Virus Detection Patents (Class 726/24)
  • Patent number: 12261824
    Abstract: An application executing on an endpoint accesses remote resources using a gateway. In response to a requested remote access, the application may be marked with a descriptor that specifies a target action and a pattern of occurrences of the target action. When a second observable action on the endpoint includes the pattern of events following the first observable action, a reportable event may be generated indicating a compromised state of the endpoint. The gateway can then regulate usage of the remote resource based on the reportable event.
    Type: Grant
    Filed: October 4, 2021
    Date of Patent: March 25, 2025
    Assignee: Sophos Limited
    Inventors: Andrew J. Thomas, Neil Robert Tyndale Watkiss, Daniel Salvatore Schiappa, Kenneth D. Ray
  • Patent number: 12259979
    Abstract: A method and a computer system are disclosed for determining a threat score of an electronic document comprising the steps of: loading and rendering the electronic document in a document sandbox, controlling the document sandbox to simulate user interaction with the electronic document, while loading and rendering the electronic document and while controlling the document sandbox to simulate user interaction with the electronic document, monitoring the document sandbox for events triggered by the electronic document and belonging to one of at least two predefined event classes, recording each observed event together with a respective event class to which each observed event belongs, and determining a threat score of the electronic document based on predefined numerical weights associated with each of the predefined event classes to which the recorded events belong.
    Type: Grant
    Filed: July 4, 2017
    Date of Patent: March 25, 2025
    Assignee: CYAN SECURITY GROUP GMBH
    Inventors: Peter Arnoth, Markus Cserna
  • Patent number: 12248572
    Abstract: In some embodiments, a method includes processing at least a portion of a received file into a first set of fragments and analyzing each fragment from the first set of fragments using a machine learning model to identify within each fragment first information potentially relevant to whether the file is malicious. The method includes forming a second set of fragments by combining adjacent fragments from the first set of fragments and analyzing each fragment from the second set of fragments using the machine learning model to identify second information potentially relevant to whether the file is malicious. The method includes identifying the file as malicious based on the first information within at least one fragment from the first set of fragments and the second information within at least one fragment from the second set of fragments. The method includes performing a remedial action based on identifying the file as malicious.
    Type: Grant
    Filed: March 20, 2023
    Date of Patent: March 11, 2025
    Assignee: Sophos Limited
    Inventors: Joshua Daniel Saxe, Richard Harang
  • Patent number: 12248574
    Abstract: A method provides a set of computer data statistical profiles derived from a corresponding set of samples of computer data to a ransomware detection system and obtains a prediction of the likelihood of a ransomware attack in the set of samples of computer data. The system utilizes a machine learning system trained to achieve data models, with each model trained initially on a corresponding cluster of curated computer data statistics profiles, each cluster including statistics characterizing a corresponding cluster of curated samples resulting from exposing a selection of raw data samples to processing by actual ransomware. Each model is subject to iterations against initial validation data until performance convergences, with sample sources from the same backups not being present in both training and validation models. The models have been subject to final validation against actual customer data to address data drift that would otherwise result in excessive false predictions.
    Type: Grant
    Filed: July 18, 2024
    Date of Patent: March 11, 2025
    Assignee: Index Engines Inc.
    Inventors: Ben Henry McMillan, Jr., Jairo Orlando Esteban
  • Patent number: 12244580
    Abstract: A gateway device between a first and second communication network outside the gateway device handles communication between a first device in the first network and a second device in the second network. When the gateway receives a communication request from the first device, directed to the second device, for performing a first cryptographic data communication protocol, the gateway determines whether the first cryptographic data communication protocol is registered as unsafe in the gateway device, and/or registered as safe, in particular whether it is safe against key reconstruction by a quantum computer. When the first cryptographic data communication protocol is not registered as unsafe in the gateway device, and/or registered as safe, the gateway device forwards messages exchanged as part of execution of the first cryptographic data communication protocol between the first and second device.
    Type: Grant
    Filed: January 12, 2024
    Date of Patent: March 4, 2025
    Assignee: Nederlandse Organisatie voor toegepast-natuurwetenschappelijk onderzoek TNO
    Inventors: Nicolaas Leonardus Maria Van Adrichem, Maran Paula Petronella Van Heesch, Piotr Wojciech Zuraniewski, Jeffrey Jermain Panneman
  • Patent number: 12229259
    Abstract: A method and a system for detecting malicious files in non-isolated environment are provided. The method comprises, during a training phase: acquiring a plurality of executable files, analyzing a given executable file to obtain: (i) data associated with the given executable file; (ii) a control-flow graph associated with the given executable file, and (iii) a data-flow graph associated with the given executable file; determining, based on the data, parameters of the given executable file; generating, by the processor, based on the parameters, at least a first feature vector and a second feature vector; generating, by the processor, based on the control-flow graph, a third feature vector; generating, by the processor, based on the data-flow graph, a fourth feature vector; and training the each one of ensemble of classifiers based on a respective feature vector to determine if a given in-use executable file is one of malicious and non-malicious.
