Patents by Inventor Vladimir V. Krylov

Vladimir V. Krylov has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10902118
    Abstract: Disclosed are systems and methods for training and retraining a model for detection of malicious activity from container files, which contain at least two or more objects constituting logically separate data regions. Parameters of each object chosen from at least one safe container and one malicious container are determined which uniquely characterize the functional relation of the mentioned object to at least one selected object. Convolutions are formed separately for each container on the basis of the determined parameters of the objects, which are used to train a machine learning model for detecting malicious container files.
    Type: Grant
    Filed: September 7, 2018
    Date of Patent: January 26, 2021
    Assignee: AO KASPERSKY LAB
    Inventors: Vladimir V. Krylov, Alexander V. Liskin, Alexey E. Antonov
  • Patent number: 10867038
    Abstract: A system and method is provided for determining whether an electronic file is malicious. An exemplary method includes extracting resources from an electronic file; forming a first rule that establishes a functional dependency between the extracted resources; identifying, in a database of malicious file resources, a second rule associated with one or more of the extracted resources; comparing the formed first rule with the identified second rule to calculate a degree of similarity between first and second rules; and determining the electronic file to be a malicious file when the calculated degree of similarity exceeds a predetermined threshold value.
    Type: Grant
    Filed: August 4, 2017
    Date of Patent: December 15, 2020
    Assignee: AO KASPERSKY LAB
    Inventors: Vladimir V. Krylov, Alexander V. Liskin
  • Patent number: 10838748
    Abstract: Disclosed are systems and methods for emulating execution of a file based on emulation time. In one aspect, an exemplary method comprises, generating an image of a file, emulating an execution of instructions from the image for a predetermined emulation time, the emulation including: when an emulation of an execution of instruction from an image of another file is needed, generating an image of the another file, detecting known set of instructions in portions read from the image, inserting a break point into a position in the generated image corresponding to a start of the detected set of instructions, emulating execution of the another file by emulating execution of instructions from the generated image, and adding corresponding records to an emulation log, and reading a next portion from the image of the another file and repeating the emulation until the predetermined emulation time has elapsed.
    Type: Grant
    Filed: September 3, 2019
    Date of Patent: November 17, 2020
    Assignee: AO Kaspersky Lab
    Inventors: Alexander V. Liskin, Vladimir V. Krylov
  • Patent number: 10713359
    Abstract: Disclosed are systems and methods for detection of malicious intermediate language files. In one exemplary aspect, the system comprises a database comprising hashes of known malicious files, a resource allocation module configured to select a set of resources from a file being analyzed, a hash calculation module, coupled to the resource allocation module, configured to calculate a perceptive hash of the set of resources; and an analysis module, coupled to the other modules, configured to identify a degree of similarly between the set of resources and a set of resources from known malicious files by comparing the perceptive hash with perceptive hashes of the set of resources from known malicious files, determine a harmfulness of the file being analyzed based on the degree of similarity and remove or quarantine the file being analyzed when the harmfulness exceeds a predetermined threshold.
    Type: Grant
    Filed: March 29, 2018
    Date of Patent: July 14, 2020
    Assignee: AO Kaspersky Lab
    Inventors: Vladimir V. Krylov, Alexander V. Liskin, Alexey E. Antonov
  • Publication number: 20190391830
    Abstract: Disclosed are systems and methods for emulating execution of a file based on emulation time. In one aspect, an exemplary method comprises, generating an image of a file, emulating an execution of instructions from the image for a predetermined emulation time, the emulation including: when an emulation of an execution of instruction from an image of another file is needed, generating an image of the another file, detecting known set of instructions in portions read from the image, inserting a break point into a position in the generated image corresponding to a start of the detected set of instructions, emulating execution of the another file by emulating execution of instructions from the generated image, and adding corresponding records to an emulation log, and reading a next portion from the image of the another file and repeating the emulation until the predetermined emulation time has elapsed.
    Type: Application
    Filed: September 3, 2019
    Publication date: December 26, 2019
    Inventors: Alexander V. Liskin, Vladimir V. Krylov
  • Patent number: 10437618
    Abstract: Disclosed are systems and methods for emulating execution of a file. An image of a file is formed, which is comprised of instructions read from the file. An analysis module detects at least one known set of instructions in a portion read from the file, and inserts a break point into a position in the generated image of the file corresponding to a start of the detected set of instructions. An emulation module emulates execution of the file by emulating execution of instructions from the generated image of the file and adding corresponding records to an emulation log associated with the emulated execution of the at least one known set of instructions.
