D Blewett, B Concannon, J Lee, K Merritt… - US Patent …, 2022 - Google Patents
Example techniques herein filter and classify security-relevant events from monitored computing devices. A control unit can receive event records of various types, each event …
HJ Kim, JH Kim, IK Kim - US Patent 10,007,789, 2018 - Google Patents
The present invention relates to an apparatus and a method for detecting a malware code by generating and analyzing behavior pattern. A malware code detecting apparatus includes a …
S Paithane, SO Vashisht - US Patent 10,887,328, 2021 - Google Patents
(74) Attorney, Agent, or Firm—Rutan & Tucker, LLP (57) ABSTRACT For one embodiment, a computerized method for detecting exploit attacks on an interpreter comprises configuring a …
P Edwards, J Bradley, J Lee - US Patent 11,194,903, 2021 - Google Patents
A computing device can install and execute a security agent that interacts with a remote security system as part of a detection loop aimed at detecting malicious attacks. The remote …
B Nisbet, A Roden, J Lee - US Patent 11,050,764, 2021 - Google Patents
Cardinality-based activity pattern detection is described herein. Events on a computing system are monitored to detect patterns matching defined activity patterns. A cardinality …
D Mandal - US Patent 11,361,072, 2022 - Google Patents
A computing apparatus, including: a processor and a memory; a web browser; and a web exploit mitigation engine, including instructions within the memory to instruct the processor …
P Deardorff, D Myers - US Patent 11,108,790, 2021 - Google Patents
Methods and systems for detecting malicious activity on a network. The methods described herein involve gathering data regarding a first state of a computing environment, executing …
H Nishikawa, T Yamamoto - US Patent 10,050,798, 2018 - Google Patents
The present invention relates to a cryptographic block identification apparatus which, in order to analyze encryption logic used by malware to conceal communication, identifies a …
E Hernvall, D Spång - US Patent 11,748,460, 2023 - Google Patents
A method by one or more computing devices for obfuscating challenge code. The method includes obtaining challenge code for interrogating a client, inserting, into the challenge …