Patents by Inventor Rachit Mathur
Rachit Mathur has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11677835Abstract: Techniques for reducing network bandwidth for remote content display include storing, in a buffer, by a first client device of a plurality of client devices participating in a co-editing session, a plurality of cursor coordinates of a cursor displayed on a display of the first client device. The plurality of cursor coordinates are stored in the buffer during a throttle time period. Responsive to a determination that the throttle time period has elapsed, the first client device obtains from the buffer and transmits the plurality of cursor coordinates in a data packet. Receipt of the plurality of cursor coordinates enables a representation of the cursor to be displayed on displays of each of the plurality of client devices other than the first client device based at least in part on the plurality of cursor coordinates.Type: GrantFiled: October 25, 2021Date of Patent: June 13, 2023Assignee: Adobe Inc.Inventors: Rachit Mathur, Himanshu Kumar, Amit Aggarwal
-
Publication number: 20230127334Abstract: Techniques for reducing network bandwidth for remote content display include storing, in a buffer, by a first client device of a plurality of client devices participating in a co-editing session, a plurality of cursor coordinates of a cursor displayed on a display of the first client device. The plurality of cursor coordinates are stored in the buffer during a throttle time period. Responsive to a determination that the throttle time period has elapsed, the first client device obtains from the buffer and transmits the plurality of cursor coordinates in a data packet. Receipt of the plurality of cursor coordinates enables a representation of the cursor to be displayed on displays of each of the plurality of client devices other than the first client device based at least in part on the plurality of cursor coordinates.Type: ApplicationFiled: October 25, 2021Publication date: April 27, 2023Inventors: Rachit Mathur, Himanshu Kumar, Amit Aggarwal
-
Patent number: 11258813Abstract: Apparatus, systems, methods, and articles of manufacture for fingerprinting and classifying application behaviors using telemetry are disclosed. An example apparatus includes a trace processor to process events in a processor trace to capture application execution behavior; a fingerprint extractor to extract a first fingerprint from the captured application execution behavior and performance monitor information; a fingerprint clusterer to, in a training mode cluster the first fingerprint and the second fingerprint into a cluster of fingerprints to be stored in a fingerprint database with a classification; and a fingerprint classifier to, in a deployed mode, classify a third fingerprint, the fingerprint classifier to trigger a remedial action when the classification is malicious.Type: GrantFiled: June 27, 2019Date of Patent: February 22, 2022Assignee: Intel CorporationInventors: Justin Gottschlich, Rachit Mathur, Zheng Zhang
-
Patent number: 10466970Abstract: Various embodiments of systems and methods are described herein for executing software programs deployed in a distributed network. The enterprise application specific to a geographical jurisdiction may request for the software programs deployed in the distributed network to execute a specific business process. The enterprise application sends a service request to the distributed network for completion of a business process specific to the given jurisdiction. An application executing in the distributed network receives such service requests from multiple enterprise applications. The application retrieves the appropriate software program(s) deployed in the distributed network and generates the localization software program based on the received service request. Execution of the localization software program facilitates completion of the requested business process by generating reports specific to the given jurisdiction.Type: GrantFiled: December 2, 2015Date of Patent: November 5, 2019Assignee: SAP SEInventors: Arun Subramanian, Praveenkumar Arangotte Kozhisseri, Rachit Mathur
-
Publication number: 20190319977Abstract: Apparatus, systems, methods, and articles of manufacture for fingerprinting and classifying application behaviors using telemetry are disclosed. An example apparatus includes a trace processor to process events in a processor trace to capture application execution behavior; a fingerprint extractor to extract a first fingerprint from the captured application execution behavior and performance monitor information; a fingerprint clusterer to, in a training mode cluster the first fingerprint and the second fingerprint into a cluster of fingerprints to be stored in a fingerprint database with a classification; and a fingerprint classifier to, in a deployed mode, classify a third fingerprint, the fingerprint classifier to trigger a remedial action when the classification is malicious.Type: ApplicationFiled: June 27, 2019Publication date: October 17, 2019Inventors: Justin Gottschlich, Rachit Mathur, Zheng Zhang
-