    Type: Grant
    Filed: January 27, 2022
    Date of Patent: February 18, 2025
    Assignee: F.A.C.C.T. NETWORK SECURITY LLC
    Inventor: Nikolay Sergeevich Prudkovskij
  • Patent number: 12210654
    Abstract: Embodiments of non-transitory computer readable mediums for displaying a remote browser isolation (RBI) protected browser are disclosed. In an embodiment, a non-transitory computer readable medium includes instructions to be executed in a computer system, where the instructions when executed in the computer system perform a method including displaying an RBI protected browser, displaying a border at least partially around the RBI protected browser, and displaying a security feature within the border, where the border and the security feature indicate to a user that the RBI protected browser is RBI protected.
    Type: Grant
    Filed: July 7, 2022
    Date of Patent: January 28, 2025
    Assignee: Versa Networks, Inc.
    Inventors: Harnish Narendra Goradia, Stephen Gerard Frost
  • Patent number: 12210662
    Abstract: According to aspect of the disclosure, there are provided methods and apparatus for connecting a peripheral device to a computer system, including an apparatus for interfacing with a peripheral device, the apparatus comprising a port configured to couple to the peripheral device, a processor, a memory coupled to the processor and comprising a software module comprising instructions that when executed on the processor protect the device from a peripheral device coupled to the port, and a hardware security controller coupled to the port, the hardware security controller configured to monitor execution of the software module by the processor and to disable the port in response to determining that the software module is not executing.
    Type: Grant
    Filed: November 26, 2019
    Date of Patent: January 28, 2025
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Joshua Serratelli Schiffman, Boris Balacheff, Richard Alden Bramley, Jr., Valiuddin Ali
  • Patent number: 12212587
    Abstract: Methods, computer-readable media, software, and apparatuses may assist a consumer in keeping track of a consumer's accounts in order to prevent unauthorized access or use of the consumer's identified subscriptions and financial accounts. The identified subscriptions and financial accounts may be displayed to the consumer along with recommendations and assistance for closing unused or unwanted financial accounts and subscriptions to prevent unauthorized access or use.
    Type: Grant
    Filed: September 12, 2023
    Date of Patent: January 28, 2025
    Assignee: Allstate Insurance Company
    Inventors: Jason D. Park, John S. Parkinson
  • Patent number: 12210614
    Abstract: Embodiments of a method and non-transitory computer readable mediums for displaying remote browser isolation (RBI) protected browsing are disclosed. In an embodiment, a method for RBI protected browsing, the method comprising initiating, by a device, RBI protected browsing via an RBI server, and displaying, by the device, an RBI protected browser, a border at least partially around the RBI protected browser, and a security feature within the border, where the border and the security feature indicate the RBI protected browsing to a user.
    Type: Grant
    Filed: July 7, 2022
    Date of Patent: January 28, 2025
    Assignee: Versa Networks, Inc.
    Inventors: Harnish Narendra Goradia, Stephen Gerard Frost
  • Patent number: 12204496
    Abstract: A plurality of computing devices are communicatively coupled to each other via a network, and each of the plurality of computing devices is operably coupled to one or more of a plurality of storage devices. A plurality of failure resilient address spaces are distributed across the plurality of storage devices such that each of the plurality of failure resilient address spaces spans a plurality of the storage devices. The plurality of computing devices maintains metadata that maps each failure resilient address space to one of the plurality of computing devices. The metadata is grouped into buckets. Each bucket is stored in a group of computing devices. However, only the leader of the group is able to directly access a particular bucket at any given time.
    Type: Grant
    Filed: November 3, 2023
    Date of Patent: January 21, 2025
    Assignee: Weka.IO Ltd.
    Inventors: Maor Ben Dayan, Omri Palmon, Liran Zvibel
  • Patent number: 12204652
    Abstract: A computer-implemented method, computer program product and computing system for: obtaining one or more artifacts concerning a detected security event; obtaining artifact information concerning the one or more artifacts; and generating a conclusion concerning the detected security event based, at least in part, upon the detected security event, the one or more artifacts, and the artifact information.
    Type: Grant
    Filed: May 3, 2022
    Date of Patent: January 21, 2025
    Assignee: RELIAQUEST HOLDINGS, LLC
    Inventors: Brian P. Murphy, Joe Partlow, Colin O'Connor, Jason Pfeiffer
  • Patent number: 12174957
    Abstract: A virus scanning router may manages a local network, including routing network traffic between devices on the network and routing network traffic being sent to and from such devices via an external communication system. The virus scanning router remotely scans for viruses the files stored on one or more such devices on the network. The virus scanning router may be a device trusted by the other devices on local network to facilitate the virus scanning router reading and scanning one or more files stored on such devices for viruses. The virus scanning router also takes corrective actions such as isolating the infected device or isolating an affected network zone to which the remote device belongs.
