Patents by Inventor Sudarshan Vasudevan
Sudarshan Vasudevan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10972493Abstract: Techniques for automatically grouping malware based on artifacts are disclosed. In some embodiments, a system, process, and/or computer program product for automatically grouping malware based on artifacts includes receiving a plurality of samples for performing automated malware analysis to generate log files based on the automated malware analysis; processing the log files to extract features associated with malware; clustering the plurality of samples based on the extracted features; and performing an action based on the clustering output.Type: GrantFiled: January 21, 2020Date of Patent: April 6, 2021Assignee: Palo Alto Networks, Inc.Inventors: Shadi Rostami-Hesarsorkh, Sudarshan Vasudevan, William Redington Hewlett, II, Farshad Rostamabadi
-
Publication number: 20200341972Abstract: The disclosed embodiments provide a system for managing a data store. During operation, the system stores a set of pending updates to a data store in a registry. Next, the system executes an asynchronous process that applies a first subset of updates from the registry as writes to records in the data store without blocking processing of read queries of the data store. Upon completing a write by the asynchronous process at a second portion of the data store, the system updates the registry with an indication of the completed write at the second portion of the data store. During processing of a read query of the data store, the system applies a second subset of updates from the registry to a result of the read query. Finally, the system returns the result in a response to the read query.Type: ApplicationFiled: May 29, 2019Publication date: October 29, 2020Inventors: Issac Buenrostro, Anthony Hsu, Hung V. Tran, Sudarshan Vasudevan, Lei Sun, Jack W. Moseley, Shirshanka Das, Vasanth Rajamani
-
Publication number: 20200162494Abstract: Techniques for automatically grouping malware based on artifacts are disclosed. In some embodiments, a system, process, and/or computer program product for automatically grouping malware based on artifacts includes receiving a plurality of samples for performing automated malware analysis to generate log files based on the automated malware analysis; processing the log files to extract features associated with malware; clustering the plurality of samples based on the extracted features; and performing an action based on the clustering output.Type: ApplicationFiled: January 21, 2020Publication date: May 21, 2020Inventors: Shadi Rostami-Hesarsorkh, Sudarshan Vasudevan, William Redington Hewlett, II, Farshad Rostamabadi
-
Patent number: 10581892Abstract: Techniques for automatically grouping malware based on artifacts are disclosed. In some embodiments, a system, process, and/or computer program product for automatically grouping malware based on artifacts includes receiving a plurality of samples for performing automated malware analysis to generate log files based on the automated malware analysis; processing the log files to extract features associated with malware; clustering the plurality of samples based on the extracted features; and performing an action based on the clustering output.Type: GrantFiled: January 18, 2019Date of Patent: March 3, 2020Assignee: Palo Alto Networks, Inc.Inventors: Shadi Rostami-Hesarsorkh, Sudarshan Vasudevan, William Redington Hewlett, II, Farshad Rostamabadi
-
Patent number: 10530789Abstract: Techniques for alerting and tagging using a malware analysis platform for threat intelligence made actionable are disclosed. In some embodiments, a system, process, and/or computer program product for alerting and tagging using a malware analysis platform for threat intelligence made actionable includes receiving a plurality of samples for performing automated malware analysis to generate log files based on the automated malware analysis; processing the log files to extract artifacts associated with the log files; determining whether a tag matches any of the plurality of samples based on the artifacts; and performing an action based on whether the tag matches any of the plurality of samples.Type: GrantFiled: May 3, 2019Date of Patent: January 7, 2020Assignee: Palo Alto Networks, Inc.Inventors: Farshad Rostamabadi, Shadi Rostami-Hesarsorkh, Sudarshan Vasudevan, Bilal Malik
-
Patent number: 10484404Abstract: Techniques for alerting and tagging using a malware analysis platform for threat intelligence made actionable are disclosed. In some embodiments, a system, process, and/or computer program product for alerting and tagging using a malware analysis platform for threat intelligence made actionable includes receiving a plurality of samples for performing automated malware analysis to generate log files based on the automated malware analysis; processing the log files to extract artifacts associated with the log files; determining whether a tag matches any of the plurality of samples based on the artifacts; and performing an action based on whether the tag matches any of the plurality of samples.Type: GrantFiled: May 3, 2019Date of Patent: November 19, 2019Assignee: Palo Alto Networks, Inc.Inventors: Farshad Rostamabadi, Shadi Rostami-Hesarsorkh, Sudarshan Vasudevan, Bilal Malik
