Virus Detection Patents (Class 726/24)
  • Patent number: 9386031
    Abstract: Methods, systems, and computer programs for detecting targeted attacks on compromised computer. An example method includes receiving from a plurality of computer systems data about the network resource, wherein each of the plurality of computer systems has a set of parameters and associated parameter values; detecting presence of a suspect indicator in the respective data received from each of a first group of the plurality of computer systems; detecting absence of the suspect indicator in the respective data received from each of a second group of the plurality of computer systems; determining at least one suspect parameter and at least one suspect parameter value; and estimating a probability of the targeted attack from the network resource based on the suspect indicator, the at least one suspect parameter, and the at least one parameter value.
    Type: Grant
    Filed: September 12, 2014
    Date of Patent: July 5, 2016
    Assignee: AO Kaspersky Lab
    Inventor: Victor V. Yablokov
  • Patent number: 9384350
    Abstract: Signature compilation on a security device is disclosed. A first set of malware signatures is received. The first set of signatures is compiled at a first time. A second set of malware signatures is received. The second set of signatures is compiled at a second time that is different from the first time. A determination of whether a file is malicious is made based at least in part by performing a scan using the first and second compiled signatures.
    Type: Grant
    Filed: November 18, 2014
    Date of Patent: July 5, 2016
    Assignee: Palo Alto Networks, Inc.
    Inventors: Huagang Xie, Song Wang
  • Patent number: 9386028
    Abstract: Methods and systems for malware detection techniques, which detect malware by identifying the Command and Control (C&C) communication between the malware and the remote host, and distinguish between communication transactions that carry C&C communication and transactions of innocent traffic. The fine-granularity features are examined, which are present in the transactions and are indicative of whether the transactions are exchanged with malware. A feature comprises an aggregated statistical property of one or more features of the transactions, such as average, sum median or variance, or of any suitable function or transformation of the features.
    Type: Grant
    Filed: October 23, 2013
    Date of Patent: July 5, 2016
    Assignee: VERINT SYSTEMS LTD.
    Inventor: Yuval Altman
  • Patent number: 9378374
    Abstract: The present disclosure discloses method and device for prompting program uninstallation and belongs to the field of the Internet. The method comprises: performing a security assessment of an application program installed on a mobile terminal, thereby obtaining a security assessment result; obtaining security identification information corresponding to the security assessment result based on pre-stored correlations between security assessment results and security identification information; establishing a correlation between the obtained security identification information and the application program, and displaying the correlation to a user.
    Type: Grant
    Filed: October 29, 2013
    Date of Patent: June 28, 2016
    Assignee: TENCENT TECHNOLOGY (SHENZHEN) CO., LTD
    Inventors: Qing Wang, Hao Ran Guo, Yi Xia Yuan, Xun Chang Zhan, Chun You Lin, Peng Tao Li, Jia Shun Song
  • Patent number: 9372991
    Abstract: Prior to execution of computer program instructions, the computer identifies one or more addresses in memory corresponding to the locations of one or more of the computer program instructions in the computer program. During execution of the computer program instructions, the computer identifies in the computer program another computer program instruction located in another address in the memory, and in response, the computer makes an indication that the computer program has an indicia of maliciousness.
    Type: Grant
    Filed: March 6, 2012
    Date of Patent: June 21, 2016
    Assignee: International Business Machines Corporation
    Inventor: Philip D. Kaufman
  • Patent number: 9372989
    Abstract: A system, method and computer readable medium for detecting and diffusing malware on a computer. Malware is analyzed to generate signatures and determine a fixing moment. All of the system calls of the operating system of a client computer are hooked and processed without emulation or the need for unpackers or decrypters, and a multi-level filter removes all system calls that are not associated with malware. The resulting system calls are accumulated on a per-thread basis and scanned, and the relevant threads are compared with the signatures to match with malware. The threads associated with malware are addressed at the fixing moment before the malware can operate to cause undesirable effects on the client computer.
    Type: Grant
    Filed: February 13, 2014
    Date of Patent: June 21, 2016
    Assignee: SYSTEMS OF INFORMATION SECURITY 2012
    Inventors: Volodymyr Grystan, Evgeny Tumoyan, Ivan Romanenko, Anton Kukoba, Anatolii Sviridenkov, Rusin Dmitry Evgenyevich
  • Patent number: 9367692
    Abstract: A method and system for validating components during a booting process of a computing device are described herein. The method can include the steps of detecting a power up signal and in response to detecting the power up signal, progressively determining whether software components of the computing device are valid. If the software components are determined to be valid, the computing device may be permitted to move to an operational state. If, however, at least some of the software components are determined to be not valid, the computing device may be prevented from moving to the operational state. In one arrangement, if the computing device is prevented from moving to the operational state, corrective action can be taken in an effort to permit the computing device to move to the operational state.