    Type: Grant
    Filed: November 3, 2023
    Date of Patent: December 24, 2024
    Assignee: DISH Technologies L.L.C.
    Inventor: William Michael Beals
  • Patent number: 12174959
    Abstract: Automatic generation of a malware signature is disclosed. Code of a sample including packages and function names is parsed. Standard type packages and vendor type packages are filtered from the code of the sample to obtain main type packages. A signature using a fuzzy hash for the sample is generated based on the main type packages. A determination of whether the sample is malware is performed using the signature and a similarity score threshold.
    Type: Grant
    Filed: February 7, 2022
    Date of Patent: December 24, 2024
    Assignee: Palo Alto Networks, Inc.
    Inventors: Yang Ji, Tyler Pals Halfpop, Zihang Xiao, Wenjun Hu
  • Patent number: 12160745
    Abstract: A method for processing, by a device in a network, an alert message received by user equipment connected to the network. The alert message indicates detection of an anomaly by the user equipment in traffic transmitted via the network. The processing method includes: obtaining from the alert message at least one piece of information which is representative of at least one user equipment constraint; processing, by means of an algorithm for detecting cyber attacks, traffic characteristics provided by the user equipment and associated with the detected anomaly, the algorithm for detecting cyber attacks being chosen and/or configured according to the at least one piece of information; and determining from the at least one piece of information, according to an outcome of the processing, and if a cyber attack is detected, a response to the user equipment regarding the detected anomaly.
    Type: Grant
    Filed: April 15, 2020
    Date of Patent: December 3, 2024
    Assignee: ORANGE
    Inventors: Hichem Sedjelmaci, Tony Capo-Chichi
  • Patent number: 12160808
    Abstract: A system, method and storage medium for operating a stealth mode of an emergency vehicle includes receiving input data including at least one of an input from an operator or one or more program input parameters; determining a data operation mode based on the received input data, wherein the data operation mode is one of a normal mode and one or more stealth modes; and generating a control signal based on the determined operation mode. When the data operation mode is one of the one or more stealth modes, the control signal is adapted to control a first device to suspend a transmission of at least one data group among candidate suspended data to at least one second device in communication with the first device.
    Type: Grant
    Filed: December 13, 2021
    Date of Patent: December 3, 2024
    Assignee: WHELEN ENGINEERING COMPANY, INC.
    Inventor: George W. Whelen
  • Patent number: 12156109
    Abstract: A method of re-establishing a connection between a LWM2M client and an LWM2M server following a reconnection of the LWM2M client to the LWM2M server includes determining, at the LWM2M client, a state of the LWM2M client device prior to reconnection of the LWM2M client, transmitting, to the LWM2M server, an indication of the state of the LWM2M client prior to reconnection of the LWM2M client, and receiving a response from the LWM2M server indicating whether the indicated state of the LWM2M client is an expected state or an unexpected state of the LWM2M client.
    Type: Grant
    Filed: November 7, 2018
    Date of Patent: November 26, 2024
    Assignee: Telefonaktiebolaget LM Ericsson (publ)
    Inventors: Ari Keränen, Jari Arkko
  • Patent number: 12155626
    Abstract: In one embodiment, a computing platform features a controller in communication with one or more virtual private cloud networks, including a first virtual private cloud network (VPC). The virtual private cloud network includes at least a first egress filtering gateway configured to filter egress traffic data received from a first gateway and route the filtered egress traffic data to a public network in accordance with a first set of filter rules. The first set of filter rules are included as part of a first security policy provided by the controller.
    Type: Grant
    Filed: August 18, 2021
    Date of Patent: November 26, 2024
    Assignee: Aviatrix Systems, Inc.
    Inventors: Xiaobo Sherry Wei, Lee-Chik Cheung
  • Patent number: 12141282
    Abstract: Methods, apparatus, systems, and articles of manufacture are disclosed that augment classification for low prevalence samples. An example non-transitory computer readable medium comprises instructions that, when executed, causes a machine to at least classify a data sample using a first classifier, classify the data sample using a second classifier different from the first classifier, the second classifier using a plurality of sensitive hashing (LSH) forests to analyze a sorted plurality of neighbor samples, determine whether a first classification result of the first classifier meets or exceeds a confidence threshold, in response to the first classification result of the first classifier meeting or exceeding the confidence threshold, output the first classification result, and in response to the first classification result of the first classifier not meeting or exceeding the confidence threshold, output a second classification result of the second classifier.
