$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

[미국특허] Fuzzy hash of behavioral results 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-011/00
  • G06F-012/14
  • G06F-012/16
  • G08B-023/00
  • H04L-029/06
  • G06F-021/56
출원번호 US-0042454 (2013-09-30)
등록번호 US-9294501 (2016-03-22)
발명자 / 주소
  • Mesdaq, Ali
  • Westin, III, Paul L.
출원인 / 주소
  • FireEye, Inc.
대리인 / 주소
    Rutan & Tucker, LLP
인용정보 피인용 횟수 : 52  인용 특허 : 199

초록

A computerized method is described in which a received object is analyzed by a malicious content detection (MCD) system to determine whether the object is malware or non-malware. The analysis may include the generation of a fuzzy hash based on a collection of behaviors for the received object. The f

대표청구항

1. A computerized method for classifying objects in a malware system, comprising: receiving, by a malicious content detection (MCD) system from a client device, an object to be classified;detecting behaviors of the received object, wherein the behaviors are detected after processing the received obj

이 특허에 인용된 특허 (199)

  1. Villa, Emilio; Zidaritz, Adrian; Varga, Michael David; Eschelbeck, Gerhard; Jones, Michael Kevin; McArdle, Mark James, Active firewall system and methodology.
  2. Thomlinson,Matthew W., Adapting input to find integer overflows.
  3. Spertus, Michael P., Adaptive instrumentation through dynamic recompilation.
  4. Demir, Tufan; Ranadive, Ameet; Rizvi, Shariq; Daswani, Neilkumar Murli, Adaptive scanning.
  5. Satish, Sourabh; Gardner, Patrick, Altering application behavior based on content provider reputation.
  6. van der Made, Peter A. J., Analytical virtual machine.
  7. Anderson,Todd A.; Putzolu,David M., Apparatus and method for secure, automated response to distributed denial of service attacks.
  8. Ben Nun, Michael; Ravid, Sagi; Weil, Ofer, Apparatus and method for wire-speed classification and pre-processing of data packets in a full duplex network.
  9. Stolfo, Salvatore J.; Wang, Ke, Apparatus method and medium for detecting payload anomaly using n-gram distribution of normal data.
  10. Danford, Robert William; Farmer, Kenneth M.; Jeffries, Clark Debs; Sisk, Robert B.; Walter, Michael A., Applying blocking measures progressively to malicious network traffic.
  11. Danford,Robert William; Farmer,Kenneth M.; Jeffries,Clark Debs; Sisk,Robert B.; Walter,Michael A., Applying blocking measures progressively to malicious network traffic.
  12. Nakae,Masayuki; Yamagata,Masaya, Attack defending system and attack defending method.
  13. Deninger, William; de la Iglesia, Erik, Attributes of captured objects in a capture system.
  14. Deninger, William; de la Iglesia, Erik, Attributes of captured objects in a capture system.
  15. Gryaznov,Dmitry, Automated Internet Relay Chat malware monitoring and interception.
  16. Enstone, Mark Richard; Cureington, James Anthony, Automated immune response for a computer.
  17. Boulay Jean-Michel Yann,FRX ; Petrillo August T. ; Swimmer Morton Gregory, Automated sample creation of polymorphic and non-polymorphic marcro viruses.
  18. Miller Christopher M. (Saratoga CA), Automated testing system.
  19. Arnold William C. (Mahopac NY) Chess David M. (Mohegan Lake NY) Kephart Jeffrey O. (Yorktown Heights NY) White Steven R. (New York NY), Automatic immune system for computers and computer networks.
  20. Liang, Yung Chang; Chen, Yi Fen, Automatic registration of a virus/worm monitor in a distributed network.
  21. Zhang, Liang, Automatic signature generation for malicious PDF files.
  22. Teragawa, Daisuke, Backlight device, display device, and television receiver.
  23. Kennedy, Mark K., Behavior blocking utilizing positive behavior system and method.
  24. Daswani, Neilkumar; Ranadive, Ameet; Rizvi, Shariq; Gagnon, Michael; Demir, Tufan; Eisenhaur, Gerry, Behavioral scanning of mobile applications.
