Patents by Inventor Shane Pereira

Shane Pereira has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8296848
    Abstract: A security module detects attempted exploitations of vulnerabilities of applications executing on a computer. The security module hooks an application on the computer. The hook transfers control flow to the security module if execution reaches a hooked location. When a hook is followed, the security module saves the state of the computer and activates an analysis environment. A virtual machine within the analysis environment executes signatures that programmatically analyze the state of the computer to determine whether a vulnerability in the application is being exploited. If a signature detects an exploit, the security module blocks the exploit by skipping over the one or more instructions that constitute the exploit, terminating the application, or performing a different action. The security module reports the detected exploit attempt to the user of the client. The security module returns control flow back to the application if it does not detect an exploit.
    Type: Grant
    Filed: June 20, 2007
    Date of Patent: October 23, 2012
    Assignee: Symantec Corporation
    Inventors: Kent E. Griffin, Carey S. Nachenberg, Shane A. Pereira
  • Patent number: 8230499
    Abstract: A hook is set for one or more downloading functions. Subsequently, code is executed within an application process. Responsive to the executed code calling one of the hooked functions, a return address of the called function is examined. If the return address is within a heap memory area of the application process, a remedial action, such as returning an error code or displaying an alert, is taken.
    Type: Grant
    Filed: May 29, 2008
    Date of Patent: July 24, 2012
    Assignee: Symantec Corporation
    Inventor: Shane Pereira
  • Patent number: 8209757
    Abstract: A method includes creating an intercept function for a tracked DLL function of a DLL being loaded into a suspicious module. Upon a determination that the tracked DLL function is invoked, a determination is made as to whether a return address of a caller of the tracked DLL function is within a legitimate return address range. The legitimate return address range includes an address range of the intercept function and excludes an address range of the suspicious module. If the return address is within the suspicious module, the suspicious module called the tracked DLL function directly. This indicates that the suspicious module is malicious and so protective action is taken.
    Type: Grant
    Filed: June 27, 2008
    Date of Patent: June 26, 2012
    Assignee: Symantec Corporation
    Inventors: Mark Kennedy, Shane Pereira
  • Patent number: 8205257
    Abstract: A computer-implemented method for preventing threats originating from a non-process based component hosted by a trusted process is described. The loading activity of the trusted process is monitored. A trust level associated with the trusted process is altered when an unverified component is loaded into the trusted process. Events performed by the trusted process are monitored. An unverified component that originated the event is identified. The trusted process is terminated based on a security risk associated with the unverified component that originated the event.
    Type: Grant
    Filed: July 28, 2009
    Date of Patent: June 19, 2012
    Assignee: Symantec Corporation
    Inventors: Sourabh Satish, Shane Pereira, Uri Mann
  • Patent number: 8190647
    Abstract: A decision tree for classifying computer files is constructed. Computational complexities of a set of candidate attributes are determined. A set of attribute vectors are created for a set of training files with known classification. A node is created to represent the set. A weighted impurity reduction score is calculated for each candidate attribute based on the computational complexity of the attribute. If a stopping criterion is satisfied then the node is set as a leaf node. Otherwise the node is set as a branch node and the attribute with the highest weighted impurity reduction score is selected as the splitting attribute for the branch node. The set of attribute vectors are split into subsets based on their attribute values of the splitting attribute. The above process is repeated for each subset. The tree is then pruned based on the computational complexities of the splitting attributes.
    Type: Grant
    Filed: September 15, 2009
    Date of Patent: May 29, 2012
    Assignee: Symantec Corporation
    Inventors: Shane Pereira, Zulfikar Ramzan, Sourabh Satish
  • Patent number: 8190755
    Abstract: Method and apparatus for host authentication in a network implementing network access control is described. In an example, a network access control (NAC) server receives network address requests from hosts on a network. If a host is compliant with an established security policy, the NAC server determines a unique indicium for the host and records the unique indicium along with a network address leased to the host by a dynamic host configuration protocol (DHCP) server. When a host requests access to a resource on the network, the host is authenticated by determining whether its asserted network address is valid. If valid, a pre-computed unique indicium for that address is obtained and compared with a unique indicium for the host. If the indicia match, the host is allowed access to the resource. Otherwise, the host is blocked from access to the resource.
    Type: Grant
    Filed: December 27, 2006
    Date of Patent: May 29, 2012
    Assignee: Symantec Corporation
    Inventors: Sourabh Satish, Brian Hernacki, Shane Pereira
  • Patent number: 8191147
    Abstract: A network communication corresponding to a malicious network signature associated with malicious code is detected on a host computer system. A determination is made whether or not the malicious network signature is validated as associated with a non-malicious code process. Upon a determination that the malicious network signature is not validated, the corresponding network communication is blocked, and the associated malicious code is located on the host computer system and removed from the host computer system. In some embodiments, the host computer system is further evaluated for the presence of residual artifacts of the malicious code on the host computer system.
    Type: Grant
    Filed: April 24, 2008
    Date of Patent: May 29, 2012
    Assignee: Symantec Corporation
    Inventors: Patrick Gardner, Shane Pereira
  • Publication number: 20110271341
    Abstract: A behavioral signature for detecting malware is generated. A computer is used to collect behavior traces of malware in a malware dataset. The behavior traces describe sequential behaviors performed by the malware. The behavior traces are normalized to produce malware behavior sequences. Similar malware behavior sequences are clustered together. The malware behavior sequences in a cluster describe behaviors of a malware family. The cluster is analyzed to identify a behavior subsequence common to the cluster's malware family. A behavior signature for the malware family is generated using the behavior subsequence. A trace of new malware is normalized and aligned with an existing cluster, if possible. The behavioral signature for that cluster is generated based on the behavior sequence of the new malware and the other sequences in the cluster.
    Type: Application
    Filed: April 28, 2010
    Publication date: November 3, 2011
    Applicant: SYMANTEC CORPORATION
    Inventors: Sourabh Satish, Shane Pereira
  • Publication number: 20100083376
    Abstract: Method and apparatus for detecting malware are described. In some examples, files of unknown trustworthiness are identified as potential threats on the computer. A trustworthiness level for each of the files is received from a backend. The trustworthiness level of each of the files is compared to a threshold level. Each of the files where the trustworthiness level thereof satisfies the threshold level is designated as a false positive threat. Each of the files where the trustworthiness level thereof does not satisfy the threshold level is designated as a true positive threat.
    Type: Application
    Filed: September 26, 2008
    Publication date: April 1, 2010
    Applicant: SYMANTEC CORPORATION
    Inventors: Shane Pereira, Mark Kennedy, Pieter Viljoen