Methods and systems for machine-learning-based resource prediction for resource allocation and anomaly detection

F Schmidt, M Niepert, F Huici - US Patent 10,579,494, 2020 - Google Patents
(57) ABSTRACT A method for monitoring resources in a computing system having system
information includes transforming, via rep resentation learning, variable-size information into …

Multistage system and method for analyzing obfuscated content for malware

A Malik, S Deshpande, A Singh, W Zheng - US Patent 10,657,251, 2020 - Google Patents
A malware detection system configured to detect suspiciousness in obfuscated content. A
multi-stage static detection logic is utilized to detect obfuscation, make the obfuscated …

Determining whether process is infected with malware

MJ Wray, N Edwards - US Patent 10,372,909, 2019 - Google Patents
Example implementations relate to determination as to whether a process is infected with
malware. For example, in an implementation, information of a process extracted from a …

System and method for detecting malware in mobile device software applications

AJ Pyles, JE Buttner, N Van Balen - US Patent 10,586,045, 2020 - Google Patents
(57) ABSTRACT A system and method for test a mobile device software application is
provided. In one example, a mobile applica tion can interface with an emulation environment …

Discrete processor feature behavior collection

E Klonowski - US Patent 10,970,388, 2021 - Google Patents
Examples of the present disclosure describe systems and methods for discrete processor
feature behavior collection and analysis. In aspects, a monitoring utility may initialize a set of …

Systems and methods for malware detection and mitigation

J Sirianni, J Powers, R Joyce - US Patent 11,451,581, 2022 - Google Patents
Disclosed herein are embodiments of systems, methods, and products comprise an analytic
server, which detects and defends against malware in-flight regardless of the specific nature …

System for isolated access and analysis of suspicious code in a computing environment

DP Stocks, J Codispoti, K Mayers - US Patent 11,797,669, 2023 - Google Patents
Providing an isolation system that allows analysts to analyze suspicious information in way
that aids in preventing any harmful information from spreading to other applications and …

System for isolated access and analysis of suspicious code in a disposable computing environment

K Mayers, G Albero, J Codispoti, JZ Kim… - US Patent …, 2023 - Google Patents
2020-06-22 Assigned to BANK OF AMERICA CORPORATION reassignment BANK OF
AMERICA CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT …

Generating source code from binary files

J Hogan, J Powers - US Patent 11,567,759, 2023 - Google Patents
a programmer can input (eg, keyboard, microphone) a set of source code (eg, C++ formatted
text, Delphi formatted text) into an integrated development environment (IDE) having a …

Optimizing source code from binary files

J Hogan, J Powers - US Patent 11,893,386, 2024 - Google Patents
Various computing technologies for various reverse engineering platforms capable of
outputting, including creating or generating, a human readable and high level source code …