Virus Detection Patents (Class 726/24)
  • Patent number: 11086995
    Abstract: Malware scanning for network-attached storage systems is provided herein. A data storage system as described herein can include a memory that stores computer executable components and a processor that executes computer executable components stored in the memory. The computer executable components can include a file identification component that obtains an identifier for a target file stored by the data storage system; a lookup component that searches a scan status data structure for a malware scan result corresponding to the identifier for the target file; and a file access component that grants access to the target file in response to the lookup component obtaining the malware scan result from the scan status data structure and the malware scan result indicating that the target file contains no malware.
    Type: Grant
    Filed: April 30, 2018
    Date of Patent: August 10, 2021
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventors: Shiv Shankar Kumar, Jai Prakash Gahlot, Amit Kumar Chauhan
  • Patent number: 11086769
    Abstract: Disclosed herein are techniques for using a line-of-code behavior and relation model to determine software functionality changes. Techniques include identifying a first portion of executable code and a second portion of executable code; accessing a first line-of-code behavior and relation model representing execution of functions of the first portion of executable code; constructing, based on the second portion of executable code, a second line-of-code behavior and relation model representing execution of functions of the second portion of executable code; performing a functional differential comparison of the first line-of-code behavior and relation model to the second line-of-code behavior and relation model; determining, based on the functional differential comparison, a status of functional equivalence between the first portion of executable code and the code portion of executable code; and generating, based on the determined difference, a report identifying the status of functional equivalence.
    Type: Grant
    Filed: March 24, 2020
    Date of Patent: August 10, 2021
    Assignee: Aurora Labs Ltd.
    Inventors: Zohar Fox, Carmit Sahar
  • Patent number: 11086387
    Abstract: Systems, methods, and computer-readable media for managing near field communications during a low power express mode of an electronic device are provided that may make credentials of a near field communication (“NFC”) component appropriately secure and appropriately accessible while also limiting the power consumption of the NFC component and of other components of the electronic device.
    Type: Grant
    Filed: September 11, 2018
    Date of Patent: August 10, 2021
    Assignee: Apple Inc.
    Inventors: Yong Wang, Gordon Y. Scott, Andrew C. Chang, Scott A. Williams
  • Patent number: 11080407
    Abstract: Methods and systems are provided for conditionally allowing a mobile communications device to process received data. Initially, the data is analyzed by a known good component without the component determining that the data is safe, and the data is analyzed by a known bad component without the component determining that the data is malicious. Subsequently, the data is analyzed by a decision component on the mobile communications device. When the decision component determines the data to be safe, the decision component allows the mobile communications device to process the data. When the decision component determined the data to be malicious, the decision component prevents the mobile communications device from processing the data.
    Type: Grant
    Filed: October 31, 2019
    Date of Patent: August 3, 2021
    Assignee: LOOKOUT, INC.
    Inventor: Kevin Patrick Mahaffey
  • Patent number: 11080394
    Abstract: Examples of the present disclosure describe systems and methods for a behavioral threat detection virtual machine. In examples, the virtual machine executes a rule comprising rule instructions. A rule may comprise one or more wait rule instructions that causes the virtual machine to pause execution. As events are added to an event queue for the rule virtual machine, the behavioral threat detection virtual machine evaluates such events in order to identify a positive or, in some instances, a negative match. When a matching event is identified, rule execution resumes. Eventually, a determination is made as a result of processing events and wait packets, thereby indicating the presence or absence of a malicious or potentially malicious behavior, among other examples. Thus, among other things, the behavioral threat detection virtual machine maintains a state associated with rule execution and processes events to identify behaviors accordingly.
    Type: Grant
    Filed: March 27, 2019
    Date of Patent: August 3, 2021
    Assignee: Webroot Inc.
    Inventors: Eric Klonowski, Fred Krenson
  • Patent number: 11075931
    Abstract: Examples of devices and methods for detecting malicious network activity are described. Fake user credentials are saved into memory of a monitored device. The fake user credentials may include a username and a password hash for a nonexistent account. Reconnaissance on the fake user credentials is monitored. A compromised account is detected based on the fake user credential reconnaissance monitoring.
    Type: Grant
    Filed: December 31, 2018
    Date of Patent: July 27, 2021
    Assignee: Stealthbits Technologies LLC
    Inventors: Jeffrey Adam Warren, Sean Bergman
  • Patent number: 11068592
    Abstract: A computing device determines, for a first time period, a usage-based file list identifying one or more executable files. The computing device determines, for each of the one or more executable files identified by the usage-based file list, whether to perform a malware scan upon the executable file based on a cached record for the executable file. The computing device schedules, for execution during a preceding time period before the first time period, a malware scan for at least one of the one or more executable files based on the corresponding determination of whether to perform a malware scan. Each scheduled malware scan is initiated as a low priority thread for execution. The computing device performs each scheduled malware scan during the preceding time period.