    Type: Grant
    Filed: October 12, 2017
    Date of Patent: October 8, 2019
    Assignee: AO Kaspersky Lab
    Inventors: Alexander V. Liskin, Vladimir V. Krylov
  • Publication number: 20190243972
    Abstract: Disclosed are systems and methods for training and retraining a model for detection of malicious activity from container files, which contain at least two or more objects constituting logically separate data regions. Parameters of each object chosen from at least one safe container and one malicious container are determined which uniquely characterize the functional relation of the mentioned object to at least one selected object. Convolutions are formed separately for each container on the basis of the determined parameters of the objects, which are used to train a machine learning model for detecting malicious container files.
    Type: Application
    Filed: September 7, 2018
    Publication date: August 8, 2019
    Inventors: Vladimir V. KRYLOV, Alexander V. LISKIN, Alexey E. ANTONOV
  • Publication number: 20190102549
    Abstract: Disclosed are systems and methods for detection of malicious intermediate language files. In one exemplary aspect, the system comprises a database comprising hashes of known malicious files, a resource allocation module configured to select a set of resources from a file being analyzed, a hash calculation module, coupled to the resource allocation module, configured to calculate a perceptive hash of the set of resources; and an analysis module, coupled to the other modules, configured to identify a degree of similarly between the set of resources and a set of resources from known malicious files by comparing the perceptive hash with perceptive hashes of the set of resources from known malicious files, determine a harmfulness of the file being analyzed based on the degree of similarity and remove or quarantine the file being analyzed when the harmfulness exceeds a predetermined threshold.
    Type: Application
    Filed: March 29, 2018
    Publication date: April 4, 2019
    Inventors: Vladimir V. Krylov, Alexander V. Liskin, Alexey E. Antonov
  • Publication number: 20190056963
    Abstract: Disclosed are systems and methods for emulating execution of a file. An image of a file is formed, which is comprised of instructions read from the file. An analysis module detects at least one known set of instructions in a portion read from the file, and inserts a break point into a position in the generated image of the file corresponding to a start of the detected set of instructions. An emulation module emulates execution of the file by emulating execution of instructions from the generated image of the file and adding corresponding records to an emulation log associated with the emulated execution of the at least one known set of instructions.
    Type: Application
    Filed: October 12, 2017
    Publication date: February 21, 2019
    Inventors: Alexander V. Liskin, Vladimir V. Krylov
  • Publication number: 20180365420
    Abstract: A system and method is provided for determining whether an electronic file is malicious. An exemplary method includes extracting resources from an electronic file; forming a first rule that establishes a functional dependency between the extracted resources; identifying, in a database of malicious file resources, a second rule associated with one or more of the extracted resources; comparing the formed first rule with the identified second rule to calculate a degree of similarity between first and second rules; and determining the electronic file to be a malicious file when the calculated degree of similarity exceeds a predetermined threshold value.
    Type: Application
    Filed: August 4, 2017
    Publication date: December 20, 2018
    Inventors: Vladimir V. Krylov, Alexander V. Liskin
  • Publication number: 20160188125
    Abstract: A system for real-time interactive presentation, the system communicatively coupled to a network for access by a plurality of user devices comprising a database to store information relating to a plurality of presentations, at least one processor executing instructions stored in non-transitory memory that cause the processor to: receive a presentation in a first format from a presenter user device, convert the presentation to an HTML5 format, embed at least one HMTL5 interactive object into the converted presentation, store the converted presentation including the at least one HTML5 interactive embedded object in the database, upon a request received from a first user device for the converted presentation, transmit the converted presentation including the at least one HTML5 interactive embedded object to the first user device, wherein the presentation including the at least one HTML5 interactive embedded object is rendered for viewing on a display of the first user device, and receive and store first user inp
    Type: Application
    Filed: August 24, 2015
    Publication date: June 30, 2016
    Inventors: Diego Andres Kaplan, Stephen G. Petilli, Mohammed Fathi Hakam, Colin Ayer, Geraldine Cerkovnik, Gavin S. Petilli, Konstantin G. Mikhailov, Anton S. Pavlov, Vladimir V. Krylov, Alexey Zaytsev, Olga Audzit, Oleg Brichev, Dmitriy Yaroslavlev
  • Publication number: 20140369249
    Abstract: A method of multicast data transmission from a web server to client terminal devices using a wireless local area network (WLAN) includes, before transmitting data from the web server, data preprocessing including data object type identification, forming of one or several logical channels in the overall bandwidth of a WLAN for each data object type, fragmentation of data objects into multiple data packets, and marking of each data packet with a header which contains at least transmission parameters. Data packets with headers are transmitted within the logical channels by data type, in a cyclic retranslation mode or by duplicating data packets and transmitting copies with delay.
    Type: Application
    Filed: December 23, 2013
    Publication date: December 18, 2014
    Applicant: TECHNOLOGIES FOR PRESENTATION, LLC
    Inventors: Konstantin G. Mikhailov, Nikolay N. Mikhaylov, Anton S. Pavlov, Vladimir V. Krylov