  25. Ott Gnther (Erlangen DEX) Kaufhold Wolfgang (Erlangen DEX), Circuit arrangement for attenuation of power oscillations in networks.
  26. Shelest, Art; Yariv, Eran; Abzarian, David, Communications traffic segregation for security purposes.
  27. Fitzgerald, Joseph; Barenboim, Oleg, Compliance-based adaptations in managed virtual systems.
  28. van der Made,Peter A. J, Computer immune system and method for detecting unwanted code in a computer system.
  29. Ji Shuang, Computer network malicious code scanner method and apparatus.
  30. Shostack Adam ; Allouch David,ILX, Computer security.
  31. Schnurer John ; Klemmer Timothy J., Computer virus trap.
  32. Aziz, Ashar, Computer worm defense system and method.
  33. Kanchirayappa, Virupaksha N.; Chandramouli, Natarajan, Computer-implemented PDF document management.
  34. Costa, Manuel; Castro, Miguel; Rowstron, Antony; Crowcroft, Jon, Containment of worms.
  35. Chess, Brian V; Fay, Sean Patrick, Context-sensitive taint analysis.
  36. Sprosts, Craig; Kennedy, Scot; Quinlan, Daniel; Rosenstein, Larry; Slater, Charles, Controlling a message quarantine.
  37. Pak,Michael C.; Kouznetsov,Victor, Delayed-delivery quarantining of network communications having suspicious contents.
  38. Ranjan, Supranamaya, Detecting DNS fast-flux anomalies.
  39. Muttik, Igor; Long, Duncan V., Detecting computer viruses or malicious software by patching instructions into an emulator.
  40. Ismael, Osman Abdoul; Yie, Samuel; Manni, Jayaraman; Amin, Muhammad; Mahbod, Bahman, Detecting malicious network content using virtual environment components.
  41. Szor, Peter; Ferrie, Peter, Detecting malicious software through process dump scanning.
  42. Nachenberg, Carey; Wilhelm, Jeffrey, Detecting polymorphic threats.
  43. Xie, Liang; Zhang, Xinwen; Seifert, Jean-Pierre; Aciicmez, Onur; Latifi, Afshin, Detecting unauthorized use of computing devices based on behavioral patterns.
  44. Chi Darren, Detection and elimination of macro viruses.
  45. Drew,James Howard; Liu,Hui, Diagnosing fault patterns in telecommunication networks.
  46. Bennett, Jeremy, Differential threat detection processing.
  47. Carey S. Nachenberg, Dynamic heuristic method for detecting computer viruses using decryption exploration and evaluation phases.
  48. Bahl, Pradeep, Dynamic risk management.
  49. Aziz, Ashar; Radhakrishnan, Ramesh; Lai, Wei-Lung; Manni, Jayaraman, Dynamic signature creation and enforcement.
  50. Vaidya Vimal, Dynamic signature inspection-based network intrusion detection.
  51. Dadhia, Rajesh K; Field, Scott A., Dynamically computing reputation scores for objects.
  52. Aziz, Ashar; Uyeno, Henry; Manni, Jay; Amin, Muhammad; Staniford, Stuart, Electronic message analysis for malware detection.
  53. Guo, Fanglu; Chiueh, Tzi-cker, Enforcing the execution exception to prevent packers from evading the scanning of dynamically created code.
  54. Cidon Israel,ILX ; Sidi Moshe,ILX, Fault location and performance testing of communication networks.
  55. Lowe, Rick; Broeker, Stephen; Liu, Weimin, File system for a capture system.
  56. Ramzan, Zulfikar, Filter-based identification of malicious websites.
  57. Ismael, Osman Abdoul; Song, Dawn, Framework for efficient security coverage of mobile software applications installed on mobile devices.
