2 patents
Utility
Phishing detection system and method of use
25 Oct 22
Detecting a phishing message by providing a phishing detector having a scan engine and a fetcher, detecting a URL in the message by the scan engine, resolving the URL to a webpage by the scan engine, downloading the webpage by the fetcher, analyzing the downloaded webpage by the fetcher to determine whether the webpage is a phishing webpage, and, when the webpage is determined to be a phishing webpage, deleting the message by the scan engine.
Lior Kohavi
Filed: 25 Jul 19
Utility
Multi-threat analyzer array system and method of use
18 Nov 19
A method for determining the threat level of a sample, comprising: providing a multi-analyzer array running on a server comprising a static analyzer, a plurality of dynamic analyzers, an arbitrator, at least one post processing process, and a normalizer process; analyzing the sample by the static analyzer to produce a static analysis; review of the static analysis by the arbitrator to determine which of the plurality of dynamic analyzers to utilize for dynamic analysis of the sample; dynamic analysis of the sample by one of the plurality of dynamic analyzers as chosen by the arbitrator to produce a dynamic analysis of the sample, normalizing the dynamic analysis by the normalizer to a format for post processing by the at least one post processing process; analysis of the normalized dynamic analysis by the at least one post processing process to provide a post processing analysis and to determine a threat level of the sample; and analysis by the arbitrator of the post processing analysis and the threat level of the sample to determine whether to further analyze the sample in one of the plurality of dynamic analyzers not previously chosen by the arbitrator.
Lior Kohavi, Ido Rosner, Geffen Tzur, Friðrik Skúlason, Michael Kajiloti
Filed: 26 Feb 17
- Prev
- 1
- Next
Patents are sorted by USPTO publication date, most recent first