Taxonomic malware detection and mitigation

R Mohandas, L Lu, S Subramanian… - US Patent App. 14 …, 2016 - Google Patents
BACKGROUND 0002 Antivirus and anti-malware research has evolved into an ongoing
arms race between malware authors and security researchers. In earlier days of anti …

Systems and methods for detecting malware

S Bhatkar, J Parikh, C Nachenberg - US Patent 10,007,786, 2018 - Google Patents
A computer-implemented method for detecting malware may include (1) identifying a
behavioral trace of a program, the behavioral trace including a sequence of runtime …

Automatic graph-based detection of unlikely file possession

MM Parker - US Patent 10,824,749, 2020 - Google Patents
Abstract Systems and techniques for an automatic graph-based detection of unlikely file
possession are described herein. In an example, a system for detecting unauthorized file …

Detection and identification of targeted attacks on a computing system

PK Newman, P Vetrivel, S Narayanamurthy… - US Patent …, 2021 - Google Patents
Malicious activity data is obtained, that is indicative of attempted attacks on a computing
system. Clusters of targets are identified and it is determined whether the malicious activity …

Malware data item analysis

M Falk, T Yousaf, J Staehle, L Lemanowicz… - US Patent App. 15 …, 2018 - Google Patents
Embodiments of the present disclosure relate to a data analysis system that may
automatically analyze a suspected malware file, or group of files. Automatic analysis of the …

Which is the greenest way home? A lightweight eco-route recommendation framework based on personal driving habits

H Chen, B Guo, Z Yu, A Chin, J Tian… - 2016 12th International …, 2016 - computer.org
A vehicle's fuel consumption is strongly related to both its loading and the driver's driving
behavior, such as aggressive/tender acceleration, improper/proper gear change or …

Systems and methods for determining whether malicious files are targeted

RR Curtin - US Patent 10,216,933, 2019 - Google Patents
The disclosed computer-implemented method for determin ing whether malicious files are
targeted may include (i) applying, to a malware detection structure, a plurality of sample data …

Securing a network device by automatically identifying files belonging to an application

C Gates, K Soska, KA Roundy - US Patent 10,579,794, 2020 - Google Patents
Securing a network device by automatically identifying files belonging to an application. In
one embodiment, a method may include collecting file attributes for multiple files from …

Electronic device for classifying malicious code and operation method thereof

SEO Jaewoo, K Suin, M Kim, H Kim… - US Patent …, 2023 - Google Patents
2020-07-29 Assigned to KOREA UNIVERSITY RESEARCH AND BUSINESS FOUNDATION,
SAMSUNG ELECTRONICS CO., LTD. reassignment KOREA UNIVERSITY RESEARCH …

Systems and methods for classifying files

S Magar - US Patent 10,073,968, 2018 - Google Patents
The disclosed computer-implemented method for classifying files may include (i) identifying
a point in time before which there is a non-zero probability that at least one file within a …