33 patents
Page 2 of 2
Utility
File-modifying malware detection
15 Jun 20
A security agent implemented on a computing device is described herein.
Daniel W. Brown
Filed: 30 Oct 16
Utility
Binary suppression and modification for software upgrades
25 May 20
A remote security system may generate multiple different binary programs for corresponding operating system (OS) kernel versions that are to receive a software upgrade.
Cat S. Zimmermann, Steven King
Filed: 28 Aug 17
Utility
Computer-security Event Security-violation Detection
20 May 20
Example techniques herein determine that an event associated with a monitored computing device is associated with a security violation.
Cory-Khoi Quang Nguyen, John Lee
Filed: 14 Nov 18
Utility
Binary Search of Byte Sequences Using Inverted Indices
20 May 20
Techniques for searching an inverted index associating byte sequences of a fixed length and files that contain those byte sequences are described herein.
Horea Coroiu, Daniel Radu
Filed: 23 Jan 20
Utility
Network containment of compromised machines
18 May 20
A computing device can install and execute a kernel-level security agent that interacts with a remote security system as part of a detection loop aimed at defeating malware attacks.
Paul Meyer, Cameron Gutman, John R. Kooker
Filed: 5 Jul 17
Utility
Least recently used (LRU)-based event suppression
27 Apr 20
A security agent can implement a least recently used (LRU)-based approach to suppressing events observed on a computing device.
Daniel W. Brown
Filed: 3 May 17
Utility
Binary search of byte sequences using inverted indices
27 Jan 20
Techniques for searching an inverted index associating byte sequences of a fixed length and files that contain those byte sequences are described herein.
Horea Coroiu, Daniel Radu
Filed: 17 Jan 19
Utility
Byte N-gram Embedding Model
1 Jan 20
Training and use of a byte n-gram embedding model is described herein.
Radu Cazan, Daniel Radu, Marian Radu
Filed: 30 Dec 18
Utility
Binary search of byte sequences using inverted indices
18 Nov 19
Techniques for searching an inverted index associating byte sequences of a fixed length and files that contain those byte sequences are described herein.
Horea Coroiu, Daniel Radu
Filed: 17 Jan 19
Utility
RPC Call Interception
6 Nov 19
A service proxy is described herein.
Ion-Alexandru Ionescu
Filed: 14 Jul 19
Utility
Identifying and Correlating Physical Devices Across Disconnected Device Stacks
30 Oct 19
Drivers in different functional paths can use different types of identifiers for the same hardware device, such that the drivers may not be able to natively coordinate their actions related to the hardware device due to incompatible identifier types.
Cameron Gutman, Aaron LeMasters
Filed: 29 May 18
Utility
Securely and Efficiently Providing User Notifications About Security Actions
16 Oct 19
A security agent executing in kernel mode may receive a request from the anti-malware component executing with low privileges in user mode, and, in response, the security agent may perform a security action with respect to a malicious file detected on the computing device.
Ion-Alexandru Ionescu
Filed: 10 Apr 18
Utility
Binary search of byte sequences using inverted indices
30 Sep 19
Techniques for searching an inverted index associating byte sequences of a fixed length and files that contain those byte sequences are described herein.
Horea Coroiu, Daniel Radu
Filed: 5 Jan 17