Patents by Inventor Leylya Yumer
Leylya Yumer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250080573Abstract: Methods for protecting against malicious websites using repetitive data signatures are disclosed. Some embodiments may identify known malicious websites and known safe websites. A first dataset containing data from one or more artifacts within the known malicious websites and a second dataset containing data from the one or more artifacts within the known safe websites may be created. One or more signatures may be identified from the first dataset. A first frequency of signature repetition within the first dataset and a second frequency of signature repetition within the second dataset may be determined. A level of confidence may be determined based on the frequencies. If a rule establishment threshold for confidence is met or exceeded, a rule may be established that websites containing the one or more signatures are malicious. The rule may be applied to identify a new malicious website. A security action may also be performed.Type: ApplicationFiled: October 16, 2023Publication date: March 6, 2025Inventors: Kevin Alejandro Roundy, Platon Kotzias, Iskander Sanchez Rola, Michalis Pachilakis, Leylya Yumer, Acar Tamersoy
-
Publication number: 20250080572Abstract: Methods and systems for protecting against harm caused by malicious websites are disclosed. Exemplary embodiments of the present disclosure may protect against harm caused by malicious websites by identifying malicious websites more accurately and reliably. In particular, some embodiments of the present disclosure may receive first resource data from a first web page on a website that is accessed by a first user and second resource data from a second web page on the website that is accessed by a second user. This resource data may be correlated and analyzed. Based on this analysis, a determination may be made that the website is malicious and a security action can be performed.Type: ApplicationFiled: September 29, 2023Publication date: March 6, 2025Inventors: Iskander Sanchez Rola, Platon Kotzias, Leylya Yumer, Michalis Pachilakis, Kevin Alejandro Roundy
-
Publication number: 20250077660Abstract: Methods and systems for protecting mobile devices from malicious application encounters are disclosed. In one embodiment, a method may include obtaining application data and feature data from a plurality of mobile devices and identifying one or more malicious applications installed thereon. Based on the application data, a user profile for each mobile device may be determined and each mobile device may be assigned to a cluster based on the user profile identified. A security model based on the featured data may be created for a selected cluster and the security model may be applied to a selected mobile device within the selected cluster. Finally, a security action may be performed on the selected mobile device based on an output of the security model.Type: ApplicationFiled: September 7, 2023Publication date: March 6, 2025Inventors: Savino Dambra, Platon Kotzias, Leylya Yumer
-
Publication number: 20250005601Abstract: Systems and methods for detecting fraudulent e-commerce websites by identifying fake review systems are disclosed. In particular, some embodiments may identify an e-commerce website and download content contained on one or more product web pages of the e-commerce website. These web pages may be analyzed to identify a product review feature that is within the one or more product web pages. Attributes of the product review feature may then be evaluated to determine that the e-commerce website is fraudulent and a security action may be performed to protect consumers from the e-commerce website.Type: ApplicationFiled: July 10, 2023Publication date: January 2, 2025Inventors: Platon Kotzias, Kevin Alejandro Roundy, Iskander Sanchez Rola, Michalis Pachilakis, Leylya Yumer
-
Patent number: 12166761Abstract: Distinguishing between functional tracking domains and nonfunctional tracking domains on a host web page. In particular, a list of known tracking domains that load content into host web pages may be received. This list of tracking domains may include tracking domains that are functional and tracking domains that are nonfunctional. The tracking domains that are functional may be determined by evaluating various behaviors and characteristics of the tracking domains. Once functional tracking domains have been determined, these functional tracking domains may be allowed, and other tracking domains may be blocked from loading content onto host web pages thereby preserving the functionality of the web pages.Type: GrantFiled: February 2, 2024Date of Patent: December 10, 2024Assignee: GEN DIGITAL INC.Inventors: Iskander Sanchez Rola, Johann Roturier, David Luz Silva, Leylya Yumer, Daniel Marino, Petros Efstathopoulos
-
Patent number: 11949679Abstract: Distinguishing between functional tracking domains and nonfunctional tracking domains on a host web page. In particular, a list of known tracking domains that load content into host web pages may be received. This list of tracking domains may include tracking domains that are functional and tracking domains that are nonfunctional. The tracking domains that are functional may be determined by evaluating various behaviors and characteristics of the tracking domains. Once functional tracking domains have been determined, these functional tracking domains may be allowed, and other tracking domains may be blocked from loading content onto host web pages thereby preserving the functionality of the web pages.Type: GrantFiled: August 10, 2021Date of Patent: April 2, 2024Assignee: GEN DIGITAL INC.Inventors: Iskander Sanchez Rola, Johann Roturier, David Luz Silva, Leylya Yumer, Daniel Marino, Petros Efstathopoulos
-
