Bitdefender IPR Management Ltd.

Cyprus

Back to Profile

1-100 of 104 for Bitdefender IPR Management Ltd. Sort by
Query
Patent
United States - USPTO
Aggregations Reset Report
Date
2024 (YTD) 1
2023 7
2022 4
2021 3
2020 11
See more
IPC Class
G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements 32
H04L 29/06 - Communication control; Communication processing characterised by a protocol 29
G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines 22
G06F 21/55 - Detecting local intrusion or implementing counter-measures 20
G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity 14
See more
Status
Pending 5
Registered / In Force 99
Found results for  patents
  1     2        Next Page

1.

Aggregate Event Profiles for Detecting Malicious Mobile Applications

      
Application Number 17821493
Status Pending
Filing Date 2022-08-23
First Publication Date 2024-02-29
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Tivadar, Marius M.
  • Bocereg, Alexandra S.
  • Gosa, Razvan G.

Abstract

Described systems and methods protect client devices such as personal computers and IoT devices against malicious software. In some embodiments, a plurality of client devices report the occurrence of various events to a security server, each such event caused by a local instance of a target application (e.g., mobile app) executing on a respective device. The security server then collates the behavior of the respective target application across the plurality of client devices. Some embodiments compute an aggregate event set and/or sequence combining events detected on one device with events detected on other devices, and determine whether the target application is malicious according to the aggregate event set/sequence.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

2.

Privacy-Preserving Filtering of Encrypted Traffic

      
Application Number 17664803
Status Pending
Filing Date 2022-05-24
First Publication Date 2023-11-30
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Craciun, Ovidiu M.
  • Firuti, Bogdan C.
  • Fetti, Daniel I. A.
  • Cernat, Constantin D.

Abstract

Described systems and methods protect client devices such as personal computers and IoT devices against harmful or inappropriate Internet content. When a client uses an encrypted handshake to hide the identity of the end server, e.g., in applications implementing an encrypted client hello (ECH), some embodiments employ a modified DNS server to provide a surrogate key to the client instead of the genuine handshake key. A traffic filter executing for instance on a network gateway may then intercept and decrypt the handshake and apply an access policy to selectively allow or deny access to the respective end server. When access is allowed, the traffic filter may re-encrypt the server identifier using the genuine handshake key before forwarding the handshake to its destination. Communication privacy is maintained since the illustrated methods only decrypt the handshake, and not the actual payload.

IPC Classes  ?

  • H04L 9/08 - Key distribution
  • H04L 61/4511 - Network directories; Name-to-address mapping using standardised directory access protocols using domain name system [DNS]

3.

Privacy-Preserving Domain Name Services (DNS)

      
Application Number 18357521
Status Pending
Filing Date 2023-07-24
First Publication Date 2023-11-16
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Cebere, Bogdan C.
  • Burceanu, Elena
  • Bolboceanu, Madalina
  • Haller, Emanuela
  • Rosca, Georgiana M.
  • Titiu, Radu

Abstract

Described systems and methods allow carrying out privacy-preserving DNS exchanges. In some embodiments, a client machine engages in a private information retrieval (PIR) exchange with a nameserver. In response to receiving an encrypted query from the client, the query formulated according to a domain name, the nameserver may extract a record (e.g., an IP address) from a domain name database without decrypting the respective query. Some embodiments achieve such information retrieval by the use of homomorphic encryption.

IPC Classes  ?

  • H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
  • G06F 16/22 - Indexing; Data structures therefor; Storage structures
  • H04L 61/2539 - Hiding addresses; Keeping addresses anonymous
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04L 61/4511 - Network directories; Name-to-address mapping using standardised directory access protocols using domain name system [DNS]

4.

Computer Security Systems and Methods Using Self-Supervised Consensus-Building Machine Learning

      
Application Number 17656644
Status Pending
Filing Date 2022-03-26
First Publication Date 2023-09-28
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Burceanu, Elena
  • Haller, Emanuela
  • Leordeanu, Marius
  • Prejbeanu, Razvan
  • Cernat, Constantin D.

Abstract

Some embodiments employ a consensus-building procedure to train a multitask graph comprising a plurality of nodes interconnected by a plurality of edges, wherein each node is associated with a task of determining a set of node-specific attributes of a set of input data, and each edge comprises an AI module (e.g., neural network) configured to determine attributes of an end node according to attributes of a start node of the respective edge. Training fosters consensus between all edges converging to a node. The trained multitask graph may then be deployed in a threat detector configured to determine whether an input set of data is indicative of malice (e.g., malware, intrusion, online threat, etc.).

IPC Classes  ?

  • G06F 21/54 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by adding security routines or objects to programs
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06K 9/62 - Methods or arrangements for recognition using electronic means
  • G06N 3/04 - Architecture, e.g. interconnection topology

5.

Security Appliance for Protecting Power-Saving Wireless Devices Against Attack

      
Application Number 18312913
Status Pending
Filing Date 2023-05-05
First Publication Date 2023-08-31
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Munteanu, Cristian
  • Szente, Balint
  • Farkas, Gyula

Abstract

Described systems and methods allow protecting multiple wireless Internet-of-things (IoT) devices against impersonation attacks. In some embodiments, a security appliance detects an availability notification (e.g., a Bluetooth® Low Energy advertisement) emitted as part of a protocol of establishing a wireless connection between two devices. The security appliance may then determine whether the detected notification fits a baseline notification pattern of the apparent sender. When no, the security appliance may attack the sender device by replying to the respective availability notification and initiating a handshake.

IPC Classes  ?

  • H04W 12/48 - Security arrangements using identity modules using secure binding, e.g. securely binding identity modules to devices, services or applications
  • H04W 12/122 - Counter-measures against attacks; Protection against rogue devices
  • H04W 12/71 - Hardware identity
  • H04L 67/1087 - Peer-to-peer [P2P] networks using cross-functional networking aspects
  • H04W 12/61 - Time-dependent
  • H04L 67/55 - Push-based network services

6.

Privacy-preserving image distribution

      
Application Number 18182700
Grant Number 11768957
Status In Force
Filing Date 2023-03-13
First Publication Date 2023-07-20
Grant Date 2023-09-26
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Burceanu, Elena
  • Bolboceanu, Madalina
  • Haller, Emanuela
  • Rosca, Georgiana M
  • Cebere, Bogdan C
  • Titiu, Radu

Abstract

Some embodiments enable distributing data (e.g., recorded video, photographs, recorded audio, etc.) to a plurality of users in a manner which preserves the privacy of the respective users. Some embodiments leverage homomorphic encryption and proxy re-encryption techniques to manipulate the respective data so that selected portions of it are revealed according to an identity of the user currently accessing the respective data.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • H04L 67/10 - Protocols in which an application is distributed across nodes in the network
  • H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
  • H04L 9/08 - Key distribution
  • G06T 7/11 - Region-based segmentation
  • G06F 21/60 - Protecting data
  • H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
  • G06V 40/16 - Human faces, e.g. facial parts, sketches or expressions

7.

Systems and methods of controlling internet access using encrypted DNS

      
Application Number 18053046
Grant Number 11831602
Status In Force
Filing Date 2022-11-07
First Publication Date 2023-06-15
Grant Date 2023-11-28
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Craciun, Ovidiu M.
  • Budau, Adrian
  • Boca, Paul D.
  • Cernat, Constantin D.

Abstract

Described systems and methods enable protecting client devices (e.g., personal computers and IoT devices) implementing encrypted DNS protocols against harmful or inappropriate Internet content. A DNS proxy intercepts an attempt to establish an encrypted communication session between a client device and a DNS server. Without decrypting any communications, some embodiments of the DNS proxy determine an identifier of the respective session and an identifier of the client device, and send a query tracer connecting the session identifier with the client identifier to a security server. In some embodiments, the security server obtains the domain name included in an encrypted DNS query from the DNS server and instructs the DNS server to allow or block access of the client device to the respective Internet domain according to a device- and/or user-specific access policy.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 61/4511 - Network directories; Name-to-address mapping using standardised directory access protocols using domain name system [DNS]
  • H04L 69/22 - Parsing or analysis of headers

8.

Systems and methods of controlling internet access using encrypted DNS

      
Application Number 17644167
Grant Number 11552925
Status In Force
Filing Date 2021-12-14
First Publication Date 2023-01-10
Grant Date 2023-01-10
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Craciun, Ovidiu M.
  • Budau, Adrian
  • Boca, Paul D.
  • Cernat, Constantin D.

Abstract

Described systems and methods enable protecting client devices (e.g., personal computers and IoT devices) implementing encrypted DNS protocols against harmful or inappropriate Internet content. A DNS proxy intercepts an attempt to establish an encrypted communication session between a client device and a DNS server. Without decrypting any communications, some embodiments of the DNS proxy determine an identifier of the respective session and an identifier of the client device, and send a query tracer connecting the session identifier with the client identifier to a security server. In some embodiments, the security server obtains the domain name included in an encrypted DNS query from the DNS server and instructs the DNS server to allow or block access of the client device to the respective Internet domain according to a device- and/or user-specific access policy.

IPC Classes  ?

  • H04L 61/4511 - Network directories; Name-to-address mapping using standardised directory access protocols using domain name system [DNS]
  • H04L 9/40 - Network security protocols
  • H04L 69/22 - Parsing or analysis of headers

9.

Anomaly detection systems and methods

      
Application Number 17301641
Grant Number 11847111
Status In Force
Filing Date 2021-04-09
First Publication Date 2022-10-13
Grant Date 2023-12-19
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Manolache, Andrei M.
  • Brad, Florin M.
  • Novac, Alexandru
  • Burceanu, Elena

Abstract

Some embodiments employ a novel procedure of training an artificial intelligence system (e.g., set of deep neural networks) for anomaly detection in applications such as natural language processing and computer security. Token sequences selected from a training corpus are distorted according to at least one of a plurality of pre-determined sequence transformations, before being fed to a sequence analyzer. In turn, the sequence analyzer is trained to correctly guess which transformation was used to generate the respective input token sequence.

IPC Classes  ?

10.

Privacy-preserving domain name service (DNS)

      
Application Number 16949587
Grant Number 11750363
Status In Force
Filing Date 2020-11-04
First Publication Date 2022-05-05
Grant Date 2023-09-05
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Cebere, Bogdan C.
  • Burceanu, Elena
  • Bolboceanu, Madalina
  • Haller, Emanuela
  • Rosca, Georgiana M.
  • Titiu, Radu

Abstract

Described systems and methods allow carrying out privacy-preserving DNS exchanges. In some embodiments, a client machine engages in a private information retrieval (PIR) exchange with a nameserver. In response to receiving an encrypted query from the client, the query formulated according to a domain name, the nameserver may extract a record (e.g., an IP address) from a domain name database without decrypting the respective query. Some embodiments achieve such information retrieval by the use of homomorphic encryption.

IPC Classes  ?

  • H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
  • G06F 16/22 - Indexing; Data structures therefor; Storage structures
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04L 61/2539 - Hiding addresses; Keeping addresses anonymous
  • H04L 61/4511 - Network directories; Name-to-address mapping using standardised directory access protocols using domain name system [DNS]

11.

Image distribution using composite re-encrypted images

      
Application Number 17305324
Grant Number 11599669
Status In Force
Filing Date 2021-07-05
First Publication Date 2022-01-13
Grant Date 2023-03-07
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Burceanu, Elena
  • Bolboceanu, Madalina
  • Haller, Emanuela
  • Rosca, Georgiana M
  • Cebere, Bogdan C
  • Titiu, Radu

Abstract

Some embodiments enable distributing data (e.g., recorded video, photographs, recorded audio, etc.) to a plurality of users in a manner which preserves the privacy of the respective users. Some embodiments leverage homomorphic encryption and proxy re-encryption techniques to manipulate the respective data so that selected portions of it are revealed according to an identity of the user currently accessing the respective data.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • H04L 67/10 - Protocols in which an application is distributed across nodes in the network
  • H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
  • H04L 9/08 - Key distribution
  • G06T 7/11 - Region-based segmentation
  • G06F 21/60 - Protecting data
  • H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
  • G06V 40/16 - Human faces, e.g. facial parts, sketches or expressions

12.

