Patents by Inventor Shishir Singh

Shishir Singh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180247058
    Abstract: A system configured to detect malware is described. The system configured to detect malware including a data collector configured to detect at least a first hypertext transfer object in a chain of a plurality of hypertext transfer objects. The data collector further configured to analyze at least the first hypertext transfer object for one or more events. And, the data collector configured to generate a list of events based on the analysis of at least the first hypertext transfer object.
    Type: Application
    Filed: April 20, 2018
    Publication date: August 30, 2018
    Inventors: Alexander BURT, Mikola BILOGORSKIY, McEnroe NAVARAJ, Frank JAS, Liang HAN, Yucheng TING, Manikandan KENYAN, Fengmin GONG, Ali GOLSHAN, Shishir SINGH
  • Patent number: 9953163
    Abstract: A system configured to detect malware is described. The system configured to detect malware including a data collector configured to detect at least a first hypertext transfer object in a chain of a plurality of hypertext transfer objects. The data collector further configured to analyze at least the first hypertext transfer object for one or more events. And, the data collector configured to generate a list of events based on the analysis of at least the first hypertext transfer object.
    Type: Grant
    Filed: February 20, 2015
    Date of Patent: April 24, 2018
    Assignee: Cyphort Inc.
    Inventors: Alexander Burt, Mikola Bilogorskiy, McEnroe Navaraj, Frank Jas, Liang Han, Yucheng Ting, Manikandan Kenyan, Fengmin Gong, Ali Golshan, Shishir Singh
  • Publication number: 20150244730
    Abstract: A system configured to detect malware is described. The system including an infection verification pack configured to perform behavior detonation; identify a malware object based on machine-learning; and select one or more persistent artifacts of the malware on the target system based on one or more algorithms applied to behavior traces of the malware object to select one or more persistent artifacts of the malware on the target system.
    Type: Application
    Filed: February 23, 2015
    Publication date: August 27, 2015
    Inventors: Neal Vu, Frank Jas, Fengmin Gong, Anthony James, Ali Golshan, Shishir Singh
  • Publication number: 20150242628
    Abstract: A system configured to detect malware is described. The system configured to detect malware including a data collector configured to detect at least a first hypertext transfer object in a chain of a plurality of hypertext transfer objects. The data collector further configured to analyze at least the first hypertext transfer object for one or more events. And, the data collector configured to generate a list of events based on the analysis of at least the first hypertext transfer object.
    Type: Application
    Filed: February 20, 2015
    Publication date: August 27, 2015
    Inventors: Alexander Burt, Nick Bilogorskiy, McEnroe Navaraj, Frank Jas, Liang Han, Yucheng Ting, Manikandan Kenyan, Fengmin Gong, Ali Golshan, Shishir Singh