Patents by Inventor Kirill MOTIL
Kirill MOTIL has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240037222Abstract: A system includes calling to a first function, determination, in response to the call, of whether to execute a first version of the first function or a second version of the first function, execution of the first version of the first function if it is determined to execute the first version of the first function, and execution of the second version of the second function if it is determined to execute the second version of the first function, wherein the second version of the first function comprises a security-related features and the first version of the first function does not comprise the security-related feature.Type: ApplicationFiled: October 9, 2023Publication date: February 1, 2024Inventor: Kirill MOTIL
-
Patent number: 11847207Abstract: A system includes calling to a first function, determination, in response to the call, of whether to execute a first version of the first function or a second version of the first function, execution of the first version of the first function if it is determined to execute the first version of the first function, and execution of the second version of the second function if it is determined to execute the second version of the first function, wherein the second version of the first function comprises a security-related features and the first version of the first function does not comprise the security-related feature.Type: GrantFiled: March 4, 2019Date of Patent: December 19, 2023Assignee: Microsoft Technology Licensing, LLCInventor: Kirill Motil
-
Patent number: 11775657Abstract: Enhancing security achieved via encryption that is performed within an encryption device by combining entropy that is generated within the encryption device with additional entropy, that is generated external to the encryption device, into the generation of an encryption key. Prior to an encryption device utilizing a deterministic algorithm to generate the encryption key, multiple random numbers may be obtained from different entropy sources—at least one of which is internal to the encryption device and at least one of which is external to the encryption device. The encryption device combines the multiple random numbers into a combined entropy input that cannot be determined from either one of the random numbers alone. This combined entropy input is then utilized to generate the encryption key that is ultimately used to perform the device-internal encryption.Type: GrantFiled: October 15, 2020Date of Patent: October 3, 2023Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventor: Kirill Motil
-
Publication number: 20230281311Abstract: There is provided a system and a computer-implemented method of detecting malware in real time in a live environment. The method comprises: monitoring one or more operations of at least one program concurrently running in the live environment, building at least one stateful model in accordance with the one or more operations, analyzing the at least one stateful model to identify one or more behaviors, and determining the presence of malware based on the identified one or more behaviors.Type: ApplicationFiled: March 7, 2023Publication date: September 7, 2023Inventors: Tomer Weingarten, Almog Cohen, Udi Shamir, Kirill Motil
-
Patent number: 11625485Abstract: There is provided a system and a computer-implemented method of detecting malware in real time in a live environment. The method comprises: monitoring one or more operations of at least one program concurrently running in the live environment, building at least one stateful model in accordance with the one or more operations, analyzing the at least one stateful model to identify one or more behaviors, and determining the presence of malware based on the identified one or more behaviors.Type: GrantFiled: April 15, 2020Date of Patent: April 11, 2023Assignee: Sentinel Labs Israel Ltd.Inventors: Tomer Weingarten, Almog Cohen, Udi Shamir, Kirill Motil
-
Publication number: 20220121755Abstract: Enhancing security achieved via encryption that is performed within an encryption device by combining entropy that is generated within the encryption device with additional entropy, that is generated external to the encryption device, into the generation of an encryption key. Prior to an encryption device utilizing a deterministic algorithm to generate the encryption key, multiple random numbers may be obtained from different entropy sources—at least one of which is internal to the encryption device and at least one of which is external to the encryption device. The encryption device combines the multiple random numbers into a combined entropy input that cannot be determined from either one of the random numbers alone. This combined entropy input is then utilized to generate the encryption key that is ultimately used to perform the device-internal encryption.Type: ApplicationFiled: October 15, 2020Publication date: April 21, 2022Inventor: Kirill MOTIL
-
Publication number: 20200311271Abstract: There is provided a system and a computer-implemented method of detecting malware in real time in a live environment. The method comprises: monitoring one or more operations of at least one program concurrently running in the live environment, building at least one stateful model in accordance with the one or more operations, analyzing the at least one stateful model to identify one or more behaviors, and determining the presence of malware based on the identified one or more behaviors.Type: ApplicationFiled: April 15, 2020Publication date: October 1, 2020Inventors: Tomer WEINGARTEN, Almog COHEN, Udi SHAMIR, Kirill MOTIL
-