  58. Ismael, Osman Abdoul; Aziz, Ashar, Framework for multi-phase analysis of mobile applications.
  59. Asbj?rn S?rhaug ; Aleksandr L. Kupchik, Full-duplex medium tap apparatus and system.
  60. Wolff,Daniel Joseph; Spurlock,Joel Robert; Edwards,Jonathan Lewis, Handling of malware scanning of files stored within a file storage device of a computer network.
  61. Aziz, Ashar; Drzewiecki, Adrian; Radhakrishnan, Ramesh; Manni, Jayaraman; Amin, Muhammad, Heuristic based capture with replay to virtual machine.
  62. Spiegel,Mark; McCorkendale,Bruce; Sobel,William, Heuristic detection and termination of fast spreading network worm attacks.
  63. Szor,Peter, Heuristic detection of malicious computer code by page tracking.
  64. Narasimhan, Srinivasan; Hejmadi, Parthiv; Sreenath, Sheshadri, Host state monitoring.
  65. Sprosts, Craig; Kennedy, Scot; Quinlan, Daniel; Rosenstein, Larry; Slater, Charles, Identifying threats in electronic messages.
  66. Oshima, Akihide, Image forming system, image forming method and information terminal device.
  67. Liang,Yung Chang, Innoculation of computing devices against a selected computer virus.
  68. Roesch,Martin F.; Gula,Ronald J., Intrusion and misuse deterrence system employing a virtual network.
  69. Steven D. Shanklin ; Thomas E. Bernhard ; Gerald S. Lathem, Intrusion detection signature analysis using regular expressions and logical operators.
  70. Ranjan, Supranamaya, Machine learning based botnet detection using real-time extracted traffic features.
  71. Ranadive, Ameet; Rizvi, Shariq; Daswani, Neilkumar Murli, Malicious advertisement detection and remediation.
  72. Thioux, Emmanuel; Amin, Muhammad; Kindlund, Darien; Pilipenko, Alex; Vincent, Michael, Malicious content analysis using simulated user interaction without user involvement.
  73. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, Malware containment and security analysis on connection.
  74. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, Malware containment on connection.
  75. Aziz, Ashar, Malware defense system and method.
  76. Vaystikh, Alex; Polansky, Robert; Saklikar, Samir Dilipkumar; Liptz, Liron, Malware detection using risk analysis based on file system and network activity.
  77. Tuvell, George; Venugopal, Deepak; Hu, Guoning, Malware modeling detection system and method for mobile platforms.
  78. Hursey,Nell John; McEwan,William Alexander, Malware scanning of compressed computer files.
  79. Xie, Michael, Managing network traffic flow.
  80. Chen, Yan; Li, Zhichun; Xia, Gao; Liu, Bin, Matching with a large vulnerability signature ruleset for high performance network defense.
  81. O'Toole, Jr.,James W., Method and apparatus for capturing and filtering datagrams for network security monitoring.
  82. Killean Reginald (Burntisland GB3) Robb David (Aberdeen GB3) White Norman Jackson (Tayside GB3), Method and apparatus for controlling access to and corruption of information in computer systems.
  83. Hendel Ariel (Ronkonkoma NY) Virzi John D. (Bronx NY), Method and apparatus for controlling data communication operations within stations of a local-area network.
  84. Wallman, David, Method and apparatus for implementing concurrently running jobs on an extended virtual machine using different heaps managers.
  85. Arnold, William C.; Chess, David M.; Morar, John F.; Segal, Alla; Swimmer, Morton G.; Whalley, Ian N.; White, Steve R., Method and apparatus for replicating and analyzing worm programs.
  86. Petersen, Scott E., Method and apparatus for secure execution of code.
  87. Arnold,William C.; Chess,David M.; Morar,John F.; Segal,Alla; Whalley,Ian N.; White,Steve R., Method and apparatus for the automatic determination of potentially worm-like behavior of a program.
  88. Donaldson,Albert L., Method and system for blocking e-mail having a nonexistent sender address.
  89. Poston, Robert J., Method and system for classification of software using characteristics and combinations of such characteristics.
