322 patents
Page 3 of 17
Utility
System and Method for Detecting Dictionary-based Dga Traffic
19 Oct 23
A system and method for detecting dictionary-based DGA traffic is provided.
Janos Szurdi, Weihan Jiang, David Qianshan He
Filed: 18 Apr 22
Utility
Method and System for Providing DNS Security Using Process Information
19 Oct 23
Domain Name System (DNS) security using process information is provided.
Zihang Xiao, Zhanhao Chen
Filed: 8 Dec 22
Utility
Preventing Ransomware from Encrypting Files on a Target Machine
12 Oct 23
Techniques for preventing ransomware from encrypting files on a target machine are disclosed.
Eldar Aharoni, Vadim Goldstein, Mashav Sapir, Jenny Kitaichik
Filed: 14 Jun 23
Utility
Heidi: ML on Hypervisor Dynamic Analysis Data for Malware Classification
12 Oct 23
The present application discloses a method, system, and computer system for detecting malicious files.
Sujit Rokka Chhetri, Akshata Krishnamoorthy Rao, Daniel Raygoza, Esmid Idrizovic, William Redington Hewlett, II, Robert Jung
Filed: 7 Apr 22
Utility
Method and System for Automatically Generating Malware Signature
28 Sep 23
Automatic generation of a malware signature is disclosed.
Yang Ji, Tyler Pals Halfpop, Zihang Xiao, Wenjun Hu
Filed: 7 Feb 22
Utility
Enforcing a Dynamically Modifiable Geofence Based on Conditions of a Cellular Network
21 Sep 23
A geofencing service establishes an initial geofence for monitoring devices connected to a cellular network.
Arun Athrey Chandrasekaran, Avaneesh Anandrao Kadam
Filed: 21 Mar 22
Utility
Detecting Malicious Activity on an Endpoint Based on Real-time System Events
31 Aug 23
Techniques for detecting malicious activity on an endpoint based on real-time system events are disclosed.
Roni Moshitzky, Elad Wexler, Marat Khousid, Guy Pilosof
Filed: 2 May 23
Utility
Multi-layered Policy Management
31 Aug 23
Techniques for enforcing policy on multiple levels are disclosed.
Jun Du
Filed: 3 May 23
Utility
Context-based Security Over Interfaces In Ng-ran Environments In Mobile Networks
31 Aug 23
Techniques for applying context-based security over interfaces in NG-RAN environments in mobile networks are disclosed.
Sachin Verma, Leonid Burakovsky
Filed: 25 Feb 22
Utility
Context-based Security Over Interfaces In O-ran Environments In Mobile Networks
31 Aug 23
Techniques for applying context-based security over interfaces in O-RAN environments in mobile networks are disclosed.
Sachin Verma, Leonid Burakovsky
Filed: 13 Feb 23
Utility
Prevention of Container Escape-based Attacks of a Host System
17 Aug 23
A service prevents attacks carried out through container escape for silo-based containers.
Daniel Prizmant, Ariel M. Zelivansky, Liron Levin, Eran Yanay
Filed: 15 Feb 22
Utility
Process Privilege Escalation Protection In a Computing Environment
10 Aug 23
Techniques for process privilege escalation protection in a computing environment are disclosed.
Yaron Lavi, Eldar Aharoni, Elad Wexler
Filed: 18 Apr 23
Utility
Profiling of Spawned Processes In Container Images and Enforcing Security Policies Respective Thereof
10 Aug 23
Execution of software containers is secured using security profiles.
Dima Stopel, Liron Levin
Filed: 6 Apr 23
Utility
Automated Generation of Behavioral Signatures for Malicious Web Campaigns
10 Aug 23
Techniques for automated generation of behavioral signatures for malicious web campaigns are disclosed.
William Russell Melicher, Oleksii Starov, Shresta Bellary Seetharam, Shaown Sarker
Filed: 31 Jan 23
Utility
Cross-network Performance Testing for an Application and Correlation of Results for Enhanced Performance Analysis
3 Aug 23
Performance tests targeting an application executing on a destination server and the network elements along the path thereto are executed by agents installed on multiple types of respective hosts across geographic locations.
Hristos Siakou, John Edward Bothe
Filed: 28 Jan 22
Utility
Detecting Behavioral Change of Iot Devices Using Novelty Detection Based Behavior Traffic Modeling
3 Aug 23
An anomalous behavior detector has been designed to detect novel behavioral changes of devices based on network traffic data that likely correlate to anomalous behaviors.
Ke Tian, Yilin Zhao, Xiaoyi Duan, Jun Du
Filed: 28 Jan 22
Utility
Distributed Offload Leveraging Different Offload Devices
3 Aug 23
Techniques for distributed offload leveraging different offload devices are disclosed.
John Edward McDowall, James Sugg, Charles Bransi
Filed: 31 Mar 23
Utility
Secure Multi-enterprise Wireless Network
3 Aug 23
An access point service configures and manages a multi-enterprise wireless network in public settings.
Ta Chien Lin
Filed: 2 Feb 22
Utility
System and Method for Detecting Exploit Including Shellcode
3 Aug 23
Detection of an exploit including shellcode is disclosed.
Tao Yan, Jin Chen, Bo Qu, Jiangxia Liu, Edouard Bochin, Royce Lu
Filed: 28 Jan 22
Utility
Increased Coverage of Application-based Traffic Classification with Local and Cloud Classification Services
20 Jul 23
A cloud-based traffic classification engine maintains a catalog of application-based traffic classes which have been developed based on known applications, and a local traffic classification engine maintains a subset of these classes.
Mengying Jiang, Shengming Xu, Menglan Fang, Ho Yu Lam
Filed: 27 Feb 23