Patents by Inventor Ryan C. Salsamendi
Ryan C. Salsamendi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11036859Abstract: Generating a set of attempted external contacts associated with a malware sample is disclosed. A malware sample is executed in an accelerated computing environment. In the accelerated computing environment, a guest time is advanced more quickly than a time by which a host time is advanced. A set of one or more attempted external contacts generated by the executing malware sample is recorded. The set of attempted external contacts includes at least one generated domain name. A remedial action is taken with respect to the generated domain name.Type: GrantFiled: March 10, 2020Date of Patent: June 15, 2021Assignee: Palo Alto Networks, Inc.Inventors: Ryan C. Salsamendi, Robert A. Seger
-
Patent number: 10846404Abstract: Generating a set of attempted external contacts associated with a malware sample is disclosed. A malware sample is executed, in an accelerated computing environment. In the accelerated computing environment, a guest time is advanced more quickly than a time by which a host time is advanced. A set of one or more attempted external contacts generated by the executing malware sample is recorded. The set of attempted external contacts is provided as output.Type: GrantFiled: July 20, 2017Date of Patent: November 24, 2020Assignee: Palo Alto Networks, Inc.Inventors: Ryan C. Salsamendi, Robert A. Seger
-
Publication number: 20200210581Abstract: Generating a set of attempted external contacts associated with a malware sample is disclosed. A malware sample is executed in an accelerated computing environment. In the accelerated computing environment, a guest time is advanced more quickly than a time by which a host time is advanced. A set of one or more attempted external contacts generated by the executing malware sample is recorded. The set of attempted external contacts includes at least one generated domain name. A remedial action is taken with respect to the generated domain name.Type: ApplicationFiled: March 10, 2020Publication date: July 2, 2020Inventors: Ryan C. Salsamendi, Robert A. Seger
-
Patent number: 10505975Abstract: Techniques for automatic repair of corrupt files (e.g., malware sample files) for a detonation engine are disclosed. In some embodiments, a system, process, and/or computer program for automatic repair of corrupt files for a detonation engine includes receiving a malware sample from a network device; determining whether the malware sample includes a corrupt file; and in an event that the malware sample is determined to include the corrupt file, repairing the corrupt file for the detonation engine.Type: GrantFiled: July 18, 2017Date of Patent: December 10, 2019Assignee: Palo Alto Networks, Inc.Inventor: Ryan C. Salsamendi
-
Patent number: 10152597Abstract: Detecting duplicate malware samples is disclosed. A first guest clock is set to a first value in a first virtual machine instance. A first malware sample is executed in the first virtual machine instance. A second guest clock value is set to the first value in a second virtual machine instance. A second malware sample is executed in the second virtual machine instance. A determination is made as to whether the first malware sample and the second malware sample are the same, based at least in part on performing a comparison of attempted external contacts generated by executing each of the respective first and second malware samples.Type: GrantFiled: November 28, 2016Date of Patent: December 11, 2018Assignee: Palo Alto Networks, Inc.Inventors: Ryan C. Salsamendi, Wei Xu
-
Publication number: 20180048659Abstract: Techniques for automatic repair of corrupt files (e.g., malware sample files) for a detonation engine are disclosed. In some embodiments, a system, process, and/or computer program for automatic repair of corrupt files for a detonation engine includes receiving a malware sample from a network device; determining whether the malware sample includes a corrupt file; and in an event that the malware sample is determined to include the corrupt file, repairing the corrupt file for the detonation engine.Type: ApplicationFiled: July 18, 2017Publication date: February 15, 2018Inventor: Ryan C. Salsamendi
-
Patent number: 9805193Abstract: Generating a set of attempted external contacts associated with a malware sample is disclosed. A malware sample is executed, in an accelerated computing environment. In the accelerated computing environment, a guest time is advanced more quickly than a time by which a host time is advanced. A set of one or more attempted external contacts generated by the executing malware sample is recorded. The set of attempted external contacts is provided as output.Type: GrantFiled: December 18, 2014Date of Patent: October 31, 2017Assignee: Palo Alto Networks, Inc.Inventors: Ryan C. Salsamendi, Robert A. Seger
-
Patent number: 9742796Abstract: Techniques for automatic repair of corrupt files (e.g., malware sample files) for a detonation engine are disclosed. In some embodiments, a system, process, and/or computer program for automatic repair of corrupt files for a detonation engine includes receiving a malware sample from a network device; determining whether the malware sample includes a corrupt file; and in an event that the malware sample is determined to include the corrupt file, repairing the corrupt file for the detonation engine.Type: GrantFiled: September 18, 2015Date of Patent: August 22, 2017Assignee: Palo Alto Networks, Inc.Inventor: Ryan C. Salsamendi
-