    Type: Grant
    Filed: December 31, 2021
    Date of Patent: November 12, 2024
    Assignee: McAfee, LLC
    Inventors: German Lancioni, Jonathan King
  • Patent number: 12141283
    Abstract: A rootkit detection system and method analyzes memory dumps to determine connections between intercepted system driver operations requested by unknown files and changes in system memory before and after those operations. Memory dump differences and I/O buffers are analyzed with machine learning models to identify clustered features associated with rootkits.
    Type: Grant
    Filed: December 30, 2021
    Date of Patent: November 12, 2024
    Assignee: Acronis International GmbH
    Inventors: Vladimir Strogov, Sergey Ulasen, Serguei Beloussov, Stanislav Protasov
  • Patent number: 12141278
    Abstract: A computer-implemented method for detecting a security status of a computer system may include: in response to satisfaction of a predetermined trigger condition associated with an electronic application installed on a memory of the computer system, performing a security check process on the computer system; in response to the security check process determining that a security status of the computer system is currently compromised, performing a first security action; and in response to the security check process determining that the security status is formerly compromised, performing a second security action.
    Type: Grant
    Filed: August 15, 2022
    Date of Patent: November 12, 2024
    Assignee: Capital One Services, LLC
    Inventor: Jon Whitmore
  • Patent number: 12130949
    Abstract: An inspection device supports work related to ensuring security by including: a conversion unit that converts a regular expression of a first signature into a first representation by a nondeterministic finite automaton and converts a regular expression of a second signature into a second representation by a nondeterministic finite automaton; a determination unit that determines the presence or absence of an inclusive relationship between the first representation and the second representation; and an output unit that when a result of determination by the determination unit indicates that the first representation and the second representation have an inclusive relationship, outputs information indicating that the first signature and the second signature have the inclusive relationship.
    Type: Grant
    Filed: January 27, 2020
    Date of Patent: October 29, 2024
    Assignee: Nippon Telegraph and Telephone Corporation
    Inventor: Yoshihide Nakagawa
  • Patent number: 12130919
    Abstract: The present disclosure is directed to monitoring internal process memory of a computer at a time with program code executes. Methods and apparatus consistent with the present disclosure monitor the operation of program code with the intent of detecting whether received program inputs may exploit vulnerabilities that may exist in the program code at runtime. By detecting suspicious activity or malicious code that may affect internal process memory at run-time, methods and apparatus described herein identify suspected malware based on suspicious actions performed as program code executes. Runtime exploit detection may detect certain anomalous activities or chain of events in a potentially vulnerable application during execution. These events may be detected using instrumentation code when a regular code execution path of an application is deviated from.
    Type: Grant
    Filed: January 10, 2023
    Date of Patent: October 29, 2024
    Assignee: SONICWALL INC.
    Inventors: Soumyadipta Das, Sai Sravan Kumar Ganachari, Yao He, Aleksandr Dubrovsky
  • Patent number: 12124568
    Abstract: Malware prevention and remediation is provided by monitoring actions performed by processes and maintaining indications of which processes are trusted; selectively presenting canary files to these processes, which includes presenting the canary files to processes not indicated as being trusted and hiding the canary files from processes indicated as being trusted, and where the monitoring includes monitoring for access of canary files with change privileges; scoring each of the processes based on the actions performed, including any access of canary files with change privileges, which scoring produces a malice score for each process; and automatically terminating any process for which its malice score indicates at least a threshold level of malice in the execution of the process.
    Type: Grant
    Filed: April 20, 2021
    Date of Patent: October 22, 2024
    Assignee: Assured Information Security, Inc.
    Inventors: Sean Laplante, Patrick McHarris
  • Patent number: 12124574
    Abstract: A system and method for malware classification using machine learning models trained using synthesized feature sets based on features extracted from samples of known malicious objects and known safe objects. The synthesized feature sets act as virtual samples for training a machine learning classifier to recognize new objects in the wild that are likely to be malicious.
    Type: Grant
    Filed: December 27, 2021
    Date of Patent: October 22, 2024
    Assignee: Acronis International GmbH
    Inventors: Sergey Ulasen, Vladimir Strogov, Serguei Beloussov, Stanislav Protasov
  • Patent number: 12118087
    Abstract: File risk and malware detection and classification can be enhanced using machine learning analysis of content disarm and reconstruction (CDR) output. Correlations can be discovered or analyzed between individual elements of such outputs, which can include an XML report. Such correlations can provide useful information on threat intelligence and help validate content disarm and reconstruction. A method can include training machine learning algorithms with a dataset derived from CDR results from test files labelled as malicious or not malicious; instructing algorithms to predict probabilities; and determining correlation between the report items and malware (for example, using the function feature importances and the SHAP value method).