  90. Kasper,James W.; Beriswill,Paul A.; Wiley,Kevin L., Method and system for configurable network intrusion detection.
  91. Kevin J. Ziese, Method and system for dynamically distributing updates in a network.
  92. Xue, Hui; Liu, Yixun; Guetter, Christoph; Jolly, Marie-Pierre; Gühring, Jens, Method and system for propagation of myocardial infarction from delayed enhanced cardiac imaging to cine magnetic resonance imaging using hybrid image registration.
  93. Choi, Jong-Deok; Konuru, Ravi; Srinivasan, Harini, Method and system for recording and replaying the execution of distributed java programs.
  94. Kuzkin, Maxim A.; Tormasov, Alexander G., Method and system for remote device access in virtual environment.
  95. Kejriwal, Nidhi Govindram; Judge, Paul, Method for detecting malicious javascript.
  96. Carpenter,Brian Edward; Himberger,Kevin David; Jeffries,Clark Debs; Peyravian,Mohammad, Method of responding to a truncated secure session attack.
  97. Chiriac, Mihai, Method, computer program and computer for analyzing an executable computer file.
  98. Ivchenko,Olexiy; Kraplin,Denys L., Methods and apparatus for performing data acquisition and control.
  99. Zimmer,Vincent J.; Rothman,Michael A., Methods and apparatus to provide network traffic support and physical security support.
  100. Schmid, Matthew N.; Weber, Michael; Haddox-Schatz, Michael; Geyer, David, Methods for identifying malicious software.
  101. Stolfo, Salvatore J.; Li, Wei-Jen; Keromylis, Angelos D.; Androulaki, Elli, Methods, media, and systems for detecting attack on a digital processing device.
  102. Capek Peter G. ; Cuomo Gennaro A. ; Unger Jay H., Methods, systems and computer program products for providing insertions during delays in interactive systems.
  103. Daswani, Neilkumar Murli; Ranadive, Ameet; Rizvi, Shariq, Mitigating malware.
  104. Tzadikario, Rephael, Mitigating network attacks using automatic signature generation.
  105. Miller, Michael D.; Ulaszek, Ryan R., Model-based testing using branches, decisions, and options.
  106. Schneider, Scott; Griffin, Kent, Modeling goodware characteristics to reduce false positive malware signatures.
  107. Baker, Stephen M., Multilayered intrusion detection system and method.
  108. Branscomb,Brian; Black,Darryl; Perry,James R, Network device identity authentication.
  109. Sobchuk, Gregory M.; Subramaniam, Shekhar; Zaheer, Khurram; Gelfenshteyn, Alexander; Shetty, Ramesh; Brady, Michael; Donnegan, George; McGuire, Roger, Network intrusion mitigation.
  110. Liang,Yung Chang; Chen,Yi Fen, Network isolation techniques suitable for virus protection.
  111. Gordy, Stephen C.; Poelstra, Henry D.; Otis, Robert W.; Gallatin, Tom, Network security tap for use with intrusion detection system.
  112. Manni, Jayaraman; Aziz, Ashar; Gong, Fengmin; Loganathan, Upendran; Amin, Muhammad, Network-based binary file extraction and analysis for malware detection.
  113. Manni, Jayaraman; Aziz, Ashar; Gong, Fengmin; Loganathan, Upendran; Amin, Muhammad, Network-based binary file extraction and analysis for malware detection.
  114. Tuvell, George; Venugopal, Deepak; Pfefferle, Matthew, Non-signature malware detection system and method for mobile platforms.
  115. Eker, Johan; Johansson, Björn; Von Platen, Carl, Obfuscating computer program code.
  116. Zhang, Yufeng; Chen, Xiaoxin; Le, Bich Cau; Krishnan, Jagannath Gopal; Uluski, Derek, On-access anti-virus mechanism for virtual machine architecture.
  117. Amit, Yair; Hay, Roee; Saltzman, Roi; Sharabani, Adi, Pinpointing security vulnerabilities in computer software applications.
  118. Aziz, Ashar; Drzewiecki, Adrian; Radhakrishnan, Ramesh; Manni, Jayaraman; Amin, Muhammad, Policy based capture with replay to virtual machine.
