System and method for automated machine-learning, zero-day malware detection
BR Avasarala, JC Day, D Steiner - US Patent 9,292,688, 2016 - Google Patents
BACKGROUND Detection of cyber intrusion attempts is a key component to cyber security.
Current commercial anti-virus and intrusion detection software (IDS) rely largely on …
Current commercial anti-virus and intrusion detection software (IDS) rely largely on …
Use of device risk evaluation to manage access to services
A Cockerill, D Richardson, D Thanos… - US Patent …, 2019 - Google Patents
2017-08-14 Assigned to Lookout, Inc. reassignment Lookout, Inc. ASSIGNMENT OF
ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: RICHARDSON …
ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: RICHARDSON …
System and method for automated machine-learning, zero-day malware detection
S Miserendino, R Peters, D Steiner… - US Patent …, 2021 - Google Patents
Improved systems and methods for automated machine-learning, zero-day malware
detection. Embodiments include a system and method for detecting malware using multi …
detection. Embodiments include a system and method for detecting malware using multi …
Determining source of side-loaded software
D Richardson, AM Farrakha, WN Robinson… - US Patent …, 2017 - Google Patents
(57) ABSTRACT A source of side-loaded software is determined. An action may be
performed in response to the determination of the Source. In one case, the handling of an …
performed in response to the determination of the Source. In one case, the handling of an …
System and method for network data characterization
PE Kaloroumakis, MP Boyle, CC Valentino - US Patent 9,832,216, 2017 - Google Patents
Described herein are embodiments of a system and method for network data
characterization and/or classification that overcome the defects of the prior art. These and …
characterization and/or classification that overcome the defects of the prior art. These and …
Systems and methods for detecting malicious mobile webpages
C Amrutkar, PG Traynor, YS Kim - US Patent App. 14/218,760, 2015 - Google Patents
The disclosed technology includes techniques for identifying malicious mobile electronic
documents, eg, webpages or emails, based on static document features. The static features …
documents, eg, webpages or emails, based on static document features. The static features …
System and method for analyzing mobile cyber incident
BI Kim, TJ Lee, Y Shin, HK Kang, SG Lee… - US Patent …, 2017 - Google Patents
A system and method for analyzing mobile cyber incidents that checks whether codes
attacking the weaknesses of mobile users are inserted into collected URLs and whether …
attacking the weaknesses of mobile users are inserted into collected URLs and whether …
System and method for automated machine-learning, zero-day malware detection
BR Avasarala, JC Day, D Steiner - US Patent 9,665,713, 2017 - Google Patents
Improved systems and methods for automated machine learning, Zero-day malware
detection. Embodiments include a method for improved Zero-day malware detection that …
detection. Embodiments include a method for improved Zero-day malware detection that …
Malware detection and identification
JR Humble, C Robinette - US Patent 9,237,161, 2016 - Google Patents
(57) ABSTRACT A malware detection/identification system scores each Sub ject file and/or
scores tags obtained from the subject file to determine the potential that the file contains …
scores tags obtained from the subject file to determine the potential that the file contains …
Determining source of side-loaded software using signature of authorship
D Richardson, AM Farrakha, WN Robinson… - US Patent …, 2018 - Google Patents
A source of side-loaded software is determined. An action may be performed in response to
the determination of the source. In one case, the handling of an application on a mobile …
the determination of the source. In one case, the handling of an application on a mobile …