Patents by Inventor Gregory William Dalcher
Gregory William Dalcher has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12388848Abstract: A cybersecurity service protects endpoint devices from cybersecurity attacks. The cybersecurity service deploys cybersecurity attack feature vectors to agents in the field. The cybersecurity attack feature vectors are created in the cloud to efficiently describe observed groups of cybersecurity attacks. One method to assemble these is to generate clustering centroids for the observed groups. Each agent monitors its host according to the cybersecurity attack feature vectors. Each agent monitors its host's event behaviors and locally extracts an event behavior feature vector. The agent compares the cybersecurity attack feature vectors to the event behavior feature vector and, if similarity is determined, then the agent determines that the host's event behaviors are evidence of a cybersecurity attack. The agent may implement threat procedures, such as suspending/terminating the event behaviors and generating alerts.Type: GrantFiled: August 1, 2023Date of Patent: August 12, 2025Assignee: CrowdStrike, Inc.Inventors: Gregory William Dalcher, Vitaly Zaytsev
-
Publication number: 20250047689Abstract: A cybersecurity service protects endpoint devices from cybersecurity attacks. The cybersecurity service deploys cybersecurity attack feature vectors to agents in the field. The cybersecurity attack feature vectors are created in the cloud to efficiently describe observed groups of cybersecurity attacks. One method to assemble these is to generate clustering centroids for the observed groups. Each agent monitors its host according to the cybersecurity attack feature vectors. Each agent monitors its host's event behaviors and locally extracts an event behavior feature vector. The agent compares the cybersecurity attack feature vectors to the event behavior feature vector and, if similarity is determined, then the agent determines that the host's event behaviors are evidence of a cybersecurity attack. The agent may implement threat procedures, such as suspending/terminating the event behaviors and generating alerts.Type: ApplicationFiled: August 1, 2023Publication date: February 6, 2025Applicant: CrowdStrike,Inc.Inventors: Gregory William Dalcher, Vitaly Zaytsev
-
Patent number: 10834124Abstract: An opportunity to assist with remediation of a file at a remote particular host device is identified. One or more remediation techniques are identified that can be applied to assist with remediation of the file at the particular host device. In one aspect, one or more remediation scripts are identified from a plurality of remediation scripts for remediation of the file and provided to the particular host device for execution on the particular host device. In another aspect, a remediation tool is identified and launched on a computing device remote from the particular host device with operations of the remediation tool applied to resources of the particular host device. In another aspect, at least a portion of the remediation techniques are remotely initiated to be performed locally at the particular host device.Type: GrantFiled: January 30, 2019Date of Patent: November 10, 2020Assignee: McAfee, LLCInventors: John D. Teddy, James Douglas Bean, Gregory William Dalcher, Jeff Hetzler
-
Patent number: 10372472Abstract: A system, method, and computer program product are provided for conditionally preventing use of hardware virtualization. In use, an attempt to use hardware virtualization is identified. Further, the use of the hardware virtualization is conditionally prevented.Type: GrantFiled: August 6, 2015Date of Patent: August 6, 2019Assignee: McAfee, LLCInventors: Peter Blaimschein, Thomas C. H. Steeiner, Gregory William Dalcher, John Douglas Teddy
-
Publication number: 20190166136Abstract: An opportunity to assist with remediation of a file at a remote particular host device is identified. One or more remediation techniques are identified that can be applied to assist with remediation of the file at the particular host device. In one aspect, one or more remediation scripts are identified from a plurality of remediation scripts for remediation of the file and provided to the particular host device for execution on the particular host device. In another aspect, a remediation tool is identified and launched on a computing device remote from the particular host device with operations of the remediation tool applied to resources of the particular host device. In another aspect, at least a portion of the remediation techniques are remotely initiated to be performed locally at the particular host device.Type: ApplicationFiled: January 30, 2019Publication date: May 30, 2019Applicant: McAfee, LLCInventors: John D. Teddy, James Douglas Bean, Gregory William Dalcher, Jeff Hetzler
-
