Patents by Inventor Sandor Lukacs
Sandor Lukacs has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9202046Abstract: Described systems and methods allow protecting a host system, such as a computer system or smartphone, from malware such as viruses, exploits, and rootkits. In some embodiments, a hypervisor executes at the highest processor privilege level and displaces other software to a guest virtual machine (VM). A security application detects the launch of a target process within the guest VM. In response to the launch, the hypervisor instantiates a process VM isolated from the guest VM, and relocates the target process to the process VM. In some embodiments, when the relocated target process attempts to access a resource, such as a file or registry key, an instance of the respective resource is fetched on-demand, from the guest VM to the respective process VM. Executing the target process within an isolated environment helps to contain malware to the respective environment.Type: GrantFiled: March 3, 2014Date of Patent: December 1, 2015Assignee: Bitdefender IPR Management Ltd.Inventors: Bogdan C. Dumitru, Sandor Lukacs, Dan H. Lutas, Raul V. Tosa
-
Publication number: 20150339480Abstract: Described systems and methods allow protecting a host computer system from malware, such as return-oriented programming (ROP) and jump-oriented programming (JOP) exploits. In some embodiments, a processor of the host system is endowed with two counters configured to store a count of branch instructions and a count of inter-branch instructions, respectively, occurring within a stream of instructions fetched by the processor for execution. Exemplary counted branch instructions include indirect JMP, indirect CALL, and RET on x86 platforms, while inter-branch instructions consist of instructions executed between two consecutive counted branch instructions. The processor may be further configured to generate a processor event, such as an exception, when a value stored in a counter exceeds a predetermined threshold. Such events may be used as triggers for launching a malware analysis to determine whether the host system is subject to a code reuse attack.Type: ApplicationFiled: May 21, 2014Publication date: November 26, 2015Inventors: Andrei V. LUTAS, Sandor LUKACS
-
Publication number: 20150288659Abstract: Described systems and methods allow malware-protecting a client system (e.g., computer system, smartphone, etc.) connected to a network. In some embodiments, a network appliance transmits a boot image over the network, on demand, to the client system. The boot image may install a hypervisor, which may further load a local OS and applications into a virtual machine. The client system performs a mutual integrity attestation transaction with the network appliance over the network, wherein each side of the transaction verifies the integrity of software objects executing on the other side. When the network appliance determines that the client system is not in a trusted state, the network appliance may block access of the client system to the network. When the client system determines that the network appliance is not in a trusted state, the client system may block communications between the client system and the network appliance.Type: ApplicationFiled: April 3, 2014Publication date: October 8, 2015Inventors: Sandor LUKACS, Adrian V. COLESA, Dan H. LUTAS
-
Publication number: 20150271139Abstract: Described systems and methods allow protecting a client system, such as a computer system or smartphone, from malware. In some embodiments, a network regulator device is used to distribute a bootable image of a hypervisor, on demand, to each of a set of client systems connected to a network. After booting on a client system, the hypervisor loads the local OS and applications into a virtual machine. Integrity measurements of the hypervisor and/or OS are sent to the network regulator for verification. When the network regulator determines that software executing on a client system, such as the hypervisor and/or the OS, are not in a trusted state, the network regulator may block access of the respective client system to the network.Type: ApplicationFiled: March 20, 2014Publication date: September 24, 2015Inventors: Sandor LUKACS, Adrian V. COLESA
-
Publication number: 20150248554Abstract: Described systems and methods allow protecting a host system, such as a computer system or smartphone, from malware such as viruses, exploits, and rootkits. In some embodiments, a hypervisor executes at the highest processor privilege level and displaces other software to a guest virtual machine (VM). A security application detects the launch of a target process within the guest VM. In response to the launch, the hypervisor instantiates a process VM isolated from the guest VM, and relocates the target process to the process VM. In some embodiments, when the relocated target process attempts to access a resource, such as a file or registry key, an instance of the respective resource is fetched on-demand, from the guest VM to the respective process VM. Executing the target process within an isolated environment helps to contain malware to the respective environment.Type: ApplicationFiled: March 3, 2014Publication date: September 3, 2015Inventors: Bogdan C. DUMITRU, Sandor LUKACS, Dan H. LUTAS, Raul V. TOSA
