Patents by Inventor Sudarshan Vasudevan

Sudarshan Vasudevan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10972493
    Abstract: Techniques for automatically grouping malware based on artifacts are disclosed. In some embodiments, a system, process, and/or computer program product for automatically grouping malware based on artifacts includes receiving a plurality of samples for performing automated malware analysis to generate log files based on the automated malware analysis; processing the log files to extract features associated with malware; clustering the plurality of samples based on the extracted features; and performing an action based on the clustering output.
    Type: Grant
    Filed: January 21, 2020
    Date of Patent: April 6, 2021
    Assignee: Palo Alto Networks, Inc.
    Inventors: Shadi Rostami-Hesarsorkh, Sudarshan Vasudevan, William Redington Hewlett, II, Farshad Rostamabadi
  • Publication number: 20200341972
    Abstract: The disclosed embodiments provide a system for managing a data store. During operation, the system stores a set of pending updates to a data store in a registry. Next, the system executes an asynchronous process that applies a first subset of updates from the registry as writes to records in the data store without blocking processing of read queries of the data store. Upon completing a write by the asynchronous process at a second portion of the data store, the system updates the registry with an indication of the completed write at the second portion of the data store. During processing of a read query of the data store, the system applies a second subset of updates from the registry to a result of the read query. Finally, the system returns the result in a response to the read query.
    Type: Application
    Filed: May 29, 2019
    Publication date: October 29, 2020
    Inventors: Issac Buenrostro, Anthony Hsu, Hung V. Tran, Sudarshan Vasudevan, Lei Sun, Jack W. Moseley, Shirshanka Das, Vasanth Rajamani
  • Publication number: 20200162494
    Abstract: Techniques for automatically grouping malware based on artifacts are disclosed. In some embodiments, a system, process, and/or computer program product for automatically grouping malware based on artifacts includes receiving a plurality of samples for performing automated malware analysis to generate log files based on the automated malware analysis; processing the log files to extract features associated with malware; clustering the plurality of samples based on the extracted features; and performing an action based on the clustering output.
    Type: Application
    Filed: January 21, 2020
    Publication date: May 21, 2020
    Inventors: Shadi Rostami-Hesarsorkh, Sudarshan Vasudevan, William Redington Hewlett, II, Farshad Rostamabadi
  • Patent number: 10581892
    Abstract: Techniques for automatically grouping malware based on artifacts are disclosed. In some embodiments, a system, process, and/or computer program product for automatically grouping malware based on artifacts includes receiving a plurality of samples for performing automated malware analysis to generate log files based on the automated malware analysis; processing the log files to extract features associated with malware; clustering the plurality of samples based on the extracted features; and performing an action based on the clustering output.
    Type: Grant
    Filed: January 18, 2019
    Date of Patent: March 3, 2020
    Assignee: Palo Alto Networks, Inc.
    Inventors: Shadi Rostami-Hesarsorkh, Sudarshan Vasudevan, William Redington Hewlett, II, Farshad Rostamabadi
  • Patent number: 10530789
    Abstract: Techniques for alerting and tagging using a malware analysis platform for threat intelligence made actionable are disclosed. In some embodiments, a system, process, and/or computer program product for alerting and tagging using a malware analysis platform for threat intelligence made actionable includes receiving a plurality of samples for performing automated malware analysis to generate log files based on the automated malware analysis; processing the log files to extract artifacts associated with the log files; determining whether a tag matches any of the plurality of samples based on the artifacts; and performing an action based on whether the tag matches any of the plurality of samples.
    Type: Grant
    Filed: May 3, 2019
    Date of Patent: January 7, 2020
    Assignee: Palo Alto Networks, Inc.
    Inventors: Farshad Rostamabadi, Shadi Rostami-Hesarsorkh, Sudarshan Vasudevan, Bilal Malik
  • Patent number: 10484404
    Abstract: Techniques for alerting and tagging using a malware analysis platform for threat intelligence made actionable are disclosed. In some embodiments, a system, process, and/or computer program product for alerting and tagging using a malware analysis platform for threat intelligence made actionable includes receiving a plurality of samples for performing automated malware analysis to generate log files based on the automated malware analysis; processing the log files to extract artifacts associated with the log files; determining whether a tag matches any of the plurality of samples based on the artifacts; and performing an action based on whether the tag matches any of the plurality of samples.