Patent number: 10205744Abstract: An opportunity to assist with remediation of a file at a remote particular host device is identified. One or more remediation techniques are identified that can be applied to assist with remediation of the file at the particular host device. In one aspect, one or more remediation scripts are identified from a plurality of remediation scripts for remediation of the file and provided to the particular host device for execution on the particular host device. In another aspect, a remediation tool is identified and launched on a computing device remote from the particular host device with operations of the remediation tool applied to resources of the particular host device. In another aspect, at least a portion of the remediation techniques are remotely initiated to be performed locally at the particular host device.Type: GrantFiled: May 25, 2017Date of Patent: February 12, 2019Assignee: McAfee, LLCInventors: John D. Teddy, James Douglas Bean, Gregory William Dalcher, Jeff Hetzler
-
Publication number: 20180083983Abstract: An opportunity to assist with remediation of a file at a remote particular host device is identified. One or more remediation techniques are identified that can be applied to assist with remediation of the file at the particular host device. In one aspect, one or more remediation scripts are identified from a plurality of remediation scripts for remediation of the file and provided to the particular host device for execution on the particular host device. In another aspect, a remediation tool is identified and launched on a computing device remote from the particular host device with operations of the remediation tool applied to resources of the particular host device. In another aspect, at least a portion of the remediation techniques are remotely initiated to be performed locally at the particular host device.Type: ApplicationFiled: May 25, 2017Publication date: March 22, 2018Applicant: McAfee, LLCInventors: John D. Teddy, James Douglas Bean, Gregory William Dalcher, Jeff Hetzler
-
Patent number: 9906537Abstract: A system, method, and computer program product are provided for conditionally performing an action based on an attribute. In use, at least one attribute associated with an object is determined. Additionally, an event associated with the object is identified. Further, at least one action is conditionally performed in association with the event, based on the at least one attribute.Type: GrantFiled: January 12, 2015Date of Patent: February 27, 2018Assignee: McAfee, LLCInventors: Joel R. Spurlock, Gregory William Dalcher
-
Publication number: 20170366560Abstract: A host-based antimalware client can interface with a server-based antimalware support server. A file is identified at a host device. It is determined whether local reputation data for the file is available at the host device for the file. A query is sent to an antimalware support system relating to the file. Particular reputation data is received from the antimalware support system corresponding to the query. It is determined whether to allow the file to be loaded on the host device based at least in part on the particular reputation data.Type: ApplicationFiled: April 3, 2017Publication date: December 21, 2017Applicant: McAfee, Inc.Inventors: John Teddy, James Douglas Bean, Gregory William Dalcher, Jeff Hetzler
-
Patent number: 9824215Abstract: A system, method and computer program product are provided. In use, execution of a portion of internal code of an interface is identified. Further, in response to the execution of the portion of internal code, at least one aspect of an invocation of the interface is monitored and/or analyzed.Type: GrantFiled: May 1, 2015Date of Patent: November 21, 2017Assignee: McAfee, LLCInventor: Gregory William Dalcher
-
Patent number: 9779251Abstract: A system, method, and computer program product are provided for monitoring an execution flow of a function. In use, data associated with a function is identified within a call stack. Additionally, a call stack frame is determined from freed memory in the call stack. Further, an execution flow of the function is monitored, utilizing the call stack frame from the freed memory.Type: GrantFiled: October 28, 2015Date of Patent: October 3, 2017Assignee: McAfee, Inc.Inventor: Gregory William Dalcher
-
Patent number: 9773116Abstract: A system, method and computer readable medium pertaining to evaluation of events from a computer system to assess security risks to that system. Events are evaluated according to the aspects of each event and the aspects are used to make a preliminary determination regarding violation of a security rule. In addition to a preliminary determination of a rule violation, exceptions to the rule may be identified.Type: GrantFiled: January 27, 2014Date of Patent: September 26, 2017Assignee: McAfee, Inc.Inventors: Gregory William Dalcher, Hemang Satish Nadkarni
-
