613 patents
Utility
Sequential Dual Machine Learning Models for Effective Cloud Detection Engines
18 Jan 24
The present application discloses a method, system, and computer system for detecting malicious files.
Yu Fu, Lei Xu, Jin Chen, Zhibin Zhang, Bo Qu, Stefan Achleitner
Filed: 12 Jul 22
Utility
Network Attack Detection with Targeted Feature Extraction from Exploit Tools
18 Jan 24
The present application discloses a method, system, and computer system for detecting malicious SQL or command injection strings.
Zhibin Zhang, Jin Chen, Yu Fu, Stefan Achleitner, Bo Qu, Lei Xu
Filed: 12 Jul 22
Utility
Malicious C&C channel to fixed IP detection
18 Jan 24
Methods, apparatus and computer software products implement embodiments of the present invention that include protecting a computer system, by collecting information from data traffic transmitted between multiple local nodes on a private data network and public IP addresses corresponding to multiple remote nodes on a public data network.
Yinnon Meshi, Idan Amit, Jonathan Allon, Aviad Meyer
Filed: 17 Jul 23
Utility
Malicious JS detection based on automated user interaction emulation
16 Jan 24
Detection of malicious JavaScript based on automated user interaction emulation is disclosed.
Jin Chen, Tao Yan, Taojie Wang, Bo Qu
Filed: 2 Nov 21
Utility
Supply chain attack detection
11 Jan 24
Methods, storage systems and computer program products implement embodiments of the present invention that include identifying multiple host computers executing respective instances of a specific software application, each given instance on each given host computer including a set of program instructions loaded, by the host computer, from a respective storage device.
Yuval Zan, Erez Levy, Dor Agron, Yarom Dadon, Chen Evgi
Filed: 5 Jul 22
Utility
Dynamic path selection and data flow forwarding
9 Jan 24
Various techniques for dynamic path selection and data flow forwarding are disclosed.
Kumar Ramachandran, Venkataraman Anand, Navneet Yadav, Arivu Ramasamy, Aaron Edwards, Gopal Reddy
Filed: 6 Oct 22
Utility
High Availability of Cloud-based Serivces with Address Translation
4 Jan 24
Described herein are systems, methods, and software to enhance failover operations in a cloud computing environment.
Shu Lin, Patrick Xu, Eswar Rao Sadaram, Hao Long
Filed: 12 Sep 23
Utility
Using browser context in evasive web-based malware detection
2 Jan 24
The use of browser context in detecting malware is disclosed.
Tongbo Luo, Xin Ouyang, Zhaoyan Xu, Xing Jin
Filed: 21 Jul 22
Utility
Context profiling for malware detection
2 Jan 24
Analysis of samples for maliciousness is disclosed.
Jun Wang, Wei Xu
Filed: 11 Feb 22
Utility
Inline package name based supply chain attack detection and prevention
2 Jan 24
Inline package name based supply chain attack detection and prevention is disclosed.
Ruian Duan, Daiping Liu, Jun Wang, Zihang Xiao
Filed: 30 Sep 22
Utility
5G Lan Security
28 Dec 23
Techniques for 5G LAN security in mobile networks are disclosed.
Leonid Burakovsky, Sachin Verma, Sree Koratala
Filed: 28 Jun 22
Utility
Application Traffic Flow Prediction Based on Multi-stage Network Traffic Flow Scanning
28 Dec 23
In a network control plane, a pattern matching database is built and maintained for identifying an application or application level protocol.
Daphne Sang, Harish Patil
Filed: 15 Aug 22
Utility
Cloud Native Virtual Machine Runtime Protection
28 Dec 23
A system and method for cloud native virtual machine (VM) runtime protection.
Liron Levin, John Morello, Dima Stopel, Michael Velbaum, Itay Abramowsky, Isaac Schnitzer
Filed: 11 Sep 23
Utility
Securing Control and User Plane Separation In Mobile Networks
21 Dec 23
Techniques for securing control and user plane separation in mobile networks (e.g., service provider networks for mobile subscribers, such as for 4G/5G networks) are disclosed.
Leonid Burakovsky, Sachin Verma, Fengliang Hu, I-Chun Chen, How Tung Lim
Filed: 8 May 23
Utility
Detecting credentials abuse of cloud compute services
21 Dec 23
Methods, storage systems and computer program products implement embodiments of the present invention that include identifying a first autonomous system number (ASN) for a service hosted by a networked entity, and retrieving, from a log file, an entry corresponding to an access by a networked entity to the service and including an Internet Protocol (IP) address of the networked entity and an access token authorizing access to the service.
Dror Alon, Niv Sela, Or Kliger, Guy Arazi
Filed: 20 Jun 22
Utility
Fast Policy Matching with Runtime Signature Update
21 Dec 23
Techniques for fast policy matching with runtime signature update are disclosed.
Chunqing Cai
Filed: 16 Jun 22
Utility
Pattern-based malicious URL detection
19 Dec 23
To perform pattern-based detection of malicious URLs, patterns are first generated from known URLs to build a pattern repository.
Fang Liu, Yuchen Zhou, Jun Wang
Filed: 7 Jul 22
Utility
Rendering Contextual Security Information Determined In-browser with Web Pages of Cloud and Saas Vendors
14 Dec 23
A browser extension produces a single view comprising content of web pages of a target vendor requested by a customer and corresponding security information for the target vendor maintained for the customer.
Krishnan Shankar Narayan
Filed: 9 Jun 22
Utility
Whitelisting Clients Accessing Resources Via a Secure Web Gateway with Time-based One Time Passwords for Authentication
14 Dec 23
Each tenant of a secure web gateway (SWG) is issued a secret key.
Mohit Sahni
Filed: 17 Aug 23
Utility
Infrastructure as code resource definition correction system
12 Dec 23
A method, including accessing a corpus or infrastructure as code modules including respective resource definitions for provisioning and deploying a plurality of computing resources configured to execute one or more software applications.
Tohar Zand, Nimrod Kor, Rotem Avni, Naor David, Ariel Kruszyn
Filed: 18 Apr 22