Privacy-preserving image distribution

      
Application Number 17305322
Grant Number 11604893
Status In Force
Filing Date 2021-07-05
First Publication Date 2022-01-13
Grant Date 2023-03-14
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Burceanu, Elena
  • Bolboceanu, Madalina
  • Haller, Emanuela
  • Rosca, Georgiana M
  • Cebere, Bogdan C
  • Titiu, Radu

Abstract

Some embodiments enable distributing data (e.g., recorded video, photographs, recorded audio, etc.) to a plurality of users in a manner which preserves the privacy of the respective users. Some embodiments leverage homomorphic encryption and proxy re-encryption techniques to manipulate the respective data so that selected portions of it are revealed according to an identity of the user currently accessing the respective data.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • H04L 67/10 - Protocols in which an application is distributed across nodes in the network
  • H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
  • H04L 9/08 - Key distribution
  • G06T 7/11 - Region-based segmentation
  • G06F 21/60 - Protecting data
  • H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
  • G06V 40/16 - Human faces, e.g. facial parts, sketches or expressions

13.

Anti-cyberbullying systems and methods

      
Application Number 17446485
Grant Number 11580258
Status In Force
Filing Date 2021-08-31
First Publication Date 2021-12-16
Grant Date 2023-02-14
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Miron, Adrian
  • Zavoiu, Viorel
  • Afloarei, Andrei M.
  • Patru, Elena M.
  • Holban, Liviu A.
  • Botezatu, Loredana
  • Bugoiu, Bogdan

Abstract

Some embodiments use text and/or image processing methods to determine whether a user of an electronic messaging platform is subject to an online threat such as cyberbullying, sexual grooming, and identity theft, among others. In some embodiments, a text content of electronic messages is automatically harvested and aggregated into conversations. Conversation data are then analyzed to extract various threat indicators. A result of a text analysis may be combined with a result of an analysis of an image transmitted as part of the respective conversation. When a threat is detected, some embodiments automatically send a notification to a third party (e.g., parent, teacher, etc.)

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • H04L 9/40 - Network security protocols
  • G06F 40/216 - Parsing using statistical methods
  • G06Q 10/10 - Office automation; Time management
  • H04W 4/12 - Messaging; Mailboxes; Announcements
  • H04L 51/212 - Monitoring or handling of messages using filtering or selective blocking
  • H04L 51/214 - Monitoring or handling of messages using selective forwarding
  • G06Q 10/107 - Computer-aided management of electronic mailing [e-mailing]

14.

Security appliance for protecting power-saving wireless devices against attack

      
Application Number 17248909
Grant Number 11696138
Status In Force
Filing Date 2021-02-12
First Publication Date 2021-12-09
Grant Date 2023-07-04
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Munteanu, Cristian
  • Szente, Balint
  • Farkas, Gyula

Abstract

Described systems and methods allow protecting multiple wireless Internet-of-things (IoT) devices against impersonation attacks. In some embodiments, a security appliance detects an availability notification (e.g., a Bluetooth® Low Energy advertisement) emitted as part of a protocol of establishing a wireless connection between two devices. The security appliance may then determine whether the detected notification fits a baseline notification pattern of the apparent sender. When no, the security appliance may attack the sender device by replying to the respective availability notification and initiating a handshake.

IPC Classes  ?

  • H04W 12/61 - Time-dependent
  • H04W 12/71 - Hardware identity
  • H04W 12/122 - Counter-measures against attacks; Protection against rogue devices
  • H04L 67/1087 - Peer-to-peer [P2P] networks using cross-functional networking aspects
  • H04W 12/48 - Security arrangements using identity modules using secure binding, e.g. securely binding identity modules to devices, services or applications
  • H04L 67/55 - Push-based network services

15.

Machine learning systems and methods for reducing the false positive malware detection rate

      
Application Number 16853934
Grant Number 11847214
Status In Force
Filing Date 2020-04-21
First Publication Date 2021-10-21
Grant Date 2023-12-19
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Dichiu, Daniel
  • Dincu, Andreea
  • Botarleanu, Robert M
  • Zamfir, Sorina N.
  • Bosinceanu, Elena A
  • Prejbeanu, Razvan

Abstract

In some embodiments, a behavior classifier comprises a set of neural networks trained to determine whether a monitored software entity is malicious according to a sequence of computing events caused by the execution of the respective entity. When the behavior classifier indicates that the entity is malicious, some embodiments execute a memory classifier comprising another set of neural networks trained to determine whether the monitored entity is malicious according to a memory snapshot of the monitored entity. Applying the classifiers in sequence may substantially reduce the false positive detection rate, while reducing computational costs.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 3/06 - Digital input from, or digital output to, record carriers
  • G06N 3/08 - Learning methods

16.

Systems and methods for using DNS messages to selectively collect computer forensic data

      
Application Number 16405140
Grant Number 10862854
Status In Force
Filing Date 2019-05-07
First Publication Date 2020-11-12
Grant Date 2020-12-08
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor Mircescu, Daniel A.

Abstract

Described systems and methods allow a selective collection of computer security data from client devices such as personal computers, smartphones, and Internet of Things (IoT) devices. A security application executing on each client device comprises a domain name service (DNS) proxy that tags outgoing DNS messages with a client ID. The DNS server selects a client for to data collection by returning a DNS reply comprising a service activation flag. Some embodiments thus enable a per-DNS-message selectivity of data collection. In some embodiments, subsequent network access requests by the selected clients are re-routed to a security server for analysis.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 29/12 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups characterised by the data terminal
  • H04L 12/46 - Interconnection of networks

17.

Systems and methods for translating natural language sentences into database queries

      
Application Number 16882615
Grant Number 11194799
Status In Force
Filing Date 2020-05-25
First Publication Date 2020-09-10
Grant Date 2021-12-07
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Burceanu, Elena
  • Brad, Florin
  • Rebedea, Traian

Abstract

Described systems and methods allow an automatic translation from a natural language (e.g., English) into an artificial language such as a structured query language (SQL). In some embodiments, a translator module includes an encoder component and a decoder component, both components comprising recurrent neural networks. Training the translator module comprises two stages. A first stage trains the translator module to produce artificial language (AL) output when presented with an AL input. For instance, the translator is first trained to reproduce an AL input. A second stage of training comprises training the translator to produce AL output when presented with a natural language (NL) input.

IPC Classes  ?

18.

Anti-cyberbullying systems and methods

      
Application Number 16746648
Grant Number 11188677
Status In Force
Filing Date 2020-01-17
First Publication Date 2020-07-23
Grant Date 2021-11-30
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Miron, Adrian
  • Zavoiu, Viorel
  • Afloarei, Andrei M.
  • Patru, Elena M.
  • Holban, Liviu A.
  • Botezatu, Loredana
  • Bugoiu, Bogdan

Abstract

Some embodiments use text and/or image processing methods to determine whether a user of an electronic messaging platform is subject to an online threat such as cyberbullying, sexual grooming, and identity theft, among others. In some embodiments, a text content of electronic messages is automatically harvested and aggregated into conversations. Conversation data are then analyzed to extract various threat indicators. A result of a text analysis may be combined with a result of an analysis of an image transmitted as part of the respective conversation. When a threat is detected, some embodiments automatically send a notification to a third party (e.g., parent, teacher, etc.).

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06N 3/08 - Learning methods
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 40/216 - Parsing using statistical methods
  • G06Q 10/10 - Office automation; Time management
  • H04L 12/58 - Message switching systems
  • H04W 4/12 - Messaging; Mailboxes; Announcements

19.

Parental control systems and methods for detecting an exposure of confidential information

      
Application Number 16746675
Grant Number 11436366
Status In Force
Filing Date 2020-01-17
First Publication Date 2020-07-23
Grant Date 2022-09-06
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Miron, Adrian
  • Zavoiu, Viorel
  • Ion, Cristian
  • Minea, Cristian
  • Holban, Liviu A.
  • Bugoiu, Bogdan

Abstract

Some embodiments use text and/or image processing methods to determine whether a child is transmitting confidential information to a conversation partner via an electronic messaging service. Some embodiments detect whether an image transmitted as part of an electronic message shows a bank card, a social security card, or an identity document, among others. When detecting such a situation, some embodiments automatically send a notification to a third party (e.g., parent, teacher, etc.)

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • H04L 9/40 - Network security protocols
  • G06F 40/216 - Parsing using statistical methods
  • G06Q 10/10 - Office automation; Time management
  • H04W 4/12 - Messaging; Mailboxes; Announcements
  • H04L 51/212 - Monitoring or handling of messages using filtering or selective blocking
  • H04L 51/214 - Monitoring or handling of messages using selective forwarding

20.

Systems and methods for behavioral threat detection

      
Application Number 16215179
Grant Number 11089034
Status In Force
Filing Date 2018-12-10
First Publication Date 2020-06-11
Grant Date 2021-08-10
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Dichiu, Daniel
  • Niculae, Stefan
  • Bosinceanu, Elena A.
  • Stoian, Sorina N.
  • Dincu, Andreea
  • Apostoae, Andrei A.

Abstract

In some embodiments, a behavioral computer security system protects clients and networks against threats such as malicious software and intrusion. A set of client profiles is constructed according to a training corpus of events occurring on clients, wherein each client profile represents a subset of protected machines, and each client profile is indicative of a normal or baseline pattern of using the machines assigned to the client respective profile. A client profile may group together machines having a similar event statistic. Following training, events detected on a client are selectively analyzed against a client profile associated with the respective client, to detect anomalous behavior. In some embodiments, individual events are analyzed in the context of other events, using a multi-dimensional event embedding space.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06N 20/00 - Machine learning

21.

Systems and methods for behavioral threat detection

      
Application Number 16215214
Grant Number 11323459
Status In Force
Filing Date 2018-12-10
First Publication Date 2020-06-11
Grant Date 2022-05-03
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Dichiu, Daniel
  • Niculae, Stefan
  • Bosinceanu, Elena A.
  • Stoian, Sorina N.
  • Dincu, Andreea
  • Apostoae, Andrei A.

Abstract

In some embodiments, a behavioral computer security system protects clients and networks against threats such as malicious software and intrusion. A set of client profiles is constructed according to a training corpus of events occurring on clients, wherein each client profile represents a subset of protected machines, and each client profile is indicative of a normal or baseline pattern of using the machines assigned to the client respective profile. A client profile may group together machines having a similar event statistic. Following training, events detected on a client are selectively analyzed against a client profile associated with the respective client, to detect anomalous behavior. In some embodiments, individual events are analyzed in the context of other events, using a multi-dimensional event embedding space.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06N 20/00 - Machine learning

22.

Systems and methods for behavioral threat detection

      
Application Number 16215251
Grant Number 11153332
Status In Force
Filing Date 2018-12-10
First Publication Date 2020-06-11
Grant Date 2021-10-19
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Dichiu, Daniel
  • Niculae, Stefan
  • Bosinceanu, Elena A.
  • Stoian, Sorina N.
  • Dincu, Andreea
  • Apostoae, Andrei A.

Abstract

In some embodiments, a behavioral computer security system protects clients and networks against threats such as malicious software and intrusion. A set of client profiles is constructed according to a training corpus of events occurring on clients, wherein each client profile represents a subset of protected machines, and each client profile is indicative of a normal or baseline pattern of using the machines assigned to the client respective profile. A client profile may group together machines having a similar event statistic. Following training, events detected on a client are selectively analyzed against a client profile associated with the respective client, to detect anomalous behavior. In some embodiments, individual events are analyzed in the context of other events, using a multi-dimensional event embedding space.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06N 5/02 - Knowledge representation; Symbolic representation

23.

Information security appliance

      
Application Number 29607399
Grant Number D0885950
Status In Force
Filing Date 2017-06-13
First Publication Date 2020-06-02
Grant Date 2020-06-02
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor Veja, Alexandru V.

24.

Systems and methods for auditing a virtual machine

      
Application Number 16666990
Grant Number 10949247
Status In Force
Filing Date 2019-10-29
First Publication Date 2020-02-27
Grant Date 2021-03-16
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Lukacs, Sandor
  • Lutas, Andrei V.
  • Anichitei, Ionel C.

Abstract

Described systems and methods enable performing software audits remotely and automatically, on a relatively large number of client systems (e.g., a corporate network, a virtual desktop infrastructure system, etc.) An audit engine executes on each client system, in a hardware virtualization configuration wherein the audit engine executes outside an audited virtual machine. When receiving an audit request from an audit server, some embodiments of the audit engine drop an audit agent into the audited virtual machine, and remove the audit agent upon completion of the audit.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 11/30 - Monitoring
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
  • G06F 9/445 - Program loading or initiating
  • G06F 21/10 - Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

25.