-
Patent number: 9117081Abstract: Described systems and methods allow protecting a host system, such as a computer or smartphone, from malware. In some embodiments, an anti-malware application installs a hypervisor, which displaces an operating system executing on the host system to a guest virtual machine (VM). The hypervisor further creates a set of virtual containers (VC), by setting up a memory domain for each VC, isolated from the memory domain of the guest VM. The hypervisor then maps a memory image of a malware scanner to each VC. When a target object is selected for scanning, the anti-malware application launches the malware scanner. Upon intercepting the launch, the hypervisor switches the memory context of the malware scanner to the memory domain of a selected VC, for the duration of the scan. Thus, malware scanning is performed within an isolated environment.Type: GrantFiled: December 20, 2013Date of Patent: August 25, 2015Assignee: Bitdefender IPR Management Ltd.Inventors: Sandor Lukacs, Cristian B. Sirb, Dan H. Lutas, Adrian V. Colesa
-
Patent number: 9117080Abstract: Described systems and methods allow protecting a computer system from malware, such as viruses and rootkits. An anti-malware component executes within a virtual machine (VM) exposed by a hypervisor executing on the computer system. A memory introspection engine executes outside the virtual machine, at the processor privilege level of the hypervisor, and protects a process executing within the virtual machine by write-protecting a memory page of the respective process. By combining anti-malware components executing inside and outside the respective VM, some embodiments of the present invention may use the abundance of behavioral data that inside-VM components have access to, while protecting the integrity of such components from outside the respective VM.Type: GrantFiled: July 5, 2013Date of Patent: August 25, 2015Assignee: Bitdefender IPR Management Ltd.Inventors: Sandor Lukacs, Raul V. Tosa, Paul Boca, Gheorghe Hajmasan, Andrei V. Lutas
-
Publication number: 20150199514Abstract: Described systems and methods enable a host system to efficiently perform computer security activities, when operating in a hardware virtualization configuration. A hypervisor exposes a virtual machine on the host system. In some embodiments, the hypervisor further configures a processor of the host system to generate a virtualization exception in response to detecting a memory access violation, and to deliver such exceptions to a computer security program operating within the virtual machine. The hypervisor may further set access permissions to a section of memory containing a part of a function targeted for hooking, so that an attempt to execute the respective target function triggers a virtualization exception. Some embodiments thus achieve hooking of the target function without resorting to conventional methods, such as patching, inline hooking, and MSR hooking.Type: ApplicationFiled: November 5, 2014Publication date: July 16, 2015Inventors: Raul V. TOSA, Dan H. LUTAS, Daniel I. TICLE, Sandor LUKACS
-
Publication number: 20150178497Abstract: Described systems and methods allow protecting a host system, such as a computer or smartphone, from malware. In some embodiments, an anti-malware application installs a hypervisor, which displaces an operating system executing on the host system to a guest virtual machine (VM). The hypervisor further creates a set of virtual containers (VC), by setting up a memory domain for each VC, isolated from the memory domain of the guest VM. The hypervisor then maps a memory image of a malware scanner to each VC. When a target object is selected for scanning, the anti-malware application launches the malware scanner. Upon intercepting the launch, the hypervisor switches the memory context of the malware scanner to the memory domain of a selected VC, for the duration of the scan. Thus, malware scanning is performed within an isolated environment.Type: ApplicationFiled: December 20, 2013Publication date: June 25, 2015Inventors: Sandor LUKACS, Cristian B. SIRB, Dan H. LUTAS, Adrian V. COLESA
-
Publication number: 20150143362Abstract: Described systems and methods allow a host system, such as a computer or a smartphone, to enable a secure environment, which can be used to carry out secure communications with a remote service provider, for applications such as online banking, e-commerce, private messaging, and online gaming, among others. A hypervisor oversees a switch between an insecure environment and the secure environment, in response to a user input, or in response to an event such as receiving a telephone call. Switching from the insecure to the secure environment comprises transitioning the insecure environment to a sleeping state and loading the secure environment from a memory image (snapshot) saved to disk, after checking the integrity of the snapshot. Switching from the secure to the insecure environment comprises transitioning the secure environment into a sleeping state and waking up the insecure environment.Type: ApplicationFiled: November 18, 2013Publication date: May 21, 2015Inventors: Sandor LUKACS, Radu I. CIOCAS, Vlad I. TOPAN, Adrian V. COLESA, Raul V. TOSA
