Distributed systems and methods for automatically detecting unknown bots and botnets
A Mushtaq, T Rosenberry, A Aziz, A Islam - US Patent 9,430,646, 2016 - Google Patents
Generally speaking, a bot is a type of (or part of) an active infiltration attack, often installing
or operating in a two-step process. The first step is the initial infection, which may be a …
or operating in a two-step process. The first step is the initial infection, which may be a …
Detection efficacy of virtual machine-based analysis with application specific events
S Paithane, S Vashisht - US Patent 9,262,635, 2016 - Google Patents
CPC................................. G06F 21/56, G06F 21/53 fying objects as malicious by processing
the objects in a virtual environment and monitoring behaviors during pro See application file …
the objects in a virtual environment and monitoring behaviors during pro See application file …
Dynamically remote tuning of a malware content detection system
M Vincent, E Thioux, S Vashisht, D Kindlund - US Patent 9,223,972, 2015 - Google Patents
4,292,580 A 9, 1981 Ott et al. 5,175,732 A 12/1992 Hendel et al. 5.440, 723 A 8, 1995
Arnold et al. 5.490, 249 A 2, 1996 Miller 5,657,473 A 8, 1997 Killean et al. 5,842,002 A …
Arnold et al. 5.490, 249 A 2, 1996 Miller 5,657,473 A 8, 1997 Killean et al. 5,842,002 A …
Interactive infection visualization for improved exploit detection and signature generation for malware and malware families
H Rathor, K Dalal, A Gupta - US Patent 10,027,689, 2018 - Google Patents
According to one embodiment, a malware detection and visualization system comprises one
or more processors; and a storage module communicatively coupled to the one or more …
or more processors; and a storage module communicatively coupled to the one or more …
Optimized resource allocation for virtual machines within a malware content detection system
OA Ismael - US Patent 9,495,180, 2016 - Google Patents
According to one embodiment, a computerized method comprises operations of instantiating
a first virtual machine instance and a second virtual machine instance to run concurrently …
a first virtual machine instance and a second virtual machine instance to run concurrently …
System and method for detecting malicious links in electronic messages
V Pidathala, H Uyeno - US Patent 9,300,686, 2016 - Google Patents
William W. Schaal (57) ABSTRACT According to one embodiment, in response to receiving
a plurality of uniform resource locator (URL) links for mali cious determination, any known …
a plurality of uniform resource locator (URL) links for mali cious determination, any known …
Advanced persistent threat (APT) detection center
T Haq, J Zhai, VK Pidathala - US Patent 9,628,507, 2017 - Google Patents
(57) ABSTRACT A computerized method is described in which one or more received objects
are analyzed by an advanced persistent threat (APT) detection center to determine if the …
are analyzed by an advanced persistent threat (APT) detection center to determine if the …
System, apparatus and method for using malware analysis results to drive adaptive instrumentation of virtual machines to improve exploit detection
OA Ismael - US Patent 9,736,179, 2017 - Google Patents
According to one embodiment, an electronic device comprises a memory to store
information and a processor. The processor is adapted to receive information associated …
information and a processor. The processor is adapted to receive information associated …
Framework for efficient security coverage of mobile software applications installed on mobile devices
OA Ismael, D Song - US Patent 9,009,823, 2015 - Google Patents
(57) ABSTRACT A method is described that includes generating a representa tion of an
application that describes specific States of the application and specific State transitions of …
application that describes specific States of the application and specific State transitions of …
Systems and methods for automatically detecting backdoors
A Singh, J Manni - US Patent 8,990,944, 2015 - Google Patents
Techniques for detecting malicious attacks may monitor activities during execution of content
(eg, network downloads and email) to identify an instruction backdoor on a computer. An …
(eg, network downloads and email) to identify an instruction backdoor on a computer. An …