Systems and methods for reporting computer security incidents

      
Application Number 16515349
Grant Number 11184368
Status In Force
Filing Date 2019-07-18
First Publication Date 2020-01-23
Grant Date 2021-11-23
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Warmenhoven, Adrianus
  • Hofstede, Richard J.

Abstract

Alert manager software dynamically assembles a security alert as various security scenarios are tested to reach a verdict. Each executed scenario may contribute a scenario-specific message, so the resulting compound security alert indicates an actual line of reasoning used in reaching the respective verdict. The described systems and methods apply, inter alia, to the analysis of high-volume network flows in corporate networks. In some embodiments, flows are pre-tagged with extra metadata to facilitate detection of malware and/or intrusion.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • H04L 12/24 - Arrangements for maintenance or administration
  • H04L 12/58 - Message switching systems

26.

Systems and methods for translating natural language sentences into database queries

      
Application Number 16020910
Grant Number 10664472
Status In Force
Filing Date 2018-06-27
First Publication Date 2020-01-02
Grant Date 2020-05-26
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Burceanu, Elena
  • Brad, Florin
  • Rebedea, Traian

Abstract

Described systems and methods allow an automatic translation from a natural language (e.g., English) into an artificial language such as a structured query language (SQL). In some embodiments, a translator module includes an encoder component and a decoder component, both components comprising recurrent neural networks. Training the translator module comprises two stages. A first stage trains the translator module to produce artificial language (AL) output when presented with an AL input. For instance, the translator is first trained to reproduce an AL input. A second stage of training comprises training the translator to produce AL output when presented with a natural language (NL) input.

IPC Classes  ?

27.

Systems and methods for detecting online fraud

      
Application Number 16233750
Grant Number 11388193
Status In Force
Filing Date 2018-12-27
First Publication Date 2019-05-02
Grant Date 2022-07-12
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor Damian, Alin O.

Abstract

Described systems and methods enable a swift and efficient detection of fraudulent Internet domains, i.e., domains used to host or distribute fraudulent electronic documents such as fraudulent webpages and electronic messages. Some embodiments use a reverse IP analysis to select a set of fraud candidates from among a set of domains hosted at the same IP address as a known fraudulent domain. The candidate set is further filtered according to domain registration data. Online content hosted at each filtered candidate domain is further analyzed to identify truly fraudulent domains. A security module may then prevent users from accessing a content of such domains.

IPC Classes  ?

  • G08B 23/00 - Alarms responsive to unspecified undesired or abnormal conditions
  • H04L 9/40 - Network security protocols
  • G06F 16/9535 - Search customisation based on user profiles and personalisation
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • H04L 61/4511 - Network directories; Name-to-address mapping using standardised directory access protocols using domain name system [DNS]

28.

Systems and methods for decrypting network traffic in a virtualized environment

      
Application Number 16173490
Grant Number 10257170
Status In Force
Filing Date 2018-10-29
First Publication Date 2019-02-28
Grant Date 2019-04-09
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor Caragea, Radu

Abstract

Described systems and methods enable a decryption of encrypted communication between a client system and a remote party, for applications such as detection and analysis of malicious software, intrusion detection, and surveillance, among others. The client system executes a virtual machine and an introspection engine outside the virtual machine. The introspection engine is configured to identify memory pages whose contents have changed between a first session event (e.g., a ServerHello message) and a second session event (e.g., a ClientFinished message). The respective memory pages are likely to contain encryption key material for the respective communication session. A decryption engine may then attempt to decrypt an encrypted payload of the respective communication session using information derived from the content of the identified memory pages.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • G06F 12/1009 - Address translation using page tables, e.g. page table structures
  • H04L 9/14 - Arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

29.

Systems and methods for tracking malicious behavior across multiple software entities

      
Application Number 16148242
Grant Number 10706151
Status In Force
Filing Date 2018-10-01
First Publication Date 2019-01-31
Grant Date 2020-07-07
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Hajmasan, Gheorghe F.
  • Portase, Radu M.

Abstract

Described systems and methods allow protecting a computer system from malicious software. In some embodiments, a security application organizes a set of monitored executable entities (e.g., processes) into a plurality of groups, wherein members of a group are related by filiation and/or code injection. The security application may further associate a malice-indicative entity score with each monitored entity, and a malice-indicative group score with each entity group. Group scores may be incremented when a member of the respective group performs certain actions. Thus, even though actions performed by individual members may not be malware-indicative per se, the respective group score may capture collective malicious behavior and trigger malware detection.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

30.

Systems and methods for automatic device detection, device management, and remote assistance

      
Application Number 16133238
Grant Number 11706051
Status In Force
Filing Date 2018-09-17
First Publication Date 2019-01-17
Grant Date 2023-07-18
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Stan, Cosmin C.
  • Rusu, Andrei
  • Cebere, Bogdan C.
  • Achim, Alexandru I.

Abstract

In some embodiments, a network regulator device protects a local network of client systems (e.g. Internet-of-things devices such as smartphones, home appliances, wearables, etc.) against computer security threats. When introduced to the local network, some embodiments of network regulator take over some network services from a router, and automatically install the network regulator as gateway to the local network. The network regulator then carries out an automatic device discovery procedure and distribute device-specific utility agents to the protected client systems. An exemplary utility agent detects when its host device has left the local network, and in response, sets up a virtual private network (VPN) tunnel with a security server to maintain protection of the respective device.

IPC Classes  ?

  • H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
  • H04L 12/46 - Interconnection of networks
  • H04L 9/40 - Network security protocols
  • H04L 41/22 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
  • H04W 76/32 - Release of transport tunnels
  • H04W 76/12 - Setup of transport tunnels
  • H04L 41/0803 - Configuration setting
  • H04W 12/088 - Access security using filters or firewalls
  • G06F 9/54 - Interprogram communication
  • H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
  • H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
  • H04L 43/0876 - Network utilisation, e.g. volume of load or congestion level
  • H04L 67/02 - Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
  • H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
  • H04W 4/70 - Services for machine-to-machine communication [M2M] or machine type communication [MTC]
  • H04L 41/0806 - Configuration setting for initial configuration or provisioning, e.g. plug-and-play
  • H04L 61/5014 - Internet protocol [IP] addresses using dynamic host configuration protocol [DHCP] or bootstrap protocol [BOOTP]
  • H04L 61/5061 - Pools of addresses
  • H04W 88/12 - Access point controller devices
  • H04W 88/16 - Gateway arrangements

31.

Systems and methods of application control in virtualized environments

      
Application Number 16044986
Grant Number 10445498
Status In Force
Filing Date 2018-07-25
First Publication Date 2018-11-15
Grant Date 2019-10-15
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Lukacs, Sandor
  • Lutas, Andrei V.

Abstract

Described systems and methods enable enforcing application control remotely and automatically, on a relatively large number of client systems (e.g., a corporate network, a virtual desktop infrastructure system, etc.). An application control engine executes outside a virtual machine exposed on a client system, the application control engine configured to enforce application control within the virtual machine according to a set of control policies. When a policy indicates that a specific process is not allowable on the respective client system, the app control engine may prevent execution of the respective process. To assist in data gathering and/or other activities associated with application control, some embodiments temporarily drop a control agent into the controlled virtual machine.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/51 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

32.

Systems and methods for auditing a virtual machine

      
Application Number 15971425
Grant Number 10489187
Status In Force
Filing Date 2018-05-04
First Publication Date 2018-09-06
Grant Date 2019-11-26
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Lukacs, Sandor
  • Lutas, Andrei V.
  • Anichitei, Ionel C.

Abstract

Described systems and methods enable performing software audits remotely and automatically, on a relatively large number of client systems (e.g., a corporate network, a virtual desktop infrastructure system, etc.) An audit engine executes on each client system, in a hardware virtualization configuration wherein the audit engine executes outside an audited virtual machine. When receiving an audit request from an audit server, some embodiments of the audit engine drop an audit agent into the audited virtual machine, and remove the audit agent upon completion of the audit.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 11/30 - Monitoring
  • G06F 9/445 - Program loading or initiating
  • G06F 21/10 - Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

33.

Hardware-accelerated prevention of code reuse attacks

      
Application Number 14799927
Grant Number 10049211
Status In Force
Filing Date 2015-07-15
First Publication Date 2018-08-14
Grant Date 2018-08-14
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Lukacs, Sandor
  • Lutas, Andrei V.
  • Lutas, Dan H.

Abstract

Described systems and methods allow protecting a host computer system from malicious software, such as return-oriented programming (ROP) and jump-oriented programming (JOP) exploits. In some embodiments, a processor of the host system is endowed with two counters storing a count of branch instructions and a count of inter-branch instructions, respectively, occurring within a sequence of instructions. Exemplary counted branch instructions include indirect JMP, indirect CALL, and RET on x86 platforms, while inter-branch instructions consist of instructions executed between two consecutive counted branch instructions. The processor may be further configured to generate a processor event, such as an exception, when a value stored in a counter exceeds a predetermined threshold, and/or when a branch instruction redirects execution to a critical OS function. Such events may be used as triggers for launching a malware analysis to determine whether the host system is subject to a code reuse attack.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/52 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

34.

Systems and methods for automatic device detection, device management, and remote assistance

      
Application Number 15940284
Grant Number 10080138
Status In Force
Filing Date 2018-03-29
First Publication Date 2018-08-09
Grant Date 2018-09-18
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Stan, Cosmin C.
  • Rusu, Andrei
  • Cebere, Bogdan C.
  • Achim, Alexandru I.

Abstract

In some embodiments, a network regulator device protects a local network of client systems (e.g. Internet-of-things devices such as smartphones, home appliances, wearables, etc.) against computer security threats. When introduced to the local network, some embodiments of network regulator take over some network services from a router, and automatically install the network regulator as gateway to the local network. The network regulator then carries out an automatic device discovery procedure and distribute device-specific utility agents to the protected client systems. An exemplary utility agent detects when its host device has left the local network, and in response, sets up a virtual private network (VPN) tunnel with a security server to maintain protection of the respective device.

IPC Classes  ?

  • H04W 12/08 - Access security
  • G06F 9/54 - Interprogram communication
  • H04L 12/46 - Interconnection of networks
  • H04L 12/24 - Arrangements for maintenance or administration
  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04W 76/12 - Setup of transport tunnels
  • H04W 76/32 - Release of transport tunnels
  • H04W 4/70 - Services for machine-to-machine communication [M2M] or machine type communication [MTC]
  • H04W 88/16 - Gateway arrangements
  • H04L 29/12 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups characterised by the data terminal
  • H04W 88/12 - Access point controller devices
  • H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]

35.

Event filtering for virtual machine security applications

      
Application Number 15845060
Grant Number 10635479
Status In Force
Filing Date 2017-12-18
First Publication Date 2018-06-21
Grant Date 2020-04-28
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor Lutas, Andrei V.

Abstract

Described systems and methods allow protecting a hardware virtualization system from malicious software. Some embodiments use a hybrid event notification/analysis system, wherein a first component executing within a protected virtual machine (VM) registers as a handler for processor exceptions triggered by violations of memory access permissions, and wherein a second component executing outside the respective VM registers as a handler for VM exit events. The first component filters permission violation events according to a set of rules and only notifies the second component about events which are deemed relevant to security. The second component analyzes notified events to detect malicious software.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 9/54 - Interprogram communication
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

36.

Dynamic reputation indicator for optimizing computer security operations

      
Application Number 15336387
Grant Number 10237293
Status In Force
Filing Date 2016-10-27
First Publication Date 2018-05-03
Grant Date 2019-03-19
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Hajmasan, Gheorghe F.
  • Mondoc, Alexandra
  • Portase, Radu M.

Abstract

Described systems and methods allow protecting a computer system from malware such as viruses, worms, and spyware. A reputation manager executes on the computer system concurrently with an anti-malware engine. The reputation manager associates a dynamic reputation indicator to each executable entity seen as a unique combination of individual components (e.g., a main executable and a set of loaded libraries). The reputation indicator indicates a probability that the respective entity is malicious. The reputation of benign entities may increase in time. When an entity performs certain actions which may be indicative of malicious activity, the reputation of the respective entity may drop. The anti-malware engine uses an entity-specific protocol to scan and/or monitor each target entity for malice, the protocol varying according to the entity's reputation. Entities trusted to be non-malicious may be analyzed using a more relaxed protocol than unknown or untrusted entities.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

37.

