Patents by Inventor Scott Eric Coull
Scott Eric Coull has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250150478Abstract: A cyber-security analysis method uses machine learning (ML) technology to classify cyber-threat indicators, for example, as malicious or benign, by generating a threat score. The method includes receiving, at a compute device, a cyber-threat indicator (IUE) and associated verdicts from a set of sources. Augmenting the verdicts associated with the IUE with verdicts associated with at least one related indicator having a defined relationship with the IUE. The relationship between the IUE and the at least one related indicator can be operational, e g., based on an administrative domain, or functional, e.g., based on a protocol specification. The cyber-threat score is generated for the IUE based on the ML model and the combined verdicts of the IUE and the at least one related indicator.Type: ApplicationFiled: January 13, 2025Publication date: May 8, 2025Inventors: Scott Eric Coull, Jeffrey Thomas Johns
-
Publication number: 20250131092Abstract: Provided is a malware detection system that provides structure-aware neural networks for performing malware detection. In particular, rather than treat the entire computer file as one large input to a deep neural network, the malware detection system can break the file up based on the internal file structure. Each portion of the computer file can then be processed using individual neural networks and the outputs of these networks can be combined and similarly processed. In this way the overall system can evaluate the file with knowledge of the structure of the file, enabling the malware detection to have a higher-order understanding of the interoperation of different portions of the computer file.Type: ApplicationFiled: October 19, 2023Publication date: April 24, 2025Inventors: David Benjamin Krisiloff, Scott Eric Coull
-
Patent number: 12225031Abstract: A cyber-security analysis method uses machine learning (ML) technology to classify cyber-threat indicators, for example, as malicious or benign, by generating a threat score. The method includes receiving, at a compute device, a data set including cyber-threat indicators and verdicts serving as votes from each source in the set of sources. Each of the votes is associated with one of the cyber-threat indicators. An ML model is trained based on at least one of agreements among the sets of votes, and disagreements among the sets of votes to produce a trained ML model. In response to receiving a new cyber-threat indicator, votes are identified for each source from a subset of the sources, to define a second set of votes. The cyber-threat score is generated for the new cyber-threat indicator based on the trained ML model and the second set of votes.Type: GrantFiled: June 30, 2022Date of Patent: February 11, 2025Assignee: GOOGLE LLCInventors: Scott Eric Coull, Jeffrey Thomas Johns
-
Publication number: 20240370556Abstract: A cybersecurity threat hunting system deploys a model generation subsystem and a threat detection subsystem. The model generation subsystem includes a function evaluator associated with hunt pack(s) containing hunting function(s) to extract features from a training dataset to achieve a prescribed operating level. The model generation subsystem conducts training of a Machine Learning (ML) model by adjusting weighing parameters associated with the hunting function(s) and/or hunt pack(s) to optimize accuracy of threat scores formed by the ML model. Each hunting function may conduct analytics in reaching a verdict for the extracted feature(s), and the verdicts are compared across hunting functions during training to form quality metrics. The quality metrics assess the effectiveness of the hunting functions and set weighting parameters for the ML model.Type: ApplicationFiled: May 2, 2023Publication date: November 7, 2024Inventors: Scott Eric Coull, Jeffrey Thomas Johns
-
Publication number: 20240362323Abstract: A non-transitory storage medium includes logic associated with a cybersecurity threat hunting system. Upon execution, the logic analyzes input event data to detect whether the input event data constitutes a cyberthreat. The logic includes a function evaluator, which is configured to extract features from the input event data that is relevant, based on experiential knowledge or past analyses, for use in determining whether one or more cyberthreats are associated with the input event data. The function evaluator includes one or more hunt packs, each of the one or more hunt packs includes one or more hunting functions, and each hunting function of the one or more hunting functions is configured to analyze the input event data received from at least one cybersecurity source.Type: ApplicationFiled: April 28, 2023Publication date: October 31, 2024Inventors: Scott Eric Coull, Jeffrey Thomas Johns
-
Patent number: 12074902Abstract: A method for performing cyber-security analysis includes generating a semantic graph in which each object is represented as a node, and each event associated with an object is represented as an edge. A cyber-threat related alert, with an associated alert type, is received from a source. A first object from the plurality of objects is modified based on the alert. A plurality of threat scores, each associated with an object, are calculated, substantially concurrently, based on the alert type. Subsequently, a plurality of modified threat scores are determined for each object, based on: (1) the threat score for that object, (2) a connectivity of that object to each of the remaining objects within the semantic graph; and (3) the threat score for each remaining object from the plurality of objects. A subgraph of the semantic graph is identified based on normalized versions of the modified threat scores.Type: GrantFiled: June 20, 2023Date of Patent: August 27, 2024Assignee: GOOGLE LLCInventors: Scott Eric Coull, Jeffrey Thomas Johns
-