    Type: Grant
    Filed: January 26, 2021
    Date of Patent: July 20, 2021
    Assignee: Malwarebytes Inc.
    Inventor: Ravi Kalyan Namballa
  • Patent number: 11070571
    Abstract: Some embodiments of cloud-based gateway security scanning have been presented. In one embodiment, some data packets are received sequentially at a gateway device. The data packets constitute at least a part of a file being addressed to a client machine coupled to the gateway device. The gateway device forwards an identification of the file to a remote datacenter in parallel with forwarding the data packets to the client machine. The datacenter performs signature matching on the identification and returns a result of the signature matching to the gateway device. The gateway device determining whether to block the file from the client machine based on the result of the signature matching from the datacenter.
    Type: Grant
    Filed: May 21, 2019
    Date of Patent: July 20, 2021
    Assignee: SONICWALL INC.
    Inventors: Aleksandr Dubrovsky, Senthilkumar G. Cheetancheri, Boris Yanovsky
  • Patent number: 11062115
    Abstract: Systems and methods for scanning signatures in a string field. In one implementation, the invention provides a method for signature scanning. The method includes receiving a particular string field, scanning the particular string field for a plurality of signatures using a larger scan step size, scanning the particular string field for the remaining signatures that are shorter than what can be scanned by the larger scan step size separately either using the same scanning method but a smaller scan step size or using a different scan method and the same or a smaller scan step size, and outputting any identified signatures in the particular string field.
    Type: Grant
    Filed: August 30, 2016
    Date of Patent: July 13, 2021
    Assignee: LIGHT SPEED MICROELECTRONICS, LLC
    Inventor: Qiang Wang
  • Patent number: 11064015
    Abstract: Techniques for delivering a distributed network security service providing isolation of customer data are described. One example method includes configuring a first node to participate in a node cluster, wherein the first node is hosted by a first cloud service provider, and wherein participating in the node cluster includes performing one or more processing actions specific to the node cluster on data received by the node; configuring a second node to participate in the node cluster, the second node hosted by a second cloud service provider; receiving a status indication from the first node over a network; determining a synchronization mechanism for the first node based on a network configuration of the first node, wherein the determined synchronization mechanism is configured to allow the first node to acquire synchronization data from other nodes in the node cluster; and transmitting the synchronization mechanism to the first node over the network.
    Type: Grant
    Filed: April 18, 2019
    Date of Patent: July 13, 2021
    Assignee: iboss, Inc.
    Inventor: Paul Michael Martini
  • Patent number: 11055417
    Abstract: Provided are systems, methods, and computer-readable medium for identifying security risks in applications executing in a cloud environment. In various implementations, a security monitoring and management system can obtain application data from a service provider system. The application data can include a record of actions performed by an application during use of the application by users associated with a tenant. The application executes in a service platform provided for the tenant by the service provider system. In various implementations, the application data is analyzed to identify an event associated with a security risk, where the event is identified from one or more actions performed by the application. The system can determine an action to perform in response to identifying the event. In various examples, an agent executing on the service platform can add instrumentation codes used by the application, where the instrumentation provides the application data.
    Type: Grant
    Filed: September 20, 2018
    Date of Patent: July 6, 2021
    Assignee: ORACLE INTERNATIONAL CORPORATION
    Inventors: Gaurav Bhatia, Ganesh Kirti, Ramana Rao Satyasai Turlapati
  • Patent number: 11056212
    Abstract: The present invention discloses methods and systems for an integrated disassembler with a function-queue manager and a disassembly interrupter for rapid, efficient, and scalable code gene extraction and analysis. Methods include the steps of: upon receiving a target binary file, disassembling the target binary file into assembly code; extracting code fragments from the assembly code; as each code fragment is extracted, verifying each code fragment; upon availability, placing each verified code fragment in an extractor queue; and upon availability, submitting each code fragment in the extractor queue to a gene-analysis system having a code genome database. Alternatively, upon determining the extractor queue is empty or determining resources of the gene-analysis system are underutilized, transferring partially-verified code fragments to the extractor queue.
    Type: Grant
    Filed: December 31, 2019
    Date of Patent: July 6, 2021
    Assignee: Intezer Labs, Ltd.
    Inventors: Itai Tevet, Roy Halevi, Jonathan Abrahamy, Ari Eitan, David Tufik, Jay Rosenberg
  • Patent number: 11055443
    Abstract: This document describes a module and method for detecting malicious activities in a storage device whereby the module is provided within a controller of the storage device. The module is configured to monitor, using a trained neural network, appropriate logical block addresses (LBAs) of the file system of the storage device that contain sensitive data or information for malicious activities.
