Automated behavioral and static analysis using an instrumented sandbox and machine learning classification for mobile security

TH Titonis, NR Manohar-Alers, CJ Wysopal - US Patent 9,672,355, 2017 - Google Patents
The present system includes a computer-networked system that allows mobile subscribers,
and others, to submit mobile applications to be analyzed for anomalous and malicious …

Malware investigation by analyzing computer memory

M Peinado, W Cui - US Patent 8,566,944, 2013 - Google Patents
Technology is described for malware investigation by analyZ ing computer memory in a
computing device. The method can include performing static analysis on code for a software …

Assessment and analysis of software security flaws in virtual machines

CJ Wysopal, MP Moynahan, JR Stevenson - US Patent 8,613,080, 2013 - Google Patents
Security analysis and vulnerability testing results are “pack aged” or “bound to” the actual
software it describes. By linking the results to the software itself, downstream users of the …

Automated intelligence graph construction and countermeasure deployment

R Olson, T Tonn - US Patent 9,886,581, 2018 - Google Patents
Techniques for providing information security threat assessment and amelioration are
disclosed. The techniques may include obtaining fundamental data, obtaining document …

Automated vulnerability intelligence generation and application

T Tonn, R Chang - US Patent 9,846,780, 2017 - Google Patents
Techniques for providing computer security vulnerability intelligence are disclosed. The
techniques include obtaining distributable vulnerability data that includes, for each of a …

System and method for identifying cybersecurity threats

DB Nides, DP Cartier, HR Cortes, L Edward… - US Patent …, 2021 - Google Patents
The invention relates to a computer-implemented system and method for automatic
collection, analysis and reporting of data relating to a cybersecurity threat. The method may …

Security systems and methods to reduce data leaks in enterprise networks

AV Ramachandran, YH Mundada, MMB Tariq… - US Patent …, 2014 - Google Patents
Disclosed are embodiments of a security system for reducing data leaks by checking
information flows between resources of a network. When an information flow is attempted …

Method, system and product for using a predictive model to predict if inputs reach a vulnerability of a program

F Copty, A Jarrous, S Keidar-Barner… - US Patent 10,387,655, 2019 - Google Patents
A method, apparatus and product for using a predictive model to predict if inputs reach a
vulnerability of a program. Given a sample input, which when provided to a program being …

Automated exploit generation

D Brumley, SK Cha, T Avgerinos - US Patent 9,135,405, 2015 - Google Patents
(57) ABSTRACT A system and method for automatically generating exploits, Such as
exploits for target code, is described. In some imple mentations, the system received binary …

Code instrumentation for runtime application self-protection

S Eshkenazi, M Siman, A Roichman - US Patent 10,120,997, 2018 - Google Patents
A method for runtime self-protection of an application program includes, before running the
application program, identifying input and output points in runtime code (24) of the program …