Anti-malware systems and methods using hardware-assisted code injection

      
Application Number 14661485
Grant Number 09881157
Status In Force
Filing Date 2015-03-18
First Publication Date 2018-01-30
Grant Date 2018-01-30
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Lukacs, Sandor
  • Colesa, Adrian V.

Abstract

Described systems and methods allow conducting computer security operations, such as detecting malware and spyware, in a bare-metal computer system. In some embodiments, a first processor of a computer system executes the code samples under assessment, whereas a second, distinct processor is used to carry out the assessment and to control various hardware components involved in the assessment. Such hardware components include, among others, a memory shadower configured to detect changes to a memory connected to the first processor, and a storage shadower configured to detect an attempt to write to a non-volatile storage device of the computer system. The memory shadower and storage shadower may be used to inject a security agent into the computer system.

IPC Classes  ?

  • G06F 13/24 - Handling requests for interconnection or transfer for access to input/output bus using interrupt
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 12/14 - Protection against unauthorised use of memory
  • G06F 3/06 - Digital input from, or digital output to, record carriers

38.

Systems and methods for detecting online fraud

      
Application Number 15206761
Grant Number 10171497
Status In Force
Filing Date 2016-07-11
First Publication Date 2018-01-11
Grant Date 2019-01-01
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor Damian, Alin O.

Abstract

Described systems and methods enable a swift and efficient detection of fraudulent Internet domains, i.e., domains used to host or distribute fraudulent electronic documents such as fraudulent webpages and electronic messages. Some embodiments use a reverse IP analysis to select a set of fraud candidates from among a set of domains hosted at the same IP address as a known fraudulent domain. The candidate set is further filtered according to domain registration data. Online content hosted at each filtered candidate domain is further analyzed to identify truly fraudulent domains. A security module may then prevent users from accessing a content of such domains.

IPC Classes  ?

  • G08B 23/00 - Alarms responsive to unspecified undesired or abnormal conditions
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 17/30 - Information retrieval; Database structures therefor
  • H04L 29/12 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups characterised by the data terminal
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

39.

Systems and methods of asynchronous analysis of event notifications for computer security applications

      
Application Number 15201035
Grant Number 10140448
Status In Force
Filing Date 2016-07-01
First Publication Date 2018-01-04
Grant Date 2018-11-27
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor Lukacs, Sandor

Abstract

Described systems and methods enable an efficient detection and analysis of software events, especially in hardware virtualization configurations. In some embodiments, certain types of events are analyzed asynchronously, in the sense that the triggering entity is allowed to continue execution while the respective event is added to a queue for later processing. Some embodiments modify the instruction set architecture of the processor by adding a processor instruction dedicated to delivering event notifications. Such notification instructions allow for complex and flexible event detection without some of the disadvantages of conventional methods such as hooking.

IPC Classes  ?

  • G06F 21/52 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 9/54 - Interprogram communication
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

40.

Systems and methods for dynamically protecting a stack from below the operating system

      
Application Number 15639051
Grant Number 10296470
Status In Force
Filing Date 2017-06-30
First Publication Date 2017-10-26
Grant Date 2019-05-21
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor Lutas, Andrei V.

Abstract

Described systems and methods allow protecting a host system against malware, using hardware virtualization technology. A memory introspection engine executes at the level of a hypervisor, protecting a virtual machine (VM) from exploits targeting the call stack of a thread executing within the respective VM. The introspection engine identifies a virtual memory page reserved for the stack, but not committed to the stack, and intercepts an attempt to write to the respective page. In response to intercepting the write attempt, the memory introspection engine marks the respective page as non-executable, thus protecting the stack against exploits.

IPC Classes  ?

  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 12/14 - Protection against unauthorised use of memory
  • G06F 12/1009 - Address translation using page tables, e.g. page table structures
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

41.

Systems and methods for application control in virtualized environments

      
Application Number 15086490
Grant Number 10043005
Status In Force
Filing Date 2016-03-31
First Publication Date 2017-10-05
Grant Date 2018-08-07
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Lukacs, Sandor
  • Lutas, Andrei V.

Abstract

Described systems and methods enable enforcing application control remotely and automatically, on a relatively large number of client systems (e.g., a corporate network, a virtual desktop infrastructure system, etc.). An application control engine executes outside a virtual machine exposed on a client system, the application control engine configured to enforce application control within the virtual machine according to a set of control policies. When a policy indicates that a specific process is not allowable on the respective client system, the app control engine may prevent execution of the respective process. To assist in data gathering and/or other activities associated with application control, some embodiments temporarily drop a control agent into the controlled virtual machine.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/51 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

42.

Systems and methods for decrypting network traffic in a virtualized environment

      
Application Number 15471981
Grant Number 10116630
Status In Force
Filing Date 2017-03-28
First Publication Date 2017-10-05
Grant Date 2018-10-30
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor Caragea, Radu

Abstract

Described systems and methods enable a decryption of encrypted communication between a client system and a remote party, for applications such as detection and analysis of malicious software, intrusion detection, and surveillance, among others. The client system executes a virtual machine and an introspection engine outside the virtual machine. The introspection engine is configured to identify memory pages whose contents have changed between a first session event (e.g., a ServerHello message) and a second session event (e.g., a ClientFinished message). The respective memory pages are likely to contain encryption key material for the respective communication session. A decryption engine may then attempt to decrypt an encrypted payload of the respective communication session using information derived from the content of the identified memory pages.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 12/1009 - Address translation using page tables, e.g. page table structures
  • H04L 9/14 - Arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

43.

Systems and methods for automatic device detection

      
Application Number 15472515
Grant Number 10644949
Status In Force
Filing Date 2017-03-29
First Publication Date 2017-10-05
Grant Date 2020-05-05
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor Cebere, Bogdan C.

Abstract

Described systems and methods enable an automatic device detection/discovery, particularly of ‘Internet of Things’ client devices such as wearables, mobile communication devices, and smart home appliances, among others. Device detection comprises assigning a target device to a device category, such as “tablet computer from an unknown manufacturer, running Android®”. Some embodiments determine multiple preliminary category assignments according to distinct inputs such as HTTP user agent data, DHCP data, mDNS data, and MAC data. Each preliminary category assignment may come with an associated score. A definitive category assignment may be made according to an aggregate score. Applications include computer security, software provisioning, and remote device management, among others.

IPC Classes  ?

  • H04L 12/24 - Arrangements for maintenance or administration
  • H04L 12/46 - Interconnection of networks
  • H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
  • H04L 29/12 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups characterised by the data terminal

44.

Systems and methods for auditing a virtual machine

      
Application Number 15045979
Grant Number 09965313
Status In Force
Filing Date 2016-02-17
First Publication Date 2017-07-06
Grant Date 2018-05-08
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Lukacs, Sandor
  • Lutas, Andrei V.
  • Anichitei, Ionel C.

Abstract

Described systems and methods enable performing software audits remotely and automatically, on a relatively large number of client systems (e.g., a corporate network, a virtual desktop infrastructure system, etc.) An audit engine executes on each client system, in a hardware virtualization configuration wherein the audit engine executes outside an audited virtual machine. When receiving an audit request from an audit server, some embodiments of the audit engine drop an audit agent into the audited virtual machine, and remove the audit agent upon completion of the audit.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 9/445 - Program loading or initiating
  • G06F 21/10 - Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 11/30 - Monitoring

45.

Dual memory introspection for securing multiple network endpoints

      
Application Number 15383082
Grant Number 10630643
Status In Force
Filing Date 2016-12-19
First Publication Date 2017-06-22
Grant Date 2020-04-21
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Lutas, Dan H.
  • Ticle, Daniel I.
  • Ciocas, Radu I.
  • Lukacs, Sandor
  • Anichitei, Ionel C.

Abstract

In some embodiments, a protected client operates a live introspection engine and an on-demand introspection engine. The live introspection engine detects the occurrence of certain events within a protected virtual machine exposed on the respective client system, and communicates the occurrence to a remote security server. In turn, the server may request a forensic analysis of the event from the client system, by indicating a forensic tool to be executed by the client. Forensic tools may be stored in a central repository accessible to the client. In response to receiving the analysis request, the on-demand introspection engine may retrieve and execute the forensic tool, and communicate a result of the forensic analysis to the security server. The server may use the information to determine whether the respective client is under attack by malicious software or an intruder.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 9/54 - Interprogram communication

46.

Systems and methods for detecting domain generation algorithm (DGA) malware

      
Application Number 14932765
Grant Number 09819696
Status In Force
Filing Date 2015-11-04
First Publication Date 2017-05-04
Grant Date 2017-11-14
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Minea, Octavian M.
  • Vatamanu, Cristina
  • Benchea, Mihai R.
  • Gavrilut, Dragos T.

Abstract

Domain generation algorithm (DGA) malware is detected by intercepting an external time request sent by a potential DGA malware host, and replacing the received real time with an accelerated (future) real time designed to trigger time-dependent DGA activity. The interception and replacement are performed outside the physical or virtual DGA host, on a different physical or virtual system such as a distinct external physical server or router, or distinct hypervisor or virtual machine running on the same physical system, in order to reduce the risk that the DGA malware identifies the time substitution. Failed DGA malware external access requests triggered only at future times are then used to identify domain names generated by the DGA malware, allowing proactive countermeasures.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

47.

Systems and methods for delivering context-specific introspection notifications

      
Application Number 14665917
Grant Number 09596261
Status In Force
Filing Date 2015-03-23
First Publication Date 2017-03-14
Grant Date 2017-03-14
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Lukacs, Sandor
  • Lutas, Andrei V.

Abstract

Described systems and methods enable a computer security module to protect a set of guest virtual machines against computer security threats. In some embodiments, the computer security module receives introspection notifications from the protected VM, each such notification indicating that a particular trigger event (e.g., a system call) has occurred during execution of guest software within the respective VM. In some embodiments, delivering a notification comprises suspending execution of guest software and switching the processor to executing a notification handler forming part of the computer security module. Some embodiments enable a context-specific delivery of notifications, wherein the set of events triggering notifications may vary from one guest process to another.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

48.

Computer security systems and methods using asynchronous introspection exceptions

      
Application Number 15209317
Grant Number 09852295
Status In Force
Filing Date 2016-07-13
First Publication Date 2017-02-09
Grant Date 2017-12-26
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Lukacs, Sandor
  • Sirb, Cristian B.
  • Lutas, Andrei V.

Abstract

Described systems and methods enable an efficient analysis of security-relevant events, especially in hardware virtualization platforms. In some embodiments, a notification handler detects the occurrence of an event within a virtual machine, and communicates the respective event to security software. The security software then attempts to match the respective event to a collection of behavioral and exception signatures. An exception comprises a set of conditions which, when satisfied by an tuple, indicates that the respective entity is not malicious. In some embodiments, a part of exception matching is performed synchronously (i.e., while execution of the entity that triggered the respective event is suspended), while another part of exception matching is performed asynchronously (i.e., after the triggering entity is allowed to resume execution).

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/54 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by adding security routines or objects to programs
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 3/06 - Digital input from, or digital output to, record carriers

49.

Systems and methods for tracking malicious behavior across multiple software entities

      
Application Number 14808173
Grant Number 10089465
Status In Force
Filing Date 2015-07-24
First Publication Date 2017-01-26
Grant Date 2018-10-02
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Hajmasan, Gheorghe F.
  • Portase, Radu M.

Abstract

Described systems and methods allow protecting a computer system from malicious software. In some embodiments, a security application divides a set of monitored executable entities (e.g., processes) into a plurality of groups, wherein all members of a group are related by filiation or code injection. The security application may further associate a set of scores with each entity group. Such group scores may be incremented when a member of the respective group performs certain actions. Thus, even though actions performed by individual members may not be malware-indicative per se, the group score may capture collective malicious behavior and trigger malware detection. In some embodiments, group membership rules vary according to whether an entity is part of a selected subset of entities including certain OS processes, browsers and file managers. When an entity is determined to be malicious, anti-malware measures may be taken against a whole group of related entities.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

50.