    Type: Grant
    Filed: December 11, 2020
    Date of Patent: July 6, 2021
    Assignee: FLEXXON PTE. LTD.
    Inventors: Chan Mei Ling, Nizar Bouguerra
  • Patent number: 11050772
    Abstract: An electronic authorization system is typically configured for: receiving electronic activity requests from a plurality of source nodes; analyzing each of the electronic activity requests using a decisioning algorithm, wherein a decision boundary of the decisioning algorithm is dynamically altered while analyzing the electronic activity requests; for each of the electronic activity requests, determining an activity exposure level of the decision boundary based on (i) a distance to the decision boundary and (ii) an amount of information exposed regarding the decision boundary; for each of the plurality of source nodes, determining a source exposure level of the decision boundary based on the activity exposure levels of the decision boundary of the electronic activity requests; and in response to determining that a likelihood of decision boundary profiling by one or more first source nodes exceeds a defined threshold, performing an exposure remediation action.
    Type: Grant
    Filed: December 5, 2018
    Date of Patent: June 29, 2021
    Assignee: BANK OF AMERICA CORPORATION
    Inventor: Eren Kursun
  • Patent number: 11049026
    Abstract: Updating ground truth data in a security management platform is disclosed. One example is a system including at least one processor and a memory storing instructions executable by the at least one processor to receive, in a security management platform, event data relating to a plurality of events corresponding to operation of a computing arrangement in a current time interval, and computing ground truth data for the current time interval based on the received event data, and threat intelligence data from time intervals preceding the current time interval. A prediction model is applied to generate predictions for the current time interval based on the received event data. Ground truth data is re-computed for the time intervals preceding the current time interval based on a comparison of the generated predictions and the computed ground truth data.
    Type: Grant
    Filed: March 20, 2017
    Date of Patent: June 29, 2021
    Assignee: Micro Focus LLC
    Inventors: Pratyusa K. Manadhata, Sandeep Bhatt, Tomas Sander
  • Patent number: 11044269
    Abstract: Embodiments of the present disclosure are directed to a network analytic system for tracking and analysis of network infrastructure for network-based digital assets. The network analytic system can detect and track a relationship between assets based on one or more attributes related or shared between any given assets. The network analytic system can analyze network-based digital assets to determine information about a website (e.g., information about electronic documents, such as web pages) that has be used to detect phishing and other abuse of the website. The network analytic system can analyze data about network-based assets to determine whether any are being used or connected to use of unauthorized or malicious activity or known network-based assets. Based on the relationship identified, the network analytic system can associate or link assets together. The network analytic system may provide an interface to view data sets generated by the network analytic system.
    Type: Grant
    Filed: August 15, 2017
    Date of Patent: June 22, 2021
    Assignee: RiskIQ, Inc.
    Inventors: Adam Hunt, Jonas Edgeworth, Chris Kiernan, Elias Manousos, David Pon
  • Patent number: 11036850
    Abstract: Technologies for memory management with memory protection extension include a computing device having a processor with one or more protection extensions. The processor may load a logical address including a segment base, effective limit, and effective address and generate a linear address as a function of the logical address with the effective limit as a mask. The processor may switch to a new task described by a task state segment extension. The task state extension may specify a low-latency segmentation mode. The processor may prohibit access to a descriptor in a local descriptor table with a descriptor privilege level lower than the current privilege level of the processor. The computing device may load a secure enclave using secure enclave support of the processor. The secure enclave may load an unsandbox and a sandboxed application in a user privilege level of the processor. Other embodiments are described and claimed.
    Type: Grant
    Filed: December 13, 2018
    Date of Patent: June 15, 2021
    Assignee: Intel Corporation
    Inventors: Michael LeMay, Barry E. Huntley, Ravi Sahita
  • Patent number: 11036856
    Abstract: Systems and methods for continuously scanning and/or sandboxing files to protect users from accessing infected files by natively mounting public cloud file stores are provided. According to one embodiment, a determination is made by a network security device that is protecting the enterprise network regarding whether an untrusted file stored within a first repository of a public cloud file store, which is natively mounted on the network security device, is a clean file that is free of malicious content by applying one or more security checks to the untrusted file. When a result of the determination is affirmative, the network security device makes the clean file accessible to the users by copying the clean file from the first repository to a second repository that is accessible to the users.
    Type: Grant
    Filed: September 16, 2018
    Date of Patent: June 15, 2021
    Assignee: Fortinet, Inc.
    Inventors: Jason Graun, Jesse Alverson
  • Patent number: 11029969
    Abstract: Determining a characteristic of a configuration file that is used to discover configuration files in a target machine, a computer identifies, using information associated with a configuration item of a machine, a candidate configuration file related to the configuration item of the machine, from among a plurality of files from the machine. The computer extracts a value of a feature of the candidate configuration file and aggregates the candidate configuration file with a second candidate configuration file related to the same configuration item identified from among a plurality of files from a second machine, based on the extracted value. The computer then determines a configuration file related to the configuration item from among the aggregated candidate configuration files based on a result of the aggregation, and determines a characteristic of the configuration file related to the configuration item.