    Type: Grant
    Filed: September 29, 2014
    Date of Patent: June 14, 2016
    Assignee: OPENPEAK INC.
    Inventors: John R. Brown, John Irwin Perret-Gentil
  • Patent number: 9367685
    Abstract: A device may identify a set of features associated with the unknown object. The device may determine, based on inputting the set of features into a threat prediction model associated with a set of security functions, a set of predicted threat scores. The device may determine, based on the set of predicted threat scores, a set of predicted utility values. The device may determine a set of costs corresponding to the set of security functions. The device may determine a set of predicted efficiencies, associated with the set of security functions, based on the set of predicted utility values and the set of costs. The device may identify, based on the set of predicted efficiencies, a particular security function, and may cause the particular security function to be executed on the unknown object. The device may determine whether another security function is to be executed on the unknown object.
    Type: Grant
    Filed: September 30, 2014
    Date of Patent: June 14, 2016
    Assignee: Juniper Networks, Inc.
    Inventors: Jacob Asher Langton, Daniel J. Quinlan
  • Patent number: 9367328
    Abstract: Embodiments of techniques and systems for out-of-band verification of host OS components are described. In embodiments, a out-of-band host OS boot sequence verification system (“BSVS”) may access system memory without detection by a host OS process, or “out of band.” The BSVS may access host OS components in the system memory and may generate signatures from memory footprints of the host OS components. These signatures may then be compared to trusted signatures to verify integrity of the host OS components. In embodiments, this verification may be performed during a boot of a host OS or on demand. In embodiments, the trusted signatures may be pre-stored by the BSVS before a boot; in some embodiments, the trusted signatures may be previously-computed and then stored by the BSVS. Other embodiments may be described and claimed.
    Type: Grant
    Filed: June 28, 2012
    Date of Patent: June 14, 2016
    Assignee: Intel Corporation
    Inventors: Daniel Nemiroff, Paul J. Thadikaran, Andrew H. Gafken, Purushottam Goel, Nicholas D. Triantafillou, Paritosh Saxena, Debra Cablao
  • Patent number: 9361449
    Abstract: A platform integrity verification system capable of executing platform integrity verification by a trusted boot without causing a delay of system startup time. The platform integrity verification system has an information processing device and an integrity verification computer that is communicably connected to each other. The information processing device comprises an acquisition section acquires a unique value from each of a plurality of programs executed by the information processing device when the information processing device is shut down; and a storage section configured to store the unique value acquired by the acquisition section in a storage device. The integrity verification computer comprises a comparison section configured to acquire the unique value stored in the storage device through communication with the information processing device and compares the acquired unique value with a predetermined value held in advance for each program.
    Type: Grant
    Filed: July 27, 2011
    Date of Patent: June 7, 2016
    Assignee: CANON KABUSHIKI KAISHA
    Inventor: Yasuharu Sugano
  • Patent number: 9361458
    Abstract: Malicious code is detected in binary data by disassembling machine language instructions of the binary data into assembly language instructions. Opcodes of the assembly language instructions are normalized and formed into groups, with each group being a subsequence of a sequence of machine language instructions of the binary data. The subsequence is delimited by a predetermined machine language instruction. Locality-sensitive hashes are calculated for each group and compared to locality-sensitive hashes of known malicious machine language instructions to detect malicious code in the binary data.
    Type: Grant
    Filed: October 8, 2014
    Date of Patent: June 7, 2016
    Assignee: Trend Micro Incorporated
    Inventors: Hsiang-An Feng, Po-I Wang, Ming-Chin Zhuang
  • Patent number: 9356787
    Abstract: Secure communication of user inputs is achieved by isolating part of an endpoint device such that certificates and encryption keys are protected from corruption by malware. Further, the communication is passed through a trusted data relay that is configured to decrypt and/or certify the user inputs encrypted by the isolated part of the endpoint device. The trusted data relay can determine that the user inputs were encrypted or certified by the protected certificates and encryption keys, thus authenticating their origin within the endpoint device. The trusted data relay then forwards the inputs to an intended destination. In some embodiments, the isolated part of the endpoint device is configured to detect input created by auto-completion logic and/or spell checking logic.
    Type: Grant
    Filed: October 16, 2013
    Date of Patent: May 31, 2016
    Assignee: Truedata Systems, Inc.