Systems and methods for detecting return-oriented programming (ROP) exploits

      
Application Number 15289761
Grant Number 10083294
Status In Force
Filing Date 2016-10-10
First Publication Date 2017-01-26
Grant Date 2018-09-25
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor Tosa, Raul V.

Abstract

Described systems and methods allow protecting a computer system from malware, such as return-oriented programming (ROP) exploits. In some embodiments, a set of references are identified within a call stack used by a thread of a target process, each reference pointing into the memory space of an executable module loaded by the target process. Each such reference is analyzed to determine whether it points to a ROP gadget, and whether the respective reference was pushed on the stack by a legitimate function call. In some embodiments, a ROP score is indicative of whether the target process is subject to a ROP attack, the score determined according to a count of references to a loaded module, according to a stack footprint of the respective module, and further according to a count of ROP gadgets identified within the respective module.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/52 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

51.

Systems and methods for delivering event-filtered introspection notifications

      
Application Number 14665888
Grant Number 09536084
Status In Force
Filing Date 2015-03-23
First Publication Date 2017-01-03
Grant Date 2017-01-03
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Lukacs, Sandor
  • Lutas, Andrei V.

Abstract

Described systems and methods enable a computer security module to protect a set of guest virtual machines against computer security threats. In some embodiments, the computer security module receives introspection notifications from the protected VM, each such notification indicating that a particular trigger event (e.g., a system call) has occurred during execution of guest software within the respective VM. In some embodiments, delivering a notification comprises suspending execution of guest software and switching the processor to executing a notification handler forming part of the computer security module. In some embodiments, the computer security module may indicate to the processor a selected subset of events which trigger introspection notifications.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

52.

Systems and methods for delivering introspection notifications from a virtual machine

      
Application Number 14665856
Grant Number 09531735
Status In Force
Filing Date 2015-03-23
First Publication Date 2016-12-27
Grant Date 2016-12-27
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Lukacs, Sandor
  • Lutas, Andrei V.

Abstract

Described systems and methods enable a computer security module to protect a set of guest virtual machines against computer security threats. In some embodiments, the computer security module receives introspection notifications from the protected VM, each such notification indicating that a particular trigger event (e.g., a system call) has occurred during execution of guest software within the respective VM. In some embodiments, delivering a notification comprises suspending execution of guest software and switching the processor to executing a notification handler forming part of the computer security module. Some embodiments of the present invention introduce a dedicated instruction for delivering introspection notifications. The instruction may be encoded such that it is interpreted as a no-operation instruction (NOP) by legacy processors and/or by processors that do not support hardware virtualization or do not currently execute in hardware virtualization mode.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

53.

Systems and methods for batch processing of samples using a bare-metal computer security appliance

      
Application Number 14661464
Grant Number 09507939
Status In Force
Filing Date 2015-03-18
First Publication Date 2016-11-29
Grant Date 2016-11-29
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Lukacs, Sandor
  • Colesa, Adrian V.

Abstract

Described systems and methods allow conducting computer security operations, such as detecting malware and spyware, in a bare-metal computer system. In some embodiments, a first processor of a computer system executes the code samples under assessment, whereas a second, distinct processor is used to carry out the assessment and to control various hardware components involved in the assessment. The described computer systems may be used in conjunction with a conventional anti-malware filter to increase throughput and/or the efficacy of malware scanning.

IPC Classes  ?

  • G06F 12/14 - Protection against unauthorised use of memory
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

54.

Behavioral malware detection using an interpreter virtual machine

      
Application Number 14738548
Grant Number 09460284
Status In Force
Filing Date 2015-06-12
First Publication Date 2016-10-04
Grant Date 2016-10-04
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Hajmasan, Gheorghe F.
  • Lukacs, Sandor
  • Fulop, Botond

Abstract

Described systems and methods allow protecting a computer system from computer security threats such as malware and spyware. In some embodiments, a security application executes a set of detection routines to determine whether a set of monitored entities (processes, threads, etc.) executing on the computer system comprise malicious software. The detection routines are formulated in bytecode and executed within a bytecode translation virtual machine. Execution of a detection routine comprises translating bytecode instructions of the respective routine into native processor instructions, for instance via interpretation or just-in-time compilation. Execution of the respective routines is triggered selectively, due to the occurrence of specific events within the protected client system. Detection routines may output a set of scores, which may be further used by the security application to determine whether a monitored entity is malicious.

IPC Classes  ?

  • G06F 11/00 - Error detection; Error correction; Monitoring
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

55.

Information security appliance

      
Application Number 29494707
Grant Number D0764460
Status In Force
Filing Date 2014-06-24
First Publication Date 2016-08-23
Grant Date 2016-08-23
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Veja, Alexandru V.
  • Barbu, Andrei
  • Berte, Dan R.
  • Dumitru, Bogdan C.

56.

Anti-rootkit systems and methods

      
Application Number 13846747
Grant Number 09424427
Status In Force
Filing Date 2013-03-18
First Publication Date 2016-08-23
Grant Date 2016-08-23
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Chiriac, Mihai
  • Stoenescu, Teodor

Abstract

According to one aspect, a dynamic binary instrumentation (DBI) framework is used to identify rootkits and disable their malicious functionality. A user-mode or kernel-mode anti-rootkit (ARK) engine monitors the execution of a program running on a host machine in user more or kernel mode. Upon encountering calls to certain functions that may be used by rootkits to subvert system functionality (e.g. system calls used to manage the system registry, storage/disk, processes/threads, and/or network communications), the anti-rootkit engine executes translated versions of the functions in an isolated environment and continues execution of the program under analysis using the results of the translated code execution. The translated code execution replaces the execution of original code which may or may not have been subverted by a rootkit. Isolating the stack and registers of the isolated environment impedes detection of the monitoring process by rootkits.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

57.

Network appliance for protecting network endpoints against computer security threats

      
Application Number 14966344
Grant Number 10045217
Status In Force
Filing Date 2015-12-11
First Publication Date 2016-08-11
Grant Date 2018-08-07
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Stan, Cosmin C.
  • Rusu, Andrei
  • Cebere, Bogdan C.
  • Achim, Alexandru I.

Abstract

In some embodiments, a network regulator device protects a local network of client systems (e.g. Internet-of-things devices such as smartphones, home appliances, wearables, etc.) against computer security threats. When introduced to the local network, some embodiments of network regulator automatically take over network services from an existing router, and install the network regulator as gateway to the local network. In response to taking over the network services, some embodiments redirect a request by a protected client system to access a remote resource to a security server configured to determine whether granting access to the resource constitutes a computer security threat to the client system.

IPC Classes  ?

  • H04W 12/08 - Access security
  • H04W 76/12 - Setup of transport tunnels
  • H04W 76/32 - Release of transport tunnels
  • H04L 9/06 - Arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
  • H04L 12/46 - Interconnection of networks
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04L 12/24 - Arrangements for maintenance or administration
  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • G06F 9/54 - Interprogram communication
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04W 4/70 - Services for machine-to-machine communication [M2M] or machine type communication [MTC]
  • H04L 29/12 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups characterised by the data terminal
  • H04W 88/12 - Access point controller devices
  • H04W 88/16 - Gateway arrangements
  • H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]

58.

Systems and methods for automatic device detection, device management, and remote assistance

      
Application Number 14966401
Grant Number 09936388
Status In Force
Filing Date 2015-12-11
First Publication Date 2016-08-11
Grant Date 2018-04-03
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Stan, Cosmin C.
  • Rusu, Andrei
  • Cebere, Bogdan C.
  • Achim, Alexandru I.

Abstract

In some embodiments, a network regulator device protects a local network of client systems (e.g. Internet-of-things devices such as smartphones, home appliances, wearables, etc.) against computer security threats. When introduced to the local network, some embodiments of network regulator take over some network services from a router, and automatically install the network regulator as gateway to the local network. The network regulator then carries out an automatic device discovery procedure and distribute device-specific utility agents to the protected client systems. An exemplary utility agent detects when its host device has left the local network, and in response, sets up a virtual private network (VPN) tunnel with a security server to maintain protection of the respective device.

IPC Classes  ?

  • H04H 20/71 - Wireless systems
  • H04W 12/08 - Access security
  • H04L 12/24 - Arrangements for maintenance or administration
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 9/54 - Interprogram communication
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 12/46 - Interconnection of networks
  • H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
  • H04L 29/12 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups characterised by the data terminal
  • H04W 88/12 - Access point controller devices
  • H04W 88/16 - Gateway arrangements

59.

Privacy protection for mobile devices

      
Application Number 15074495
Grant Number 09830459
Status In Force
Filing Date 2016-03-18
First Publication Date 2016-07-14
Grant Date 2017-11-28
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Valceanu, Vlad
  • Burceanu, Elena
  • Gavrilut, Dragos T.
  • Axinte, Tiberius
  • Bordianu, Vlad
  • Benchea, Razvan M.

Abstract

Described systems and methods allow a mobile device, such as a smartphone or a tablet computer, to protect a user of the respective device from fraud and/or loss of privacy. In some embodiments, the mobile device receives from a server a risk indicator indicative of whether executing a target application causes a privacy risk. Determining the risk indicator includes automatically supplying a test input to a data field used by the target application, the data field configured to hold a private item such as a password or a geolocation indicator. Determining the risk indicator further comprises determining whether a test device executing an instance of the target application transmits an indicator of the test input, such as the test input itself or a hash of the test input, to another party on the network.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • H04W 12/10 - Integrity
  • H04W 12/02 - Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
  • G06F 21/51 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
  • H04W 12/12 - Detection or prevention of fraud

60.

Bare-metal computer security appliance

      
Application Number 14661423
Grant Number 09383934
Status In Force
Filing Date 2015-03-18
First Publication Date 2016-07-05
Grant Date 2016-07-05
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Lukacs, Sandor
  • Colesa, Adrian V.

Abstract

Described systems and methods allow conducting computer security operations, such as detecting malware and spyware, in a bare-metal computer system. In some embodiments, a first processor of a computer system executes the code samples under assessment, whereas a second, distinct processor is used to carry out the assessment and to control various hardware components involved in the assessment. Such hardware components include, among others, a memory shadower configured to detect changes to a memory connected to the first processor, and a storage shadower configured to detect an attempt to write to a non-volatile storage device of the computer system.

IPC Classes  ?

  • G06F 12/14 - Protection against unauthorised use of memory
  • G06F 3/06 - Digital input from, or digital output to, record carriers

61.

User interface for security protection and remote management of network endpoints

      
Application Number 14966315
Grant Number 10375572
Status In Force
Filing Date 2015-12-11
First Publication Date 2016-06-16
Grant Date 2019-08-06
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Achim, Alexandru I.
  • Padina, Mirela L.
  • Miron, Monica M.
  • Cebere, Bogdan C.
  • Stan, Cosmin C.
  • Albisteanu, Catalina
  • Berte, Dan
  • Dumitrache, Bogdan
  • Mircescu, Daniel A.
  • Novac, Alex

Abstract

In some embodiments, a network regulator device protects a local network of client systems (e.g. Internet-of-things devices such as smartphones, home appliances, wearables, etc.) against computer security threats. Various aspects of the operation of the network regulator may be managed remotely via a graphical user interface (GUI) executing on an administration device, such as a mobile phone. The GUI is further configured to display a security notification to a user of the administration device, the security notification indicating the occurrence of a security event caused by an action of a protected client system.

IPC Classes  ?

  • H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
  • H04W 12/08 - Access security
  • H04L 12/24 - Arrangements for maintenance or administration
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 9/54 - Interprogram communication
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 12/46 - Interconnection of networks
  • H04W 76/32 - Release of transport tunnels
  • H04W 76/12 - Setup of transport tunnels
  • H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
  • H04L 29/12 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups characterised by the data terminal
  • H04W 88/12 - Access point controller devices
  • H04W 88/16 - Gateway arrangements
  • H04W 4/70 - Services for machine-to-machine communication [M2M] or machine type communication [MTC]

62.