Publication number: 20200285736Abstract: A system includes calling to a first function, determination, in response to the call, of whether to execute a first version of the first function or a second version of the first function, execution of the first version of the first function if it is determined to execute the first version of the first function, and execution of the second version of the second function if it is determined to execute the second version of the first function, wherein the second version of the first function comprises a security-related features and the first version of the first function does not comprise the security-related feature.Type: ApplicationFiled: March 4, 2019Publication date: September 10, 2020Inventor: Kirill MOTIL
-
Patent number: 10664596Abstract: There is provided a system and a computer-implemented method of detecting malware in real time in a live environment. The method comprises: monitoring one or more operations of at least one program concurrently running in the live environment, building at least one stateful model in accordance with the one or more operations, analyzing the at least one stateful model to identify one or more behaviors, and determining the presence of malware based on the identified one or more behaviors.Type: GrantFiled: June 15, 2017Date of Patent: May 26, 2020Assignee: Sentinel Labs Israel Ltd.Inventors: Tomer Weingarten, Almog Cohen, Udi Shamir, Kirill Motil
-
Publication number: 20170286676Abstract: There is provided a system and a computer-implemented method of detecting malware in real time in a live environment. The method comprises: monitoring one or more operations of at least one program concurrently running in the live environment, building at least one stateful model in accordance with the one or more operations, analyzing the at least one stateful model to identify one or more behaviors, and determining the presence of malware based on the identified one or more behaviors.Type: ApplicationFiled: June 15, 2017Publication date: October 5, 2017Inventors: Tomer WEINGARTEN, Almog COHEN, Udi SHAMIR, Kirill MOTIL
-
Patent number: 9710648Abstract: There is provided a system and a computer-implemented method of detecting malware in real time in a live environment. The method comprises: monitoring one or more operations of at least one program concurrently running in the live environment, building at least one stateful model in accordance with the one or more operations, analyzing the at least one stateful model to identify one or more behaviors, and determining the presence of malware based on the identified one or more behaviors.Type: GrantFiled: August 11, 2014Date of Patent: July 18, 2017Assignee: SENTINEL LABS ISRAEL LTD.Inventors: Tomer Weingarten, Almog Cohen, Udi Shamir, Kirill Motil
-
Publication number: 20160042179Abstract: There is provided a system and a computer-implemented method of detecting malware in real time in a live environment. The method comprises: monitoring one or more operations of at least one program concurrently running in the live environment, building at least one stateful model in accordance with the one or more operations, analyzing the at least one stateful model to identify one or more behaviors, and determining the presence of malware based on the identified one or more behaviors.Type: ApplicationFiled: August 11, 2014Publication date: February 11, 2016Inventors: Tomer WEINGARTEN, Almog COHEN, Udi SHAMIR, Kirill MOTIL
-
Patent number: 8713666Abstract: Disclosed are methods, devices, and media for enforcing network access control, the method including the steps of: extracting a packet signature from a packet (or packet fragment) received from a network; storing the packet signature and the packet in a buffer; computing a buffer signature using a per-endpoint secret key; determining whether the packet signature and the buffer signature are identical; and upon determining the packet signature and the buffer signature are identical, transmitting the packet to a protocol stack. Preferably, the step of extracting includes extracting the packet signature from a field (e.g. identification field) of a header of the packet. Preferably, the method further includes the step of: upon determining the packet signature and the buffer signature are not identical, discarding the packet. Methods for receiving a packet from a protocol stack, and transmitting the packet to a network are disclosed as well.Type: GrantFiled: March 27, 2008Date of Patent: April 29, 2014Assignee: Check Point Software Technologies, Ltd.Inventors: Kirill Motil, Almog Cohen, Yaron Sheffer
-
Publication number: 20090249466Abstract: Disclosed are methods, devices, and media for enforcing network access control, the method including the steps of: extracting a packet signature from a packet (or packet fragment) received from a network; storing the packet signature and the packet in a buffer; computing a buffer signature using a per-endpoint secret key; determining whether the packet signature and the buffer signature are identical; and upon determining the packet signature and the buffer signature are identical, transmitting the packet to a protocol stack. Preferably, the step of extracting includes extracting the packet signature from a field (e.g. identification field) of a header of the packet. Preferably, the method further includes the step of: upon determining the packet signature and the buffer signature are not identical, discarding the packet. Methods for receiving a packet from a protocol stack, and transmitting the packet to a network are disclosed as well.Type: ApplicationFiled: March 27, 2008Publication date: October 1, 2009Applicant: Check Point Software Technologies Ltd.Inventors: Kirill MOTIL, Almog Cohen, Yaron Sheffer