    Type: Grant
    Filed: July 10, 2018
    Date of Patent: June 8, 2021
    Assignee: International Business Machines Corporation
    Inventors: Ajay A. Apte, Chang Sheng Li, Fan Jing Meng, Joseph P. Wigglesworth, Jing Min Xu, Bo Yang, Xue Jun Zhuo
  • Patent number: 11030312
    Abstract: A system for training a file classification model for classifying malicious software comprising at least one hardware processor adapted to: computing a plurality of datasets, each for one of a plurality of executable files, each file having a label, each dataset is computed by: receiving a respective file; detecting a plurality of binary functions in the respective file; translating each of the respective plurality of binary functions to produce a plurality of disassembled functions; clustering a plurality of operation-codes identified in the plurality of disassembled functions into a plurality of clusters according to respective operation-code; computing a plurality of statistical values of the plurality of disassembled functions and the plurality of clusters; and associating the plurality of statistical values with the file's label to produce a dataset; and training a file classification model using the plurality of datasets to compute at least one classification score of an input file.
    Type: Grant
    Filed: September 18, 2018
    Date of Patent: June 8, 2021
    Assignee: International Business Machines Corporation
    Inventors: Eitan Menahem, Gal Steimberg
  • Patent number: 11032711
    Abstract: Systems and methods for analyzing applications (“apps”) on a mobile device for security risks for a company while maintaining the mobile device owner's privacy and confidentiality concerning the applications. The mobile device may be a user's personal device (a “bring your own device”). In an example method, a process generates one or more cryptographic representations of application information for each application on the mobile device. The cryptographic representations may comprise a hash or composite hash. The cryptographic representations may be transmit outside the mobile device to a system which makes a determination and provides an indication whether the application is permitted or not permitted for use at the company. The company can be associated with a hashed permitted or not permitted list. The application information can include application name, executable code, and a version number. The method may include automatically remediating the application if it matches a known risk.
    Type: Grant
    Filed: November 8, 2019
    Date of Patent: June 8, 2021
    Assignee: Proofpoint, Inc.
    Inventor: David Alexander Jevans
  • Patent number: 11030314
    Abstract: A storage system in one embodiment comprises a plurality of storage devices and a storage controller. The storage controller is configured to generate a plurality of snapshots of a storage volume of the storage system at respective different points in time, to monitor a differential between a given one of the snapshots and the storage volume, and to generate an alert indicative of at least a potential ransomware attack on the storage system based at least in part on the monitored differential satisfying one or more specified conditions. The one or more specified conditions illustratively comprise a specified minimum amount of change in the storage volume relative to the given snapshot of the storage volume. Compressibility of the storage volume is also taken into account in generating the alert in some embodiments. The storage controller illustratively initiates restoration of the storage volume utilizing a selected snapshot responsive to confirmation of an actual attack.
    Type: Grant
    Filed: July 31, 2018
    Date of Patent: June 8, 2021
    Assignee: EMC IP Holding Company LLC
    Inventors: Anton Kucherov, David Meiri
  • Patent number: 11023581
    Abstract: Example implementations relate to code package variants. For example, a system according to the present disclosure, may include a client server, a development environment, a digital signing environment, and a central server. The development environment may generate a plurality of variants of a first portion of a code package. The digital signing environment may create a distinct digital signature for each variant of the plurality of variants of the first portion of the code package with a same second portion of the code package. The central server may transmit to the client server a complete code package comprising a variant of the plurality of variants of the first portion of the code package along with the second portion of the code package and a corresponding digital signature.
    Type: Grant
    Filed: July 28, 2016
    Date of Patent: June 1, 2021
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Brandon R Ashey, Chris R Gunning
  • Patent number: 11023583
    Abstract: A system for detecting malicious software, comprising at least one hardware processor adapted to: execute a tested software object in a plurality of computing environments each configured according to a different hardware and software configuration; monitor a plurality of computer actions performed in each of the plurality of computing environments when executing the tested software object; identify at least one difference between the plurality of computer actions performed in a first of the plurality of computing environments and the plurality of computer actions performed in a second of the plurality of computing environments; and instruct a presentation of an indication of the identified at least one difference on a hardware presentation unit.