    Inventors: Peter Sinclair, James Lloyd, Michael Eynon
  • Patent number: 9355248
    Abstract: Implementations provide for container and image scanning for a Platform-as-a-Service (PaaS) system. A method of the disclosure includes initiating, by a processing device executing a node of a multi-tenant Platform-as-a-Service (PaaS) system, a scan process at the node to scan containers executing on the node, the containers executing functionality of multiple applications that are owned by multiple owners. The method further includes, for each container of the containers, scanning, by the processing device in accordance with the scan process, a top layer of application image instance used to launch the container in the node without scanning remaining layers of the application image instance, and terminating, by the processing device, the scan process for the container when the scanning generates a clean result.
    Type: Grant
    Filed: January 26, 2015
    Date of Patent: May 31, 2016
    Assignee: Red Hat, Inc.
    Inventors: Thomas Wiest, Joel Smith
  • Patent number: 9348999
    Abstract: It is possible to effectively prevent an unauthorized remote operation of a terminal. A user terminal provides a user with higher precision information related to execution determination of a program to be executed, by detecting, from the program, a command for performing a remote operation with a remote operation terminal, temporarily stopping the execution of the program, and inquiring of a reliability management server about the reliability.
    Type: Grant
    Filed: January 17, 2013
    Date of Patent: May 24, 2016
    Assignee: OPTIM CORPORATION
    Inventor: Shunji Sugaya
  • Patent number: 9348742
    Abstract: Techniques are described for identifying potential code injection attacks against a process by analyzing the memory allocation for the process. Memory allocation data may be collected on one or more host computing devices, the memory allocation data describing the amount of memory allocated for a process or utilized by a process during its execution. The collected memory allocation data may be analyzed to identify instances of anomalous memory allocation during process execution. Statistical or machine learning algorithms may be employed to identify anomalous memory allocation based on the analysis of aggregated memory allocation data for the process.
    Type: Grant
    Filed: December 18, 2013
    Date of Patent: May 24, 2016
    Assignee: AMAZON TECHNOLOGIES, INC.
    Inventor: Dominique Imjya Brezinski
  • Patent number: 9349006
    Abstract: A method and device perform program identification based on machine learning. The method includes: analyzing an inputted unknown program, and extracting a feature of the unknown program; coarsely classifying the unknown program according to the extracted feature; judging by inputting the unknown program into a corresponding decision-making machine generated by training according to a result of the coarse classification; and outputting an identification result of the unknown program. The identification result is a malicious program or a non-malicious program. The method can save a lot of manpower and improve the identification efficiency for a malicious program by using the decision-making machine.
    Type: Grant
    Filed: November 18, 2011
    Date of Patent: May 24, 2016
    Assignee: BEIJING QIHOO TECHNOLOGY COMPANY LIMITED
    Inventors: Hongyi Zhou, Yi Dong, Hui Zhou
  • Patent number: 9349002
    Abstract: Known malicious Android applications are collected and their functions are extracted. Similarity values are calculated between pairs of functions and those functions with a low similarity value are grouped together and assigned a unique similarity identifier. A common set of functions or common set of similarity identifiers are identified within the applications. If at least one function in the common set is determined to be malicious then the common set is added to a blacklist database either by adding functions or by adding similarity identifiers. To classify an unknown Android application, first the functions in the application are extracted. These functions are then compared to the set of functions identified in the blacklist database. If each function in the set of functions is present (either by matching or by similarity) in the group of extracted functions from the unknown application then the unknown application is classified as malicious.
    Type: Grant
    Filed: May 29, 2013
    Date of Patent: May 24, 2016
    Assignee: Trend Micro Inc.
    Inventors: Lei Zhang, Zhentao Huang, Franson Fang
  • Patent number: 9342366
    Abstract: An intrusion detection apparatus and method using a load balancer responsive to traffic conditions between a central processing unit (CPU) and a graphics processing unit (GPU) are provided. The intrusion detection apparatus includes a packet acquisition unit, a character string check task allocation unit, a CPU character string check unit, and a GPU character string check unit. The packet acquisition unit receives packets, and stores the packets in a single task queue. The character string check task allocation unit determines the number of packets in the packet acquisition unit, and allocates character string check tasks to the CPU or the GPU. The CPU character string check unit compares the character strings of the packets with a character string defined in at least one detection rule inside the CPU. The GPU character string check unit compares the character strings of the packets with the character string inside the GPU.
