114 patents
Page 5 of 6
Utility
Secure communications between peers using a verified virtual trusted platform module
16 Mar 20
The embodiments herein are directed to a technique for providing secure communication between nodes of a network environment or within a node of the network using a verified virtual trusted platform module (TPM) of each node.
Osman Abdoul Ismael, Hendrik Tews
Filed: 8 Sep 16
Utility
System and method for bot detection
9 Mar 20
Exemplary systems and methods for detecting a communication channel of a bot.
Ashar Aziz, Wei-Lung Lai, Jayaraman Manni
Filed: 16 Apr 17
Utility
Technique for malware detection capability comparison of network security devices
9 Mar 20
A testing technique tests and compares malware detection capabilities of network security devices, such as those commercially available from a variety of cyber-security vendors.
Yasir Khalid, Nadeem Shahbaz
Filed: 21 Nov 16
Utility
Malware detection system with contextual analysis
2 Mar 20
A computerized method for detecting malware associated with an object.
Yasir Khalid, Sai Omkar Vashisht, Alexander Otvagin
Filed: 30 Dec 15
Utility
Enhanced malware detection for generated objects
2 Mar 20
A computerized method to identify malicious code generated by seemingly benign objects is described.
Sushant Paithane, Sai Omkar Vashisht
Filed: 18 Jun 17
Utility
Malicious message analysis system
2 Mar 20
A computerized technique is provided to analyze a message for malware by determining context information from attributes of the message.
Abhishek Singh
Filed: 12 Aug 18
Utility
System and method to create a number of breakpoints in a virtual machine via virtual machine trapping events
24 Feb 20
A system and method for dynamic software analysis operable to describe program behavior via instrumentation of virtualization events.
Robert Jung, Antony Saba
Filed: 23 Apr 13
Utility
Exploit of privilege detection framework
17 Feb 20
A non-transitory storage medium having stored thereon logic, the logic being executable by one or more processors to perform operations including comparing a current privilege of a first process with an initial privilege of the first process recorded in a privilege list, and responsive to determining a change exists between the current privilege of the first process and the initial privilege of the first process that is greater than a predetermined threshold, determining the first process is operating with the current privilege due to an exploit of privilege attack is shown.
Michael Vincent, Sai Omkar Vashist, Jonas Pfoh
Filed: 28 Jun 16
Utility
System for detecting a presence of malware from behavioral analysis
17 Feb 20
A system for detecting malware is described.
Ashar Aziz
Filed: 31 Jul 16
Utility
Adaptive virtual machine snapshot update framework for malware behavioral analysis
3 Feb 20
A method for updating a virtual machine disk snapshot for use in instantiating one or more virtual guest instances for malware detection is described.
Sai Omkar Vashisht, Phung-Te Ha, Sushant Paithane, Sumer Deshpande
Filed: 18 Jun 17
Utility
Multi-level control for enhanced resource and object evaluation management of malware detection system
3 Feb 20
A computerized method for enforcing compliance to a subscription for object evaluation service by a malware detection system is described.
Mumtaz Siddiqui, Manju Radhakrishnan, Alexander Otvagin
Filed: 28 Sep 17
Utility
Methods and apparatus for graphical user interface environment for creating threat response courses of action for computer networks
13 Jan 20
A graphical user interface provides network security administrators a tool to quickly and easily create one or more courses of action for automatic response to a network threat.
Christopher Nelson Bailey, Bernd Constant, Juan Manuel Vela
Filed: 21 Jun 16
Utility
Detection efficacy of virtual machine-based analysis with application specific events
13 Jan 20
A computerized system and method is described for classifying objects as malicious by processing the objects in a virtual environment and monitoring behaviors during processing by one or more monitors, where the monitoring is conducted in an electronic device that is different than the electronic device within which an analysis of attributes of the objects is conducted beforehand.
Sushant Paithane, Sai Vashisht
Filed: 11 Mar 18
Utility
Microvisor-based malware detection appliance architecture
6 Jan 20
A threat-aware microvisor may be deployed in a malware detection appliance architecture and execute on a malware detection system (MDS) appliance to provide exploit and malware detection within a network environment.
Osman Abdoul Ismael
Filed: 1 Apr 18
Utility
Multi-vector malware detection and analysis
30 Dec 19
A computerized method to coordinate the detection capabilities of an email-based malware detection system with the detection capabilities of a network-based malware detection system and prevent multi-vector cyber-security attacks.
Sakthi Subramanian
Filed: 26 Dec 16
Utility
System and method for classifying malware within content created during analysis of a specimen
23 Dec 19
According to one embodiment, a system of detecting malware in a specimen of computer content or network traffic comprises a processor and a memory.
Michael Vincent, Ali Mesdaq, Emmanuel Thioux, Abhishek Singh, Sal Vashisht
Filed: 22 Oct 15
Utility
Subscription based malware detection under management system control
16 Dec 19
A method establishing communications between a management system and a malware detection system that collectively provide a distributed malware detection scheme.
Ashar Aziz
Filed: 5 Mar 17
Utility
System and method for detecting malicious links in electronic messages
9 Dec 19
According to one embodiment, in response to receiving a plurality of uniform resource locator (URL) links for malicious determination, any known URL links are removed from the URL links based on a list of known link signatures.
Vinay Pidathala, Henry Uyeno
Filed: 4 Feb 18
Utility
Dynamic adaptive defense for cyber-security threats
9 Dec 19
Disclosed is a cyber-security system that is configured to aggregate and unify data from multiple components and platforms on a network.
Bernard Thomas, David Scott, Fred Brott, Paul Smith
Filed: 27 Apr 17
Utility
Ransomware detection and mitigation
9 Dec 19
A computerized method for detecting and mitigating a ransomware attack is described.
Japneet Singh, Anil Gupta
Filed: 23 Jul 17