Privacy protection for mobile devices

      
Application Number 13837166
Grant Number 09292694
Status In Force
Filing Date 2013-03-15
First Publication Date 2016-03-22
Grant Date 2016-03-22
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Valceanu, Vlad
  • Burceanu, Elena
  • Gavrilut, Dragos T.
  • Axinte, Tiberius
  • Bordianu, Vlad
  • Benchea, Razvan M

Abstract

Described systems and methods allow a mobile device, such as a smartphone or a tablet computer, to protect a user of the respective device from fraud and/or loss of privacy. In some embodiments, the mobile device receives from a server a risk indicator indicative of whether executing a target application causes a privacy risk. Determining the risk indicator includes automatically supplying a test input to a data field used by the target application, the data field configured to hold a private item such as a password or a geolocation indicator. Determining the risk indicator further comprises determining whether a test device executing an instance of the target application transmits an indicator of the test input, such as the test input itself or a hash of the test input, to another party on the network.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • H04W 12/10 - Integrity
  • H04W 12/12 - Detection or prevention of fraud

63.

Systems and methods for exposing a result of a current processor instruction upon exiting a virtual machine

      
Application Number 14489820
Grant Number 09672354
Status In Force
Filing Date 2014-09-18
First Publication Date 2016-02-18
Grant Date 2017-06-06
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Lutas, Andrei V.
  • Lukacs, Sandor

Abstract

Described systems and methods enable a host system to efficiently perform computer security activities, when operating in a hardware virtualization configuration. A processor is configured to generate a VM suspend event (e.g., a VM exit or a virtualization exception) when a guest instruction executing within a guest VM performs a memory access violation. In some embodiments, the processor is further configured to delay generating the VM suspend event until the execution stage of the pipeline for the guest instruction is complete, and to save results of the execution stage to a specific location (e.g. a specific processor register readable by security software) before generating the event.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 12/08 - Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems
  • G06F 12/1027 - Address translation using associative or pseudo-associative address translation means, e.g. translation look-aside buffer [TLB]
  • G06F 12/109 - Address translation for multiple virtual address spaces, e.g. segmentation
  • G06F 12/14 - Protection against unauthorised use of memory

64.

Systems and methods for spam detection using frequency spectra of character strings

      
Application Number 14846895
Grant Number 10212114
Status In Force
Filing Date 2015-09-07
First Publication Date 2015-12-31
Grant Date 2019-02-19
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Dichiu, Daniel
  • Lupsescu, Lucian Z

Abstract

Described spam detection techniques including string identification, pre-filtering, and frequency spectrum and timestamp comparison steps facilitate accurate, computationally-efficient detection of rapidly-changing spam arriving in short-lasting waves. In some embodiments, a computer system extracts a target character string from an electronic communication such as a blog comment, transmits it to an anti-spam server, and receives an indicator of whether the respective electronic communication is spam or non-spam from the anti-spam server. The anti-spam server determines whether the electronic communication is spam or non-spam according to features of the frequency spectrum of the target string. Some embodiments also perform an unsupervised clustering of incoming target strings into clusters, wherein all members of a cluster have similar spectra.

IPC Classes  ?

  • G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
  • H04L 12/58 - Message switching systems
  • G06F 17/30 - Information retrieval; Database structures therefor

65.

Systems and methods for dynamically protecting a stack from below the operating system

      
Application Number 14312712
Grant Number 09703726
Status In Force
Filing Date 2014-06-24
First Publication Date 2015-12-24
Grant Date 2017-07-11
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor Lutas, Andrei V.

Abstract

Described systems and methods allow protecting a host system against malware, using hardware virtualization technology. A memory introspection engine executes at the level of a hypervisor, protecting a virtual machine (VM) from exploits targeting the call stack of a thread executing within the respective VM. The introspection engine identifies a virtual memory page reserved for the stack, but not committed to the stack, and intercepts an attempt to write to the respective page. In response to intercepting the write attempt, the memory introspection engine marks the respective page as non-executable, thus protecting the stack against exploits.

IPC Classes  ?

  • G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures
  • G06F 12/14 - Protection against unauthorised use of memory
  • G06F 12/1009 - Address translation using page tables, e.g. page table structures
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

66.

Network device

      
Application Number 29502455
Grant Number D0744483
Status In Force
Filing Date 2014-09-16
First Publication Date 2015-12-01
Grant Date 2015-12-01
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Barbu, Andrei
  • Berte, Dan R.
  • Dumitru, Bogdan C.
  • Veja, Alexandru V.

67.

Hardware-enabled prevention of code reuse attacks

      
Application Number 14283351
Grant Number 09305167
Status In Force
Filing Date 2014-05-21
First Publication Date 2015-11-26
Grant Date 2016-04-05
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Lutas, Andrei V.
  • Lukacs, Sandor

Abstract

Described systems and methods allow protecting a host computer system from malware, such as return-oriented programming (ROP) and jump-oriented programming (JOP) exploits. In some embodiments, a processor of the host system is endowed with two counters configured to store a count of branch instructions and a count of inter-branch instructions, respectively, occurring within a stream of instructions fetched by the processor for execution. Exemplary counted branch instructions include indirect JMP, indirect CALL, and RET on x86 platforms, while inter-branch instructions consist of instructions executed between two consecutive counted branch instructions. The processor may be further configured to generate a processor event, such as an exception, when a value stored in a counter exceeds a predetermined threshold. Such events may be used as triggers for launching a malware analysis to determine whether the host system is subject to a code reuse attack.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 9/30 - Arrangements for executing machine instructions, e.g. instruction decode
  • G06F 9/54 - Interprogram communication

68.

Fuzzy whitelisting anti-malware systems and methods

      
Application Number 14807076
Grant Number 09479520
Status In Force
Filing Date 2015-07-23
First Publication Date 2015-11-12
Grant Date 2016-10-25
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Topan, Vlad I.
  • Dudea, Sorin V.
  • Canja, Viorel D.

Abstract

In some embodiments, an anti-malware system accounts for benign differences between non-malicious data objects, such as differences introduced by compilers and other polymorphisms. A target object is separated into a multitude of code blocks, and a hash is calculated for each code block. The obtained set of target hashes is then compared against a database of hashes corresponding to code blocks extracted from whitelisted objects. A target object may be labeled as whitelisted (trusted, non-malicious) if it has a substantial number of hashes in common with a whitelisted object. Objects which are slightly different from known whitelisted objects may still receive whitelisting status. By allowing a certain degree of mismatch between the sets of hashes of distinct objects, some embodiments of the present invention increase the efficiency of whitelisting without an unacceptable decrease in safety.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

69.

Below-OS security solution for distributed network endpoints

      
Application Number 14221158
Grant Number 09319380
Status In Force
Filing Date 2014-03-20
First Publication Date 2015-09-24
Grant Date 2016-04-19
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Lukacs, Sandor
  • Colesa, Adrian V.

Abstract

Described systems and methods allow protecting a client system, such as a computer system or smartphone, from malware. In some embodiments, a network regulator device is used to distribute a bootable image of a hypervisor, on demand, to each of a set of client systems connected to a network. After booting on a client system, the hypervisor loads the local OS and applications into a virtual machine. Integrity measurements of the hypervisor and/or OS are sent to the network regulator for verification. When the network regulator determines that software executing on a client system, such as the hypervisor and/or the OS, are not in a trusted state, the network regulator may block access of the respective client system to the network.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 9/44 - Arrangements for executing specific programs
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

70.

Systems and methods for executing arbitrary applications in secure environments

      
Application Number 14195132
Grant Number 09202046
Status In Force
Filing Date 2014-03-03
First Publication Date 2015-09-03
Grant Date 2015-12-01
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Dumitru, Bogdan C.
  • Lukacs, Sandor
  • Lutas, Dan H.
  • Tosa, Raul V.

Abstract

Described systems and methods allow protecting a host system, such as a computer system or smartphone, from malware such as viruses, exploits, and rootkits. In some embodiments, a hypervisor executes at the highest processor privilege level and displaces other software to a guest virtual machine (VM). A security application detects the launch of a target process within the guest VM. In response to the launch, the hypervisor instantiates a process VM isolated from the guest VM, and relocates the target process to the process VM. In some embodiments, when the relocated target process attempts to access a resource, such as a file or registry key, an instance of the respective resource is fetched on-demand, from the guest VM to the respective process VM. Executing the target process within an isolated environment helps to contain malware to the respective environment.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine

71.

Computer security systems and methods using virtualization exceptions

      
Application Number 14533670
Grant Number 09400885
Status In Force
Filing Date 2014-11-05
First Publication Date 2015-07-16
Grant Date 2016-07-26
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Tosa, Raul V.
  • Lutas, Dan H.
  • Ticle, Daniel I.
  • Lukacs, Sandor

Abstract

Described systems and methods enable a host system to efficiently perform computer security activities, when operating in a hardware virtualization configuration. A hypervisor exposes a virtual machine on the host system. In some embodiments, the hypervisor further configures a processor of the host system to generate a virtualization exception in response to detecting a memory access violation, and to deliver such exceptions to a computer security program operating within the virtual machine. The hypervisor may further set access permissions to a section of memory containing a part of a function targeted for hooking, so that an attempt to execute the respective target function triggers a virtualization exception. Some embodiments thus achieve hooking of the target function without resorting to conventional methods, such as patching, inline hooking, and MSR hooking.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/74 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode

72.

Strongly isolated malware scanning using secure virtual containers

      
Application Number 14135902
Grant Number 09117081
Status In Force
Filing Date 2013-12-20
First Publication Date 2015-06-25
Grant Date 2015-08-25
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Lukacs, Sandor
  • Sirb, Cristian B.
  • Lutas, Dan H.
  • Colesa, Adrian V.

Abstract

Described systems and methods allow protecting a host system, such as a computer or smartphone, from malware. In some embodiments, an anti-malware application installs a hypervisor, which displaces an operating system executing on the host system to a guest virtual machine (VM). The hypervisor further creates a set of virtual containers (VC), by setting up a memory domain for each VC, isolated from the memory domain of the guest VM. The hypervisor then maps a memory image of a malware scanner to each VC. When a target object is selected for scanning, the anti-malware application launches the malware scanner. Upon intercepting the launch, the hypervisor switches the memory context of the malware scanner to the memory domain of a selected VC, for the duration of the scan. Thus, malware scanning is performed within an isolated environment.

IPC Classes  ?

  • G06F 9/45 - Compilation or interpretation of high level programme languages
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 9/46 - Multiprogramming arrangements

73.

Enabling a secure environment through operating system switching

      
Application Number 14082478
Grant Number 09563457
Status In Force
Filing Date 2013-11-18
First Publication Date 2015-05-21
Grant Date 2017-02-07
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Lukacs, Sandor
  • Ciocas, Radu I.
  • Topan, Vlad I.
  • Colesa, Adrian V.
  • Tosa, Raul V.

Abstract

Described systems and methods allow a host system, such as a computer or a smartphone, to enable a secure environment, which can be used to carry out secure communications with a remote service provider, for applications such as online banking, e-commerce, private messaging, and online gaming, among others. A hypervisor oversees a switch between an insecure environment and the secure environment, in response to a user input, or in response to an event such as receiving a telephone call. Switching from the insecure to the secure environment comprises transitioning the insecure environment to a sleeping state and loading the secure environment from a memory image (snapshot) saved to disk, after checking the integrity of the snapshot. Switching from the secure to the insecure environment comprises transitioning the secure environment into a sleeping state and waking up the insecure environment.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 9/48 - Program initiating; Program switching, e.g. by interrupt

74.

Systems and methods for detecting return-oriented programming (ROP) exploits

      
Application Number 14073368
Grant Number 09465936
Status In Force
Filing Date 2013-11-06
First Publication Date 2015-05-07
Grant Date 2016-10-11
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor Tosa, Raul V.

Abstract

Described systems and methods allow protecting a computer system from malware, such as return-oriented programming (ROP) exploits. In some embodiments, a set of references are identified within a call stack used by a thread of a target process, each reference pointing into the memory space of an executable module loaded by the target process. Each such reference is analyzed to determine whether it points to a ROP gadget, and whether the respective reference was pushed on the stack by a legitimate function call. In some embodiments, a ROP score is indicative of whether the target process is subject to a ROP attack, the score determined according to a count of references to a loaded module, according to a stack footprint of the respective module, and further according to a count of ROP gadgets identified within the respective module.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/52 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure

75.

Complex scoring for malware detection

      
Application Number 14046728
Grant Number 09323931
Status In Force
Filing Date 2013-10-04
First Publication Date 2015-04-09
Grant Date 2016-04-26
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Lukacs, Sandor
  • Tosa, Raul V.
  • Boca, Paul
  • Hajmasan, Gheorghe
  • Lutas, Andrei V.