-
Publication number: 20190268357Abstract: Techniques for alerting and tagging using a malware analysis platform for threat intelligence made actionable are disclosed. In some embodiments, a system, process, and/or computer program product for alerting and tagging using a malware analysis platform for threat intelligence made actionable includes receiving a plurality of samples for performing automated malware analysis to generate log files based on the automated malware analysis; processing the log files to extract artifacts associated with the log files; determining whether a tag matches any of the plurality of samples based on the artifacts; and performing an action based on whether the tag matches any of the plurality of samples.Type: ApplicationFiled: May 3, 2019Publication date: August 29, 2019Inventors: Farshad Rostamabadi, Shadi Rostami-Hesarsorkh, Sudarshan Vasudevan, Bilal Malik
-
Patent number: 10333948Abstract: Techniques for alerting and tagging using a malware analysis platform for threat intelligence made actionable are disclosed. In some embodiments, a system, process, and/or computer program product for alerting and tagging using a malware analysis platform for threat intelligence made actionable includes receiving a plurality of samples for performing automated malware analysis to generate log files based on the automated malware analysis; processing the log files to extract artifacts associated with the log files; determining whether a tag matches any of the plurality of samples based on the artifacts; and performing an action based on whether the tag matches any of the plurality of samples.Type: GrantFiled: February 29, 2016Date of Patent: June 25, 2019Assignee: Palo Alto Networks, Inc.Inventors: Farshad Rostamabadi, Shadi Rostami-Hesarsorkh, Sudarshan Vasudevan, Bilal Malik
-
Publication number: 20190158525Abstract: Techniques for automatically grouping malware based on artifacts are disclosed. In some embodiments, a system, process, and/or computer program product for automatically grouping malware based on artifacts includes receiving a plurality of samples for performing automated malware analysis to generate log files based on the automated malware analysis; processing the log files to extract features associated with malware; clustering the plurality of samples based on the extracted features; and performing an action based on the clustering output.Type: ApplicationFiled: January 18, 2019Publication date: May 23, 2019Inventors: Shadi Rostami-Hesarsorkh, Sudarshan Vasudevan, William Redington Hewlett, II, Farshad Rostamabadi
-
Patent number: 10230749Abstract: Techniques for automatically grouping malware based on artifacts are disclosed. In some embodiments, a system, process, and/or computer program product for automatically grouping malware based on artifacts includes receiving a plurality of samples for performing automated malware analysis to generate log files based on the automated malware analysis; processing the log files to extract features associated with malware; clustering the plurality of samples based on the extracted features; and performing an action based on the clustering output.Type: GrantFiled: February 29, 2016Date of Patent: March 12, 2019Assignee: Palo Alto Networks, Inc.Inventors: Shadi Rostami-Hesarsorkh, Sudarshan Vasudevan, William Redington Hewlett, II, Farshad Rostamabadi
-
Patent number: 10200390Abstract: Techniques for automatically determining whether malware samples are similar are disclosed. In some embodiments, a system, process, and/or computer program product for automatically determining whether malware samples are similar includes receiving a plurality of samples for performing automated malware analysis to generate log files based on the automated malware analysis; comparing the log files based on the automated malware analysis; determining whether any of the plurality of samples are similar based on the comparison of the log files based on the automated malware analysis; and performing an action based on determining that at least two samples are similar.Type: GrantFiled: February 29, 2016Date of Patent: February 5, 2019Assignee: Palo Alto Networks, Inc.Inventors: Shadi Rostami-Hesarsorkh, Sudarshan Vasudevan, Farshad Rostamabadi
-
Patent number: 10200389Abstract: Techniques for a malware analysis platform for threat intelligence made actionable are disclosed. In some embodiments, a system, process, and/or computer program product for a malware analysis platform for threat intelligence made actionable includes receiving a plurality of samples for performing automated malware analysis to generate log files based on the automated malware analysis; processing the log files to determine artifacts associated with malware; and performing an action based on an artifact.Type: GrantFiled: February 29, 2016Date of Patent: February 5, 2019Assignee: Palo Alto Networks, Inc.Inventors: Farshad Rostamabadi, Shadi Rostami-Hesarsorkh, Sudarshan Vasudevan
