System and method for detecting cyberattacks impersonating legitimate sources
MZ ul abadin Gardezi, M Saeed, H Ahmed… - US Patent …, 2023 - Google Patents
A system and method for detecting phishing cyberattacks. The method involves parsing a
code segment retrieved using a suspect uniform resource locator (URL) to identify any links …
code segment retrieved using a suspect uniform resource locator (URL) to identify any links …
Techniques for code isolation in static analysis of applications using application framework
A Sidis, M Saar, M Eyal - US Patent App. 17/804,067, 2023 - Google Patents
US20230385057A1 - Techniques for code isolation in static analysis of applications using
application framework - Google Patents US20230385057A1 - Techniques for code isolation in …
application framework - Google Patents US20230385057A1 - Techniques for code isolation in …
System and method for detecting cyberattacks impersonating legitimate sources
MZ ul abadin Gardezi, M Saeed, H Ahmed… - US Patent App. 18 …, 2024 - Google Patents
A system and method for detecting phishing cyberattacks. The method involves parsing a
code segment retrieved using a suspect uniform resource locator (URL) to identify any links …
code segment retrieved using a suspect uniform resource locator (URL) to identify any links …
Analyzing multiple CPU architecture malware samples
A sample is received for analysis. A determination is made that the sample was compiled for
a CPU architecture that is different from a host CPU architecture. The sample is executed in …
a CPU architecture that is different from a host CPU architecture. The sample is executed in …
Detection of malicious mobile apps
L Wu, H Ye, B Yin, Z Zhou, Z Zhang - US Patent 11,356,853, 2022 - Google Patents
A mobile app is in a form of a package file. A structural feature digest is generated from
contents of a manifest part, bytecode part, and resource part of the package file. A mobile …
contents of a manifest part, bytecode part, and resource part of the package file. A mobile …
Analyzing multiple CPU architecture malware samples
(57) ABSTRACT A sample is received for analysis by a virtualized environ ment. A
determination is made that the sample was compiled for a CPU architecture that is different …
determination is made that the sample was compiled for a CPU architecture that is different …
Analyzing multiple CPU architecture malware samples
A sample is received for analysis by a virtualized environment. A determination is made that
the sample was compiled for a CPU architecture that is different from a host CPU …
the sample was compiled for a CPU architecture that is different from a host CPU …