location is detected, a comparison is made between a destination code location address with values in the freed stack. If the code location address matches any of the values in the freed stack, then it is determined that the control transfer of the code location relates to a Return-Oriented Programming exploitation.
    Type: Application
    Filed: December 22, 2010
    Publication date: June 28, 2012
    Inventor: Daavid Hentunen
  • Publication number: 20120151586
    Abstract: A method of identifying sections of code that can be disregarded when detecting features that are characteristic of malware, which features are subsequently used for detecting malware. The method includes, for each of a multiplicity of sample files, subdividing file code of the sample file into a plurality of code blocks and then removing duplicate code blocks to leave a sequence of unique code blocks. The sequence of unique code blocks is then compared with those obtained for other sample files in order to identify standard sections of code. The standard sections of code identified are then included within a database such that those sections of code can subsequently be disregarded when identifying features characteristic of malware.
    Type: Application
    Filed: December 14, 2010
    Publication date: June 14, 2012
    Inventor: Daavid Hentunen
  • Publication number: 20110209220
    Abstract: A method and apparatus for scanning for or removing malware from a computer device. Under normal circumstances, the computer device is controlled by a first operating system installed in a memory of the device. In order to scan for or remove the malware from the computer device, control of the computer device is passed from the first operating system to a second operating system and, under the control of the second operating system, the device is either scanned for malware or the malware is removed. This allows malware to be detected or removed, even if it has affected the first operating system in some way in order to evade detection or removal.
    Type: Application
    Filed: February 22, 2010
    Publication date: August 25, 2011
    Inventors: Antti Tikkanen, Jarkko Turkulainen, Daavid Hentunen, Samuli Larvala, Jose Perez Alegre
  • Patent number: 7260843
    Abstract: An intrusion detection system employs a pointer fingerprint method for detecting attempted or successful intrusions into an information system or network. In a pointer fingerprint method, the specific stream of bits searched from the traffic streams is a pointer or part of it that must be included in all working buffer overflow (bof) attacks. This makes it possible to detect also the previously unknown bof attacks.
    Type: Grant
    Filed: June 26, 2002
    Date of Patent: August 21, 2007
    Assignee: Stonesoft Corporation
    Inventor: Daavid Hentunen
  • Publication number: 20030014664
    Abstract: Intrusion detection system (IDS) according to the invention employs a pointer fingerprint method for detecting attempted or successful intrusions into an information system or network. In a pointer fingerprint method, the specific stream of bits searched from the traffic streams is a pointer or part of it that must be included in all working buffer overflow (bof) attacks. This makes it possible to detect also the previously unknown bof attacks.
    Type: Application
    Filed: June 26, 2002
    Publication date: January 16, 2003
    Inventor: Daavid Hentunen