Patent number: 12069087Abstract: A system for detecting whether a file including content s associated with a cyber-attack is described. The content may include an executable file for example. The system includes an intelligence-driven analysis subsystem and a computation analysis subsystem. The intelligence-driven analysis subsystem is configured to (i) receive the file, (ii) inspect and compute features of the file for indicators associated with a cyber-attack, and (iii) produce a first output representing the detected indicators. The computational analysis subsystem includes an artificial neural network to (i) receive a network input being a first representation of at least one section of binary code from the file as input, and (ii) process the first representation of the section to produce a second output. The first output and the second output are used in determination a classification assigned to the file.Type: GrantFiled: April 24, 2023Date of Patent: August 20, 2024Assignee: GOOGLE LLCInventors: Jeffrey Thomas Johns, Brian Sanford Jones, Scott Eric Coull
-
System and method for heterogeneous transferred learning for enhanced cybersecurity threat detection
Patent number: 12045343Abstract: A method includes training a first machine learning model with a first dataset, to produce a first trained machine learning model to infer cybersecurity-oriented file properties and/or detect cybersecurity threats within a first domain. The first dataset includes labeled files associated with the first domain. The first trained machine learning model includes multiple layers, some of which are trainable. A second trained machine learning model is generated, via a transfer learning process, using (1) at least one trainable layer from the multiple trainable layers of the first trained machine learning model, and (2) a second dataset different from the first dataset. The second dataset includes labeled files associated with a second domain. The first domain has a different syntax, different semantics, and/or a different structure than that of the second domain. The second trained machine learning model (e.g.Type: GrantFiled: October 17, 2022Date of Patent: July 23, 2024Assignee: GOOGLE LLCInventors: Scott Eric Coull, David Krisiloff, Giorgio Severi -
Publication number: 20240007495Abstract: A method for performing cyber-security analysis includes generating a semantic graph in which each object is represented as a node, and each event associated with an object is represented as an edge. A cyber-threat related alert, with an associated alert type, is received from a source. A first object from the plurality of objects is modified based on the alert. A plurality of threat scores, each associated with an object, are calculated, substantially concurrently, based on the alert type. Subsequently, a plurality of modified threat scores are determined for each object, based on: (1) the threat score for that object, (2) a connectivity of that object to each of the remaining objects within the semantic graph; and (3) the threat score for each remaining object from the plurality of objects. A subgraph of the semantic graph is identified based on normalized versions of the modified threat scores.Type: ApplicationFiled: June 20, 2023Publication date: January 4, 2024Inventors: Scott Eric Coull, Jeffrey Thomas Johns
-
Publication number: 20230336584Abstract: A system for detecting whether a file including content s associated with a cyber-attack is described. The content may include an executable file for example. The system includes an intelligence-driven analysis subsystem and a computation analysis subsystem. The intelligence-driven analysis subsystem is configured to (i) receive the file, (ii) inspect and compute features of the file for indicators associated with a cyber-attack, and (iii) produce a first output representing the detected indicators. The computational analysis subsystem includes an artificial neural network to (i) receive a network input being a first representation of at least one section of binary code from the file as input, and (ii) process the first representation of the section to produce a second output. The first output and the second output are used in determination a classification assigned to the file.Type: ApplicationFiled: April 24, 2023Publication date: October 19, 2023Inventors: Jeffrey Thomas Johns, Brian Sanford Jones, Scott Eric Coull
-
Patent number: 11729204Abstract: A method for performing cyber-security analysis includes storing a semantic graph with nodes representing monitored computer-based entities, and edges representing monitored relationships. Each edge has an associated tally. A set of threat scores associated with multiple computer-based entities is stored in the memory. The semantic graph is updated in response to receiving event data. The updating includes decomposing the event data into a set of entities and a set of associated relationships, updating the tally of one of the edges based on the set of relationships, modifying an alert attribute of a monitored computer-based entity when the event data includes an applicable alert, and modifying a threat score of at least one computer-based entity based on the event data when the event data includes an applicable alert, to define a set of modified threat scores. The updated semantic graph is monitored for cyber-security risks within the multiple computer-based entities.Type: GrantFiled: December 13, 2021Date of Patent: August 15, 2023Assignee: GOOGLE LLCInventors: Scott Eric Coull, Jeffrey Thomas Johns
-
SYSTEM AND METHOD FOR HETEROGENEOUS TRANSFERRED LEARNING FOR ENHANCED CYBERSECURITY THREAT DETECTION
Publication number: 20230185907Abstract: A method includes training a first machine learning model with a first dataset, to produce a first trained machine learning model to infer cybersecurity-oriented file properties and/or detect cybersecurity threats within a first domain. The first dataset includes labeled files associated with the first domain. The first trained machine learning model includes multiple layers, some of which are trainable. A second trained machine learning model is generated, via a transfer learning process, using (1) at least one trainable layer from the multiple trainable layers of the first trained machine learning model, and (2) a second dataset different from the first dataset. The second dataset includes labeled files associated with a second domain. The first domain has a different syntax, different semantics, and/or a different structure than that of the second domain. The second trained machine learning model (e.g.Type: ApplicationFiled: October 17, 2022Publication date: June 15, 2023Applicant: Mandiant, Inc.Inventors: Scott Eric COULL, David Krisiloff, Giorgio Severi -
