Attribute-controlled malware detection

M Siddiqui, M Radhakrishnan, D Agarwal - US Patent 10,798,112, 2020 - Google Patents
A computerized method for authenticating access to a subscription-based service to detect
an attempted cyber-attack. The method features operations by the cloud broker that include …

System and method for detecting time-bomb malware

S Paithane, M Vincent, S Vashisht… - US Patent 9,536,091, 2017 - Google Patents
6.424, 627 B1 7/2002 Sorhaug et al. 8,069,484 B2 11/2011 McMillan et al. 6,484.315 B1
11/2002 Ziese 8,087.086 B1 12/2011 Lai et al. 6,487,666 B1 11/2002 Shanklin et al. 8 …

System and method for protecting memory pages associated with a process using a virtualization layer

U Steinberg - US Patent 10,216,927, 2019 - Google Patents
(Continued) Primary Examiner—Tuan V Thai (74) Attorney, Agent, or Firm—Rutan & Tucker,
LLP (57) ABSTRACT A computerized method is provided for protecting processes operating …

System and method of threat detection under hypervisor control

A Kabra, J Stecklina, H Rathor, U Steinberg - US Patent 10,033,759, 2018 - Google Patents
A computing device is described that comprises one or more hardware processors and a
memory communicatively coupled to the one or more hardware processors. The memory …

System and methods for advanced malware detection through placement of transition events

A Pilipenko, PT Ha - US Patent 10,169,585, 2019 - Google Patents
ABSTRACT A non-transitory storage medium including instructions that are executable by
one or more processors to perform opera tions including instrumenting a VM is shown. The …

Leveraging behavior-based rules for malware family classification

FH Abbasi, A Salam, F Shahzad - US Patent 10,176,321, 2019 - Google Patents
According to one embodiment, a malware classification scheme operating with an electronic
device, configured with one or more hardware processors and a memory that stores the …

Dynamic guest image creation and rollback

H Goradia - US Patent 10,242,185, 2019 - Google Patents
According to one embodiment, a computerized method comprises three operations. First, an
incoming object is analyzed to determine if the incoming object is suspicious by having …

Launcher for setting analysis environment variations for malware detection

S Paithane, S Vashisht, Y Khalid, A Pilipenko… - US Patent …, 2019 - Google Patents
(57) ABSTRACT A system and method for automatically analyzing an object for malware is
described. Operating one or more virtual machines, the system and method provide an …

Malicious content analysis with multi-version application support within single operating environment

Y Khalid, M Amin, E Jing, M Rizwan - US Patent 10,025,927, 2018 - Google Patents
Techniques for efficient malicious content detection in plural versions of a software
application are described. According to one embodiment, the computerized method includes …

Correlation and consolidation of analytic data for holistic view of malware attack

J Manni, P Eun, MM Berrow - US Patent 10,122,746, 2018 - Google Patents
In communication with security appliances, an electronic device for providing a holistic view
of a malware attack is described. The electronic device features one or more processors and …