    Type: Grant
    Filed: January 28, 2022
    Date of Patent: October 15, 2024
    Assignee: Glasswall (IP) Limited
    Inventors: Petra Vukmirovic, Matthew James Cavey, Matthew James Dignum
  • Patent number: 12113809
    Abstract: Artificial Intelligence (“AI”) apparatus and method are provided that correlate and consolidate operation of discrete vendor tools for detecting cyberthreats on a network. An AI engine may filter false positives and eliminate duplicates within cyberthreats detected by multiple vendor tools. The AI engine provides machine learning solutions to complexities associated with translating vendor-specific cyberthreats to known cyberthreats. The AI engine may ingest data generated by the multiple vendor tools. The AI engine may classify hardware devices or software applications scanned by each vendor tool. The AI engine may decommission vendor tools that provide redundant cyberthreat detection. The AI engine may display operational results on a dashboard directing cyberthreat defense teams to corroborated cyberthreats and away from false positives.
    Type: Grant
    Filed: January 15, 2021
    Date of Patent: October 8, 2024
    Assignee: Bank of America Corporation
    Inventors: Ajay Jose Paul, Ghada I. Khashab, Sidy Diop, Peggy J. Qualls, Anthony R. Bandos, Lori Mammoser
  • Patent number: 12105751
    Abstract: A file format identification system can predict file formats associated with binary data. The file format identification system can extract n-grams, such as byte 4-grams, from the binary data. A trained neural network with at least one embedding layer can generate embedding arrays that correspond to the extracted n-grams. A trained file format classifier can compare values in the embedding arrays with patterns of values associated with known file formats. The trained file format classifier can accordingly determine which of the known file formats are most likely to be associated with the binary data.
    Type: Grant
    Filed: May 19, 2022
    Date of Patent: October 1, 2024
    Assignee: CrowdStrike, Inc.
    Inventor: Marian Radu
  • Patent number: 12107872
    Abstract: Detection of command and control malware is disclosed. A network traffic session is monitored. Automatic feature identification for real-time malicious command and control traffic detection based on a request header of the monitored network traffic session using a deep learning model is performed.
    Type: Grant
    Filed: January 18, 2022
    Date of Patent: October 1, 2024
    Assignee: Palo Alto Networks, Inc.
    Inventors: Ajaya Neupane, Yuwen Dai, Stefan Achleitner, Yu Fu, Shengming Xu
  • Patent number: 12093382
    Abstract: Methods, apparatus, systems, and articles of manufacture are disclosed. In one example, an apparatus includes at least one memory, instructions, and processor circuitry. The processor circuitry at least executes or instantiates the instructions to receive a group of indicators from a campaign attack, then query an indicator database with an indicator from the group of indicators, and then predict an identification of the campaign attack in response to the indicator having a current deterministic indicator and confidence scoring (DISC) score in the indicator database, wherein the DISC score represents at least one of a lethality component, a determinism component, or a confidence component of the indicator.
    Type: Grant
    Filed: December 31, 2021
    Date of Patent: September 17, 2024
    Assignee: Musarubra US LLC
    Inventors: Christiaan Beek, John Fokker, Steve Grobman
  • Patent number: 12086249
    Abstract: A detection system for determining whether an update of at least one application installed on at least one whitelisted host is legitimate is provided. The system includes an update management server and update detectors installed with the application(s). During a process that software automatic update occurs in each update detector and a corresponding update installation package is executed, the executed update installation package generates at least one updater corresponding to each application. Each update detector transmits report information which includes the information of the at least one updater and sampled executable files to the update management server. The update management server obtains a number of update detectors, having performed the update operation of each application, according to the report information of each update detector. If the number is greater than or equal to a threshold value, it is determined that the update is legitimate.
    Type: Grant
    Filed: January 30, 2020
    Date of Patent: September 10, 2024
    Assignee: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTE
    Inventors: Tzi-Cker Chiueh, Lap-Chung Lam, Li-Ting Huang, Pan-Jo Chuang
  • Patent number: 12086235
    Abstract: Techniques for early exit dynamic analysis of a virtual machine are disclosed. In some embodiments, a system/process/computer program product for early exit dynamic analysis of a virtual machine includes initiating a dynamic analysis of a malware sample by executing the malware sample in a virtual computing environment; monitoring activities of the malware sample during execution of the malware sample in the virtual computing environment; and determining when to exit the dynamic analysis before a predetermined period of time.
    Type: Grant
    Filed: June 30, 2021
    Date of Patent: September 10, 2024
    Assignee: Palo Alto Networks, Inc.