Patent number: 11637859Abstract: A system for detecting whether a file including content is associated with a cyber-attack is described. The content may include an executable file for example. The system includes an intelligence-driven analysis subsystem and a computation analysis subsystem. The intelligence-driven analysis subsystem is configured to (i) receive the file, (ii) inspect and compute features of the file for indicators associated with a cyber-attack, and (iii) produce a first output representing the detected indicators. The computational analysis subsystem includes an artificial neural network to (i) receive a network input being a first representation of at least one section of binary code from the file as input, and (ii) process the first representation of the section to produce a second output. The first output and the second output are used in determination a classification assigned to the file.Type: GrantFiled: August 30, 2021Date of Patent: April 25, 2023Assignee: Mandiant, Inc.Inventors: Jeffrey Thomas Johns, Brian Sanford Jones, Scott Eric Coull
-
System and method for heterogeneous transferred learning for enhanced cybersecurity threat detection
Patent number: 11475128Abstract: A method includes training a first machine learning model with a first dataset, to produce a first trained machine learning model to infer cybersecurity-oriented file properties and/or detect cybersecurity threats within a first domain. The first dataset includes labeled files associated with the first domain. The first trained machine learning model includes multiple layers, some of which are trainable. A second trained machine learning model is generated, via a transfer learning process, using (1) at least one trainable layer from the multiple trainable layers of the first trained machine learning model, and (2) a second dataset different from the first dataset. The second dataset includes labeled files associated with a second domain. The first domain has a different syntax, different semantics, and/or a different structure than that of the second domain. The second trained machine learning model (e.g.Type: GrantFiled: August 16, 2019Date of Patent: October 18, 2022Assignee: Mandiant, Inc.Inventors: Scott Eric Coull, David Krisiloff, Giorgio Severi -
Patent number: 11201890Abstract: A method for performing cyber-security analysis includes generating a semantic graph in which each object is represented as a node, and each event associated with an object is represented as an edge. A cyber-threat related alert, with an associated alert type, is received from a source. A first object from the plurality of objects is modified based on the alert. A plurality of threat scores, each associated with an object, are calculated, substantially concurrently, based on the alert type. Subsequently, a plurality of modified threat scores are determined for each object, based on: (1) the threat score for that object, (2) a connectivity of that object to each of the remaining objects within the semantic graph; and (3) the threat score for each remaining object from the plurality of objects. A subgraph of the semantic graph is identified based on normalized versions of the modified threat scores.Type: GrantFiled: March 29, 2019Date of Patent: December 14, 2021Assignee: Mandiant, inc.Inventors: Scott Eric Coull, Jeffrey Thomas Johns
-
Patent number: 11108809Abstract: A system for detecting whether a file including content s associated with a cyber-attack is described. The content may include an executable file for example. The system includes an intelligence-driven analysis subsystem and a computation analysis subsystem. The intelligence-driven analysis subsystem is configured to (i) receive the file, (ii) inspect and compute features of the file for indicators associated with a cyber-attack, and (iii) produce a first output representing the detected indicators. The computational analysis subsystem includes an artificial neural network to (i) receive a network input being a first representation of at least one section of binary code from the file as input, and (ii) process the first representation of the section to produce a second output. The first output and the second output are used in determination a classification assigned to the file.Type: GrantFiled: October 27, 2017Date of Patent: August 31, 2021Assignee: FireEye, Inc.Inventors: Jeffrey Thomas Johns, Brian Sanford Jones, Scott Eric Coull
-
SYSTEM AND METHOD FOR HETEROGENEOUS TRANSFERRED LEARNING FOR ENHANCED CYBERSECURITY THREAT DETECTION
Publication number: 20210073377Abstract: A method includes training a first machine learning model with a first dataset, to produce a first trained machine learning model to infer cybersecurity-oriented file properties and/or detect cybersecurity threats within a first domain. The first dataset includes labeled files associated with the first domain. The first trained machine learning model includes multiple layers, some of which are trainable. A second trained machine learning model is generated, via a transfer learning process, using (1) at least one trainable layer from the multiple trainable layers of the first trained machine learning model, and (2) a second dataset different from the first dataset. The second dataset includes labeled files associated with a second domain. The first domain has a different syntax, different semantics, and/or a different structure than that of the second domain. The second trained machine learning model (e.g.Type: ApplicationFiled: August 16, 2019Publication date: March 11, 2021Inventors: Scott Eric COULL, David KRISILOFF, Giorgio SEVERI -
Publication number: 20190132334Abstract: A system for detecting whether a file including content s associated with a cyber-attack is described. The content may include an executable file for example. The system includes an intelligence-driven analysis subsystem and a computation analysis subsystem. The intelligence-driven analysis subsystem is configured to (i) receive the file, (ii) inspect and compute features of the file for indicators associated with a cyber-attack, and (iii) produce a first output representing the detected indicators. The computational analysis subsystem includes an artificial neural network to (i) receive a network input being a first representation of at least one section of binary code from the file as input, and (ii) process the first representation of the section to produce a second output. The first output and the second output are used in determination a classification assigned to the file.Type: ApplicationFiled: October 27, 2017Publication date: May 2, 2019Applicant: FireEye, Inc.Inventors: Jeffrey Thomas Johns, Brian Sanford Jones, Scott Eric Coull