Patents by Inventor Paolo Milani Comparetti

Paolo Milani Comparetti has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9361459
    Abstract: The present disclosure is directed to methods and systems for malware detection based on environment-dependent behavior. Generally, an analysis environment is used to determine how input collected from an execution environment is used by suspicious software. The methods and systems described identify use of environmental information to decide between execution paths leading to malicious behavior or benign activity. In one aspect, one embodiment of the invention relates to a method comprising monitoring execution of suspect computer instructions; recognizing access by the instructions of an item of environmental information; identifying a plurality of execution paths in the instructions dependant on a branch in the instructions based on a value of the accessed item of environmental information; and determining that a first execution path results in benign behavior and that a second execution path results in malicious behavior.
    Type: Grant
    Filed: April 19, 2013
    Date of Patent: June 7, 2016
    Assignee: LASTLINE, INC.
    Inventors: Clemens Kolbitsch, Paolo Milani Comparetti, Ludovico Cavedon
  • Patent number: 8910285
    Abstract: The present disclosure is directed to methods and systems for reciprocal generation of watch-lists and traffic models characteristic of malicious network activity. In some aspects, the described methods and systems relate to maintaining data for recognition of malicious network activity. In general, the methods include monitoring network traffic; comparing endpoint data from monitored data packets to endpoints in a watch-list of network endpoints and comparing packet data from monitored data packets to traffic models in a catalog of traffic models characterizing malicious network activity; and determining, based on the comparisons, that a set of data packets comprise suspect network activity. The methods include adding a network endpoint to the watch-list when the determination is based on comparing packet data to a traffic model or adding a traffic model to the catalog when the determination is based on comparing endpoint data.
    Type: Grant
    Filed: April 19, 2013
    Date of Patent: December 9, 2014
    Assignee: Lastline, Inc.
    Inventors: Clemens Kolbitsch, Paolo Milani Comparetti, Ludovico Cavedon
  • Publication number: 20140317735
    Abstract: The present disclosure is directed to methods and systems for reciprocal generation of watch-lists and traffic models characteristic of malicious network activity. In some aspects, the described methods and systems relate to maintaining data for recognition of malicious network activity. In general, the methods include monitoring network traffic; comparing endpoint data from monitored data packets to endpoints in a watch-list of network endpoints and comparing packet data from monitored data packets to traffic models in a catalog of traffic models characterizing malicious network activity; and determining, based on the comparisons, that a set of data packets comprise suspect network activity. The methods include adding a network endpoint to the watch-list when the determination is based on comparing packet data to a traffic model or adding a traffic model to the catalog when the determination is based on comparing endpoint data.
    Type: Application
    Filed: April 19, 2013
    Publication date: October 23, 2014
    Applicant: LASTLINE, INC.
    Inventors: Clemens Kolbitsch, Paolo Milani Comparetti, Ludovico Cavedon
  • Patent number: 8042182
    Abstract: A system for providing intrusion detection in a network wherein data flows are exchanged using associated network ports and application layer protocols. The system includes a monitoring module configured for monitoring data flows in the network, a protocol identification engine configured for detecting information on the application layer protocols involved in the monitored data flows, and an intrusion detection module configured for operating based on the information on application layer protocols detected. Intrusion detection is thus provided independently of any predefined association between the network ports and the application layer protocols.
    Type: Grant
    Filed: March 30, 2004
    Date of Patent: October 18, 2011
    Assignee: Telecom Italia S.p.A.
    Inventors: Paolo Milani Comparetti, Paolo Abeni
  • Publication number: 20090217369
    Abstract: Packet flows are processed, e.g. to perform an intrusion detection function in a communication network, by means of a multiprocessor system including a plurality of processing units. The packets are distributed for processing among the processing units via a distribution function. Such a distribution function is selectively allotted to one of the processing units of the plurality. A preferred embodiment of the arrangement involves using a single Symmetric Multi-Processor machine with a single network port to Gigabit/sec link. The corresponding system architecture does not require any intermediate device, or any external load balancing mechanism. All the processing work is performed on a single system, which is able to dynamically balance the traffic load among the several independent CPUs. By resorting to a specific scheduling arrangement, such a system is able to effectively distribute the computations required to perform both the loadbalancing and the detection operations.
    Type: Application
    Filed: May 4, 2005
    Publication date: August 27, 2009
    Applicant: TELECOM ITALIA S.P.A.
    Inventors: Paolo Abeni, Paolo Milani Comparetti, Sebastiano Di Paola, Gerardo Lamastra
  • Publication number: 20070214504
    Abstract: A system for providing intrusion detection in a network wherein data flows are exchanged using associated network ports and application layer protocols. The system includes a monitoring module configured for monitoring data flows in the network, a protocol identification engine configured for detecting information on the application layer protocols involved in the monitored data flows, and an intrusion detection module configured for operating based on the information on application layer protocols detected. Intrusion detection is thus provided independently of any predefined association between the network ports and the application layer protocols.
    Type: Application
    Filed: March 30, 2004
    Publication date: September 13, 2007
    Inventors: Paolo Milani Comparetti, Paolo Abeni