Abstract

Described systems and methods allow protecting a computer system from malware such as viruses, Trojans, and spyware. For each of a plurality of executable entities (such as processes and threads executing on the computer system), a scoring engine records a plurality of evaluation scores, each score determined according to a distinct evaluation criterion. Every time an entity satisfies an evaluation criterion (e.g, performs an action), the respective score of the entity is updated. Updating a score of an entity may trigger score updates of entities related to the respective entity, even when the related entities are terminated, i.e., no longer active. Related entities include, among others, a parent of the respective entity, and/or an entity injecting code into the respective entity. The scoring engine determines whether an entity is malicious according to the plurality of evaluation scores of the respective entity.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

76.

Systems and methods for using a reputation indicator to facilitate malware scanning

      
Application Number 14040430
Grant Number 09117077
Status In Force
Filing Date 2013-09-27
First Publication Date 2015-04-02
Grant Date 2015-08-25
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor Mircescu, Daniel Alexandru

Abstract

Described systems and methods allow protecting a computer system from malware, such as viruses, Trojans, and spyware. A reputation manager executes in conjunction with an anti-malware engine. The reputation manager determines a reputation of a target process executing on the computer system according to a reputation of a set of executable modules, such as shared libraries, loaded by the target process. The anti-malware engine may be configured to employ a process-specific protocol to scan the target process for malware, the protocol selected according to process reputation. Processes trusted to be non-malicious may thus be scanned using a more relaxed protocol than unknown or untrusted processes. The reputation of executable modules may be static; an indicator of module reputation may be stored and/or retrieved by a remote reputation server. Process reputation may be dynamically changeable, i.e. re-computed repeatedly by the reputation manager in response to process life-cycle and/or security events.

IPC Classes  ?

  • G06F 11/30 - Monitoring
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

77.

Document classification using multiscale text fingerprints

      
Application Number 14558079
Grant Number 09203852
Status In Force
Filing Date 2014-12-02
First Publication Date 2015-03-26
Grant Date 2015-12-01
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Toma, Adrian
  • Tibeica, Marius

Abstract

Described systems and methods allow a classification of electronic documents such as email messages and HTML documents, according to a document-specific text fingerprint. The text fingerprint is calculated for a text block of each target document, and comprises a sequence of characters determined according to a plurality of text tokens of the respective text block. In some embodiments, the length of the text fingerprint is forced within a pre-determined range of lengths (e.g. between 129 and 256 characters) irrespective of the length of the text block, by zooming in for short text blocks, and zooming out for long ones. Classification may include, for instance, determining whether an electronic document represents unsolicited communication (spam) or online fraud such as phishing.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 12/58 - Message switching systems
  • G06Q 50/26 - Government or public services

78.

Page fault injection in virtual machines

      
Application Number 14289163
Grant Number 09507727
Status In Force
Filing Date 2014-05-28
First Publication Date 2015-01-22
Grant Date 2016-11-29
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor Lutas, Andrei V.

Abstract

Described systems and methods allow protecting a host system from malware using virtualization technology. In some embodiments, a memory introspection engine operates below a virtual machine (VM) executing on the host system. The engine is configured to analyze the content of a virtual memory page used by software executing within the VM, and/or to protect the respective content from unauthorized modification, for instance by malware. When the respective content is swapped out of memory, the memory introspection engine injects a page fault into the respective VM, to force a swap-in of the respective content.

IPC Classes  ?

  • G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures
  • G06F 12/10 - Address translation
  • G06F 21/54 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by adding security routines or objects to programs
  • G06F 21/79 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 12/08 - Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems

79.

Process evaluation for malware detection in virtual machines

      
Application Number 13936058
Grant Number 09117080
Status In Force
Filing Date 2013-07-05
First Publication Date 2015-01-08
Grant Date 2015-08-25
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Lukacs, Sandor
  • Tosa, Raul V.
  • Boca, Paul
  • Hajmasan, Gheorghe
  • Lutas, Andrei V.

Abstract

Described systems and methods allow protecting a computer system from malware, such as viruses and rootkits. An anti-malware component executes within a virtual machine (VM) exposed by a hypervisor executing on the computer system. A memory introspection engine executes outside the virtual machine, at the processor privilege level of the hypervisor, and protects a process executing within the virtual machine by write-protecting a memory page of the respective process. By combining anti-malware components executing inside and outside the respective VM, some embodiments of the present invention may use the abundance of behavioral data that inside-VM components have access to, while protecting the integrity of such components from outside the respective VM.

IPC Classes  ?

  • G06F 12/14 - Protection against unauthorised use of memory
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

80.

Communications adapter

      
Application Number 29485391
Grant Number D0718716
Status In Force
Filing Date 2014-03-18
First Publication Date 2014-12-02
Grant Date 2014-12-02
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Barbu, Andrei
  • Berte, Dan R.
  • Dumitru, Bogdan C.
  • Veja, Alexandru V.

81.

Document classification using multiscale text fingerprints

      
Application Number 13790636
Grant Number 08935783
Status In Force
Filing Date 2013-03-08
First Publication Date 2014-09-11
Grant Date 2015-01-13
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Toma, Adrian
  • Tibeica, Marius N

Abstract

Described systems and methods allow a classification of electronic documents such as email messages and HTML documents, according to a document-specific text fingerprint. The text fingerprint is calculated for a text block of each target document, and comprises a sequence of characters determined according to a plurality of text tokens of the respective text block. In some embodiments, the length of the text fingerprint is forced within a pre-determined range of lengths (e.g. between 129 and 256 characters) irrespective of the length of the text block, by zooming in for short text blocks, and zooming out for long ones. Classification may include, for instance, determining whether an electronic document represents unsolicited communication (spam) or online fraud such as phishing.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • H04L 12/58 - Message switching systems

82.

Memory introspection engine for integrity protection of virtual machines

      
Application Number 13774720
Grant Number 08875295
Status In Force
Filing Date 2013-02-22
First Publication Date 2014-08-28
Grant Date 2014-10-28
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Lutas, Andrei V.
  • Lukacs, Sandor
  • Lutas, Dan H.

Abstract

Described systems and methods allow protecting a computer system from malware, such as viruses and rootkits. In some embodiments, a hypervisor configures a hardware virtualization platform hosting a set of operating systems (OS). A memory introspection engine executing at the processor privilege level of the hypervisor dynamically identifies each OS, and uses an protection priming module to change the way memory is allocated to a target software object by the memory allocation function native to the respective OS. In some embodiments, the change affects only target objects requiring malware protection, and comprises enforcing that memory pages containing data of the target object are reserved exclusively for the respective object. The memory introspection engine then write-protects the respective memory pages.

IPC Classes  ?

  • G06F 11/00 - Error detection; Error correction; Monitoring
  • G06F 12/14 - Protection against unauthorised use of memory
  • G06F 12/16 - Protection against loss of memory contents
  • G08B 23/00 - Alarms responsive to unspecified undesired or abnormal conditions
  • G06F 11/30 - Monitoring
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 12/10 - Address translation
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules

83.

Collaborative malware scanning

      
Application Number 12356677
Grant Number 08813222
Status In Force
Filing Date 2009-01-21
First Publication Date 2014-08-19
Grant Date 2014-08-19
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Codreanu, Dumitru
  • Neagu, Mihai
  • Chiriac, Mihai

Abstract

In some embodiments, a malware detecting system is configured to conduct an iterative, collaborative scan of a target object (computer file or process), comprising a server-side scan and a client-side scan, and to assess the malware status of the target object according to the results of the client-side and server-side scans. The client-side scan comprises computationally-intensive operations such as virtual-environment emulation, decryption and data compression methods, while the server-side scan comprises database-intensive operations such as hash lookups. The information exchanged between client and server systems may be limited to relatively-compact data, such as hashes, which may amount to a few bytes per target object. Exemplary methods and systems described herein allow storing malware signature databases on the server side, thus reducing the burden of frequently delivering data-heavy signature updates to large numbers of customers, without requiring the server side to perform computationally-intensive scanning tasks for large numbers of customers.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

84.

Secure communication using a trusted virtual machine

      
Application Number 14157807
Grant Number 09575790
Status In Force
Filing Date 2014-01-17
First Publication Date 2014-05-15
Grant Date 2017-02-21
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Tosa, Raul V.
  • Lukacs, Sandor
  • Lutas, Dan H.

Abstract

A client system, such as a computer or a smartphone, securely exchanges sensitive information with a remote service provider computer system such as a bank or an online retailer. The client system executes a commercially available operating system in an untrusted virtual machine (VM), which may be affected by malware. A hypervisor is configured to launch a trusted, malware-free VM from an authenticated image stored on computer-readable media used by the untrusted VM. The trusted VM executes a thin operating system with minimal functionality, to manage a secure communication channel with the remote server system, wherein sensitive communication is encrypted. Data from the trusted VM is forwarded via the hypervisor to a network interface driver of the untrusted VM for transmission to the remote service provider. The service provider may perform a remote attestation of the client system to determine whether it operates a trusted VM.

IPC Classes  ?

  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/60 - Protecting data
  • H04L 5/22 - Arrangements affording multiple use of the transmission path using time-division multiplexing

85.

Hypervisor-based enterprise endpoint protection

      
Application Number 13676008
Grant Number 08910238
Status In Force
Filing Date 2012-11-13
First Publication Date 2014-05-15
Grant Date 2014-12-09
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Lukacs, Sandor
  • Lutas, Dan H.
  • Tosa, Raul V.

Abstract

Described systems and methods allow the detection and prevention of malware and/or malicious activity within a network comprising multiple client computer systems, such as an enterprise network with multiple endpoints. Each endpoint operates a hardware virtualization platform, including a hypervisor exposing a client virtual machine (VM) and a security VM. The security VM is configured to have exclusive use of the network adapter(s) of the respective endpoint, and to detect whether data traffic to/from the client VM comprises malware or is indicative of malicious behavior. Upon detecting malware/malicious behavior, the security VM may block access of the client VM to the network, thus preventing the spread of malware to other endpoints. The client system may further comprise a memory introspection engine configured to perform malware scanning of the client VM from the level of the hypervisor.

IPC Classes  ?

  • G06F 17/00 - Digital computing or data processing equipment or methods, specially adapted for specific functions

86.

Systems and methods for electronic fraud prevention

      
Application Number 11967563
Grant Number 08695100
Status In Force
Filing Date 2007-12-31
First Publication Date 2014-04-08
Grant Date 2014-04-08
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor Cosoi, Catalin A.

Abstract

In some embodiments, a phishing detection method includes computing a first phishing indicator of a target webpage; when the target webpage is considered suspicious of phishing according to the first phishing indicator, computing a second phishing indicator of the target webpage, and deciding whether the webpage is a phishing site according to the first and second phishing indicators. Computing the second phishing indicator comprises comparing a word content (semantic content) of the target webpage to a word content of each of a plurality of reference webpages. Comparing the word contents may include counting the number of visible words which are common to the target and reference webpages, and/or computing a ratio of a number of words which are common to the target and reference webpages to the total number of words in both the target and reference webpages.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

87.

Fuzzy whitelisting anti-malware systems and methods

      
Application Number 14076466
Grant Number 09118703
Status In Force
Filing Date 2013-11-11
First Publication Date 2014-03-06
Grant Date 2015-08-25
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Topan, Vlad I.
  • Dudea, Sorin V.
  • Canja, Viorel D.

Abstract

In some embodiments, an anti-malware system accounts for benign differences between non-malicious data objects, such as differences introduced by compilers and other polymorphisms. A target object is separated into a multitude of code blocks, and a hash is calculated for each code block. The obtained set of target hashes is then compared against a database of hashes corresponding to code blocks extracted from whitelisted objects. A target object may be labeled as whitelisted (trusted, non-malicious) if it has a substantial number of hashes in common with a whitelisted object. Objects which are slightly different from known whitelisted objects may still receive whitelisting status. By allowing a certain degree of mismatch between the sets of hashes of distinct objects, some embodiments of the present invention increase the efficiency of whitelisting without an unacceptable decrease in safety.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

88.

Secure communication using a trusted virtual machine

      
Application Number 13590119
Grant Number 08656482
Status In Force
Filing Date 2012-08-20
First Publication Date 2014-02-18
Grant Date 2014-02-18
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Tosa, Raul V.
  • Lukacs, Sandor
  • Lutas, Dan H.