    Inventors: Esmid Idrizovic, Daniel Raygoza, Robert Jung, Michael S. Hughes
  • Patent number: 12086250
    Abstract: Techniques are described for monitoring and analyzing input/output (I/O) messages for patterns indicative of ransomware attacks affecting computer systems of a cloud provider, and for performing various remediation actions to mitigate data loss once a potential ransomware attack is detected. The monitoring of I/O activity for such patterns is performed at least in part by I/O proxy devices coupled to computer systems of a cloud provider network, where an I/O proxy device is interposed in the I/O path between guest operating systems running on a computer system and storage devices to which I/O messages are destined. An I/O proxy device can analyze I/O messages for patterns indicative of potential ransomware attacks by monitoring for anomalous I/O patterns which may, e.g., be indicative of a malicious process attempting to encrypt or otherwise render in accessible a significant portion of one or more storage volumes as part of a ransomware attack.
    Type: Grant
    Filed: December 10, 2021
    Date of Patent: September 10, 2024
    Assignee: Amazon Technologies, Inc.
    Inventor: Eric Jason Brandwine
  • Patent number: 12079639
    Abstract: A device property control system determines whether a current user of a device is an owner of the device, a trusted secondary user of the device, or an untrusted secondary user of the device. The system maintains device property values for the owner as well as each trusted secondary user of the device. When the current user of the device changes, the system determines whether the current user is the owner or a trusted secondary user and if so changes the device property values to those previously used by the owner or one of the trusted secondary users (whichever is the current user of the device). However, if the current user is an untrusted secondary user, the device property control system changes the device property values to demonstration mode device property values that are expected to best demonstrate the capabilities of the device.
    Type: Grant
    Filed: April 1, 2021
    Date of Patent: September 3, 2024
    Assignee: Motorola Mobility LLC
    Inventors: Mayank Rajesh Gupta, Nadeem Nazarali Panjwani, Amit Kumar Agrawal
  • Patent number: 12079364
    Abstract: A server kernel processing system receives an input/output (I/O) request from a user mode computing environment. The I/O request is analyzed to determine whether it is a file open request. If so, target analysis logic determines whether the file open request is for a driver file or for a file within a protected volume that stores a driven whitelist file. If the file open request is for a file stored in a protected volume, the request is blocked. If the file open request is for a driver file, then the driver whitelist file is examined to determine whether the target driver is on the whitelist. If not, the file open request is also blocked.
    Type: Grant
    Filed: September 15, 2021
    Date of Patent: September 3, 2024
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Manoharan Kuppusamy, Dhananjay Ramakrishnappa, Shyam Arunkundram Ramprasad, Priyadarshi Ghosh
  • Patent number: 12079340
    Abstract: Methods and apparatus consistent with the present disclosure may be performed by a Cloud computing device may use instrumentation code that remains transparent to an application program that the instrumentation code has been injected into, may perform deep packet inspection (DPI) on computer data, or identify a content rating associated with computer data. In certain instances, data sets that include executable code may be received via packetized communications or be received via other means, such as, receiving a file from a data store. The present technique allows one or more processors executing instrumentation code to monitor actions performed by the program code included in a received data set. Malware can be detected using exception handling to track memory allocations of the program code included in the received data set. Furthermore, access to content associated with malware, potential malware, or with inappropriate content ratings may be blocked.
    Type: Grant
    Filed: September 19, 2023
    Date of Patent: September 3, 2024
    Assignee: SONICWALL INC.
    Inventors: Aleksandr Dubrovsky, Soumyadipta Das, Senthilkumar Gopinathan Cheetancheri
  • Patent number: 12079339
    Abstract: The disclosure herein describes the processing of malware scan requests from VCIs by an anti-malware scanner (AMS) on a host device. A malware scan request is received by the AMS from a VCI, the malware scan request including script data of a script from a memory buffer of the VCI. The AMS scans the script data of the malware scan request, outside of the VCI, and determines that the script includes malware. The AMS notifies the VCI that the script includes malware, whereby the VCI is configured to prevent execution of the script or take other mitigating action. The AMS provides scanning for fileless malware to VCIs on a host device without consuming or otherwise affecting resources of the VCIs.
    Type: Grant
    Filed: May 12, 2022
    Date of Patent: September 3, 2024
    Assignee: VMware, Inc.
    Inventors: Kedar Bhalchandra Chaudhari, Pranav Gokhale, Mandar Barve
  • Patent number: 12072978
    Abstract: A system for detection of files not matching a known malware file in a computing environment that includes a processor coupled to a memory storing instructions to permit the processor to function as an analyzer. The analyzer is configured to receive, as input, an unknown file and the known malware file, compare the unknown file to the known malware file by comparing N (where N is greater of equal to 1) blocks B1, . . . , BN of lengths L1, . . . , LN located at offsets O1, . . . , ON such that the number of blocks, lengths and offsets are calculated according to pre-defined algorithm, and output a value indicating that the unknown file is different from the known malware file if exists at least one j that a Bj block of the unknown file is different from a Bj block of the known malware file.