Publication number: 20190318085Abstract: Methods, apparatus, systems and articles of manufacture are disclosed that analyze computer system attack mechanisms. An example apparatus includes a graph generator utilizing a natural language processing model to generate a graph based on a publication, an analyzer to: analyze two or more nodes in the graph by identifying respective attributes of the two or more nodes in the graph, and provide an indication of the two or more nodes that include similar respective attributes, a variation generator to generate an attack mechanism based on the indication, and a weight postulator to obtain the generated attack mechanism and, based on (A) the two or more nodes in the graph and (B) the generated attack mechanism, indicate a weight associated with a severity of the generated attack mechanism.Type: ApplicationFiled: June 27, 2019Publication date: October 17, 2019Inventors: Rachit Mathur, Brendan Traw, Justin Gottschlich
-
Patent number: 10204223Abstract: Systems and methods are provided in example embodiments for mitigating malicious calls. The system can be configured to receive a function call, determine the location of a memory page that initiated the function call, determine if the memory page is associated with a trusted module, and block the function call if the memory page is not associated with the trusted module. In addition, the system can determine the return address for the function call and block the function call if the return address does not belong to the trusted module. Further, the system can determine a parameter for the function call, determine if the parameter is a known parameter used by the process that called the function, and block the function call if the parameter is not the known parameter used by the process that called the function.Type: GrantFiled: September 18, 2017Date of Patent: February 12, 2019Assignee: McAfee, LLCInventors: Peter Szor, Rachit Mathur
-
Patent number: 9984230Abstract: Particular embodiments described herein provide for an electronic device that can be configured to execute an application in a system with an operating system, perform event tracing for the application, analyze each instruction pointer from the event tracing, and determine if an instruction pointer points to an orphan page of memory. The orphan page can be a region of code that is not associated with the application, a region of code that is unidentified, or unusual code that is not associated with the application. In addition, the event tracing can be an embedded application that is part of the operating system.Type: GrantFiled: June 26, 2015Date of Patent: May 29, 2018Assignee: McAfee, LLCInventors: Volodymyr Pikhur, Rachit Mathur
-
Publication number: 20180004951Abstract: Systems and methods are provided in example embodiments for mitigating malicious calls. The system can be configured to receive a function call, determine the location of a memory page that initiated the function call, determine if the memory page is associated with a trusted module, and block the function call if the memory page is not associated with the trusted module. In addition, the system can determine the return address for the function call and block the function call if the return address does not belong to the trusted module. Further, the system can determine a parameter for the function call, determine if the parameter is a known parameter used by the process that called the function, and block the function call if the parameter is not the known parameter used by the process that called the function.Type: ApplicationFiled: September 18, 2017Publication date: January 4, 2018Applicant: McAfee, Inc.Inventors: Peter Szor, Rachit Mathur
-
Patent number: 9767283Abstract: Systems and methods are provided in example embodiments for mitigating malicious calls. The system can be configured to receive a function call, determine the location of a memory page that initiated the function call, determine if the memory page is associated with a trusted module, and block the function call if the memory page is not associated with the trusted module. In addition, the system can determine the return address for the function call and block the function call if the return address does not belong to the trusted module. Further, the system can determine a parameter for the function call, determine if the parameter is a known parameter used by the process that called the function, and block the function call if the parameter is not the known parameter used by the process that called the function.Type: GrantFiled: June 27, 2014Date of Patent: September 19, 2017Assignee: McAfee, Inc.Inventors: Peter Szor, Rachit Mathur
-
Publication number: 20170109137Abstract: Various embodiments of systems and methods are described herein for executing software programs deployed in a distributed network. The enterprise application specific to a geographical jurisdiction may request for the software programs deployed in the distributed network to execute a specific business process. The enterprise application sends a service request to the distributed network for completion of a business process specific to the given jurisdiction. An application executing in the distributed network receives such service requests from multiple enterprise applications. The application retrieves the appropriate software program(s) deployed in the distributed network and generates the localization software program based on the received service request. Execution of the localization software program facilitates completion of the requested business process by generating reports specific to the given jurisdiction.Type: ApplicationFiled: December 2, 2015Publication date: April 20, 2017Inventors: ARUN SUBRAMANIAN, PRAVEENKUMAR ARANGOTTE KOZHISSERI, RACHIT MATHUR