Patent number: 9542554Abstract: Detecting duplicate malware samples is disclosed. A first guest clock is set to a first value in a first virtual machine instance. A first malware sample is executed in the first virtual machine instance. A second guest clock value is set to the first value in a second virtual machine instance. A second malware sample is executed in the second virtual machine instance. A determination is made as to whether the first malware sample and the second malware sample are the same, based at least in part on performing a comparison of attempted external contacts generated by executing each of the respective first and second malware samples.Type: GrantFiled: December 18, 2014Date of Patent: January 10, 2017Assignee: Palo Alto Networks, Inc.Inventors: Ryan C. Salsamendi, Wei Xu
-
Patent number: 9292417Abstract: Methods and systems allow the use of hypervisors to use software breakpoints in the same manner as hardware breakpoints. A program to be tested is executed by a hypervisor running a virtual machine. A memory page containing the location of a breakpoint is copied to a temporary memory page. Then a new page is written containing breakpoint instructions at specified memory locations. The new page is tagged as execute only, so the program to be tested is unaware of any changes to the program. If the program attempts to read from the changed memory page, it will read from the temporary memory page instead. Such a method can be used to search websites for malware in relative safety because of the inability of the malware to write to memory locations that are located on a page that is execute only.Type: GrantFiled: August 7, 2013Date of Patent: March 22, 2016Assignee: Raytheon Cyber Products, LLCInventor: Ryan C. Salsamendi
-
Patent number: 9146767Abstract: This disclosure addresses systems and methods for the protection of hardware and software in a computing environment. A hypervisor-monitor may be nested between the hardware of a host system and a hypervisor that is capable of supporting one or more guest virtual machines. The hypervisor-monitor may intercept exceptions generated by one or more processors in the host system and inspect software instructions for the hypervisor and the guests. Inspection may include performing a hash of the software instructions and a comparison of the hash with authorized software modules or a set of known malware. In this manner the hypervisor-monitor may monitor prevent the execution of malware by the hypervisor or the guests or provide a record of when code of an unknown origin was executed.Type: GrantFiled: February 19, 2013Date of Patent: September 29, 2015Assignee: Raytheon CompanyInventors: Ryan C. Salsamendi, Michael J. Simms, John R. Wagner
-
Publication number: 20150046908Abstract: Methods and systems allow the use of hypervisors to use software breakpoints in the same manner as hardware breakpoints. A program to be tested is executed by a hypervisor running a virtual machine. A memory page containing the location of a breakpoint is copied to a temporary memory page. Then a new page is written containing breakpoint instructions at specified memory locations. The new page is tagged as execute only, so the program to be tested is unaware of any changes to the program. If the program attempts to read from the changed memory page, it will read from the temporary memory page instead. Such a method can be used to search websites for malware in relative safety because of the inability of the malware to write to memory locations that are located on a page that is execute only.Type: ApplicationFiled: August 7, 2013Publication date: February 12, 2015Applicant: Raytheon CompanyInventor: Ryan C. Salsamendi
-
Publication number: 20140068601Abstract: Embodiments of a system and method for live computer forensics are generally described herein. The system can include a first hypervisor configured to halt a computer system, the computer system including a central processing unit, a drive, a volatile memory, and a non-volatile memory. The first hypervisor can be configured to collect data representative of the state of the computer system at the time the computer system was halted. The data representative of the state of the computer system can include the contents of the volatile and non-volatile memory at the time the computer system was halted, wherein at least a portion of the collected data is representative of the state of the central processing unit and the contents of the drive, at the time the computer system was halted.Type: ApplicationFiled: August 30, 2012Publication date: March 6, 2014Applicant: Raytheon CompanyInventors: Michael J. Simms, Ryan C. Salsamendi, John R. Wagner
-
Publication number: 20130340077Abstract: This disclosure addresses systems and methods for the protection of hardware and software in a computing environment. A hypervisor-monitor may be nested between the hardware of a host system and a hypervisor that is capable of supporting one or more guest virtual machines. The hypervisor-monitor may intercept exceptions generated by one or more processors in the host system and inspect software instructions for the hypervisor and the guests. Inspection may include performing a hash of the software instructions and a comparison of the hash with authorized software modules or a set of known malware. In this manner the hypervisor-monitor may monitor prevent the execution of malware by the hypervisor or the guests or provide a record of when code of an unknown origin was executed.Type: ApplicationFiled: February 19, 2013Publication date: December 19, 2013Applicant: Raytheon CompanyInventors: Ryan C. Salsamendi, Michael J. Simms, John R. Wagner