    Type: Grant
    Filed: December 12, 2018
    Date of Patent: June 1, 2021
    Assignee: NEC Corporation Of America
    Inventors: Tsvi Lev, Yaacov Hoch
  • Patent number: 11019080
    Abstract: Methods, computer-readable media, software, and apparatuses may assist a consumer in keeping track of a consumer's accounts in order to prevent unauthorized access or use of the consumer's identified accounts. To discover the various accounts, the methods, computer-readable media, software, and apparatuses can monitor at least a consumer's email accounts, web browser history, and web cache. The discovered accounts may be displayed to the consumer along with recommendations and assistance for closing unused or unwanted accounts to prevent unauthorized access or use.
    Type: Grant
    Filed: May 15, 2019
    Date of Patent: May 25, 2021
    Assignee: Allstate Insurance Company
    Inventors: Jason D. Park, John S. Parkinson
  • Patent number: 11017399
    Abstract: An electronic device and a method of payment by the electronic device are provided. The electronic device includes a local wireless communication circuit, a first biometric sensor and a second biometric sensor, a security module configured to store payment information corresponding to a payment card, a processor electrically connected to the first biometric sensor, the second biometric sensor, the local wireless communication circuit, and the security module, and a memory electrically connected to the processor, wherein the memory is configured to store instructions that cause the processor to select at least one of the first biometric sensor or the second biometric sensor, based on a security policy of an issuer of the payment card or a security policy of the payment card, authenticate a user by using the selected biometric sensor, and if the authentication is successful, transmit the payment information to an external device through the local wireless communication circuit.
    Type: Grant
    Filed: July 28, 2017
    Date of Patent: May 25, 2021
    Inventors: Yong Seok Park, Seong Il Kim, In Ho Kim, Tae Yun Kim, Seung Won Oh, Ji Su Oh, Yong Wan Lee, You Na Lee, Dong Ho Jang, Jae Man Cho
  • Patent number: 11016990
    Abstract: Techniques are disclosed relating to fencing out a first one of a plurality of nodes configured to handle requests for data stored in a distributed storage. A database system, in various embodiments, stores a value indicating that the first node is permitted to update a catalog stored at a metadata server. In response to a determination to prevent the first node from updating the catalog and writing to the distributed storage, in various embodiments, the database system updates the value to indicate that the first node is not permitted to update the catalog and instructs the distributed storage to prevent write operations to a particular portion allocated to the first node for writing data.
    Type: Grant
    Filed: August 2, 2017
    Date of Patent: May 25, 2021
    Assignee: salesforce.com, inc.
    Inventors: Nathaniel Wyatt, Steven Raspudic, Venkateswararao Jujjuri
  • Patent number: 11019096
    Abstract: A combining apparatus has an acquiring unit that acquires script codes included in a website and having been divided and written at plural locations in the website; and a code combining unit that combines a plurality of the divided script codes written therein, based on a dependency between data in the divided script codes written therein acquired by the acquiring unit, or a dynamic generation relation arising from execution of the divided script codes written therein.
    Type: Grant
    Filed: August 9, 2017
    Date of Patent: May 25, 2021
    Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATION
    Inventors: Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi
  • Patent number: 11010233
    Abstract: An exemplary monitoring system receives log data associated with an operation of a hardware component, applies the log data as an input to an unsupervised machine learning model, and identifies, based on an output of the unsupervised machine learning model, an anomaly in the log data.
    Type: Grant
    Filed: January 16, 2019
    Date of Patent: May 18, 2021
    Assignee: Pure Storage, Inc
    Inventors: Christopher Golden, Emily Watkins
  • Patent number: 11005819
    Abstract: Surrogate browsing techniques are disclosed. A request for a page is received, from a client, by a surrogate. The specified page is requested by the surrogate from a site. Data received from the site in response to the request is rendered at the surrogate. A representation of the page is transmitted to the client.
    Type: Grant
    Filed: December 22, 2016
    Date of Patent: May 11, 2021
    Assignee: Menlo Security, Inc.
    Inventors: Xiaodong Dawn Song, Ian Fischer, Gautam Altekar, Lorenzo Martignoni, Zvonimir Pavlinovic
  • Patent number: 10990363
    Abstract: Examples disclosed herein relate to classification models for binary code data. Some of the examples enable obtaining changed binary code data and unchanged binary code data, and generating, using a machine-leaning algorithm, a classification model based on training data that comprises the changed binary code data and the unchanged binary code data.
    Type: Grant
    Filed: November 12, 2015
    Date of Patent: April 27, 2021
    Assignee: Micro Focus LLC
    Inventors: Amit Bezalel, Amir Wigelman, Roman Gelfand
  • Patent number: 10990673
    Abstract: A method protects a daemon in an operating system of a host computer. The operating system detects that there is an access of a plist file of a daemon by a process in the computer. If so, then it executes a callback function registered for the plist file. The callback function sends to a kernel extension a notification of the attempted access. The kernel extension returns a value to the operating system indicating that the access should be denied. The operating system denies access to the plist file of the daemon by the process. The extension may also notify an application which prompts the user for instruction. The kernel extension also protects itself by executing its exit function when a command is given to unload the extension, and the exit function determines whether or not the command is invoked by an authorized application, such as by checking a flag.