    Type: Grant
    Filed: May 3, 2019
    Date of Patent: November 19, 2019
    Assignee: Palo Alto Networks, Inc.
    Inventors: Farshad Rostamabadi, Shadi Rostami-Hesarsorkh, Sudarshan Vasudevan, Bilal Malik
  • Publication number: 20190268357
    Abstract: Techniques for alerting and tagging using a malware analysis platform for threat intelligence made actionable are disclosed. In some embodiments, a system, process, and/or computer program product for alerting and tagging using a malware analysis platform for threat intelligence made actionable includes receiving a plurality of samples for performing automated malware analysis to generate log files based on the automated malware analysis; processing the log files to extract artifacts associated with the log files; determining whether a tag matches any of the plurality of samples based on the artifacts; and performing an action based on whether the tag matches any of the plurality of samples.
    Type: Application
    Filed: May 3, 2019
    Publication date: August 29, 2019
    Inventors: Farshad Rostamabadi, Shadi Rostami-Hesarsorkh, Sudarshan Vasudevan, Bilal Malik
  • Patent number: 10333948
    Abstract: Techniques for alerting and tagging using a malware analysis platform for threat intelligence made actionable are disclosed. In some embodiments, a system, process, and/or computer program product for alerting and tagging using a malware analysis platform for threat intelligence made actionable includes receiving a plurality of samples for performing automated malware analysis to generate log files based on the automated malware analysis; processing the log files to extract artifacts associated with the log files; determining whether a tag matches any of the plurality of samples based on the artifacts; and performing an action based on whether the tag matches any of the plurality of samples.
    Type: Grant
    Filed: February 29, 2016
    Date of Patent: June 25, 2019
    Assignee: Palo Alto Networks, Inc.
    Inventors: Farshad Rostamabadi, Shadi Rostami-Hesarsorkh, Sudarshan Vasudevan, Bilal Malik
  • Publication number: 20190158525
    Abstract: Techniques for automatically grouping malware based on artifacts are disclosed. In some embodiments, a system, process, and/or computer program product for automatically grouping malware based on artifacts includes receiving a plurality of samples for performing automated malware analysis to generate log files based on the automated malware analysis; processing the log files to extract features associated with malware; clustering the plurality of samples based on the extracted features; and performing an action based on the clustering output.
    Type: Application
    Filed: January 18, 2019
    Publication date: May 23, 2019
    Inventors: Shadi Rostami-Hesarsorkh, Sudarshan Vasudevan, William Redington Hewlett, II, Farshad Rostamabadi
  • Patent number: 10230749
    Abstract: Techniques for automatically grouping malware based on artifacts are disclosed. In some embodiments, a system, process, and/or computer program product for automatically grouping malware based on artifacts includes receiving a plurality of samples for performing automated malware analysis to generate log files based on the automated malware analysis; processing the log files to extract features associated with malware; clustering the plurality of samples based on the extracted features; and performing an action based on the clustering output.
    Type: Grant
    Filed: February 29, 2016
    Date of Patent: March 12, 2019
    Assignee: Palo Alto Networks, Inc.
    Inventors: Shadi Rostami-Hesarsorkh, Sudarshan Vasudevan, William Redington Hewlett, II, Farshad Rostamabadi
  • Patent number: 10200390
    Abstract: Techniques for automatically determining whether malware samples are similar are disclosed. In some embodiments, a system, process, and/or computer program product for automatically determining whether malware samples are similar includes receiving a plurality of samples for performing automated malware analysis to generate log files based on the automated malware analysis; comparing the log files based on the automated malware analysis; determining whether any of the plurality of samples are similar based on the comparison of the log files based on the automated malware analysis; and performing an action based on determining that at least two samples are similar.
    Type: Grant
    Filed: February 29, 2016
    Date of Patent: February 5, 2019
    Assignee: Palo Alto Networks, Inc.
    Inventors: Shadi Rostami-Hesarsorkh, Sudarshan Vasudevan, Farshad Rostamabadi
  • Patent number: 10200389
    Abstract: Techniques for a malware analysis platform for threat intelligence made actionable are disclosed. In some embodiments, a system, process, and/or computer program product for a malware analysis platform for threat intelligence made actionable includes receiving a plurality of samples for performing automated malware analysis to generate log files based on the automated malware analysis; processing the log files to determine artifacts associated with malware; and performing an action based on an artifact.