    Type: Grant
    Filed: February 24, 2022
    Date of Patent: August 27, 2024
    Assignee: Acronis International GmbH
    Inventors: Andrey Kulaga, Serguei Beloussov, Stanislav Protasov
  • Patent number: 12069076
    Abstract: A network device may include a memory and one or more processors configured to analyze execution of suspicious data; detect one or more states of execution of the suspicious data; determine that the one or more states of execution are to be assigned a priority level; and extract at least a portion of the suspicious data from one or more locations based on determining that the one or more states of execution are to be assigned a priority level.
    Type: Grant
    Filed: January 28, 2022
    Date of Patent: August 20, 2024
    Assignee: Juniper Networks, Inc.
    Inventors: Abhijit Mohanta, Anoop Wilbur Saldanha
  • Patent number: 12050945
    Abstract: A standalone storage product having: a first bus connector for connecting to an external processor; a second bus connector for connecting to an external network interface; a storage device accessible over the network interface; and a processing device configured to communicate, via the second bus connector, with the network interface to obtain storage access messages represented by incoming packets received at the network interface from a computer network. The processing device can: identify, from the storage access messages, first messages and second messages; provide, the first messages via the first bus connector, to the processor; and provide, the second messages, to the storage device without the second messages going through the processor. The storage device is configured to: receive, via the first bus connector, third messages from the processor; and execute commands in the second messages and the third messages to implement a network storage service.
    Type: Grant
    Filed: July 15, 2022
    Date of Patent: July 30, 2024
    Assignee: Micron Technology, Inc.
    Inventor: Luca Bert
  • Patent number: 12039034
    Abstract: Embodiments seek to prevent detection of a sandbox environment by a potential malware application. To this end, execution of the application is monitored, and provide information about the execution to a reinforcement learning machine learning model. The model generates a suggested modification to make to the executing application. The model is provided with information indicating whether the application executed successfully or not, and this information is used to train the model for additional modifications. By modifying the potential malware execution during its execution, detection of a sandbox environment is prevented, and analysis of the potential malware applications features are better understood.
    Type: Grant
    Filed: January 30, 2023
    Date of Patent: July 16, 2024
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Jugal Parikh, Geoffrey Lyall McDonald, Mariusz Hieronim Jakubowski, Seyed Mehdi Fatemi Booshehri, Allan Gordon Lontoc Sepillo, Bradley Noah Faskowitz
  • Patent number: 12039048
    Abstract: A system and method of deployment of malware detection traps by at least one processor may include performing a first interrogation of a first Network Asset (NA) of a specific NA family; determining, based on the interrogation, a value of one or more first NA property data elements of the first NA; obtaining one or more second NA property data elements corresponding to the specific NA family; integrating the one or more first NA property data elements and the one or more second NA property data elements to generate a template data element, corresponding to the specific NA family; producing, from the template data element, a malware detection trap module; and deploying, on one or more computing devices of a computer network, one or more instantiations of the malware detection trap module as decoys of the first NA.
    Type: Grant
    Filed: April 27, 2023
    Date of Patent: July 16, 2024
    Assignee: Commvault Systems, Inc.
    Inventors: Oleg Goldshmidt, Mori Benech
  • Patent number: 12028358
    Abstract: Methods, computer-readable media, software, and apparatuses may assist a consumer in keeping track of a consumer's accounts in order to prevent unauthorized access or use of the consumer's identified accounts. To discover the various accounts, the methods, computer-readable media, software, and apparatuses can monitor at least a consumer's email accounts, web browser history, and web cache. The discovered accounts may be displayed to the consumer along with recommendations and assistance for closing unused or unwanted accounts to prevent unauthorized access or use.
    Type: Grant
    Filed: February 1, 2023
    Date of Patent: July 2, 2024
    Assignee: Allstate Insurance Company
    Inventors: Jason D. Park, John S. Parkinson
  • Patent number: 12021879
    Abstract: A computer includes a processor and a memory, and the memory stores instructions executable by the processor to receive a plurality of first message patterns; receive a plurality of second message patterns; determine a set of differences between the first message patterns and the second message patterns; for at least one of the differences, determine a respective resolution in favor of either the first message patterns or the second message patterns; and generate a plurality of third message patterns. The message patterns define messaging between electronic control units on board a vehicle. The message patterns include values for attributes assigned to the respective message patterns. The third message patterns include the at least one resolution and commonalities between the first message patterns and the second message patterns.
