Using static analysis for vulnerability detection

PW O'hearn, TM Reed, Y Chen… - US Patent 12,034,754, 2024 - Google Patents
Using static analysis for vulnerability detection, including: inspecting, using an
underapproximate static code analysis, a non-executable representation of an application to …

Tracking of user login sessions

M Bog, V Kapoor, SJ Pullara III, Y Chen… - US Patent …, 2024 - Google Patents
An illustrative method includes determining that a first user login session and a second user
login session have a parent-child relationship that indicates that a particular user is …

Enhancing security of a cloud deployment based on learnings from other cloud deployments

Ú Erlingsson, Y Chen - US Patent 12,126,695, 2024 - Google Patents
Learning from other cloud deployments to combat security threats, including: identifying, for
at least a portion of a first cloud deployment, one or more additional cloud deployments to …

Cloud infrastructure entitlement management by a data platform

TM Reed, B Nguyen, K Beasley, JL Vertes… - US Patent …, 2024 - Google Patents
An illustrative method includes accessing data representative of a first role associated with a
set of permissions with respect to resources within the compute environment and specifying …

Universal cloud data ingestion for stream processing

G Karaje, H Sigurbjarnarson, JPE Martin… - US Patent …, 2024 - Google Patents
An example method includes accessing, by a data platform via a network, data from one or
more cloud environments; identifying, by the data platform and in the data, first data …

Deduplication of monitored communications data in a cloud environment

AK Nanduri, P Jalan, MA Vanninen, AG Ekbote… - US Patent …, 2024 - Google Patents
Example systems and methods monitor a cloud compute environment. An example method
includes: determining, by an agent deployed in a cloud environment and based on a …

Leveraging generative artificial intelligence ('AI') for securing a monitored deployment

N Skarphedinsson, P Bhattacharya… - US Patent …, 2024 - Google Patents
Leveraging generative artificial intelligence ('AI') for securing a monitored deployment,
including: receiving natural language input associated with the monitored deployment, the …

User-specific data-driven network security

V Kapoor, HKB Singh, W Zeng, V Jeyakumar… - US Patent …, 2024 - Google Patents
Detecting anomalous behavior of a device, including: generating, using information
describing historical activity associated with a user device, a trained model for detecting …

Detecting threats against computing resources based on user behavior changes

HKB Singh, V Kapoor, M Bog, Y Chen - US Patent 12,120,140, 2024 - Google Patents
An illustrative method includes generating, based on log data associated with at least one
user session in a network environment associated with a user, a logical graph, wherein the …

Instruction-level threat assessment

P Godefroid, C Condra, Y Chen - US Patent 12,095,796, 2024 - Google Patents
Instruction-level threat assessment, including: identifying one or more probe insertion points
in code of a package corresponding to one or more vulnerabilities of the package; inserting …