    Type: Grant
    Filed: October 15, 2013
    Date of Patent: May 17, 2016
    Assignee: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Junghee Lee, Sungryoul Lee, Deokjin Kim, Young Han Choi, Byungchul Bae, HyungGeun Oh, Kiwook Sohn, KyoungSoo Park, Yung Yi, Jihyung Lee, Sangwoo Moon
  • Patent number: 9336389
    Abstract: Disclosed are various embodiments for inspecting malware with little or no user interruption. A first computing device may compare a source code of an application to a fingerprint stored locally on the first computing device. The first computing device may transmit the source code to a second computing device to determine whether the source code resides in a database comprising approved applications. If the source code does not reside in the database, a thorough scan of the source code may be conducted.
    Type: Grant
    Filed: August 19, 2013
    Date of Patent: May 10, 2016
    Assignee: Amazon Technologies, Inc.
    Inventors: Mekka Chibuisi Okereke, Peter Phan Han
  • Patent number: 9338174
    Abstract: In accordance with some embodiments of the present invention, systems and methods that protect an application from attacks are provided. In some embodiments of the present invention, input from an input source, such as traffic from a communication network, can be routed through a filtering proxy that includes one or more filters, classifiers, and/or detectors. In response to the input passing through the filtering proxy to the application, a supervision framework monitors the input for attacks (e.g., code injection attacks). The supervision framework can provide feedback to tune the components of the filtering proxy.
    Type: Grant
    Filed: May 7, 2014
    Date of Patent: May 10, 2016
    Assignee: The Trustees of Columbia University in the City of New York
    Inventors: Michael E Locasto, Salvatore J Stolfo, Angelos D Keromytis, Ke Wang
  • Patent number: 9336381
    Abstract: Techniques are described for identifying security credentials or other sensitive information based on an entropy-based analysis of information included in documents such as source code files, object code files, or other types of files. A baseline information entropy may be determined for one or more documents, indicating a baseline level of randomness for information in the document(s). One or more of the documents may be analyzed to identify the presence of high entropy portions that have an information entropy above a threshold value. The threshold value may be based on the baseline information entropy, or based on other criteria such as a programming language of the document(s). Because security credentials may have a higher level of information entropy than the surrounding code, any high entropy portions of the document(s) may be identified as potential security risks.
    Type: Grant
    Filed: April 8, 2013
    Date of Patent: May 10, 2016
    Assignee: Amazon Technologies, Inc.
    Inventors: David James Kane-Parry, Thibault Candebat
  • Patent number: 9332021
    Abstract: A security payload is attached to a received binary executable file. The security payload is adapted to intercept application programming interface (API) calls to system resources from the binary executable file via export address redirection back to the security payload. Upon execution of the binary executable file, the security payload replaces system library export addresses within a process address space for the binary executable file with security monitoring stub addresses to the security payload. Upon the binary executable computer file issuing a call to a given API, the process address space directs the call to the given API back to the security payload via one of the security monitoring stub addresses that is associated with the given API. The security payload then can assess whether the call to the given API is a security breach.
    Type: Grant
    Filed: March 13, 2014
    Date of Patent: May 3, 2016
    Assignee: International Business Machines Corporation
    Inventor: Vishal Chahal
  • Patent number: 9332023
    Abstract: Zero day threats are detected at gateway level and blocked from entering a network. A database containing signatures identifying malware is maintained at the gateway. Inbound network traffic is scanned using the signatures, and files containing malware are detected and blocked by the gateway. When a file is received by a given endpoint in the network, behavior based malware detection is used to determine whether the file contains a zero day threat. Whenever a file is adjudicated by an endpoint as containing a zero day threat, the endpoint generates an identifying signature, and transmits the signature to the gateway in real time. The gateway thus receives signatures identifying multiple zero day threats from multiple endpoints, and subsequently scans inbound network traffic for the received signatures. From that point, the gateway detects files containing the zero day threats, and blocks them from being routed to endpoints in the network.
    Type: Grant
    Filed: August 25, 2014
    Date of Patent: May 3, 2016
    Inventor: Pengchao Wang
  • Patent number: 9332028
    Abstract: Methods, systems, and apparatuses for proactively protecting a computing network are disclosed. A proactive security mechanism is disclosed, among other things, with the ability to monitor a protected domain in real-time and safely identify inoculation procedures for responding to threats introduced to the protected domain via malware. The proactive security mechanism includes an Artificial Neural Network Interface (ANNI) configured to execute at least some features of the proactive security mechanism.
    Type: Grant
    Filed: January 24, 2014
    Date of Patent: May 3, 2016
    Assignee: REMTCS Inc.
