Patents by Inventor Matteo Dell'Amico

Matteo Dell'Amico has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11438378
    Abstract: The disclosed computer-implemented method for protecting against password attacks by concealing the use of honeywords in password files may include (i) receiving a login request comprising a candidate password for a user, (ii) authenticating the login request by determining whether a hash of a true password for the user stored in a honeyserver matches a hash of the candidate password, (iii) determining whether the candidate password has matches a hash of a honeyword stored in a password file when the true password hash fails to match the candidate password hash, (iv) classifying the password file as being potentially compromised when the candidate password hash matches the honeyword hash stored in the password file, and (v) performing a security action that protects against a password attack utilizing the potentially compromised password file. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: December 18, 2019
    Date of Patent: September 6, 2022
    Assignee: NortonLifeLock Inc.
    Inventor: Matteo Dell'Amico
  • Patent number: 11163875
    Abstract: The present disclosure relates to using correlations between support interaction data and telemetry data to discover emerging incidents for remediation. One example method generally includes receiving a corpus of support interaction data and a corpus of telemetry data. Topics indicative of underlying problems experienced by users of an application are extracted from the corpus of support interaction data. A topic having a rate of appearance in the support interaction data above a threshold value is identified. A set of telemetry data relevant to the topic is extracted from the corpus of telemetry data, and a subset of the relevant set of telemetry data having a frequency in the relevant set of telemetry data above a second threshold value is identified. The topic and the subset of telemetry data are correlated to an incident to be remediated, and one or more actions are taken to remedy the incident.
    Type: Grant
    Filed: March 22, 2019
    Date of Patent: November 2, 2021
    Assignee: CA, INC.
    Inventors: Kevin A. Roundy, Mahmood Sharif, Matteo Dell'Amico, Christopher Gates, Daniel Kats, Dong Chung
  • Patent number: 11140196
    Abstract: Malware fingerprinting on encrypted Transport Layer Security (TLS) traffic. A method may include obtaining, by the computing device, input data of a TLS communication between a client device and a server device; extracting, by the computing device, features associated with the TLS communication; determining, by the computing device, an association between the TLS communication and a known malware family by applying a clustering algorithm to the extracted features; analyzing, by the computing device, at least one cluster determined by applying the clustering algorithm to determine a purity level; assigning, by the computing device, a malware family fingerprint to the TLS communication based on the purity level; applying, by the computing device, the malware family fingerprint to a backend of a network to determine a probability of an attack; and initiating, by the computing device, a security action based on the probability of the attack.
    Type: Grant
    Filed: March 27, 2019
    Date of Patent: October 5, 2021
    Assignee: NORTONLIFELOCK INC.
    Inventors: Leyla Bilge, Matteo Dell'Amico
  • Patent number: 11075951
    Abstract: A method for learning queries in automated incident remediation is performed by one or more computing devices, each comprising one or more processors. The method includes parsing at least a portion of incidents from an incident log based at least in part on one or more incident types associated with each incident from the portion of the incidents, identifying parameters associated with a plurality of queries, grouping the plurality of queries into a plurality of query groups based at least in part on the identified parameters, identifying a new incident added to the incident log, and generating an automated query based at least in part on a similarity between the new incident and a prior incident.
    Type: Grant
    Filed: June 29, 2018
    Date of Patent: July 27, 2021
    Assignee: NortonLifeLock Inc.
    Inventors: Daniel Kats, Brian Schlatter, Michael Hart, Steven Meckl, Jung Hui Yoon, Matteo Dell'Amico
  • Patent number: 10877946
    Abstract: A computer system stores incident records in a database. When a user wants to resolve a particular current incident, the computer system will access the current incident record from an incident queue. The computer system also identifies historical incident records that share one or more attributes with the current incident record. The computer system creates a plurality of clusters from the current incident record and the selected historical incident records. The clusters are then arranged into a hierarchical tree. This hierarchical tree is presented in a graphical user interface. A user can select a node to access additional information for that node. The computer system generates a first suggested response to a particular current incident based on the incident records included in the selected node. The computer system presents the first suggested response to the particular current incident in a graphical user interface.
    Type: Grant
    Filed: May 31, 2017
    Date of Patent: December 29, 2020
    Assignee: NortonLifeLock Inc.
    Inventors: David Silva, Matteo Dell'Amico, Kevin Alejandro Roundy, Michael Hart, Christopher Gates
  • Patent number: 10721264
    Abstract: The disclosed computer-implemented method for categorizing security incidents may include (i) generating, within a training dataset, a feature vector for each of a group of security incidents, the feature vector including features that describe the security incidents and the features including categories that were previously assigned to the security incidents as labels to describe the security incidents, (ii) training a supervised machine learning function on the training dataset such that the supervised machine learning function learns how to predict an assignment of future categories to future security incidents, (iii) assigning a category to a new security incident by applying the supervised machine learning function to a new feature vector that describes the new security incident, and (iv) notifying a client of the new security incident and the category assigned to the new security incident. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: February 27, 2019
    Date of Patent: July 21, 2020
    Assignee: NortonLifeLock Inc.