    Type: Grant
    Filed: February 29, 2016
    Date of Patent: February 5, 2019
    Assignee: Palo Alto Networks, Inc.
    Inventors: Farshad Rostamabadi, Shadi Rostami-Hesarsorkh, Sudarshan Vasudevan
  • Publication number: 20170251003
    Abstract: Techniques for automatically determining whether malware samples are similar are disclosed. In some embodiments, a system, process, and/or computer program product for automatically determining whether malware samples are similar includes receiving a plurality of samples for performing automated malware analysis to generate log files based on the automated malware analysis; comparing the log files based on the automated malware analysis; determining whether any of the plurality of samples are similar based on the comparison of the log files based on the automated malware analysis; and performing an action based on determining that at least two samples are similar.
    Type: Application
    Filed: February 29, 2016
    Publication date: August 31, 2017
    Inventors: Shadi Rostami-Hesarsorkh, Sudarshan Vasudevan, Farshad Rostamabadi
  • Publication number: 20170251002
    Abstract: Techniques for a malware analysis platform for threat intelligence made actionable are disclosed. In some embodiments, a system, process, and/or computer program product for a malware analysis platform for threat intelligence made actionable includes receiving a plurality of samples for performing automated malware analysis to generate log files based on the automated malware analysis; processing the log files to determine artifacts associated with malware; and performing an action based on an artifact.
    Type: Application
    Filed: February 29, 2016
    Publication date: August 31, 2017
    Inventors: Farshad Rostamabadi, Shadi Rostami-Hesarsorkh, Sudarshan Vasudevan
  • Publication number: 20170250997
    Abstract: Techniques for alerting and tagging using a malware analysis platform for threat intelligence made actionable are disclosed. In some embodiments, a system, process, and/or computer program product for alerting and tagging using a malware analysis platform for threat intelligence made actionable includes receiving a plurality of samples for performing automated malware analysis to generate log files based on the automated malware analysis; processing the log files to extract artifacts associated with the log files; determining whether a tag matches any of the plurality of samples based on the artifacts; and performing an action based on whether the tag matches any of the plurality of samples.
    Type: Application
    Filed: February 29, 2016
    Publication date: August 31, 2017
    Inventors: Farshad Rostamabadi, Shadi Rostami-Hesarsorkh, Sudarshan Vasudevan, Bilal Malik
  • Patent number: 8644329
    Abstract: A power aware Point-Of-Presence design and auto-configuration method is disclosed for configuring which network elements within a point-of-presence are powered so as to accommodate anticipated traffic while minimizing power consumption. The IP power aware Point-Of-Presence design and auto-configuration method includes a set of activation thresholds associated with each port in the Point-of-Presence that indicates that the port should be activated when the traffic demand exceeds the threshold. The power aware Point-Of-Presence design and auto-configuration method is particularly useful for providing a configuration which accounts for both external and internal link traffic demand and has the further advantage of ordering the port activation such that only a minimum number of activation and deactivation operations to satisfy a new demand is required. This property is advantageous for limiting the routing instabilities caused by topological changes in response to varying demand.
    Type: Grant
    Filed: May 4, 2012
    Date of Patent: February 4, 2014
    Assignee: Alcatel Lucent
    Inventors: Yigal Bejerano, Sudarshan Vasudevan
  • Publication number: 20130294454
    Abstract: A power aware Point-Of-Presence design and auto-configuration method is disclosed for configuring which network elements within a point-of-presence are powered so as to accommodate anticipated traffic while minimizing power consumption. The IP power aware Point-Of-Presence design and auto-configuration method includes a set of activation thresholds associated with each port in the Point-of-Presence that indicates that the port should be activated when the traffic demand exceeds the threshold. The power aware Point-Of-Presence design and auto-configuration method is particularly useful for providing a configuration which accounts for both external and internal link traffic demand and has the further advantage of ordering the port activation such that only a minimum number of activation and deactivation operations to satisfy a new demand is required. This property is advantageous for limiting the routing instabilities caused by topological changes in response to varying demand.
    Type: Application
    Filed: May 4, 2012
    Publication date: November 7, 2013
    Applicant: Alcatel-Lucent USA Inc.
    Inventors: Yigal Bejerano, Sudarshan Vasudevan