-
Publication number: 20170250997Abstract: Techniques for alerting and tagging using a malware analysis platform for threat intelligence made actionable are disclosed. In some embodiments, a system, process, and/or computer program product for alerting and tagging using a malware analysis platform for threat intelligence made actionable includes receiving a plurality of samples for performing automated malware analysis to generate log files based on the automated malware analysis; processing the log files to extract artifacts associated with the log files; determining whether a tag matches any of the plurality of samples based on the artifacts; and performing an action based on whether the tag matches any of the plurality of samples.Type: ApplicationFiled: February 29, 2016Publication date: August 31, 2017Inventors: Farshad Rostamabadi, Shadi Rostami-Hesarsorkh, Sudarshan Vasudevan, Bilal Malik
-
Publication number: 20170251002Abstract: Techniques for a malware analysis platform for threat intelligence made actionable are disclosed. In some embodiments, a system, process, and/or computer program product for a malware analysis platform for threat intelligence made actionable includes receiving a plurality of samples for performing automated malware analysis to generate log files based on the automated malware analysis; processing the log files to determine artifacts associated with malware; and performing an action based on an artifact.Type: ApplicationFiled: February 29, 2016Publication date: August 31, 2017Inventors: Farshad Rostamabadi, Shadi Rostami-Hesarsorkh, Sudarshan Vasudevan
-
Publication number: 20170251003Abstract: Techniques for automatically determining whether malware samples are similar are disclosed. In some embodiments, a system, process, and/or computer program product for automatically determining whether malware samples are similar includes receiving a plurality of samples for performing automated malware analysis to generate log files based on the automated malware analysis; comparing the log files based on the automated malware analysis; determining whether any of the plurality of samples are similar based on the comparison of the log files based on the automated malware analysis; and performing an action based on determining that at least two samples are similar.Type: ApplicationFiled: February 29, 2016Publication date: August 31, 2017Inventors: Shadi Rostami-Hesarsorkh, Sudarshan Vasudevan, Farshad Rostamabadi
-
Patent number: 8644329Abstract: A power aware Point-Of-Presence design and auto-configuration method is disclosed for configuring which network elements within a point-of-presence are powered so as to accommodate anticipated traffic while minimizing power consumption. The IP power aware Point-Of-Presence design and auto-configuration method includes a set of activation thresholds associated with each port in the Point-of-Presence that indicates that the port should be activated when the traffic demand exceeds the threshold. The power aware Point-Of-Presence design and auto-configuration method is particularly useful for providing a configuration which accounts for both external and internal link traffic demand and has the further advantage of ordering the port activation such that only a minimum number of activation and deactivation operations to satisfy a new demand is required. This property is advantageous for limiting the routing instabilities caused by topological changes in response to varying demand.Type: GrantFiled: May 4, 2012Date of Patent: February 4, 2014Assignee: Alcatel LucentInventors: Yigal Bejerano, Sudarshan Vasudevan
-
Publication number: 20130294454Abstract: A power aware Point-Of-Presence design and auto-configuration method is disclosed for configuring which network elements within a point-of-presence are powered so as to accommodate anticipated traffic while minimizing power consumption. The IP power aware Point-Of-Presence design and auto-configuration method includes a set of activation thresholds associated with each port in the Point-of-Presence that indicates that the port should be activated when the traffic demand exceeds the threshold. The power aware Point-Of-Presence design and auto-configuration method is particularly useful for providing a configuration which accounts for both external and internal link traffic demand and has the further advantage of ordering the port activation such that only a minimum number of activation and deactivation operations to satisfy a new demand is required. This property is advantageous for limiting the routing instabilities caused by topological changes in response to varying demand.Type: ApplicationFiled: May 4, 2012Publication date: November 7, 2013Applicant: Alcatel-Lucent USA Inc.Inventors: Yigal Bejerano, Sudarshan Vasudevan