Patents by Inventor Scott Eric Coull

Scott Eric Coull has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250150478
    Abstract: A cyber-security analysis method uses machine learning (ML) technology to classify cyber-threat indicators, for example, as malicious or benign, by generating a threat score. The method includes receiving, at a compute device, a cyber-threat indicator (IUE) and associated verdicts from a set of sources. Augmenting the verdicts associated with the IUE with verdicts associated with at least one related indicator having a defined relationship with the IUE. The relationship between the IUE and the at least one related indicator can be operational, e g., based on an administrative domain, or functional, e.g., based on a protocol specification. The cyber-threat score is generated for the IUE based on the ML model and the combined verdicts of the IUE and the at least one related indicator.
    Type: Application
    Filed: January 13, 2025
    Publication date: May 8, 2025
    Inventors: Scott Eric Coull, Jeffrey Thomas Johns
  • Publication number: 20250131092
    Abstract: Provided is a malware detection system that provides structure-aware neural networks for performing malware detection. In particular, rather than treat the entire computer file as one large input to a deep neural network, the malware detection system can break the file up based on the internal file structure. Each portion of the computer file can then be processed using individual neural networks and the outputs of these networks can be combined and similarly processed. In this way the overall system can evaluate the file with knowledge of the structure of the file, enabling the malware detection to have a higher-order understanding of the interoperation of different portions of the computer file.
    Type: Application
    Filed: October 19, 2023
    Publication date: April 24, 2025
    Inventors: David Benjamin Krisiloff, Scott Eric Coull
  • Patent number: 12225031
    Abstract: A cyber-security analysis method uses machine learning (ML) technology to classify cyber-threat indicators, for example, as malicious or benign, by generating a threat score. The method includes receiving, at a compute device, a data set including cyber-threat indicators and verdicts serving as votes from each source in the set of sources. Each of the votes is associated with one of the cyber-threat indicators. An ML model is trained based on at least one of agreements among the sets of votes, and disagreements among the sets of votes to produce a trained ML model. In response to receiving a new cyber-threat indicator, votes are identified for each source from a subset of the sources, to define a second set of votes. The cyber-threat score is generated for the new cyber-threat indicator based on the trained ML model and the second set of votes.
    Type: Grant
    Filed: June 30, 2022
    Date of Patent: February 11, 2025
    Assignee: GOOGLE LLC
    Inventors: Scott Eric Coull, Jeffrey Thomas Johns
  • Publication number: 20240370556
    Abstract: A cybersecurity threat hunting system deploys a model generation subsystem and a threat detection subsystem. The model generation subsystem includes a function evaluator associated with hunt pack(s) containing hunting function(s) to extract features from a training dataset to achieve a prescribed operating level. The model generation subsystem conducts training of a Machine Learning (ML) model by adjusting weighing parameters associated with the hunting function(s) and/or hunt pack(s) to optimize accuracy of threat scores formed by the ML model. Each hunting function may conduct analytics in reaching a verdict for the extracted feature(s), and the verdicts are compared across hunting functions during training to form quality metrics. The quality metrics assess the effectiveness of the hunting functions and set weighting parameters for the ML model.
    Type: Application
    Filed: May 2, 2023
    Publication date: November 7, 2024
    Inventors: Scott Eric Coull, Jeffrey Thomas Johns
  • Publication number: 20240362323
    Abstract: A non-transitory storage medium includes logic associated with a cybersecurity threat hunting system. Upon execution, the logic analyzes input event data to detect whether the input event data constitutes a cyberthreat. The logic includes a function evaluator, which is configured to extract features from the input event data that is relevant, based on experiential knowledge or past analyses, for use in determining whether one or more cyberthreats are associated with the input event data. The function evaluator includes one or more hunt packs, each of the one or more hunt packs includes one or more hunting functions, and each hunting function of the one or more hunting functions is configured to analyze the input event data received from at least one cybersecurity source.
    Type: Application
    Filed: April 28, 2023
    Publication date: October 31, 2024
    Inventors: Scott Eric Coull, Jeffrey Thomas Johns
  • Patent number: 12074902
    Abstract: A method for performing cyber-security analysis includes generating a semantic graph in which each object is represented as a node, and each event associated with an object is represented as an edge. A cyber-threat related alert, with an associated alert type, is received from a source. A first object from the plurality of objects is modified based on the alert. A plurality of threat scores, each associated with an object, are calculated, substantially concurrently, based on the alert type. Subsequently, a plurality of modified threat scores are determined for each object, based on: (1) the threat score for that object, (2) a connectivity of that object to each of the remaining objects within the semantic graph; and (3) the threat score for each remaining object from the plurality of objects. A subgraph of the semantic graph is identified based on normalized versions of the modified threat scores.