-
Publication number: 20150101049Abstract: Described systems and methods allow protecting a computer system from malware such as viruses, Trojans, and spyware. For each of a plurality of executable entities (such as processes and threads executing on the computer system), a scoring engine records a plurality of evaluation scores, each score determined according to a distinct evaluation criterion. Every time an entity satisfies an evaluation criterion (e.g, performs an action), the respective score of the entity is updated. Updating a score of an entity may trigger score updates of entities related to the respective entity, even when the related entities are terminated, i.e., no longer active. Related entities include, among others, a parent of the respective entity, and/or an entity injecting code into the respective entity. The scoring engine determines whether an entity is malicious according to the plurality of evaluation scores of the respective entity.Type: ApplicationFiled: October 4, 2013Publication date: April 9, 2015Inventors: Sandor LUKACS, Raul V. TOSA, Paul BOCA, Gheorghe HAJMASAN, Andrei V. LUTAS
-
Patent number: 8981648Abstract: A lamp assembly provides both instant light through use of an incandescent/halogen lamp source and an energy saving type light provided by a compact fluorescent lamp source. Both light sources are enclosed within a common envelope or outer bulb. The sensor member monitors a temperature of the cathode and mercury reservoir of the compact fluorescent lamp source in order to determine when to terminate power to the incandescent lamp source.Type: GrantFiled: March 29, 2010Date of Patent: March 17, 2015Assignee: General Electric CompanyInventors: Istvan Wurschung, Jozsef Fulop, Fetenc Papp, Sandor Lukacs, Peter Vigh
-
Patent number: 8933633Abstract: A lamp including a primary light source and a secondary light source, and a secondary light source control circuit configured to provide an operating voltage to the secondary light source. The secondary light source control circuit including a resistance element having an initial resistance which changes in response to being exposed to a temperature above a predetermined threshold. The secondary light source control circuit including a charging branch resistance-capacitance time constant that is configured to change with a change in the resistance element resistance.Type: GrantFiled: October 2, 2013Date of Patent: January 13, 2015Assignee: General Electric CompanyInventors: Gabor Szabo, Jacint Gergely, Sandor Lukacs, Peter Lucz
-
Publication number: 20150013008Abstract: Described systems and methods allow protecting a computer system from malware, such as viruses and rootkits. An anti-malware component executes within a virtual machine (VM) exposed by a hypervisor executing on the computer system. A memory introspection engine executes outside the virtual machine, at the processor privilege level of the hypervisor, and protects a process executing within the virtual machine by write-protecting a memory page of the respective process. By combining anti-malware components executing inside and outside the respective VM, some embodiments of the present invention may use the abundance of behavioral data that inside-VM components have access to, while protecting the integrity of such components from outside the respective VM.Type: ApplicationFiled: July 5, 2013Publication date: January 8, 2015Inventors: Sandor LUKACS, Raul V. TOSA, Paul BOCA, Gheorghe HAJMASAN, Andrei V. LUTAS
-
Patent number: 8910238Abstract: Described systems and methods allow the detection and prevention of malware and/or malicious activity within a network comprising multiple client computer systems, such as an enterprise network with multiple endpoints. Each endpoint operates a hardware virtualization platform, including a hypervisor exposing a client virtual machine (VM) and a security VM. The security VM is configured to have exclusive use of the network adapter(s) of the respective endpoint, and to detect whether data traffic to/from the client VM comprises malware or is indicative of malicious behavior. Upon detecting malware/malicious behavior, the security VM may block access of the client VM to the network, thus preventing the spread of malware to other endpoints. The client system may further comprise a memory introspection engine configured to perform malware scanning of the client VM from the level of the hypervisor.Type: GrantFiled: November 13, 2012Date of Patent: December 9, 2014Assignee: Bitdefender IPR Management Ltd.Inventors: Sandor Lukacs, Dan H. Lutas, Raul V. Tosa
-