  119. Ball, Thomas J., Predicate-based test coverage and generation.
  120. Wu, Handong; Genes, Raimund Alexander, Preventing malicious codes from performing malicious actions in a computer system.
  121. Green, David E.; Payne, Richard; Wood, Trevor, Preventing propagation of malicious software during execution in a virtual machine.
  122. Alperovitch, Dmitri; Greve, Paula; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele, Prioritizing network traffic.
  123. Aziz, Ashar, Prospective client identification using malware attack detection.
  124. Zaitsev, Oleg V.; Denisov, Vitaly I., Protection against malware on web resources.
  125. Kraemer, Jeffrey A., Protection of computer resources.
  126. Kraemer, Jeffrey A., Protection of computer resources.
  127. Rogel, Lawrence S., Providing security in mobile devices via a virtualization software layer.
  128. Batenin, Vyacheslav A., Rapid analysis of data stream for malware presence.
  129. Nachenberg, Carey S.; Griffin, Kent E., Reducing malware signature set size through server-side processing.
  130. Hutton, Samuel Harrison; Goddard, Trevor, Resisting the spread of unwanted code and data.
  131. Bucher,Tim, Restoration of data corrupted by viruses using pre-infected copy of data.
  132. Zhao, Xiaoming; Chen, Gang; Chang, Eric, Scheduled gateway scanning arrangement and methods thereof.
  133. Sobel, William E.; Satish, Sourabh, Secure network cache content.
  134. Wang, Jiahe Helen; Lorch, Jacob R.; Parno, Bryan Jeffrey, Securing anti-virus software with virtualization.
  135. Natvig,Kurt, Simulated computer system for monitoring of software performance.
  136. Mann, Uriel; Doshi, Nishant, Software object corruption detection.
  137. Viljoen, Petrus Johannes; Meggers, Jens, Streaming malware definition updates.
  138. Edwards, Jonathan L.; Teddy, John D., Subsequent processing of scanning task utilizing subset of virtual machines predetermined to have scanner process and adjusting amount of subsequest VMs processing based on load.
  139. Dansey, Stephen Thomas; Kuc, Zenon, Switching device, method, and computer program for efficient intrusion detection.
  140. Hibbs James D. ; Brodhecker John W., System and method for alerting safety personnel of unsafe air temperature conditions.
  141. Aziz, Ashar; Radhakrishnan, Ramesh; Ismael, Osman, System and method for analyzing suspicious network data.
  142. Jordan,Myles, System and method for computer virus detection utilizing heuristic analysis.
  143. Silberman, Peter J.; Butler, II, James R.; Harbour, Nick J., System and method for detecting executable machine instructions in a data stream.
  144. Pavlyushchik, Mikhail A., System and method for detecting malicious code executed by virtual machine.
  145. Parshin, Yury G.; Pintiysky, Vladislav V., System and method for detecting malware targeting the boot process of a computer using boot process emulation.
  146. McMillan, Chad; Garman, Jason, System and method for determining data entropy to identify malware.
  147. Doukhvalov, Andrey P.; Tikhomirov, Anton V., System and method for dynamically allocating computing resources for processing security information.
  148. Eric David O'Brien ; James Robert Tryon, Jr., System and method for dynamically sensing an asynchronous network event within a modular framework for network event processing.
  149. David Robert Wray GB; David John Blanchfield GB, System and method for extensible positive client identification.
  150. Hibbs, James D.; Brodhecker, John W., System and method for identifying unsafe temperature conditions.
  151. James D. Hibbs ; John W. Brodhecker, System and method for identifying unsafe temperature conditions.
  152. Appelt,Daren R.; Brunson,Kevin K.; Hibbs,James D., System and method for identifying, monitoring and evaluating equipment, environmental and physiological conditions.
  153. Hoefelmeyer,Ralph S.; Phillips,Theresa E., System and method for malicious code detection.
  154. Green, David E.; Payne, Richard; Kilmer, William, System and method for malicious software detection in multiple protocols.
