Patents by Inventor Egemen Tas

Egemen Tas has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12229249
    Abstract: Protection of process memory against foreign code injection is described herein. A system includes at least one processor and at least one memory storing instructions thereon that, when executed by the at least one processor, cause the at least one processor to perform operations. The operations include to dynamically virtualize a protected application in user space, wherein the virtualization comprises a virtualized memory management system and to monitor memory allocated to the virtualized protected application by the virtualized memory management system. The operations include to compare memory allocated by the virtualized memory management system with known allocations of virtual memory. Additionally, the applications include to designate the memory as being injected with foreign code in response to the virtualized memory management system detecting privileges not created by the virtualized memory management system.
    Type: Grant
    Filed: May 17, 2022
    Date of Patent: February 18, 2025
    Assignee: Deloitte Development LLC
    Inventors: Egemen Tas, Haibo Zhang
  • Patent number: 12032726
    Abstract: Systems and methods for obfuscating keyboard keys against interception are provided. In an example, a protected application is dynamically virtualized in user space, wherein the virtualization comprises an isolated keyboard path. Keystrokes are injected to the isolated keyboard path, wherein the injected keystrokes are associated with a respective timestamp, and user input keystrokes are obfuscated with the injected keystrokes and the obfuscated keystrokes are passed to a low level hook. The obfuscated keystrokes passed to the low level hook are separated according to tags associated with the obfuscated keystrokes to obtain the user input keystrokes. The user input keystrokes are transmitted to a target window of the protected application.
    Type: Grant
    Filed: May 17, 2022
    Date of Patent: July 9, 2024
    Assignee: Deloitte Development LLC
    Inventors: Egemen Tas, Haibo Zhang
  • Patent number: 11212284
    Abstract: There is provided a method and system with an improved bitmap access control method of file virtualization for large files in sandbox. The process divides a large file to pieces clusters by fixed byte counts, building a mapping relationship between logical view of sandboxed file and physical shadow file on disk. Thus, there is no need to copy an entire file when a file is modified and waste the user's disk storage.
    Type: Grant
    Filed: October 26, 2018
    Date of Patent: December 28, 2021
    Inventor: Egemen Tas
  • Patent number: 11204788
    Abstract: There is provided a method to detect script texts passed to interpreter and send them to security components, such as a scanner, whitelist and sandbox. The method is accomplished by extracting embedded script from command line parameters or documents, saving it to a script file and passing the file path to security components for scanning and further processing.
    Type: Grant
    Filed: December 10, 2018
    Date of Patent: December 21, 2021
    Inventors: Egemen Tas, Haibo Zhang, Sergey Kazakov
  • Patent number: 10990678
    Abstract: There is provided a method to protect applications running in a hostile environment, including against trampoline based attacks which use dll injection and code modification. The method includes protecting an application when access is performed from injected dll, and protecting the application when access is performed from modified codes.
    Type: Grant
    Filed: July 25, 2018
    Date of Patent: April 27, 2021
    Inventors: Egemen Tas, Haibo Zhang
  • Patent number: 10735447
    Abstract: There is provided a network appliance, methods and systems which intercept web and email traffic, extract executables, compare the executables with a policy and wrap the executables. Then, the wrapped executables are delivered to a client system in a manner to protect the network and end point devices, where the wrapped executables are run in a sandbox with all file system, registry accesses, communication and traffic isolated.
    Type: Grant
    Filed: July 28, 2018
    Date of Patent: August 4, 2020
    Inventors: Melih Abdulhayoglu, Egemen Tas, Haibo Zhang
  • Publication number: 20190265994
    Abstract: There is provided a method to detect script texts passed to interpreter and send them to security components, such as a scanner, whitelist and sandbox. The method is accomplished by extracting embedded script from command line parameters or documents, saving it to a script file and passing the file path to security components for scanning and further processing.
    Type: Application
    Filed: December 10, 2018
    Publication date: August 29, 2019
    Inventors: Egemen Tas, Haibo Zhang, Sergey Kazakov
  • Patent number: 10313373
    Abstract: There is provided a network appliance, methods and systems which intercept web and email traffic, extract executables, compare the executables with a policy and wrap the executables. Then, the wrapped executables are delivered to a client system in a manner to protect the network and end point devices, where the wrapped executables are run in a sandbox with all file system, registry accesses, communication and traffic isolated.