Patent number: 8875295Abstract: Described systems and methods allow protecting a computer system from malware, such as viruses and rootkits. In some embodiments, a hypervisor configures a hardware virtualization platform hosting a set of operating systems (OS). A memory introspection engine executing at the processor privilege level of the hypervisor dynamically identifies each OS, and uses an protection priming module to change the way memory is allocated to a target software object by the memory allocation function native to the respective OS. In some embodiments, the change affects only target objects requiring malware protection, and comprises enforcing that memory pages containing data of the target object are reserved exclusively for the respective object. The memory introspection engine then write-protects the respective memory pages.Type: GrantFiled: February 22, 2013Date of Patent: October 28, 2014Assignee: Bitdefender IPR Management Ltd.Inventors: Andrei V. Lutas, Sandor Lukacs, Dan H. Lutas
-
Publication number: 20140245444Abstract: Described systems and methods allow protecting a computer system from malware, such as viruses and rootkits. In some embodiments, a hypervisor configures a hardware virtualization platform hosting a set of operating systems (OS). A memory introspection engine executing at the processor privilege level of the hypervisor dynamically identifies each OS, and uses an protection priming module to change the way memory is allocated to a target software object by the memory allocation function native to the respective OS. In some embodiments, the change affects only target objects requiring malware protection, and comprises enforcing that memory pages containing data of the target object are reserved exclusively for the respective object. The memory introspection engine then write-protects the respective memory pages.Type: ApplicationFiled: February 22, 2013Publication date: August 28, 2014Applicant: BITDEFENDER IPR MANAGEMENT LTD.Inventors: Andrei V. LUTAS, Sandor LUKACS, Dan H. LUTAS
-
Publication number: 20140137180Abstract: Described systems and methods allow the detection and prevention of malware and/or malicious activity within a network comprising multiple client computer systems, such as an enterprise network with multiple endpoints. Each endpoint operates a hardware virtualization platform, including a hypervisor exposing a client virtual machine (VM) and a security VM. The security VM is configured to have exclusive use of the network adapter(s) of the respective endpoint, and to detect whether data traffic to/from the client VM comprises malware or is indicative of malicious behavior. Upon detecting malware/malicious behavior, the security VM may block access of the client VM to the network, thus preventing the spread of malware to other endpoints. The client system may further comprise a memory introspection engine configured to perform malware scanning of the client VM from the level of the hypervisor.Type: ApplicationFiled: November 13, 2012Publication date: May 15, 2014Applicant: BITDEFENDER IPR MANAGEMENT LTD.Inventors: Sandor LUKACS, Dan H. LUTAS, Raul V. TOSA
-
Publication number: 20140137115Abstract: A client system, such as a computer or a smartphone, securely exchanges sensitive information with a remote service provider computer system such as a bank or an online retailer. The client system executes a commercially available operating system in an untrusted virtual machine (VM), which may be affected by malware. A hypervisor is configured to launch a trusted, malware-free VM from an authenticated image stored on computer-readable media used by the untrusted VM. The trusted VM executes a thin operating system with minimal functionality, to manage a secure communication channel with the remote server system, wherein sensitive communication is encrypted. Data from the trusted VM is forwarded via the hypervisor to a network interface driver of the untrusted VM for transmission to the remote service provider. The service provider may perform a remote attestation of the client system to determine whether it operates a trusted VM.Type: ApplicationFiled: January 17, 2014Publication date: May 15, 2014Applicant: Bitdefender IPR Management Ltd.Inventors: Raul V. TOSA, Sandor LUKACS, Dan H. LUTAS
-
Publication number: 20140053272Abstract: Described systems and methods allow software introspection and/or anti-malware operations in a hardware virtualization system comprising a nested hierarchy of hypervisors and virtual machines, wherein introspection is carried out to any level of the hierarchy from a central location on a host hypervisor. An introspection engine intercepts a processor event occurring in a virtual machine exposed by a nested hypervisor, to determine an address of a software object executing on the respective virtual machine. The address is progressively translated down through all levels of the virtualization hierarchy, to an address within a memory space controlled by the host hypervisor. Anti-malware procedures can thus be performed from the level of the host hypervisor, and may comprise techniques such as signature matching and/or protecting certain areas of memory of the nested virtual machine.Type: ApplicationFiled: August 20, 2012Publication date: February 20, 2014Inventors: Sandor LUKACS, Dan H. LUTAS, Raul V. TOSA