    Inventors: Matteo Dell'Amico, Chris Gates, Michael Hart, Kevin Roundy
  • Patent number: 10574700
    Abstract: A computer-implemented method for managing computer security of client computing machines may include (i) monitoring a set of client computing devices, (ii) receiving security data on sets of security-related events from each client computing device in the set of client computing devices, (iii) clustering the sets of security-related events by calculating a dissimilarity value, for each set of security-related events, that indicates a uniqueness of the set of security-related events in relation to other sets of security-related events using a dissimilarity function and adjusting the dissimilarity function based on a homogeneity of clusters of sets of security-related events, (iv) determining, based on clustering the sets of security-related events by the dissimilarity value, that a set of security-related events comprises an anomaly, and (v) performing a security action in response to determining that the set of security-related events comprises the anomaly.
    Type: Grant
    Filed: September 30, 2016
    Date of Patent: February 25, 2020
    Assignee: Symantec Corporation
    Inventors: Matteo Dell'Amico, Kevin Roundy, Chris Gates, Michael Hart
  • Patent number: 10547633
    Abstract: The disclosed computer-implemented method for mapping services utilized by network domains may include (i) receiving a request to perform a risk assessment on a domain, (ii) querying a database for records associated with the domain, where each record links to a network resource that enables functionality of the domain, (iii) generating a service map that matches each network resource to a corresponding service type and service provider, (v) performing the risk assessment of the domain, and (vi) facilitating a security measure for the domain based on a result of the risk assessment. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: November 7, 2017
    Date of Patent: January 28, 2020
    Assignee: Symantec Corporation
    Inventors: Matteo Dell'Amico, Pierre-Antoine Vervier, Leylya Yumer
  • Patent number: 10516680
    Abstract: A computer-implemented method for assessing cyber risks using incident-origin information may include (1) receiving a request for a cyber-risk assessment of an entity of interest, (2) using an Internet-address data source that maps identifiers of entities to public Internet addresses of the entities to translate an identifier of the entity into a set of Internet addresses of the entity, (3) using an incident-origin data source that maps externally-detected security incidents to public Internet addresses from which the security incidents originated to translate the set of Internet addresses into a set of security incidents that originated from the entity, and (4) using the set of security incidents to generate the cyber-risk assessment of the entity. Various other methods, systems, and computer-readable media may have similar features.
    Type: Grant
    Filed: June 22, 2016
    Date of Patent: December 24, 2019
    Assignee: NortonLifeLock Inc.
    Inventors: Pierre-Antoine Vervier, Leylya Bilge, Yufei Han, Matteo Dell'Amico
  • Patent number: 10367845
    Abstract: The disclosed computer-implemented method for evaluating infection risks based on profiled user behaviors may include (1) collecting user-behavior profiles that may include labeled profiles (e.g., infected profiles and/or clean profiles) and/or unlabeled profiles, (2) training a classification model to distinguish infected profiles from clean profiles using features and labels of the user-behavior profiles, and (3) using the classification model to predict (a) a likelihood that a computing system of a user will become infected based on a profile of user behaviors of the user and/or (b) a likelihood that a user behavior in the user-behavior profiles will result in a computing-system infection. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: August 30, 2018
    Date of Patent: July 30, 2019
    Assignee: Symantec Corporation
    Inventors: Yufei Han, Leylya Yumer, Pierre-Antoine Vervier, Matteo Dell'Amico
  • Patent number: 10341377
    Abstract: The disclosed computer-implemented method for categorizing security incidents may include (i) generating, within a training dataset, a feature vector for each of a group of security incidents, the feature vector including features that describe the security incidents and the features including categories that were previously assigned to the security incidents as labels to describe the security incidents, (ii) training a supervised machine learning function on the training dataset such that the supervised machine learning function learns how to predict an assignment of future categories to future security incidents, (iii) assigning a category to a new security incident by applying the supervised machine learning function to a new feature vector that describes the new security incident, and (iv) notifying a client of the new security incident and the category assigned to the new security incident. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: October 13, 2016
    Date of Patent: July 2, 2019
    Assignee: Symantec Corporation
    Inventors: Matteo Dell'Amico, Chris Gates, Michael Hart, Kevin Roundy
  • Patent number: 10242187
    Abstract: The disclosed computer-implemented method for providing integrated security management may include (1) identifying a computing environment protected by security systems and monitored by a security management system that receives event signatures from the security systems, where a first security system uses a first event signature naming scheme that differs from a second event signature naming scheme used by a second security system, (2) observing a first event signature that originates from the first security system and uses the first event signature naming scheme, (3) determine that the first event signature is equivalent to a second event signature that uses the second event signature naming scheme, and (4) performing, in connection with observing the first event signature, a security action associated with the second event signature and directed to the computing environment. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: September 14, 2016
    Date of Patent: March 26, 2019
    Assignee: Symantec Corporation
    Inventors: Kevin Roundy, Matteo Dell'Amico, Chris Gates, Michael Hart, Stanislav Miskovic
  • Patent number: 10116680
    Abstract: The disclosed computer-implemented method for evaluating infection risks based on profiled user behaviors may include (1) collecting user-behavior profiles that may include labeled profiles (e.g., infected profiles and/or clean profiles) and/or unlabeled profiles, (2) training a classification model to distinguish infected profiles from clean profiles using features and labels of the user-behavior profiles, and (3) using the classification model to predict (a) a likelihood that a computing system of a user will become infected based on a profile of user behaviors of the user and/or (b) a likelihood that a user behavior in the user-behavior profiles will result in a computing-system infection. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: June 21, 2016
    Date of Patent: October 30, 2018
    Assignee: Symantec Corporation
    Inventors: Yufei Han, Leylya Yumer, Pierre-Antoine Vervier, Matteo Dell'Amico