Patents by Inventor Reza Yoosoofmiya

Reza Yoosoofmiya has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11409869
    Abstract: Aspects of the present disclosure relate to threat detection of executable files. A plurality of static data points may be extracted from an executable file without decrypting or unpacking the executable file. The executable file may then be analyzed without decrypting or unpacking the executable file. Analysis of the executable file may comprise applying a classifier to the plurality of extracted static data points. The classifier may be trained from data comprising known malicious executable files, known benign executable files and known unwanted executable files. Based upon analysis of the executable file, a determination can be made as to whether the executable file is harmful.
    Type: Grant
    Filed: February 14, 2020
    Date of Patent: August 9, 2022
    Assignee: Webroot Inc.
    Inventors: Mauritius Schmidtler, Gaurav Dalal, Reza Yoosoofmiya
  • Publication number: 20220237293
    Abstract: Aspects of the present disclosure relate to threat detection of executable files. A plurality of static data points may be extracted from an executable file without decrypting or unpacking the executable file. The executable file may then be analyzed without decrypting or unpacking the executable file. Analysis of the executable file may comprise applying a classifier to the plurality of extracted static data points. The classifier may be trained from data comprising known malicious executable files, known benign executable files and known unwanted executable files. Based upon analysis of the executable file, a determination can be made as to whether the executable file is harmful.
    Type: Application
    Filed: April 19, 2022
    Publication date: July 28, 2022
    Inventors: Mauritius Schmidtler, Gaurav Dalal, Reza Yoosoofmiya
  • Publication number: 20200184073
    Abstract: Aspects of the present disclosure relate to threat detection of executable files. A plurality of static data points may be extracted from an executable file without decrypting or unpacking the executable file. The executable file may then be analyzed without decrypting or unpacking the executable file. Analysis of the executable file may comprise applying a classifier to the plurality of extracted static data points. The classifier may be trained from data comprising known malicious executable files, known benign executable files and known unwanted executable files. Based upon analysis of the executable file, a determination can be made as to whether the executable file is harmful.
    Type: Application
    Filed: February 14, 2020
    Publication date: June 11, 2020
    Inventors: Mauritius Schmidtler, Gaurav Dalal, Reza Yoosoofmiya
  • Patent number: 10599844
    Abstract: Aspects of the present disclosure relate to threat detection of executable files. A plurality of static data points may be extracted from an executable file without decrypting or unpacking the executable file. The executable file may then be analyzed without decrypting or unpacking the executable file. Analysis of the executable file may comprise applying a classifier to the plurality of extracted static data points. The classifier may be trained from data comprising known malicious executable files, known benign executable files and known unwanted executable files. Based upon analysis of the executable file, a determination can be made as to whether the executable file is harmful.
    Type: Grant
    Filed: May 12, 2015
    Date of Patent: March 24, 2020
    Assignee: Webroot, Inc.
    Inventors: Mauritius Schmidtler, Gaurav Dalal, Reza Yoosoofmiya
  • Publication number: 20160335435
    Abstract: Aspects of the present disclosure relate to threat detection of executable files. A plurality of static data points may be extracted from an executable file without decrypting or unpacking the executable file. The executable file may then be analyzed without decrypting or unpacking the executable file. Analysis of the executable file may comprise applying a classifier to the plurality of extracted static data points. The classifier may be trained from data comprising known malicious executable files, known benign executable files and known unwanted executable files. Based upon analysis of the executable file, a determination can be made as to whether the executable file is harmful.
    Type: Application
    Filed: May 12, 2015
    Publication date: November 17, 2016
    Inventors: Mauritius Schmidtler, Gaurav Dalal, Reza Yoosoofmiya