    Type: Grant
    Filed: May 24, 2019
    Date of Patent: April 27, 2021
    Assignee: TREND MICRO INC.
    Inventors: Chuan Jiang, Xilin Li, Yafei Zhang
  • Patent number: 10990664
    Abstract: Systems, methods, and computer program products to perform an operation comprising monitoring a privileged storage of a computing system, wherein at least a portion of the privileged storage stores a microcode of the computing system, determining, based on the monitoring, that a first location of the privileged storage includes an instruction, determining that the first location is designated as an unused location of the privileged storage, and performing a predefined operation to remove the instruction from the first location of the privileged storage.
    Type: Grant
    Filed: November 20, 2017
    Date of Patent: April 27, 2021
    Assignee: International Business Machines Corporation
    Inventors: Jeffrey M. Uehling, Michael J. Brinker, Daniel M. Hursh
  • Patent number: 10984101
    Abstract: A method of determining a category of a malware file, using a malware determination system comprising a machine learning algorithm, the method comprising obtaining a file, which is assumed to constitute malware file, by the malware determination system, building a data structure representative of features present in said file, based on features present in at least one dictionary, wherein said dictionary stores at least, for each of one or more of categories Ci out of a plurality of N categories of malware files, with i from 1 to N and N>2, one or more features which are specific to said category Ci with respect to all other N?1 categories Cj, with j different from i, according to at least one first specificity criteria, feeding the data structure to the machine learning algorithm of the malware determination system, and providing prospects representative of one or more malware categories to which said file belongs, based on said data structure.
    Type: Grant
    Filed: June 18, 2018
    Date of Patent: April 20, 2021
    Assignee: DEEP INSTINCT
    Inventors: Guy Caspi, Eli David, Nadav Maman, Ishai Rosenberg
  • Patent number: 10986104
    Abstract: There are provided measures for enabling resource-efficient remote malware scanning capable of static and dynamic file analysis. Such measures could exemplarily comprise include, at a local entity, comparing file items of an electronic file to be scanned for malware with the file items of previously scanned electronic files, generating a recipe of the electronic file to be scanned, sending the generated recipe of the electronic file to be scanned for malware to a remote entity for enabling reconstructing the electronic file by assembling its file items on the basis of the obtained recipe and executing a dynamic malware analysis on a runtime behavior of the reconstructed electronic file.
    Type: Grant
    Filed: November 9, 2017
    Date of Patent: April 20, 2021
    Assignee: F-Secure Corporation
    Inventors: Pekka Rasanen, Ville Lindfors
  • Patent number: 10977443
    Abstract: Embodiments provide for class balancing for intent authoring using search via: receiving a positive example of an utterance associated with an intent, building an in-intent pool of utterances from a conversation log using the positive example in a first search query of the conversation log; adding the in-intent pool of utterances as a positive class to a training dataset; applying Boolean operators to negate the positive example to form a complement example; building an out-intent pool of utterances from the conversation log using the complement example in a first search query of the conversation log; and adding the out-intent pool of utterances as a complement class to the training dataset. The training dataset may be balanced to include a predefined ratio of positive and complement examples. The training dataset may be used to train or retrain an intent classifier.
    Type: Grant
    Filed: November 5, 2018
    Date of Patent: April 13, 2021
    Assignee: International Business Machines Corporation
    Inventors: Abhishek Shah, Tin Kam Ho
  • Patent number: 10977208
    Abstract: A file system is setup in user space of an operating system (OS) of a device without editing kernal code of the OS. Data of a file at the device is archived to a target location. The data of the file is replaced with a link to the target location. The archived data is retrieved via the file system in response to an input/output (I/O) request to the data of the file.
    Type: Grant
    Filed: September 25, 2015
    Date of Patent: April 13, 2021
    Assignee: MICRO FOCUS LLC
    Inventor: Jeffrey Lynn West
  • Patent number: 10972490
    Abstract: A specifying device receives detection information from a security device that detects hacking into a network or an activity of a terminal related to infection, and specifies a state of the terminal from information of the terminal and content of activity of the terminal included in the detection information. The specifying device specifies, when specifying that the terminal is in the state of being infected with malware, a terminal that may be infected before performing the content of the activity of the terminal included in the detection information based on connection information stored in a configuration information storage device, and specifies a terminal located on a route, along which the infected terminal is likely to be used for hacking or for infection of the terminal in the future, as a candidate for an infected terminal likely to be infected.
