Attribute-controlled malware detection

M Siddiqui, M Radhakrishnan, D Agarwal - US Patent 10,798,112, 2020 - Google Patents
A computerized method for authenticating access to a subscription-based service to detect
an attempted cyber-attack. The method features operations by the cloud broker that include …

System and method to extract and utilize disassembly features to classify software intent

M Sikorski, W Ballenthin - US Patent 10,713,358, 2020 - Google Patents
US10713358B2 - System and method to extract and utilize disassembly features to classify
software intent - Google Patents US10713358B2 - System and method to extract and utilize …

Selective virtualization for security threat detection

S Paithane, M Vincent - US Patent 10,417,031, 2019 - Google Patents
Selective virtualization of resources is provided, where the resources may be intercepted
and services or the resources may be intercepted and redirected. Virtualization logic …

System and method to create a number of breakpoints in a virtual machine via virtual machine trapping events

R Jung, A Saba - US Patent 10,572,665, 2020 - Google Patents
6,269,330 B1 6,272,641 B1 6,279,113 B1 6,298,445 B1 6,357,008 B1 6,424,627 B1
6,442,696 B1 6,484,315 B1 6,487,666 B1 6,493,756 B1 6,550,012 B1 6,775,657 B1 …

System, apparatus and method for reconfiguring virtual machines

OA Ismael - US Patent 11,075,945, 2021 - Google Patents
According to one embodiment, a computerized method operates by configuring a virtual
machine operating within an electronic device with a first instrumentation for processing of a …

Detection of credential spearphishing attacks using email analysis

A Mesdaq, A Singh, V Jain - US Patent 10,601,865, 2020 - Google Patents
(57) ABSTRACT A non-transitory computer readable storage medium having stored thereon
instructions when executable by a processor perform operations including responsive to …

Centralized aggregation technique for detecting lateral movement of stealthy cyber-attacks

A Aziz - US Patent 10,454,950, 2019 - Google Patents
A centralized aggregation technique detects lateral movement of a stealthy (ie, covert) cyber-
attack in an enterprise network. A data center security (DCS) appliance may be located at a …

Low latency computational capacity provisioning

TA Wagner, DC Thomas, SP Reque - US Patent 11,263,034, 2022 - Google Patents
(57) ABSTRACT A system for providing low latency computational capacity is provided. The
system may be configured to maintain a pool of virtual machine instances, which may be …

Ransomware detection and mitigation

J Singh, A Gupta - US Patent 10,503,904, 2019 - Google Patents
A computerized method for detecting and mitigating a ransomware attack is described. The
method features (i) a kernel mode agent that intercepts an initiation of a process, intercepts …

Phishing attack detection

VSPPC Kumar, SP Rao - US Patent 10,805,346, 2020 - Google Patents
A computerized method for analyzing a subject URL to determine whether the subject URL
is associated with a phishing attack is disclosed. The method includes steps of detecting …