-
Publication number: 20160378975Abstract: Particular embodiments described herein provide for an electronic device that can be configured to execute an application in a system with an operating system, perform event tracing for the application, analyze each instruction pointer from the event tracing, and determine if an instruction pointer points to an orphan page of memory. The orphan page can be a region of code that is not associated with the application, a region of code that is unidentified, or unusual code that is not associated with the application. In addition, the event tracing can be an embedded application that is part of the operating system.Type: ApplicationFiled: June 26, 2015Publication date: December 29, 2016Applicant: MCAFEE, INC.Inventors: Volodymyr Pikhur, Rachit Mathur
-
Patent number: 9438620Abstract: A software sample is identified that includes code and a control flow graph is generated for each of a plurality of functions included in the sample. Features are identified in each of the functions that correspond to instances of a set of control flow fragment types. A feature set is generated for the sample from the identified features.Type: GrantFiled: October 22, 2013Date of Patent: September 6, 2016Assignee: McAfee, Inc.Inventors: Erdem Aktas, Rachit Mathur
-
Publication number: 20150379267Abstract: Systems and methods are provided in example embodiments for mitigating malicious calls. The system can be configured to receive a function call, determine the location of a memory page that initiated the function call, determine if the memory page is associated with a trusted module, and block the function call if the memory page is not associated with the trusted module. In addition, the system can determine the return address for the function call and block the function call if the return address does not belong to the trusted module. Further, the system can determine a parameter for the function call, determine if the parameter is a known parameter used by the process that called the function, and block the function call if the parameter is not the known parameter used by the process that called the function.Type: ApplicationFiled: June 27, 2014Publication date: December 31, 2015Inventors: Peter Szor, Rachit Mathur
-
Publication number: 20150180883Abstract: A software sample is identified that includes code and a control flow graph is generated for each of a plurality of functions included in the sample. Features are identified in each of the functions that correspond to instances of a set of control flow fragment types. A feature set is generated for the sample from the identified features.Type: ApplicationFiled: October 22, 2013Publication date: June 25, 2015Inventors: Erdem Aktas, Rachit Mathur
-
Patent number: 8732296Abstract: A system, method, and computer program product are provided for redirecting internet relay chat (IRC) traffic identified utilizing a port-independent algorithm and controlling IRC based malware. In use, IRC traffic communicated via a network is identified utilizing a port-independent algorithm. Furthermore, the IRC traffic is redirected to a honeypot.Type: GrantFiled: May 6, 2009Date of Patent: May 20, 2014Assignee: McAfee, Inc.Inventors: Vinoo Thomas, Nitin Jyoti, Cedric Cochin, Rachit Mathur
-
Publication number: 20130247182Abstract: A system, method, and computer program product are provided for detecting hidden or modified data objects. In use, a first set of data objects stored in a device is enumerated, where the enumeration of the first set of data objects is performed within an operating system of the device. Additionally, a second set of data objects stored in the device is enumerated, where the enumeration of the second set of data objects is performed outside of the operating system of the device. Further, the first set of data objects and the second set of data objects are compared for identifying hidden or modified data objects.Type: ApplicationFiled: April 21, 2009Publication date: September 19, 2013Inventors: Seagen James Levites, Rachit Mathur, Aditya Kapoor
-
Patent number: 8499352Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for detecting obfuscated malware.Type: GrantFiled: April 5, 2012Date of Patent: July 30, 2013Assignee: McAfee, Inc.Inventors: Rachit Mathur, Cedric Cochin
-
Patent number: 8370941Abstract: A rootkit scanning system, method, and computer program product are provided. In use, at least one hook is traversed. Further, code is identified based on the traversal of the at least one hook. In addition, the code is scanned for at least one rootkit.Type: GrantFiled: May 6, 2008Date of Patent: February 5, 2013Assignee: McAfee, Inc.Inventors: Khai N. Pham, Aditya Kapoor, Harinath V. Ramachetty, Rachit Mathur
-
Publication number: 20120198554Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for detecting obfuscated malware.Type: ApplicationFiled: April 5, 2012Publication date: August 2, 2012Applicant: MCAFEE, INC.Inventors: Rachit Mathur, Cedric Cochin