    Type: Grant
    Filed: June 20, 2023
    Date of Patent: August 27, 2024
    Assignee: GOOGLE LLC
    Inventors: Scott Eric Coull, Jeffrey Thomas Johns
  • Patent number: 12069087
    Abstract: A system for detecting whether a file including content s associated with a cyber-attack is described. The content may include an executable file for example. The system includes an intelligence-driven analysis subsystem and a computation analysis subsystem. The intelligence-driven analysis subsystem is configured to (i) receive the file, (ii) inspect and compute features of the file for indicators associated with a cyber-attack, and (iii) produce a first output representing the detected indicators. The computational analysis subsystem includes an artificial neural network to (i) receive a network input being a first representation of at least one section of binary code from the file as input, and (ii) process the first representation of the section to produce a second output. The first output and the second output are used in determination a classification assigned to the file.
    Type: Grant
    Filed: April 24, 2023
    Date of Patent: August 20, 2024
    Assignee: GOOGLE LLC
    Inventors: Jeffrey Thomas Johns, Brian Sanford Jones, Scott Eric Coull
  • Patent number: 12045343
    Abstract: A method includes training a first machine learning model with a first dataset, to produce a first trained machine learning model to infer cybersecurity-oriented file properties and/or detect cybersecurity threats within a first domain. The first dataset includes labeled files associated with the first domain. The first trained machine learning model includes multiple layers, some of which are trainable. A second trained machine learning model is generated, via a transfer learning process, using (1) at least one trainable layer from the multiple trainable layers of the first trained machine learning model, and (2) a second dataset different from the first dataset. The second dataset includes labeled files associated with a second domain. The first domain has a different syntax, different semantics, and/or a different structure than that of the second domain. The second trained machine learning model (e.g.
    Type: Grant
    Filed: October 17, 2022
    Date of Patent: July 23, 2024
    Assignee: GOOGLE LLC
    Inventors: Scott Eric Coull, David Krisiloff, Giorgio Severi
  • Publication number: 20240007495
    Abstract: A method for performing cyber-security analysis includes generating a semantic graph in which each object is represented as a node, and each event associated with an object is represented as an edge. A cyber-threat related alert, with an associated alert type, is received from a source. A first object from the plurality of objects is modified based on the alert. A plurality of threat scores, each associated with an object, are calculated, substantially concurrently, based on the alert type. Subsequently, a plurality of modified threat scores are determined for each object, based on: (1) the threat score for that object, (2) a connectivity of that object to each of the remaining objects within the semantic graph; and (3) the threat score for each remaining object from the plurality of objects. A subgraph of the semantic graph is identified based on normalized versions of the modified threat scores.
    Type: Application
    Filed: June 20, 2023
    Publication date: January 4, 2024
    Inventors: Scott Eric Coull, Jeffrey Thomas Johns
  • Publication number: 20230336584
    Abstract: A system for detecting whether a file including content s associated with a cyber-attack is described. The content may include an executable file for example. The system includes an intelligence-driven analysis subsystem and a computation analysis subsystem. The intelligence-driven analysis subsystem is configured to (i) receive the file, (ii) inspect and compute features of the file for indicators associated with a cyber-attack, and (iii) produce a first output representing the detected indicators. The computational analysis subsystem includes an artificial neural network to (i) receive a network input being a first representation of at least one section of binary code from the file as input, and (ii) process the first representation of the section to produce a second output. The first output and the second output are used in determination a classification assigned to the file.
    Type: Application
    Filed: April 24, 2023
    Publication date: October 19, 2023
    Inventors: Jeffrey Thomas Johns, Brian Sanford Jones, Scott Eric Coull
  • Patent number: 11729204
    Abstract: A method for performing cyber-security analysis includes storing a semantic graph with nodes representing monitored computer-based entities, and edges representing monitored relationships. Each edge has an associated tally. A set of threat scores associated with multiple computer-based entities is stored in the memory. The semantic graph is updated in response to receiving event data. The updating includes decomposing the event data into a set of entities and a set of associated relationships, updating the tally of one of the edges based on the set of relationships, modifying an alert attribute of a monitored computer-based entity when the event data includes an applicable alert, and modifying a threat score of at least one computer-based entity based on the event data when the event data includes an applicable alert, to define a set of modified threat scores. The updated semantic graph is monitored for cyber-security risks within the multiple computer-based entities.
    Type: Grant
    Filed: December 13, 2021
    Date of Patent: August 15, 2023
    Assignee: GOOGLE LLC
    Inventors: Scott Eric Coull, Jeffrey Thomas Johns
  • Publication number: 20230185907
    Abstract: A method includes training a first machine learning model with a first dataset, to produce a first trained machine learning model to infer cybersecurity-oriented file properties and/or detect cybersecurity threats within a first domain. The first dataset includes labeled files associated with the first domain. The first trained machine learning model includes multiple layers, some of which are trainable. A second trained machine learning model is generated, via a transfer learning process, using (1) at least one trainable layer from the multiple trainable layers of the first trained machine learning model, and (2) a second dataset different from the first dataset. The second dataset includes labeled files associated with a second domain. The first domain has a different syntax, different semantics, and/or a different structure than that of the second domain. The second trained machine learning model (e.g.
    Type: Application
    Filed: October 17, 2022
    Publication date: June 15, 2023
    Applicant: Mandiant, Inc.