    Inventors: Tommy Xaypanya, Richard E. Malinowski
  • Patent number: 9323929
    Abstract: The various aspects provide for a computing device and methods implemented by the device to ensure that an application executing on the device and seeking root access will not cause malicious behavior while after receiving root access. Before giving the application root access, the computing device may identify operations the application intends to execute while having root access, determine whether executing the operations will cause malicious behavior by simulating execution of the operations, and pre-approve those operations after determining that executing those operations will not result in malicious behavior. Further, after giving the application root access, the computing device may only allow the application to perform pre-approved operations by quickly checking the application's pending operations against the pre-approved operations before allowing the application to perform those operations.
    Type: Grant
    Filed: November 26, 2013
    Date of Patent: April 26, 2016
    Assignee: QUALCOMM Incorporated
    Inventors: David Fiala, Mihai Christodorescu, Vinay Sridhara, Rajarshi Gupta, Kassem Fawaz
  • Patent number: 9323930
    Abstract: A computer-implemented method for reporting security vulnerabilities may include (1) detecting that a malware application is present on an endpoint computing system, (2) determining a window of time during which the malware application was present in a specified condition on the endpoint computing system, (3) logging a list of sensitive data items accessed during the window of time, and (4) conditioning performance of a security action to report the list of sensitive data items on a determination that both (A) a length of the window of time is longer than a security threshold length and is indicative of the malware application being located on the endpoint computing system long enough to potentially compromise a sensitive data item and (B) the malware application was accessed during the window of time. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: August 19, 2014
    Date of Patent: April 26, 2016
    Assignee: Symantec Corporation
    Inventor: Sourabh Satish
  • Patent number: 9319426
    Abstract: An information handling system includes a processor and a management controller separate from the processor. The management controller is operable to store an anti-virus program and a malicious marker detection program in a memory of the management controller, and to execute the malicious marker detection program. The malicious marker detection program operates to detect a state of a device of the information handling system, determine that the information handling system is under attack from a malicious program in response to detecting the state of the device, and send an alert to a management system coupled to the information handling system, the alert indicating that the information handling system is under attack from the malicious program.
    Type: Grant
    Filed: June 18, 2013
    Date of Patent: April 19, 2016
    Assignee: DELL PRODUCTS, LP
    Inventors: Theodore S. Webb, Jacqueline H. Wilson, Jon R. Ramsey, Mukund P. Khatri
  • Patent number: 9319427
    Abstract: An anti-malware system including at least one database, remote from a plurality of computers to be protected, which stores identification of computer applications resident on the computers to be protected and an application-specific communications footprint for the computer applications, and at least one server, remote from the plurality of computers to be protected, and being operative to calculate a reference computer-specific communications composite pattern based on multiple application-specific communications footprints for applications installed on the computers to be protected, calculate a current computer-specific communications composite pattern based on actual communications of at least one the plurality of computers to be protected, and provide an alert when the current computer-specific communications composite pattern of the at least one of the plurality of computers to be protected differs from the reference computer-specific communications composite pattern of the at least one of the plurality
    Type: Grant
    Filed: May 12, 2013
    Date of Patent: April 19, 2016
    Assignee: CHECK POINT MOBILE SECURITY LTD
    Inventors: Michael Shaulov, Ohad Bobrov
  • Patent number: 9305165
    Abstract: According to one aspect, the subject matter described herein includes a method for detecting injected machine code. The method includes extracting data content from a buffer. The method also includes providing an operating system kernel configured to detect injected machine code. The method further includes executing, using the operating system kernel, the data content on a physical processor. The method further includes monitoring, using the operating system kernel, the execution of the data content to determine whether the data content contains injected machine code indicative of a code injection attack.
    Type: Grant
    Filed: May 7, 2012
    Date of Patent: April 5, 2016
    Assignee: The University of North Carolina at Chapel Hill
    Inventors: Kevin Snow, Fabian Monrose, Srinivas Krishnan
  • Patent number: 9306965
    Abstract: A cybersecurity system for processing events to produce scores, alerts, and mitigation actions. The system includes sensors for receiving and processing data to form events, distributed analytic platform for processing events to form analytic workflows, and scoring engines for processing events using analytic workflows to produce scoring engine messages. The system also includes real time analytic engine for processing scoring engine messages and distributed analytic platform messages using the analytic workflows and analytic workflow and event processing rules to form and transmit a threat intelligence message. Threat intelligence messages include broadcast messages, mitigation messages, and model update messages.
    Type: Grant
    Filed: October 16, 2015
    Date of Patent: April 5, 2016
    Assignee: IronNet Cybersecurity, Inc.
