Xen and the art of virtualization
Numerous systems have been designed which use virtualization to subdivide the ample
resources of a modern computer. Some require specialized hardware, or cannot support …
resources of a modern computer. Some require specialized hardware, or cannot support …
System and method for detecting exfiltration content
D Kindlund, J Wolf, J Bennett - US Patent 9,565,202, 2017 - Google Patents
4,292,580 A 9, 1981 Ott et al. 5,175,732 A 12/1992 Hendel et al. 5.440, 723 A 8, 1995
Arnold et al. 5,657,473 A 8, 1997 Killean et al. 5,842,002 A 11/1998 Schnurer et al …
Arnold et al. 5,657,473 A 8, 1997 Killean et al. 5,842,002 A 11/1998 Schnurer et al …
Distributed systems and methods for automatically detecting unknown bots and botnets
A Mushtaq, T Rosenberry, A Aziz, A Islam - US Patent 9,430,646, 2016 - Google Patents
Generally speaking, a bot is a type of (or part of) an active infiltration attack, often installing
or operating in a two-step process. The first step is the initial infection, which may be a …
or operating in a two-step process. The first step is the initial infection, which may be a …
Detection efficacy of virtual machine-based analysis with application specific events
S Paithane, S Vashisht - US Patent 9,262,635, 2016 - Google Patents
CPC................................. G06F 21/56, G06F 21/53 fying objects as malicious by processing
the objects in a virtual environment and monitoring behaviors during pro See application file …
the objects in a virtual environment and monitoring behaviors during pro See application file …
Systems and methods for detecting malicious network content
SG Staniford, A Aziz - US Patent 8,850,571, 2014 - Google Patents
(57) ABSTRACT A method for detecting malicious network content comprises inspecting one
or more packets of network content, identify ing a Suspicious characteristic of the network …
or more packets of network content, identify ing a Suspicious characteristic of the network …
Backtracking intrusions
Analyzing intrusions today is an arduous, largely manual task because system
administrators lack the information and tools needed to understand easily the sequence of …
administrators lack the information and tools needed to understand easily the sequence of …
Systems and methods for malware attack prevention
A Aziz, WL Lai, J Manni - US Patent 8,898,788, 2014 - Google Patents
(63) Continuation-in-part of application No. 1 1/494.990,(Continued) filed on Jul. 28, 2006,
now Pat. No. 8,375,444, which is a continuation-in-part of application No. 1 1/471,072 …
now Pat. No. 8,375,444, which is a continuation-in-part of application No. 1 1/471,072 …
Prospective client identification using malware attack detection
A Aziz - US Patent 9,027,135, 2015 - Google Patents
(63) Continuation-in-part of application No. 1 1/494.990,(Continued) filed on Jul. 28, 2006,
now Pat. No. 8,375,444, which is a continuation-in-part of application No. 1 1/471,072 …
now Pat. No. 8,375,444, which is a continuation-in-part of application No. 1 1/471,072 …
Interactive infection visualization for improved exploit detection and signature generation for malware and malware families
H Rathor, K Dalal, A Gupta - US Patent 10,027,689, 2018 - Google Patents
According to one embodiment, a malware detection and visualization system comprises one
or more processors; and a storage module communicatively coupled to the one or more …
or more processors; and a storage module communicatively coupled to the one or more …
Dynamically adaptive framework and method for classifying malware using intelligent static, emulation, and dynamic analyses
M Vincent, A Mesdaq, E Thioux, A Singh… - US Patent …, 2015 - Google Patents
According to one aspect, control logic determines an analysis plan for analyzing whether a
specimen should be classified as malware, where the analysis plan identifies at least first …
specimen should be classified as malware, where the analysis plan identifies at least first …