Patents by Inventor Elias Levy

Elias Levy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20140188986
    Abstract: The present invention relates to the security of general purpose computing devices, such as laptop or desktop PCs, and more specifically to the detection of malicious software (malware) on a general purpose computing device. A challenge in maintaining a plurality of computing systems is that it may be required to have visibility into the extensive collection of computing related resources located across those systems as well as information about resources together with their behaviors and evolutions within those systems. Examples of such resources include files, file names, registry keys, entries in network communications logs, etc. Accordingly, we present novel methods, components, and systems for keeping track of information about these resources and presenting this information to an ultimate end user.
    Type: Application
    Filed: January 2, 2014
    Publication date: July 3, 2014
    Applicant: Sourcefire, Inc.
    Inventors: Elias Levy, Alfred Huger, Oliver Friedrichs, Zulfikar Ramzan
  • Patent number: 8555379
    Abstract: A method and apparatus for monitoring communications from a communications device comprising monitoring communications from a communications device by storing a data acquisition address in a contact list of the communications device that identifies a location of a monitoring device. Further, when malicious software uses the contact list to send messages, a message is sent using the malicious software to the monitoring device using the data acquisition address.
    Type: Grant
    Filed: September 28, 2007
    Date of Patent: October 8, 2013
    Assignee: Symantec Corporation
    Inventors: Oliver Whitehouse, Oliver Friedrichs, Elias Levy
  • Patent number: 7730540
    Abstract: An security module includes a detection module for determining that an electronic message received for scanning includes a protected component. The security module also includes a parsing module for parsing the electronic message to identify potential passwords for the protected component. The security module further includes an analysis module for attempting to access the protected component of the electronic message using the identified potential passwords. A submission module submits potential passwords to a decomposition module for accessing the protected component. If the correct password is found, the decomposition module opens the protected component and/or extracts the contents of the archive. An analyzer module analyzes or scans the contents of the protected component.
    Type: Grant
    Filed: December 8, 2004
    Date of Patent: June 1, 2010
    Assignee: Symantec Corporation
    Inventors: Brendon Woirhaye, Elias Levy
  • Patent number: 7725937
    Abstract: A technique is disclosed for capturing a security breach. In one embodiment, the technique comprises initially deploying a honey pot; detecting a breach of the honey pot; and automatically redeploying the honey pot.
    Type: Grant
    Filed: February 9, 2004
    Date of Patent: May 25, 2010
    Assignee: Symantec Corporation
    Inventor: Elias Levy
  • Patent number: 7650640
    Abstract: Data streams are scanned to detect malicious jump-call-pop shellcode constructs used in attacks against stack-based buffer overflow vulnerabilities on software executing in the IA32 architecture prior to execution. Upon a detection of a malicious jump-call-pop shellcode construct, protective action is taken, such as preventing the malicious shellcode from executing.
    Type: Grant
    Filed: October 18, 2004
    Date of Patent: January 19, 2010
    Assignee: Symantec Corporation
    Inventor: Elias Levy
  • Publication number: 20030084349
    Abstract: Security events based on network message traffic and other network security information are analyzed to identify validated security threats occurring on one or more networks. Alerts are prepared based on the results of the security analysis.
    Type: Application
    Filed: August 9, 2002
    Publication date: May 1, 2003
    Inventors: Oliver Friedrichs, Elias Levy, Alfred Huger, George Tomic