    Inventors: Robert L. Grossman, James E. Heath, Russell D. Richardson, Keith B. Alexander
  • Patent number: 9306968
    Abstract: Methods and systems for risk rating and pro-actively detecting malicious online ads are described. In one example embodiment, a system for risk rating and pro-actively detecting malicious online ads includes an extraction module, an analysis engine, and a filter module. The extraction module is configured to extract a SWF file from a web page downloaded by the system. The analysis engine is communicatively coupled to the extraction module. The analysis engine is configured to determine a risk rating for the SWF file and send the risk rating to a web application for display. In an example, determining the risk rating includes locating an embedded redirection URL and determining a risk rating for the embedded redirection URL. The filter module is configured to determine, based on the risk rating, whether to block the SWF file and send a warning to the web application for display.
    Type: Grant
    Filed: July 30, 2014
    Date of Patent: April 5, 2016
    Assignee: McAfee, Inc.
    Inventors: Jayesh Sreedharan, Rahul Mohandas
  • Patent number: 9304874
    Abstract: An example method of saving and restoring a state of one or more registers for a guest includes detecting exit of a virtual machine mode of a guest running on a virtual machine. A set of registers is accessible by the guest and includes a first subset of registers and a second subset of registers. The method also includes identifying the first subset of registers. The first subset of registers includes one or more registers to be overwritten by the guest upon re-entry of the virtual machine mode. The second subset of registers is mutually exclusive from the first subset of registers. The method further includes after detecting exit of the virtual machine mode of the guest, detecting re-entry of the virtual machine mode of the guest. The method also includes restoring a saved state of the second subset of registers for the guest.
    Type: Grant
    Filed: February 3, 2014
    Date of Patent: April 5, 2016
    Assignee: Red Hat Israel, Ltd.
    Inventors: Michael Tsirkin, Radim Kr{hacek over (c)}má{hacek over (r)}
  • Patent number: 9298489
    Abstract: Systems for monitoring a virtual machine in a cloud computing environment are disclosed. The systems include a baseline module configured to retrieve baseline information from the virtual machine and create a plurality of baseline files. The systems also include a benchmark module configured to comparatively analyze at least two of the plurality of baseline files to determine differences between the at least two baseline files and generate a plurality of benchmark reports based on the determined differences. The systems also include a trends module configured to comparatively analyze the plurality of benchmark reports and generate at least one trends report based on the comparative analysis of benchmark reports.
    Type: Grant
    Filed: December 13, 2013
    Date of Patent: March 29, 2016
    Assignee: IOMAXIS, INC.
    Inventors: John Richard, David L. Branca, Brad Buhr
  • Patent number: 9298928
    Abstract: A computer processor receives rules associated with applications installed on a mobile device, and collects declared intents of the applications prior to execution of the applications. The computer processor generates possible combinations of declared intents of the applications and collects, by an intent proxy during execution, information associated with intercepted intents. The computer processor compares the information associated with each of the intercepted intents to the rules, wherein a match results in a first violation. The computer processor compares the intercepted intents to the possible combinations of the declared intents, wherein the intercepted intents other than the possible combinations of the declared intents results in a second violation. The computer processor displays a risk alert for the applications associated with either or both of the first violation and the second violation.
    Type: Grant
    Filed: September 4, 2014
    Date of Patent: March 29, 2016
    Assignee: GLOBALFOUNDRIES INC.
    Inventors: Stefano Borghetti, Alessandro Donatelli, Gianluca Della Corte, Claudio Marinelli, Antonio M. Sgro'
  • Patent number: 9300688
    Abstract: A secure appliance for use within a multi-tenant cloud computing environment which comprises: a) a policy enforcement point (PEP); b) a hardened Operating System (OS) capable of deploying applications; and c) at least one application capable of hosting services and application program interfaces (APIs).
    Type: Grant
    Filed: April 18, 2011
    Date of Patent: March 29, 2016
    Assignee: CA, INC.
    Inventors: Kenneth W. S. Morrison, Jay W. Thorne
  • Patent number: 9298488
    Abstract: Techniques for dynamic disk personalization are provided. A virtual image that is used to create an instance of a virtual machine (VM) is altered so that disk access operations are intercepted within the VM and redirected to a service that is external to the VM. The external service manages a personalized storage for a principal, the personalized storage used to personalize the virtual image without altering the virtual image.
    Type: Grant
    Filed: September 8, 2014
    Date of Patent: March 29, 2016
    Assignee: Novell, Inc.
    Inventors: Lloyd Leon Burch, Jason Allen Sabin, Kal A. Larsen, Nathaniel Brent Kranendonk, Michael John Jorgensen
  • Patent number: 9300686
    Abstract: According to one embodiment, in response to receiving a plurality of uniform resource locator (URL) links for malicious determination, any known URL links are removed from the URL links based on a list of known link signatures. For each of remaining URL links that are unknown, a link analysis is performed on the URL link based on link heuristics to determine whether the URL link is suspicious. For each of the suspicious URL links, a dynamic analysis is performed on a resource of the suspicious URL link. It is classified whether the suspicious URL link is a malicious link based on a behavior of the resource during the dynamic analysis.