  155. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, System and method for malware containment.
  156. Ivancic,Franjo; Ashar,Pranav N.; Ganai,Malay; Gupta,Aarti; Yang,Zijiang, System and method for modeling, abstraction, and analysis of software.
  157. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  158. Aziz, Ashar, System and method of containing computer worms.
  159. Aziz, Ashar, System and method of detecting computer worms.
  160. Aziz, Ashar, System and method of detecting malicious traffic while reducing false positives.
  161. Aziz, Ashar, System and method of detecting time-delayed malicious traffic.
  162. Apap,Frank; Honig,Andrew; Shlomo,Hershkop; Eskin,Eleazar; Stolfo,Salvatore J., System and methods for detecting intrusions in a computer system by monitoring operating system registry accesses.
  163. Kirby, Alan J., System and methods for integration of behavioral and signature based security.
  164. Tso Michael Man-Hak ; Bakshi Bikram Singh, System for virus-checking network data during download to a client device.
  165. Ahn, Tae Jin; Park, Taejoon, System, apparatus and method of malware diagnosis mechanism based on immunization database.
  166. Singh, Abhishek; Manni, Jayaraman, Systems and methods for automatically detecting backdoors.
  167. McCorkendale, Bruce; Tian, Xue Feng; Gong, Sheng; Zhu, Xiaole; Mao, Jun; Meng, Qingchun; Huang, Ge Hua; Hu, Wei Guo Eric, Systems and methods for combining static and dynamic code analysis.
  168. Aziz, Ashar, Systems and methods for computer worm defense.
  169. Stolfo, Salvatore J.; Keromytis, Angelos D.; Misra, Vishal; Locasto, Michael E.; Parekh, Janak, Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems.
  170. Stolfo, Salvatore J.; Malkin, Tal; Keromytis, Angelos D.; Misra, Vishal; Locasto, Michael; Parekh, Janak, Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems.
  171. Sidiroglou, Stylianos; Keromytis, Angelos D.; Anagnostakis, Kostas G., Systems and methods for detecting and inhibiting attacks using honeypots.
  172. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, Systems and methods for detecting communication channels of bots.
  173. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, Systems and methods for detecting encrypted bot command and control communication channels.
  174. Staniford, Stuart Gresley; Aziz, Ashar, Systems and methods for detecting malicious PDF network content.
  175. Staniford, Stuart Gresley; Aziz, Ashar, Systems and methods for detecting malicious PDF network content.
  176. Staniford, Stuart Gresley; Aziz, Ashar, Systems and methods for detecting malicious network content.
  177. Bodke, Anand, Systems and methods for detecting malware on mobile platforms.
  178. Gubin, Maxim; Newstadt, Keith, Systems and methods for emulating the behavior of a user in a computer-human interaction environment.
  179. Judge,Paul; Rajan,Guru, Systems and methods for enhancing electronic communication security.
  180. Bodke, Anand, Systems and methods for identifying polymorphic malware.
  181. Edwards, Sr., Thomas Scott, Systems and methods for improving virtual machine performance.
  182. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, Systems and methods for malware attack detection and identification.
  183. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, Systems and methods for malware attack prevention.
  184. Petry, Scott M.; Akamine, Shinya; Lund, Peter Kevin; Cox, Fred; Oswall, Michael John, Systems and methods for managing the transmission of electronic messages through active message date updating.
  185. Judge,Paul, Systems and methods for message threat management.
  186. Staniford, Stuart Gresley; Aziz, Ashar, Systems and methods for scheduling analysis of network content for malware.
  187. Merkle, Jr.,James A.; LeVine,Richard B.; Lee,Andrew R.; Howard,Daniel G.; Goldman,Daniel M.; Pagliarulo,Jeffrey A.; Hart, III,John J.; Bouza,Jose L., Systems and methods for the prevention of unauthorized use and manipulation of digital content.
  188. Judge,Paul, Systems and methods for upstream threat pushback.
  189. Stolfo, Salvatore J; Wang, Ke; Parekh, Janak, Systems, methods, and media for outputting a dataset based upon anomaly detection.
