125 patents
Utility
Churn-aware Machine Learning for Cybersecurity Threat Detection
25 May 23
Churn-aware training of a classifier which reduces the difference between predictions of two different models, such as a prior generation of a classification model and a subsequent generation.
David Benjamin Krisiloff, Scott Coull
Filed: 25 Jan 23
Utility
System and method for analyzing binary code for malware classification using artificial neural network techniques
25 Apr 23
A system for detecting whether a file including content is associated with a cyber-attack is described.
Jeffrey Thomas Johns, Brian Sanford Jones, Scott Eric Coull
Filed: 30 Aug 21
Utility
System and method for surfacing cyber-security threats with a self-learning recommendation engine
25 Apr 23
Techniques for performing cyber-security alert analysis and prioritization according to machine learning employing a predictive model to implement a self-learning feedback loop.
Awalin Nabila Sopan
Filed: 30 Sep 19
Utility
Methods and apparatus for detecting and preventing obfuscated cyberattacks using machine learning techniques
4 Apr 23
The presently disclosed subject matter includes a system for monitoring a set of command lines or calls to executable scripts configured to be executed by an operating system.
Vikram Hegde, Chunsheng Victor Fang
Filed: 25 Sep 19
Utility
Churn-aware machine learning for cybersecurity threat detection
31 Jan 23
Churn-aware training of a classifier which reduces the difference between predictions of two different models, such as a prior generation of a classification model and a subsequent generation.
David Benjamin Krisiloff, Scott Coull
Filed: 7 Apr 20
Utility
Systems and methods for automated cybersecurity analysis of extracted binary string sets
17 Jan 23
An automated system and method for analyzing a set of extracted strings from a binary is disclosed including processing the binary with a string-extraction logic that can locate strings within the binary and output an extracted string set for use in cybersecurity analysis.
Philip Tully, Matthew Haigh, Jay Gibble, Michael Sikorski
Filed: 27 Jun 19
Utility
System and method for heterogeneous transferred learning for enhanced cybersecurity threat detection
18 Oct 22
A method includes training a first machine learning model with a first dataset, to produce a first trained machine learning model to infer cybersecurity-oriented file properties and/or detect cybersecurity threats within a first domain.
Scott Eric Coull, David Krisiloff, Giorgio Severi
Filed: 16 Aug 19
Utility
Systems and methods for testing known bad destinations in a production network
31 May 22
The disclosure is directed to a system for testing known bad destinations while in a production network.
Christopher B. Key, Paul E. Holzberger, Jr., Jeff Seely
Filed: 29 Apr 19
Utility
System and method for automatically associating cybersecurity intelligence to cyberthreat actors
22 Feb 22
A computerized method for associating cyberthreat actor groups responsible for different cyberthreats is described.
Matthew Berninger, Barry Vengerik
Filed: 24 Jun 19
Utility
System and method for adaptive graphical depiction and selective remediation of cybersecurity threats
14 Dec 21
A method for performing cyber-security analysis includes generating a semantic graph in which each object is represented as a node, and each event associated with an object is represented as an edge.
Scott Eric Coull, Jeffrey Thomas Johns
Filed: 29 Mar 19
Utility
Churn-aware Machine Learning for Cybersecurity Threat Detection
7 Oct 21
Churn-aware training of a classifier which reduces the difference between predictions of two different models, such as a prior generation of a classification model and a subsequent generation.
David Benjamin Krisiloff, Scott Coull
Filed: 7 Apr 20
Utility
Systems and methods for attack simulation on a production network
28 Sep 21
The disclosure is directed towards systems and methods for improving security in a computer network.
Christopher B. Key, Paul E. Holzberger, Jr.
Filed: 24 Feb 17
Utility
Virtual system and method for securing external network connectivity
7 Sep 21
According to one embodiment, a computing device comprises one or more hardware processor and a memory coupled to the one or more processors.
Udo Steinberg
Filed: 30 Jun 16
Utility
System and method for analyzing binary code for malware classification using artificial neural network techniques
31 Aug 21
A system for detecting whether a file including content s associated with a cyber-attack is described.
Jeffrey Thomas Johns, Brian Sanford Jones, Scott Eric Coull
Filed: 27 Oct 17
Utility
System, apparatus and method for automatically verifying exploits within suspect objects and highlighting the display information associated with the verified exploits
10 Aug 21
According to one embodiment, a threat detection system comprising an intrusion protection system (IPS) logic, a virtual execution logic and a reporting logic is shown.
Ashar Aziz, Muhammad Amin, Osman Abdoul Ismael, Zheng Bu
Filed: 8 Nov 19
Utility
System and method for threat detection and identification
3 Aug 21
Exemplary systems and methods for malware attack detection and identification are provided.
Ashar Aziz, Wei-Lung Lai, Jayaraman Manni
Filed: 6 May 19
Utility
System and method for offloading packet processing and static analysis operations
3 Aug 21
According to one embodiment, a system features a network security device and a cloud computing service.
Muhammad Amin, Masood Mehmood, Ramaswamy Ramaswamy, Madhusudan Challa, Shrikrishna Karandikar
Filed: 21 Oct 19
Utility
System and method for detecting repetitive cybersecurity attacks constituting an email campaign
27 Jul 21
According to one embodiment, a system for detecting an email campaign includes feature extraction logic, pre-processing logic, campaign analysis logic and a reporting engine.
Jijo Xavier, Robert Venal
Filed: 27 Jun 18
Utility
System, apparatus and method for reconfiguring virtual machines
27 Jul 21
According to one embodiment, a computerized method operates by configuring a virtual machine operating within an electronic device with a first instrumentation for processing of a suspicious object.
Osman Abdoul Ismael
Filed: 14 Aug 17
Utility
Dynamic guest image creation and rollback
20 Jul 21
According to one embodiment, a computerized method comprises three operations.
Harnish Goradia
Filed: 25 Mar 19