    Type: Grant
    Filed: July 18, 2013
    Date of Patent: March 29, 2016
    Assignee: FireEye, Inc.
    Inventors: Vinay Pidathala, Henry Uyeno
  • Patent number: 9294364
    Abstract: An approach is provided for transforming application access and data storage details associated with a mobile device to application specific privacy policies. A policy platform processes and/or facilitates a processing of an application code to identify one or more application programming interfaces invoked by the application code. The policy platform causes, at least in part, a profiling of one or more invocation characteristics of the one or more application programming interfaces. The policy platform further causes, at least in part, a mapping of the one or more invocation characteristics against one or more policy templates to cause, at least in part, a generation of at least one policy for the application code.
    Type: Grant
    Filed: November 1, 2013
    Date of Patent: March 22, 2016
    Assignee: Nokia Technologies Oy
    Inventor: Debmalya Biswas
  • Patent number: 9292417
    Abstract: Methods and systems allow the use of hypervisors to use software breakpoints in the same manner as hardware breakpoints. A program to be tested is executed by a hypervisor running a virtual machine. A memory page containing the location of a breakpoint is copied to a temporary memory page. Then a new page is written containing breakpoint instructions at specified memory locations. The new page is tagged as execute only, so the program to be tested is unaware of any changes to the program. If the program attempts to read from the changed memory page, it will read from the temporary memory page instead. Such a method can be used to search websites for malware in relative safety because of the inability of the malware to write to memory locations that are located on a page that is execute only.
    Type: Grant
    Filed: August 7, 2013
    Date of Patent: March 22, 2016
    Assignee: Raytheon Cyber Products, LLC
    Inventor: Ryan C. Salsamendi
  • Patent number: 9286187
    Abstract: Implementations of the present disclosure are directed to statically checking conformance of a computer-implemented service at a source code level to requirements specified at a process level and include actions of receiving source code of the computer-implemented service, receiving one or more rules, the one or more rules being generated based on a mapping and including a set of technical requirements that can be checked on the source code level, the mapping associating the requirements with the source code, and processing the source code and the one or more rules using static code analysis (SCA) to generate a result, the result indicating whether the computer-implemented service conforms to the requirements.
    Type: Grant
    Filed: August 30, 2012
    Date of Patent: March 15, 2016
    Assignee: SAP SE
    Inventors: Achim D. Brucker, Isabelle Hang
  • Patent number: 9286469
    Abstract: A system receives information from at least one security interceptor associated with at least one computer system. The information identifies details associated with a traffic flow in a computer system of the computer networking environment. The system determines a probability that an attack on the computer system is in progress based on a probabilistic link provided by the information. The probabilistic link is determined by attack information associated with previous attacks. Based on the information provided by the at least one security interceptor, the system generates a signature utilized to prevent a similar attack on the computer system.
    Type: Grant
    Filed: August 4, 2006
    Date of Patent: March 15, 2016
    Assignee: Cisco Technology, Inc.
    Inventors: Jeffrey A. Kraemer, Andrew Zawadowskiy
  • Patent number: 9280663
    Abstract: An apparatus and method for analyzing malware in a data analysis system are provided. The apparatus includes a data analysis unit and a controller. The data analysis unit sorts data into primary harmful data and primary harmless data using screening data information of malicious code information and virus information. The controller screens or deletes the primary harmful data, and sends a request for precision analysis of the primary harmless data to a server. The data analysis unit sorts secondary harmful data from the primary harmless data using the precision analysis result received from the server.
    Type: Grant
    Filed: December 13, 2012
    Date of Patent: March 8, 2016
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Michael Pak, Kyung-Hee Lee, Na-Hea-Sal Kim, Jae-Hoon Jung
  • Patent number: 9282109
    Abstract: A system is provided with an interface and controller. The interface is configured to receive packets transmitted over a network between a first device and a second device. Transmitted over the network in accordance with a packet protocol, the packets include at least one packet transmitted from the first device and at least one packet transmitted from the second device. Coupled to the interface, the controller is configured to determine whether a plurality of packets have suspicious characteristics of malware and transmit the suspicious packets to an analysis environment. The analysis environment is configured to receive the plurality of packets that have suspicious characteristics of malware, modify at least a portion of these suspicious packets, and transmit at least the modified portion of the plurality of packets that have suspicious characteristics of malware to a virtual machine in accordance with a sequence of the packet protocol.