    Inventors: Scott Eric COULL, David Krisiloff, Giorgio Severi
  • Patent number: 11637859
    Abstract: A system for detecting whether a file including content is associated with a cyber-attack is described. The content may include an executable file for example. The system includes an intelligence-driven analysis subsystem and a computation analysis subsystem. The intelligence-driven analysis subsystem is configured to (i) receive the file, (ii) inspect and compute features of the file for indicators associated with a cyber-attack, and (iii) produce a first output representing the detected indicators. The computational analysis subsystem includes an artificial neural network to (i) receive a network input being a first representation of at least one section of binary code from the file as input, and (ii) process the first representation of the section to produce a second output. The first output and the second output are used in determination a classification assigned to the file.
    Type: Grant
    Filed: August 30, 2021
    Date of Patent: April 25, 2023
    Assignee: Mandiant, Inc.
    Inventors: Jeffrey Thomas Johns, Brian Sanford Jones, Scott Eric Coull
  • Patent number: 11475128
    Abstract: A method includes training a first machine learning model with a first dataset, to produce a first trained machine learning model to infer cybersecurity-oriented file properties and/or detect cybersecurity threats within a first domain. The first dataset includes labeled files associated with the first domain. The first trained machine learning model includes multiple layers, some of which are trainable. A second trained machine learning model is generated, via a transfer learning process, using (1) at least one trainable layer from the multiple trainable layers of the first trained machine learning model, and (2) a second dataset different from the first dataset. The second dataset includes labeled files associated with a second domain. The first domain has a different syntax, different semantics, and/or a different structure than that of the second domain. The second trained machine learning model (e.g.
    Type: Grant
    Filed: August 16, 2019
    Date of Patent: October 18, 2022
    Assignee: Mandiant, Inc.
    Inventors: Scott Eric Coull, David Krisiloff, Giorgio Severi
  • Patent number: 11201890
    Abstract: A method for performing cyber-security analysis includes generating a semantic graph in which each object is represented as a node, and each event associated with an object is represented as an edge. A cyber-threat related alert, with an associated alert type, is received from a source. A first object from the plurality of objects is modified based on the alert. A plurality of threat scores, each associated with an object, are calculated, substantially concurrently, based on the alert type. Subsequently, a plurality of modified threat scores are determined for each object, based on: (1) the threat score for that object, (2) a connectivity of that object to each of the remaining objects within the semantic graph; and (3) the threat score for each remaining object from the plurality of objects. A subgraph of the semantic graph is identified based on normalized versions of the modified threat scores.
    Type: Grant
    Filed: March 29, 2019
    Date of Patent: December 14, 2021
    Assignee: Mandiant, inc.
    Inventors: Scott Eric Coull, Jeffrey Thomas Johns
  • Patent number: 11108809
    Abstract: A system for detecting whether a file including content s associated with a cyber-attack is described. The content may include an executable file for example. The system includes an intelligence-driven analysis subsystem and a computation analysis subsystem. The intelligence-driven analysis subsystem is configured to (i) receive the file, (ii) inspect and compute features of the file for indicators associated with a cyber-attack, and (iii) produce a first output representing the detected indicators. The computational analysis subsystem includes an artificial neural network to (i) receive a network input being a first representation of at least one section of binary code from the file as input, and (ii) process the first representation of the section to produce a second output. The first output and the second output are used in determination a classification assigned to the file.
    Type: Grant
    Filed: October 27, 2017
    Date of Patent: August 31, 2021
    Assignee: FireEye, Inc.
    Inventors: Jeffrey Thomas Johns, Brian Sanford Jones, Scott Eric Coull
  • Publication number: 20210073377
    Abstract: A method includes training a first machine learning model with a first dataset, to produce a first trained machine learning model to infer cybersecurity-oriented file properties and/or detect cybersecurity threats within a first domain. The first dataset includes labeled files associated with the first domain. The first trained machine learning model includes multiple layers, some of which are trainable. A second trained machine learning model is generated, via a transfer learning process, using (1) at least one trainable layer from the multiple trainable layers of the first trained machine learning model, and (2) a second dataset different from the first dataset. The second dataset includes labeled files associated with a second domain. The first domain has a different syntax, different semantics, and/or a different structure than that of the second domain. The second trained machine learning model (e.g.
    Type: Application
    Filed: August 16, 2019
    Publication date: March 11, 2021
    Inventors: Scott Eric COULL, David KRISILOFF, Giorgio SEVERI
  • Publication number: 20190132334
    Abstract: A system for detecting whether a file including content s associated with a cyber-attack is described. The content may include an executable file for example. The system includes an intelligence-driven analysis subsystem and a computation analysis subsystem. The intelligence-driven analysis subsystem is configured to (i) receive the file, (ii) inspect and compute features of the file for indicators associated with a cyber-attack, and (iii) produce a first output representing the detected indicators. The computational analysis subsystem includes an artificial neural network to (i) receive a network input being a first representation of at least one section of binary code from the file as input, and (ii) process the first representation of the section to produce a second output. The first output and the second output are used in determination a classification assigned to the file.
    Type: Application
    Filed: October 27, 2017
    Publication date: May 2, 2019
    Applicant: FireEye, Inc.
    Inventors: Jeffrey Thomas Johns, Brian Sanford Jones, Scott Eric Coull