    Type: Grant
    Filed: October 5, 2016
    Date of Patent: April 6, 2021
    Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATION
    Inventors: Yasuhiro Teramoto, Bo Hu, Toshiharu Kishi, Yukio Nagafuchi, Takaaki Koyama, Hideo Kitazume
  • Patent number: 10963558
    Abstract: A malware detection method and a malware detection apparatus, where the method includes running to-be-detected software in a sandbox, and recording at least one operation, and in a process of recording the at least one operation, when it is detected that any interface that has a delay attribute in the sandbox is called, determining whether delay duration corresponding to a first delay length parameter of the called interface is greater than a preset duration. When the delay duration corresponding to the first delay length parameter is greater than the preset duration, delay duration of delay execution is reduced to enable the malicious behavior to be executed in the process of recording the at least one operation executed within the preset duration after the to-be-detected software starts to run.
    Type: Grant
    Filed: December 20, 2019
    Date of Patent: March 30, 2021
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventor: Bu Liu
  • Patent number: 10963569
    Abstract: A security driver loads early in the boot process for a compute instance and detects processes that are subsequently launched and/or terminated. The detected processes can be recorded, and then scanned with any suitable malware scanning tool(s) once a user mode is available on the compute instance, including any processes that are terminated before such scanning tools are launched. After the operating system is installed and a user mode is available, other scanning tools may also be deployed (e.g., in the user mode) to augment security of the compute instance.
    Type: Grant
    Filed: June 11, 2019
    Date of Patent: March 30, 2021
    Assignee: Sophos Limited
    Inventors: Mark David Harris, Andrew G. P. Smith, Richard Paul Cosgrove
  • Patent number: 10956298
    Abstract: Methods, apparatus, systems and articles of manufacture are disclosed. An example system includes a memory accessed by a program of interest, a performance monitoring unit to collect first memory access information and second memory access information about an object accessed in the memory by the program of interest; and a leak detector to: determine a non-access period based on the first memory access information and an unsupervised machine learning model trained based on the program of interest; and detect a potential memory leak of the program of interest based on the second memory access information and the non-access period.
    Type: Grant
    Filed: December 27, 2018
    Date of Patent: March 23, 2021
    Assignee: INTEL CORPORATION
    Inventors: Mohammad Mejbah Ul Alam, Jason Martin, Justin Gottschlich, Alexander Heinecke, Shengtian Zhou
  • Patent number: 10958672
    Abstract: An automated method for processing security events in association with a cybersecurity knowledge graph. The method begins upon receipt of information from a security system representing an offense. An initial offense context graph is built based in part on context data about the offense. The graph also activity nodes connected to a root node; at least one activity node includes an observable. The root node and its one or more activity nodes represent a context for the offense. The knowledge graph, and potentially other data sources, are then explored to further refine the initial graph to generate a refined graph that is then provided to an analyst for further review and analysis. Knowledge graph exploration involves locating the observables and their connections in the knowledge graph, determining that they are associated with known malicious entities, and then building subgraphs that are then merged into the initial graph.
    Type: Grant
    Filed: December 12, 2019
    Date of Patent: March 23, 2021
    Assignee: International Business Machines Corporation
    Inventors: William Alexander Bird, Suzanne Carol Deffeyes, Jiyong Jang, Dhilung Kirat, Youngja Park, Josyula R. Rao, Marc Philippe Stoecklin
  • Patent number: 10958522
    Abstract: A configuration management system tracks the configuration of a computing environment based on a tracking policy. The configuration management system detects a change to a configuration setting included in the tracking policy, and classifies the change. The classification is indicative of an effect of the change on an ability to manage operation of the computing environment. The configuration management system initiates an action, based at least in part on the classification, in response to the change.
    Type: Grant
    Filed: September 24, 2019
    Date of Patent: March 23, 2021
    Assignee: Amazon Technologies, Inc.
    Inventors: Dallas Lamont Willett, Jeremiah C. Wilton, Mostafa Ead, Ming Che Lee
  • Patent number: 10951642
    Abstract: A threat management facility that remotely stores global reputation information for network content can be used in combination with a recognition engine such as a machine learning classifier that is locally deployed on endpoints within an enterprise network. More specifically, the recognition engine can locally evaluate reputation for a network address being accessed by an endpoint, and this reputation information can be used to dynamically establish a timeout for a request from the endpoint to the threat management facility for corresponding global reputation information.
    Type: Grant
    Filed: January 13, 2020
    Date of Patent: March 16, 2021
    Assignee: Sophos Limited
    Inventors: Neil Robert Tyndale Watkiss, Emile Marcus Kenning, Mark David Harris
  • Patent number: 10944781
    Abstract: Disclosed computer-implemented methods for identifying malicious domain names from a passive domain name system server log (DNS log) may include, in some examples, (1) creating a pool of domain names from the DNS log, (2) identifying respective features of each name in the pool, (3) preparing a list of known benign names and respective features of each known benign name, (4) preparing a list of known malicious names and features of each known malicious name, (5) computing a classification model based on (A) the features of each benign name on the list of benign names and (B) the features of each malicious name on the list of malicious names, (6) identifying respective features of an unclassified domain name, and (7) classifying, using the classification model, the unclassified domain name as malicious, based on the respective features of the unclassified domain name. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: June 25, 2018
    Date of Patent: March 9, 2021
    Assignee: NortonLifeLock Inc.