    Type: Grant
    Filed: June 30, 2014
    Date of Patent: March 8, 2016
    Assignee: FireEye, Inc.
    Inventors: Ashar Aziz, Ramesh Radhakrishnan, Osman Ismael
  • Patent number: 9282112
    Abstract: Disclose dare systems and method for determining category of trust of software applications. An example method includes monitoring a first application to detect an overlay of at least one interface element of the first application by at least one interface element of a second application; collecting information about the second application, wherein the information includes at least a danger status of the second application, wherein the danger status determines a danger caused by the second application to the first application; determining a category of trust of the second application based on an analysis of the collected information; and determining, based on the category of trust of the second application, whether to allow or prohibit overlay of the at least one interface element of the first application by the at least one interface element of the second application.
    Type: Grant
    Filed: September 26, 2014
    Date of Patent: March 8, 2016
    Assignee: Kaspersky Lab AO
    Inventors: Konstantin M. Filatov, Olga O. Inozemtseva, Victor V. Yablokov
  • Patent number: 9275231
    Abstract: A method and apparatus for securing a computer using an optimal configuration for security software based on user behavior is described. In one embodiment, the method for providing an optimal configuration to secure a computer based on user behavior includes examining computer user activity to produce behavior indicia with respect to computer security from malicious threats and determining an optimal configuration for security software based on the behavior indicia.
    Type: Grant
    Filed: March 10, 2009
    Date of Patent: March 1, 2016
    Assignee: Symantec Corporation
    Inventors: Joseph H. Chen, Brendon V. Woirhaye
  • Patent number: 9270691
    Abstract: A method for detecting HTML-modifying malware present in a computer includes providing a server which serves a web page (HTML) to a browser. A determination is made whether a modified string exists in the page received by the browser and if a modifying element is found, determining the malware is present in the computer.
    Type: Grant
    Filed: November 1, 2010
    Date of Patent: February 23, 2016
    Assignee: TRUSTEER, LTD.
    Inventors: Amit Klein, Michael Boodaei
  • Patent number: 9270689
    Abstract: Systems and methods are provided that enable probabilistic application of data traffic scanning in an effort to catch malicious software or code being carried by the data traffic. The methodology and systems operate by monitoring data traffic in an data network via an interface with the data network, calculating a first conditional probability that content in first given data traffic being monitored is malicious, calculating a second conditional probability that content in second given data traffic being monitored is malicious, ranking the first and second conditional probabilities resulting in ranked conditional probabilities, and performing at least one of anti-virus (AV) or anti-malware (AM) scanning of the content of the first or second given data traffic depending on whose conditional probability is ranked higher in the ranked conditional probabilities.
    Type: Grant
    Filed: June 21, 2012
    Date of Patent: February 23, 2016
    Assignee: Cisco Technology, Inc.
    Inventors: Jisheng Wang, Daniel Quinlan, Lee Jones
  • Patent number: 9268716
    Abstract: In one embodiment, data generated via a map process and/or reduce process may be obtained. A request message may be sent to a server, where the request message indicates a request for a location in storage at which the data is to be stored. Upon receiving the location from the server, the data may be copied to the location in the storage. A commit message may be sent to the server, where the commit message indicates that the data has been copied to the location. In addition, the data may be deleted.
    Type: Grant
    Filed: October 19, 2012
    Date of Patent: February 23, 2016
    Assignee: Yahoo! Inc.
    Inventors: Michael Natkovich, Ravi Sankuratri
  • Patent number: 9268937
    Abstract: Remediating a suspicious element in a web page is disclosed. An indication of a suspicious element is received. A quarantine instruction is sent to a server of the web page. One example of a quarantine instruction is an instruction to block the page from being served. Another example of a quarantine instruction in as instruction to block an element of the page from being served.
    Type: Grant
    Filed: October 11, 2013
    Date of Patent: February 23, 2016
    Assignee: Dasient, Inc.
    Inventors: Neilkumar Murli Daswani, Ameet Ranadive, Shariq Rizvi
  • Patent number: 9264441
    Abstract: A method of securing a network from vulnerability exploits, including the steps of a traffic analysis engine receiving a plurality of packets destined for an internal operating system; the traffic analysis engine selectively forwarding the packets to at least one virtual machine emulating the internal operating system; the virtual machine processing each forwarded packet; a rapid analysis engine identifying a malicious packet from the processed packets; and the rapid analysis engine creating a new signature to identify the malicious packet.
    Type: Grant
    Filed: March 24, 2008
    Date of Patent: February 16, 2016
    Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
    Inventors: Michael Todd, Scott Robert Koster, Patrick Choy Ming Wong