Patent number: 11849002Abstract: Assigning privacy ratings to tracking domains in order to increase user awareness of online privacy violations. A list of known tracking domains and raw data from a set of host websites may be received. A prevalence, frequency, and role for each tracking domain may be determined from the raw data. Each tracking domain may be assigned to a prevalence cluster, a frequency cluster, and a role cluster. A rank may be determined for each prevalence cluster, frequency cluster, and role cluster. A domain privacy rating may be assigned to each tracking domain that is based on the ranks of the clusters to which each tracking domain is assigned. A privacy action may be performed based on the domain privacy rating assigned to each tracking domain.Type: GrantFiled: August 17, 2021Date of Patent: December 19, 2023Assignee: GEN DIGITAL INC.Inventors: Iskander Sanchez Rola, Leylya Yumer
-
Publication number: 20230403298Abstract: The disclosed computer-implemented method for utilizing user profile data to protect against phishing attacks may include (i) detecting a target user profile associated services accessed by a network-based application, (ii) determining identifiers associated with each of the services, (iii) extracting, for each of the identifiers, feature vectors describing exploitable screen elements in the network-based application associated with phishing attacks, (iv) updating, based on the feature vectors, previously extracted feature vectors in a data repository storing additional profiles for other users associated with the services, (v) predicting, utilizing a machine-learning model, phishing attack threats for target profile user based on a similarity with the additional profiles, and (vi) performing a security action that protects against the phishing attack threats. Various other methods, systems, and computer-readable media are also disclosed.Type: ApplicationFiled: June 6, 2022Publication date: December 14, 2023Inventors: David Luz Silva, Johann Roturier, Petros Efstathopoulos, Iskander Sanchez Rola, Savino Dambra, Platon Kotzias, Leylya Yumer
-
Patent number: 11777909Abstract: Systems and methods for identifying and removing a tracking capability from an external domain that performs a tracking activity on a host web page. Tracking capabilities of an external domain may be removed by altering web requests and/or responses to API calls. Once these tracking capabilities of the external domain have been removed, the altered web requests and/or altered responses to API calls may be transmitted to a web browser and/or entity making the API call thereby protecting user privacy while allowing the external domain to interact with the host web page.Type: GrantFiled: November 4, 2022Date of Patent: October 3, 2023Assignee: GEN DIGITAL INC.Inventors: Iskander Sanchez Rola, David Luz Silva, Daniel Marino, Leylya Yumer, Petros Efstathopoulos
-
Patent number: 11640479Abstract: Mitigating website privacy issues by automatically identifying cookie sharing risks in a cookie ecosystem. In some embodiments, a method may include generating, by the computing device, a cookie tree representing cookies created on a web browser while browsing a website. The cookie tree may include nodes representing organizations. The cookie tree may further include hierarchical edges between the nodes representing creation chains of the nodes. The method may also include determining, by the computing device, a creator, a sender, and a receiver of each of the cookies. The method may further include mitigating, by the computing device, website privacy issues based on the creator, sender, and receiver of each of the cookies.Type: GrantFiled: March 3, 2021Date of Patent: May 2, 2023Assignee: NORTONLIFELOCK INC.Inventors: Iskander Sanchez, Leylya Yumer
-
Patent number: 11528257Abstract: Identifying and removing a tracking capability from an external domain that performs a tracking activity on a host web page. Tracking capabilities of an external domain may be removed by altering web requests and/or responses to API calls. Once these tracking capabilities of the external domain have been removed, the altered web requests and/or altered responses to API calls may be transmitted to a web browser and/or entity making the API call thereby protecting user privacy while allowing the external domain to interact with the host web page.Type: GrantFiled: August 19, 2021Date of Patent: December 13, 2022Assignee: NORTONLIFELOCK INC.Inventors: Iskander Sanchez Rola, David Luz Silva, Daniel Marino, Leylya Yumer, Petros Efstathopoulos
-
Patent number: 11381596Abstract: Analyzing and mitigating website privacy issues by automatically classifying cookies.Type: GrantFiled: December 12, 2019Date of Patent: July 5, 2022Assignee: NORTONLIFELOCK INC.Inventors: Iskander Sanchez, Leylya Yumer
-
Patent number: 11354440Abstract: Analyzing and mitigating privacy issues on a computing device using cookie generation flows. The method includes initiating a headless web browser, monitoring a request made of a website accessed by the headless web browser, monitoring scripts created on the website, instrumenting a function used to create a cookie on the computing device, tracing an initial generation of a call used to create the cookie on the computing device, obtaining a cookie generation flow related to the creation of the cookie, and initiating a security action based on obtaining the cookie generation flow.Type: GrantFiled: June 21, 2019Date of Patent: June 7, 2022Assignee: NORTONLIFELOCK INC.Inventors: Iskander Sanchez, Leylya Yumer
-
Patent number: 10623426Abstract: Building a ground truth dataset for a machine learning-based security application. In one embodiment, a method may include identifying a set of network devices to add to a ground truth dataset. The method may also include, for each network device in the set of network devices, identifying a potentially malicious application stored on the network device, analyzing behavior of the potentially malicious application to determine whether the potentially malicious application has behaved maliciously, and if so, adding the network device to the ground truth dataset as an infected device or, if not, adding the network device to the ground truth dataset as a clean device. The method may further include training a machine learning classifier of a security application using the ground truth dataset, making a security action decision using the machine learning classifier, and performing a security action on a computer system based on the security action decision.Type: GrantFiled: July 14, 2017Date of Patent: April 14, 2020Assignee: NortonLifeLock Inc.Inventors: Leylya Yumer, Petros Efstathopoulos
