Methods and apparatus for detecting and identifying malware by map** feature data into a semantic space
K Berlin - US Patent 10,972,495, 2021 - Google Patents
In some embodiments, an apparatus includes a memory and a processor operatively
coupled to the memory. The proces sor is configured to identify a feature vector for a …
coupled to the memory. The proces sor is configured to identify a feature vector for a …
Detecting ransomware
There is disclosed in one example a ransomware mitigation engine, including: a processor;
a convolutional neural network configured to provide file type identification (FTI) services …
a convolutional neural network configured to provide file type identification (FTI) services …
Methods and apparatus for detecting whether a string of characters represents malicious activity using machine learning
JD Saxe - US Patent 10,318,735, 2019 - Google Patents
In some embodiments, a processor can receive an input string associated with a potentially
malicious artifact and convert each character in the input string into a vector of values to …
malicious artifact and convert each character in the input string into a vector of values to …
Systems and methods using computer vision and machine learning for detection of malicious actions
WP Bowditch, RG Calvo - US Patent 11,310,268, 2022 - Google Patents
The present disclosure provides systems and methods for classifying or determined whether
a request for a user's information is malicious or safe/legitimate. Request infor mation related …
a request for a user's information is malicious or safe/legitimate. Request infor mation related …
Methods and apparatus for detecting whether a string of characters represents malicious activity using machine learning
JD Saxe - US Patent 10,878,093, 2020 - Google Patents
In some embodiments, a processor can receive an input string associated with a potentially
malicious artifact and convert each character in the input string into a vector of values to …
malicious artifact and convert each character in the input string into a vector of values to …
Methods and apparatus for machine learning based malware detection
JD Saxe, K Berlin - US Patent 10,303,875, 2019 - Google Patents
Apparatus and methods describe herein, for example, a process that can include receiving a
potentially malicious file, and dividing the potentially malicious file into a set of byte …
potentially malicious file, and dividing the potentially malicious file into a set of byte …
Classifying software modules based on comparisons using a neighborhood distance metric
A method comprises obtaining at least a first software module not classified as benign or
potentially malicious, extracting a set of features associated with the first software module …
potentially malicious, extracting a set of features associated with the first software module …
Determining whether process is infected with malware
MJ Wray, N Edwards - US Patent 10,372,909, 2019 - Google Patents
Example implementations relate to determination as to whether a process is infected with
malware. For example, in an implementation, information of a process extracted from a …
malware. For example, in an implementation, information of a process extracted from a …
Methods and apparatus for detection of functionality
JD Saxe, DP Mentis, AC Wong - US Patent 10,649,970, 2020 - Google Patents
In some embodiments, a method includes receiving a plurality of descriptors via a network.
Each descriptor includes at least one of a descriptor component or a keyword. The method …
Each descriptor includes at least one of a descriptor component or a keyword. The method …
Systems and methods for distributed extended common vulnerabilities and exposures data management
M Tassoumt, W Haber - US Patent 11,381,589, 2022 - Google Patents
In one aspect, the present disclosure is directed to systems and methods for validating and
securely storing security entry updates. The security entry update is received from a …
securely storing security entry updates. The security entry update is received from a …