    Type: Grant
    Filed: February 8, 2022
    Date of Patent: June 25, 2024
    Assignee: Ford Global Technologies, LLC
    Inventors: Jacob David Nelson, Venkata Kishore Kajuluri
  • Patent number: 12019746
    Abstract: An adaptive malware writing system includes a targeting engine that classifies malware candidates as a malicious candidate or a benign candidate through a surrogate model. The surrogate model assigns a weight to each byte of the malware candidates through a saliency vector. The sum of the weights render a malware classification score. An alteration engine alters a binary form of the malware candidates classified as malware by executing a functional analysis that traces application program interface calls and memory. The alteration engine alters the binary form of the malware candidates classified as malware to render a synthesized malware. The malware analysis determines if the synthesized malware is operational by comparing an image of the synthesized malware to an image of at least one of the plurality of malware candidates. A target classifier engine identifies the vulnerabilities of a targeted computer.
    Type: Grant
    Filed: June 28, 2022
    Date of Patent: June 25, 2024
    Assignee: UT-Battelle, LLC
    Inventors: Jared M. Smith, Luke Koch
  • Patent number: 12021685
    Abstract: Examples of the present disclosure describe systems and methods relating to adaptive virtual services. In an example, a user specifies a device configuration for a platform device. As a result, a service provider installs selected virtual-network functions and defines network connections as specified by the device configuration. Management software may also be installed, thereby enabling the service provider to communicate with and remotely manage the platform device. The installed virtual-network functions are activated on the platform device once it is delivered to the user. In some instances, the user changes the device configuration. For example, the user may install new virtual-network functions, reconfigure or remove existing virtual-network functions, or change defined network connections. As a result, the service provider reconfigures the platform device accordingly. Thus, the user need not purchase new specialized hardware in order to change the available functions of the computer network.
    Type: Grant
    Filed: May 8, 2023
    Date of Patent: June 25, 2024
    Assignee: Level 3 Communications, LLC
    Inventors: Adam Saenger, Matthew Holway, Len Brannen, Gene Clark, Anil Simlot, Zubin Ingah, Johan J. Shane, Michael Gibson, Cory Sawyer, Rich Cerami, Kurt Deshazer
  • Patent number: 12014066
    Abstract: A system includes control logic to boot to a waking state, configure the system, and check for the presence of non-volatile DIMMs. Based on a determination that non-volatile DIMMs are not present, the control logic is to create one or more block devices to overcome CPU utilization limitations. Based on a determination that non-volatile DIMMs are present, the control logic is to use a non-volatile DIMM for storage.
    Type: Grant
    Filed: September 2, 2022
    Date of Patent: June 18, 2024
    Assignee: SOFTIRON LIMITED
    Inventors: Kenny Van Alstyne, Phillip Edward Straw
  • Patent number: 12013929
    Abstract: Examples of the present disclosure describe systems and methods for detecting and mitigating stack pivoting exploits. In aspects, various “checkpoints” may be identified in software code. At each checkpoint, the current stack pointer, stack base, and stack limit for each mode of execution may be obtained. The current stack pointer for each mode of execution may be evaluated to determine whether the stack pointer falls within a stack range between the stack base and the stack limit of the respective mode of execution. When the stack pointer is determined to be outside of the expected stack range, a stack pivot exploit is detected and one or more remedial actions may be automatically performed.
    Type: Grant
    Filed: January 24, 2023
    Date of Patent: June 18, 2024
    Assignee: OPEN TEXT INC.
    Inventor: Andrew Sandoval
  • Patent number: 12010076
    Abstract: Systems and method for providing an application chatbot that provides a conversational interface that receives natural language input from an application user, interprets the user's intent, and uses application-related context for generating and providing a contextually accurate response in a conversation with the user. In some examples, the application chatbot determines an action to perform corresponding to the response and provides an option to perform the action in the conversational user interface. A selection of the option causes the action to be performed.
    Type: Grant
    Filed: June 12, 2023
    Date of Patent: June 11, 2024
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Felix Andrew, Ryan Gregory Cropp, Laurentiu T. Nedelcu
  • Patent number: RE50024
    Abstract: Computer systems and methods in various embodiments are configured for improving the security and efficiency of client computers interacting with server computers through supervising instructions defined in a web page and/or web browser. In an embodiment, a computer system comprising one or more processors, coupled to a remote client computer, and configured to send, to the remote client computer, one or more instructions, which when executed by the remote client computer, cause a run-time environment on the remote client computer to: intercept, within the run-time environment, a first call to execute a particular function defined in the run-time environment by a first caller function in the run-time environment; determine a first caller identifier, which corresponds to the first caller function identified in a run-time stack maintained by the run-time environment; determine whether the first caller function is authorized to call the particular function based on the first caller identifier.
    Type: Grant
    Filed: December 21, 2018
    Date of Patent: June 25, 2024
    Assignee: SHAPE SECURITY, INC.
    Inventors: Yao Zhao, Xinran Wang