-
Patent number: 10547633Abstract: The disclosed computer-implemented method for mapping services utilized by network domains may include (i) receiving a request to perform a risk assessment on a domain, (ii) querying a database for records associated with the domain, where each record links to a network resource that enables functionality of the domain, (iii) generating a service map that matches each network resource to a corresponding service type and service provider, (v) performing the risk assessment of the domain, and (vi) facilitating a security measure for the domain based on a result of the risk assessment. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: November 7, 2017Date of Patent: January 28, 2020Assignee: Symantec CorporationInventors: Matteo Dell'Amico, Pierre-Antoine Vervier, Leylya Yumer
-
Patent number: 10547623Abstract: Securing network devices by forecasting future security incidents for a network based on past security incidents. In one embodiment, a method may include constructing past inside-in security features for a network, constructing past outside-in security features for the network, and employing dynamic time warping to generate a similarity score for each security feature pair in the past inside-in security features, in the past outside-in security features, and between the past inside-in security features and the past outside-in security features. The method may further include generating a Coupled Gaussian Latent Variable (CGLV) model based on the similarity scores, forecasting future inside-in security features for the network using the CGLV model, and performing a security action on one or more network devices of the network based on the forecasted future inside-in security features for the network.Type: GrantFiled: July 31, 2017Date of Patent: January 28, 2020Assignee: SYMANTEC CORPORATIONInventors: Yufei Han, Yun Shen, Leylya Yumer, Pierre-Antoine Vervier, Petros Efstathopoulos
-
Patent number: 10410158Abstract: A computer-implemented method for evaluating cybersecurity risk may include (i) identifying telemetry data collected from endpoints of an entity, (ii) calculating a cybersecurity risk score for the entity by searching the telemetry data for information indicative of cybersecurity risk exposure of the entity and performing an actuarial analysis on the information indicative of the cybersecurity risk exposure to quantize a potential consequence of the cybersecurity risk exposure, and (iii) performing, based on the cybersecurity risk score, a security action to protect the entity from the potential consequence of the cybersecurity risk exposure. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: July 29, 2016Date of Patent: September 10, 2019Assignee: Symantec CorporationInventors: Leylya Yumer, Laurent Heslault, Roxane Divol
-
Patent number: 10367845Abstract: The disclosed computer-implemented method for evaluating infection risks based on profiled user behaviors may include (1) collecting user-behavior profiles that may include labeled profiles (e.g., infected profiles and/or clean profiles) and/or unlabeled profiles, (2) training a classification model to distinguish infected profiles from clean profiles using features and labels of the user-behavior profiles, and (3) using the classification model to predict (a) a likelihood that a computing system of a user will become infected based on a profile of user behaviors of the user and/or (b) a likelihood that a user behavior in the user-behavior profiles will result in a computing-system infection. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: August 30, 2018Date of Patent: July 30, 2019Assignee: Symantec CorporationInventors: Yufei Han, Leylya Yumer, Pierre-Antoine Vervier, Matteo Dell'Amico
-
Patent number: 10169584Abstract: The disclosed computer-implemented method for identifying non-malicious files on computing devices within organizations may include (1) identifying a file on at least one computing device within multiple computing devices managed by an organization, (2) identifying a source of the file based on examining a relationship between the file and the organization, (3) determining that the source of the file is trusted within the organization, and then (4) concluding, based on the source of the file being trusted within the organization, that the file is not malicious. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: June 25, 2015Date of Patent: January 1, 2019Assignee: Symantec CorporationInventors: Kevin Roundy, Sandeep Bhatkar, Aleatha Parker-Wood, Yin Liu, Anand Kashyap, Leylya Yumer, Christopher Gates
-
Patent number: 10116680Abstract: The disclosed computer-implemented method for evaluating infection risks based on profiled user behaviors may include (1) collecting user-behavior profiles that may include labeled profiles (e.g., infected profiles and/or clean profiles) and/or unlabeled profiles, (2) training a classification model to distinguish infected profiles from clean profiles using features and labels of the user-behavior profiles, and (3) using the classification model to predict (a) a likelihood that a computing system of a user will become infected based on a profile of user behaviors of the user and/or (b) a likelihood that a user behavior in the user-behavior profiles will result in a computing-system infection. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: June 21, 2016Date of Patent: October 30, 2018Assignee: Symantec CorporationInventors: Yufei Han, Leylya Yumer, Pierre-Antoine Vervier, Matteo Dell'Amico