  190. Leake, Edward N.; Pike, Geoffrey, Taint tracking mechanism for computer security.
  191. Durham,David M.; Sahita,Ravi; Rajagopal,Priya; Kardach,James; Hahn,Scott; Yavatkar,Raj, Techniques for self-isolation of networked devices.
  192. Thrower, Woodrow A.; Bhattacharya, Sourav S., Threat analysis.
  193. Chen,Eva; Sun,Jimmy; Chou,Terrence; Deutsch,Steven; Havran,Mark, Tracking and reporting of computer virus information.
  194. Izatt,David, Undetectable firewall.
  195. Reed,Eugene R., Virtual machine use and optimization of hardware configurations.
  196. Aziz, Ashar; Radhakrishnan, Ramesh; Ismael, Osman, Virtual machine with dynamic data flow analysis.
  197. Zhao,Guangyu; Liu,Meyer; Badrinath,Subramaniam, Virus detection and removal system and method for network-based systems.
  198. Marsden, Walter L.; Green, David E., Virus detection by executing e-mail code in a virtual machine.
  199. Liang, Yung Chang; Chen, Yi Fen, Virus monitor and methods of use thereof.

이 특허를 인용한 특허 (52)

  1. Neumann, Justin, Analytic-based security with learning adaptability.
  2. Langton, Jacob Asher; Quinlan, Daniel J.; Adams, Kyle, Confirming a malware infection on a client device using a remote access connection tool to identify a malicious file based on fuzzy hashes.
  3. Langton, Jacob Asher; Quinlan, Daniel J.; Adams, Kyle, Confirming a malware infection on a client device using a remote access connection tool, to identify a malicious file based on fuzz hashes.
  4. Manni, Jayaraman; Eun, Philip; Berrow, Michael M., Correlation and consolidation of analytic data for holistic view of malware attack.
  5. Mehra, Divyesh; Singh, Abhishek, Cyber attack early warning system.
  6. Aronovich, Lior, Data structures for digests matching in a data deduplication system.
  7. Gomez, Joshua Lewis; Singh, Abhishek, Detection and classification of exploit kits.
  8. Paithane, Sushant; Vashisht, Sai, Detection efficacy of virtual machine-based analysis with application specific events.
  9. Mushtaq, Atif; Rosenberry, Todd; Aziz, Ashar; Islam, Ali, Distributed systems and methods for automatically detecting unknown bots and botnets.
  10. Paithane, Sushant; Vashisht, Sai, Dynamic content activation for automated analysis of embedded objects.
  11. Goradia, Harnish, Dynamic guest image creation and rollback.
  12. Manni, Jayaraman; Eun, Philip; Berrow, Michael M., Electronic device for aggregation, correlation and consolidation of analysis attributes.
  13. Aziz, Ashar; Uyeno, Henry; Manni, Jay; Sukhera, Amin; Staniford, Stuart, Electronic message analysis for malware detection.
  14. Aziz, Ashar; Uyeno, Henry; Manni, Jay; Sukhera, Amin; Staniford, Stuart, Electronic message analysis for malware detection.
  15. Ismael, Osman Abdoul; Song, Dawn; Aziz, Ashar; Johnson, Noah; Mohan, Prshanth; Xue, Hui, Framework for efficient security coverage of mobile software applications.
  16. Mesdaq, Ali; Westin, III, Paul L., Fuzzy hash of behavioral results.
  17. Mesdaq, Ali; Westin, III, Paul L., Fuzzy hash of behavioral results.
  18. Abbasi, Fahim H.; Salam, Abdul; Shahzad, Farrukh, Leveraging behavior-based rules for malware family classification.
  19. Thioux, Emmanuel; Amin, Muhammad; Kindlund, Darien; Pilipenko, Alex; Vincent, Michael, Malicious content analysis using simulated user interaction without user involvement.
  20. Khalid, Yasir; Amin, Muhammad; Jing, Emily; Rizwan, Muhammad, Malicious content analysis with multi-version application support within single operating environment.