    Type: Grant
    Filed: October 7, 2015
    Date of Patent: June 4, 2019
    Inventors: Melih Abdulhayoglu, Egemen Tas, Haibo Zhang
  • Publication number: 20190114424
    Abstract: There is provided a method to protect applications running in a hostile environment, including against trampoline based attacks which use dll injection and code modification. The method includes protecting an application when access is performed from injected dll, and protecting the application when access is performed from modified codes.
    Type: Application
    Filed: July 25, 2018
    Publication date: April 18, 2019
    Inventors: Egemen Tas, Haibo Zhang
  • Publication number: 20190068601
    Abstract: There is provided a method and system with an improved bitmap access control method of file virtualization for large files in sandbox. The process divides a large file to pieces clusters by fixed byte counts, building a mapping relationship between logical view of sandboxed file and physical shadow file on disk. Thus, there is no need to copy an entire file when a file is modified and waste the user's disk storage.
    Type: Application
    Filed: October 26, 2018
    Publication date: February 28, 2019
    Inventor: Egemen Tas
  • Publication number: 20180041540
    Abstract: The current invention discloses method and system to detect remote control and prevent critical application from being peeped at and manipulated. Solution includes remote control detection, remote control blocking and user interaction. When remote access is detected, all suspicious behaviors found during network protocol filtering, session id based detection and remote control behaviour analysis are blocked. Innovative and efficient remote detection methods support user space and kernel space mode, intercept function modules for running applications and services to check and verify. Also new detective methods support network packets filter to judge accurate remote activities.
    Type: Application
    Filed: July 29, 2016
    Publication date: February 8, 2018
    Inventors: Egemen Tas, Haibo Zhang
  • Publication number: 20170083630
    Abstract: There is provided a method and system with an improved bitmap access control method of file virtualization for large files in sandbox. The process divides a large file to pieces clusters by fixed byte counts, building a mapping relationship between logical view of sandboxed file and physical shadow file on disk. Thus, there is no need to copy an entire file when a file is modified and waste the user's disk storage.
    Type: Application
    Filed: September 21, 2015
    Publication date: March 23, 2017
    Inventor: Egemen Tas
  • Publication number: 20110252468
    Abstract: A method of protecting a computer by having security software be set to clean mode where the clean mode acts as if files installed or modified before the clean date are safe and installed or modified after the clean date as potentially harmful.
    Type: Application
    Filed: November 8, 2007
    Publication date: October 13, 2011
    Inventors: Egemen Tas, Melih Abdulhayoglu
  • Publication number: 20110197253
    Abstract: The application discloses a method of protecting a computer against buffer overflow attacks by creating a security policy based on information about the buffer overflow. This results in a dynamic and “on-the-fly” security policy that can be applied to an application to protect the computer. The application also discloses a method where the buffer overflow is reported to central server. The central server monitors the publisher to determine when a patch becomes available to remedy the problem. The server notifies the security software when a patch is available so that either the security software or computer user can download and install the patch.
    Type: Application
    Filed: February 8, 2010
    Publication date: August 11, 2011
    Inventor: Egemen Tas
  • Publication number: 20100313268
    Abstract: A method of protecting a computer by having security software be set to clean mode where the clean mode acts as if files installed or modified before the clean date are safe and installed or modified after the clean date as potentially harmful.
    Type: Application
    Filed: November 8, 2007
    Publication date: December 9, 2010
    Inventors: Melih Abdulhayoglu, Egemen Tas
  • Publication number: 20090235359
    Abstract: A method and system of performing vulnerability and security scans on an internet connected device where the device is behind a network security device such as a firewall. The method is performed by having an agent that is local to the device to be scanned create a VPN connection with a scanning server and then performing the scanning over the VPN. The connection is terminated at the end to free up system resources.
    Type: Application
    Filed: August 8, 2008
    Publication date: September 17, 2009
    Applicant: Comodo CA Limited
    Inventors: Melih Abdulhayoglu, Egemen Tas, Igor Seltskiy, Vadim Lvovskiy, Vadim Klimov