Patent number: 9667648Abstract: An opportunity to assist with remediation of a file at a remote particular host device is identified. One or more remediation techniques are identified that can be applied to assist with remediation of the file at the particular host device. In one aspect, one or more remediation scripts are identified from a plurality of remediation scripts for remediation of the file and provided to the particular host device for execution on the particular host device. In another aspect, a remediation tool is identified and launched on a computing device remote from the particular host device with operations of the remediation tool applied to resources of the particular host device. In another aspect, at least a portion of the remediation techniques are remotely initiated to be performed locally at the particular host device.Type: GrantFiled: September 14, 2015Date of Patent: May 30, 2017Assignee: McAfee, Inc.Inventors: John Teddy, James Douglas Bean, Gregory William Dalcher, Jeff Hetzler
-
Patent number: 9614865Abstract: A host-based antimalware client can interface with a server-based antimalware support server. A file is identified at a host device. It is determined whether local reputation data for the file is available at the host device for the file. A query is sent to an antimalware support system relating to the file. Particular reputation data is received from the antimalware support system corresponding to the query. It is determined whether to allow the file to be loaded on the host device based at least in part on the particular reputation data.Type: GrantFiled: March 15, 2013Date of Patent: April 4, 2017Assignee: McAfee, Inc.Inventors: John Teddy, James Douglas Bean, Gregory William Dalcher, Jeff Hetzler
-
Patent number: 9613212Abstract: Technologies for assembling an execution profile of an event are disclosed. The system and method may include recording a plurality of branch records, generating a first test event substantially identical to the event, verifying legitimacy of an owner of a code segment associated with the event, establishing an initial point of an execution chain associated with the event, establishing a final point of the execution chain associated with the event, analyzing branch records for an address associated with the code segment, installing a plurality of primary monitors within the execution chain associated with the event, and triggering the plurality of primary monitors.Type: GrantFiled: March 5, 2013Date of Patent: April 4, 2017Assignee: McAfee, Inc.Inventor: Gregory William Dalcher
-
Patent number: 9483645Abstract: A system, method, and computer program product are provided for identifying unwanted data based on an assembled execution profile of code. In use, an execution profile of code is assembled by tracking interface usage of the code. Further, it is determined whether the code is associated with unwanted activity, based on the execution profile.Type: GrantFiled: March 5, 2008Date of Patent: November 1, 2016Assignee: McAfee, Inc.Inventor: Gregory William Dalcher
-
Patent number: 9311478Abstract: A behavioral tracking system, method, and computer program product are provided for undoing events based on user input. In use, a plurality of unclassified events is identified on a system utilizing behavioral tracking. Additionally, input associated with at least one of the unclassified events is received from a user of the system for classifying the at least one of the unclassified events as an unwanted event. Further, the at least one unwanted event is undone in response to the receipt of the input.Type: GrantFiled: June 10, 2014Date of Patent: April 12, 2016Assignee: McAfee, Inc.Inventors: Jonathan L. Edwards, Joel R. Spurlock, Gregory William Dalcher
-
Patent number: 9311480Abstract: An antimalware support system is provided to support one or more host-based antimalware clients. A query is received from a particular host device that identifies a file detected by an antimalware tool local to the particular host device. Reputation data is determined for the file, and a response to the query is sent to the particular host device. The query response includes the reputation data determined for the file.Type: GrantFiled: March 15, 2013Date of Patent: April 12, 2016Assignee: McAfee, Inc.Inventors: John D. Teddy, James Douglas Bean, Gregory William Dalcher, Jeff Hetzler, Andrew Arlin Woodruff
-
Publication number: 20160048686Abstract: A system, method, and computer program product are provided for monitoring an execution flow of a function. In use, data associated with a function is identified within a call stack. Additionally, a call stack frame is determined from freed memory in the call stack. Further, an execution flow of the function is monitored, utilizing the call stack frame from the freed memory.Type: ApplicationFiled: October 28, 2015Publication date: February 18, 2016Inventor: Gregory William Dalcher
-
Publication number: 20160026794Abstract: A system, method and computer program product are provided. In use, execution of a portion of internal code of an interface is identified. Further, in response to the execution of the portion of internal code, at least one aspect of an invocation of the interface is monitored and/or analyzed.Type: ApplicationFiled: May 1, 2015Publication date: January 28, 2016Inventor: Gregory William Dalcher