  21. Vincent, Michael; Mesdaq, Ali; Thioux, Emmanuel; Singh, Abhishek; Vashisht, Sal, Malware analysis in accordance with an analysis plan.
  22. Malik, Amit; Pande, Reghav; Jain, Aakash, Method to detect application execution hijacking using memory protection.
  23. Karandikar, Shrikrishna; Amin, Muhammad; Deshpande, Shivani; Khalid, Yasir, Network-based malware detection.
  24. Aronovich, Lior, Optimizing digest based data matching in similarity based deduplication.
  25. Aziz, Ashar, Subscriber based protection system.
  26. Khalid, Yasir; Deshpande, Shivani, Susceptible environment detection system.
  27. Aziz, Ashar, System and method for detecting anomalous behaviors using a virtual machine environment.
  28. Paithane, Sushant; Vashist, Sai; Yang, Raymond; Khalid, Yasir, System and method for detecting file altering behaviors pertaining to a malicious attack.
  29. Paithane, Sushant; Vashisht, Sai Omkar, System and method for detecting interpreter-based exploit attacks.
  30. Kindlund, Darien; Wolf, Julia; Bennett, James, System and method for detecting malicious activity based on at least one environmental property.
  31. Pidathala, Vinay; Uyeno, Henry, System and method for detecting malicious links in electronic messages.
  32. Paithane, Sushant; Vincent, Michael; Vashisht, Sai; Kindlund, Darien, System and method for detecting time-bomb malware.
  33. Paithane, Sushant; Vincent, Michael; Vashisht, Sai; Kindlund, Darien, System and method for detecting time-bomb malware.
  34. Rivlin, Alexandr; Mehra, Divyesh; Uyeno, Henry; Pidathala, Vinay, System and method for determining a threat based on correlation of indicators of compromise from other sources.
  35. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, System and method for malware containment.
  36. Amin, Muhammad; Mehmood, Masood; Ramaswamy, Ramaswamy; Challa, Madhusudan; Karandikar, Shrikrishna, System and method for offloading packet processing and static analysis operations.
  37. Steinberg, Udo, System and method for protecting memory pages associated with a process using a virtualization layer.
  38. Kumar, Vineet; Otvagin, Alexander; Borodulin, Nikita, System and method for triggering analysis of an object for malware in response to modification of that object.
  39. Rivlin, Alexandr; Mehra, Divyesh; Uyeno, Henry; Pidathala, Vinay, System and method of detecting delivery of malware based on indicators of compromise from different sources.
  40. Kabra, Atul; Stecklina, Julian; Rathor, Hirendra; Steinberg, Udo, System and method of threat detection under hypervisor control.
  41. Cunningham, Sean, System and method to communicate sensitive information via one or more untrusted intermediate nodes with resilience to disconnected network topology.
  42. Thompson, Matthew; Hijazi, Karim, System and method to manage sinkholes.
  43. Wilson, Theodore, System and method to visualize user sessions.
  44. Pilipenko, Alex; Ha, Phung-Te, System and methods for advanced malware detection through placement of transition events.
  45. Islam, Ali, System, apparatus and method for conducting on-the-fly decryption of encrypted objects for malware detection.
  46. Karandikar, Shrikrishna; Amin, Muhammad; Deshpande, Shivani; Khalid, Yasir, System, device and method for detecting a malicious attack based on direct communications between remotely hosted virtual machines and malicious web servers.
  47. Aziz, Ashar, Systems and methods for computer worm defense.
  48. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, Systems and methods for malware attack prevention by intercepting flows of information.
  49. Aziz, Ashar, Systems and methods for malware defense.
  50. Husain, Syed Mohammad Amir; Abel, Martin Andreas, Systems and methods for using cognitive fingerprints.
  51. Bu, Zheng; Lin, Yichong, Zero-day discovery system.
  52. Zafar, Asim; Qureshi, Eirij; Kindlund, Darien, Zero-day rotating guest image profile.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로