    Inventors: Leyla Bilge, Pierre-Antoine Vervier
  • Patent number: 10944779
    Abstract: The disclosure is directed towards systems and methods for improving security in a computer network. The system can include a planner and a plurality of controllers. The controllers can be deployed within each zone of the production network. Each controller can be configured to assume the role of an attacker or a target for malicious network traffic. Simulations of malicious behavior can be performed by the controllers within the production network, and can therefore account for the complexities of the production network, such as stateful connections through switches, routers, and other intermediary devices. In some implementations, the planner can analyze data received from the controllers to provide a holistic analysis of the overall security posture of the production network.
    Type: Grant
    Filed: February 15, 2019
    Date of Patent: March 9, 2021
    Assignee: FIREEYE, INC.
    Inventors: Christopher B. Key, Paul E. Holzberger, Jr.
  • Patent number: 10943011
    Abstract: An amount of data change associated with a version of a content file with respect to one or more previous versions of the content file is determined. The amount of change associated with the version of the content file is determined using a tree data structure associated with the content file that is stored on a storage cluster. One or more statistics associated with backup snapshot are provided to a server. The server is configured to determine that the amount of data change associated with the version of the content file is anomalous based in part on the one or more statistics associated with the backup snapshot. A notification that data associated with the backup snapshot is potentially infected by malicious software is received from the server. The version of the content file is indicated as being potentially infected by malicious software.
    Type: Grant
    Filed: March 27, 2020
    Date of Patent: March 9, 2021
    Assignee: Cohesity, Inc.
    Inventors: Prashant Gaurav, Sidharth Mishra, Karandeep Singh Chawla, Anubhav Gupta, Sudhir Srinivas, Apurv Gupta, Nagapramod Mandagere
  • Patent number: 10936726
    Abstract: Systems, methods, and software can be used to analyze OSS components of a software code. In some aspects, a computer-implemented method comprises: scanning, by at least one hardware processor, a software code to determine whether the software code includes an open source software (OSS) component; for each OSS component included in the software code: determining, by the at least one hardware processor, a security score for the OSS component; and determining, by the at least one hardware processor, whether the OSS component meets a security policy by comparing the security score with a threshold; and in response to determining that at least one OSS component does not meet the security policy, preventing, by the at least one hardware processor, the software code including the at least one OSS component from being compiled.
    Type: Grant
    Filed: November 26, 2018
    Date of Patent: March 2, 2021
    Assignee: BlackBerry Limited
    Inventor: Adam John Boulton
  • Patent number: 10938664
    Abstract: In one embodiment, a network assurance service that monitors a network calculates network frequency distributions of a performance measurement from the network over a plurality of different time periods. The service calculates entity frequency distributions of the performance measurement for a plurality of different groupings of one or more network entities in the network over the plurality of different time periods. The service determines distance measurements between the network frequency distributions and the entity frequency distributions. The service identifies a particular one of the grouping of one or more networking entities as an outlier, based on a change in distance measurements between the network frequency distributions and the entity frequency distributions for the particular grouping. The service provides an indication of the identified outlier grouping to a user interface.
    Type: Grant
    Filed: September 17, 2018
    Date of Patent: March 2, 2021
    Assignee: Cisco Technology, Inc.
    Inventors: Vikram Kumaran, Santosh Ghanshyam Pandey, Jean-Philippe Vasseur
  • Patent number: 10938838
    Abstract: An automated system attempts to characterize code as safe or unsafe. For intermediate code samples not placed with sufficient confidence in either category, human-readable analysis is automatically generated to assist a human reviewer in reaching a final disposition. For example, a random forest over human-interpretable features may be created and used to identify suspicious features in a manner that is understandable to, and actionable by, a human reviewer. Similarly, a k-nearest neighbor algorithm may be used to identify similar samples of known safe and unsafe code based on a model for, e.g., a file path, a URL, an executable, and so forth. Similar code may then be displayed (with other information) to a user for evaluation in a user interface. This comparative information can improve the speed and accuracy of human interventions by providing richer context for human review of potential threats.
    Type: Grant
    Filed: September 12, 2018
    Date of Patent: March 2, 2021
    Assignee: Sophos Limited
    Inventors: Joshua Daniel Saxe, Andrew J. Thomas, Russell Humphries, Simon Neil Reed, Kenneth D. Ray, Joseph H. Levy