Abstract

A client system, such as a computer or a smartphone, securely exchanges sensitive information with a remote service provider computer system such as a bank or an online retailer. The client system executes a commercially available operating system in an untrusted virtual machine (VM), which may be affected by malware. A hypervisor is configured to launch a trusted, malware-free VM from an authenticated image stored on computer-readable media used by the untrusted VM. The trusted VM executes a thin operating system with minimal functionality, to manage a secure communication channel with the remote server system, wherein sensitive communication is encrypted. Data from the trusted VM is forwarded via the hypervisor to a network interface driver of the untrusted VM for transmission to the remote service provider. The service provider may perform a remote attestation of the client system to determine whether it operates a trusted VM.

IPC Classes  ?

  • H04L 12/22 - Arrangements for preventing the taking of data from a data transmission channel without authorisation
  • H04L 12/12 - Arrangements for remote connection or disconnection of substations or of equipment thereof

89.

Security application graphical user interface customization systems and methods

      
Application Number 12857535
Grant Number 08631330
Status In Force
Filing Date 2010-08-16
First Publication Date 2014-01-14
Grant Date 2014-01-14
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Hwang, Vincent
  • Pilon, Dianne
  • Roberts, Michael B.
  • Maierean, Iosefa M. C.

Abstract

In some embodiments, a graphical user interface (GUI) of a computer security application is automatically configured according to a user profile of the user. Upon installation of the computer security application, a desired GUI complexity questionnaire is displayed to the user. The application then matches the user to a user profile out of a set of predefined user profiles, according to the user's answers to the questionnaire. User profiles reflect a user's desired complexity of display and control (e.g. Novice/Intermediate/Expert, Basic/Intermediate/Advanced). The information displayed and application controls provided by the GUI window vary in detail according to the user profile. Selecting a user profile propagates multiple individually-user-configurable display and control settings of the GUI, as well as under-the-hood (non-GUI) settings of the anti-malware application.

IPC Classes  ?

  • G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range

90.

Systems and methods for dynamically integrating heterogeneous anti-spam filters

      
Application Number 11867547
Grant Number 08572184
Status In Force
Filing Date 2007-10-04
First Publication Date 2013-10-29
Grant Date 2013-10-29
Owner BITDEFENDER IPR Management Ltd. (Cyprus)
Inventor Cosoi, Catalin A.

Abstract

In some embodiments, a spam filtering method includes computing the relevance of each of a plurality of anti-spam filters according to a relevance parameter set, and deciding whether an electronic message is spam or non-spam according to the relevancies and individual classification scores generated by the anti-spam filters. The relevance of an anti-spam filter indicates the degree to which a classification score produced by that particular filter determines the final classification of a given message. The relevance parameter set of each anti-spam filter may include, among others, a training maturity indicative of the degree of training of the filter, a filter update age indicative of the time elapsed since the latest update of the filter, a false-positive classification indicator, and a false-negative classification indicator of the anti-spam filter.

IPC Classes  ?

  • G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
  • G06F 15/173 - Interprocessor communication using an interconnection network, e.g. matrix, shuffle, pyramid, star or snowflake

91.

Systems and methods for spam detection using frequency spectra of character strings

      
Application Number 13358338
Grant Number 09130778
Status In Force
Filing Date 2012-01-25
First Publication Date 2013-07-25
Grant Date 2015-09-08
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Dichiu, Daniel
  • Lupsescu, Lucian Z

Abstract

Described spam detection techniques including string identification, pre-filtering, and frequency spectrum and timestamp comparison steps facilitate accurate, computationally-efficient detection of rapidly-changing spam arriving in short-lasting waves. In some embodiments, a computer system extracts a target character string from an electronic communication such as a blog comment, transmits it to an anti-spam server, and receives an indicator of whether the respective electronic communication is spam or non-spam from the anti-spam server. The anti-spam server determines whether the electronic communication is spam or non-spam according to features of the frequency spectrum of the target string. Some embodiments also perform an unsupervised clustering of incoming target strings into clusters, wherein all members of a cluster have similar spectra.

IPC Classes  ?

  • G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
  • H04L 12/58 - Message switching systems

92.

Systems and methods for spam detection using character histograms

      
Application Number 13358358
Grant Number 08954519
Status In Force
Filing Date 2012-01-25
First Publication Date 2013-07-25
Grant Date 2015-02-10
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Dichiu, Daniel
  • Lupsescu, Lucian Z.

Abstract

Described spam detection techniques including string identification, pre-filtering, and character histogram and timestamp comparison steps facilitate accurate, computationally-efficient detection of rapidly-changing spam arriving in short-lasting waves. In some embodiments, a computer system extracts a target character string from an electronic communication such as a blog comment, transmits it to an anti-spam server, and receives an indicator of whether the respective electronic communication is spam or non-spam from the anti-spam server. The anti-spam server determines whether the electronic communication is spam or non-spam according to certain features of the character histogram of the target string. Some embodiments also perform an unsupervised clustering of incoming target strings into clusters, wherein all members of a cluster have similar character histograms.

IPC Classes  ?

  • G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

93.

Online fraud detection dynamic scoring aggregation systems and methods

      
Application Number 13352275
Grant Number 08813239
Status In Force
Filing Date 2012-01-17
First Publication Date 2013-07-18
Grant Date 2014-08-19
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Tibeica, Marius N
  • Damian, Alin O
  • Visan, Razvan

Abstract

In some embodiments, an online fraud prevention system combines the output of several distinct fraud filters, to produce an aggregate score indicative of the likelihood that a surveyed target document (e.g. webpage, email) is fraudulent. Newly implemented fraud filters can be incorporated and ageing fraud filters can be phased out without the need to recalculate individual scores or to renormalize the aggregate fraud score. Every time the output of an individual filter is calculated, the aggregate score is updated in a manner which ensures the aggregate score remains within predetermined bounds defined by a minimum allowable score and a maximum allowable score (e.g., 0 to 100).

IPC Classes  ?

  • G06F 7/04 - Identity comparison, i.e. for like or unlike values

94.

Fuzzy whitelisting anti-malware systems and methods

      
Application Number 13312686
Grant Number 08584235
Status In Force
Filing Date 2011-12-06
First Publication Date 2013-05-02
Grant Date 2013-11-12
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Topan, Vlad I.
  • Dudea, Sorin V.
  • Canja, Viorel D.

Abstract

In some embodiments, an anti-malware system accounts for benign differences between non-malicious data objects, such as differences introduced by compilers and other polymorphisms. A target object is separated into a multitude of code blocks, and a hash is calculated for each code block. The obtained set of target hashes is then compared against a database of hashes corresponding to code blocks extracted from whitelisted objects. A target object may be labeled as whitelisted (trusted, non-malicious) if it has a substantial number of hashes in common with a whitelisted object. Objects which are slightly different from known whitelisted objects may still receive whitelisting status. By allowing a certain degree of mismatch between the sets of hashes of distinct objects, some embodiments of the present invention increase the efficiency of whitelisting without an unacceptable decrease in safety.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 7/04 - Identity comparison, i.e. for like or unlike values
  • G06F 11/30 - Monitoring
  • H04L 9/28 - Arrangements for secret or secure communications; Network security protocols using particular encryption algorithm

95.

Anti-malware emulation systems and methods

      
Application Number 13437302
Grant Number 08407797
Status In Force
Filing Date 2012-04-02
First Publication Date 2013-03-26
Grant Date 2013-03-26
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor Novitchi, Mihai

Abstract

In some embodiments, antivirus/malware behavior-based scanning (emulation) is accelerated by identifying known code sequences and executing pre-stored native-code routines (e.g. decompression, decryption, checksum routines) implementing the functionality of the known code sequences before returning to the emulation. During emulation, target machine code instructions are compared to a set of known signatures. If a known code sequence is identified, the emulator calls a native code routine and caches the current instruction address. If the emulator subsequently reaches a cached address, a native code routine may be called without scanning the data at the address for known signatures. Signature scanning may be performed selectively for instructions following code flow changes (e.g. after jump, call or interrupt instructions). The emulator may also call native-code routines implementing virtual operating system calls, and native-code unpacked file reconstruction routines that reconstruct unpacked files from the contents of virtual memory for scanning by a content-based malware scanner.

IPC Classes  ?

  • G06F 11/00 - Error detection; Error correction; Monitoring
  • G06F 12/14 - Protection against unauthorised use of memory
  • G06F 12/16 - Protection against loss of memory contents
  • G08B 23/00 - Alarms responsive to unspecified undesired or abnormal conditions
  • G06F 9/45 - Compilation or interpretation of high level programme languages

96.

Image filtering systems and methods

      
Application Number 12830376
Grant Number 08335383
Status In Force
Filing Date 2010-07-05
First Publication Date 2012-12-18
Grant Date 2012-12-18
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor Cosoi, Catalin A

Abstract

In some embodiments, image spam is identified by comparing color histograms of suspected spam images with color histograms of reference (known) images. The histogram comparison includes comparing a first color content in a query image with a range of similar color contents in the reference image. For example, a pixel count for a given color in the query image may be compared to pixel counts for a range of similar colors in the reference image. A histogram distance between two images may be determined according to a computed pixel count difference between the given query histogram color and a selected color in the range of similar reference histogram colors.

IPC Classes  ?

  • G06K 9/62 - Methods or arrangements for recognition using electronic means
  • G06K 9/00 - Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints

97.

Dynamic streaming message clustering for rapid spam-wave detection

      
Application Number 12264387
Grant Number 08170966
Status In Force
Filing Date 2008-11-04
First Publication Date 2012-05-01
Grant Date 2012-05-01
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Musat, Claudiu C.
  • Grigorescu, Ionut
  • Trifan, Alexandru
  • Mitrica, Carmen A

Abstract

In some embodiments, a streaming message classification method dynamically allocates a stream of messages to a variable number of clusters (e.g. message categories), each containing messages which share a set of similar features. Incoming messages are compared to a collection of known spam clusters. New spam types are identified, and new clusters are created automatically and dynamically in order to accommodate the new spam types. Message clustering is performed in a hyperspace of message feature vectors using a modified k-means algorithm. Triangle inequality distance comparisons may be used to accelerate hyperspace distance calculations.

IPC Classes  ?

  • G06E 1/00 - Devices for processing exclusively digital data
  • G06E 3/00 - Devices not provided for in group , e.g. for processing analogue or hybrid data
  • G06F 15/18 - in which a program is changed according to experience gained by the computer itself during a complete run; Learning machines (adaptive control systems G05B 13/00;artificial intelligence G06N)
  • G06G 7/00 - Devices in which the computing operation is performed by varying electric or magnetic quantities

98.

Anti-malware emulation systems and methods

      
Application Number 11486803
Grant Number 08151352
Status In Force
Filing Date 2006-07-14
First Publication Date 2012-04-03
Grant Date 2012-04-03
Owner Bitdefender IPR Managament Ltd. (Cyprus)
Inventor Novitchi, Mihai

Abstract

In some embodiments, antivirus/malware behavior-based scanning (emulation) is accelerated by identifying known code sequences and executing pre-stored native-code routines (e.g. decompression, decryption, checksum routines) implementing the functionality of the known code sequences before returning to the emulation. During emulation, target machine code instructions are compared to a set of known signatures. If a known code sequence is identified, the emulator calls a native code routine and caches the current instruction address. If the emulator subsequently reaches a cached address, a native code routine may be called without scanning the data at the address for known signatures. Signature scanning may be performed selectively for instructions following code flow changes (e.g. after jump, call or interrupt instructions). The emulator may also call native-code routines implementing virtual operating system calls, and native-code unpacked file reconstruction routines that reconstruct unpacked files from the contents of virtual memory for scanning by a content-based malware scanner.

IPC Classes  ?

  • G06F 11/00 - Error detection; Error correction; Monitoring
  • G06F 12/14 - Protection against unauthorised use of memory
  • G06F 12/16 - Protection against loss of memory contents
  • G06F 9/45 - Compilation or interpretation of high level programme languages
  • G08B 23/00 - Alarms responsive to unspecified undesired or abnormal conditions

99.

Spam filtering using feature relevance assignment in neural networks

      
Application Number 12130630
Grant Number 08131655
Status In Force
Filing Date 2008-05-30
First Publication Date 2012-03-06
Grant Date 2012-03-06
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor
  • Cosoi, Alexandru C
  • Vlad, Madalin S
  • Sgarciu, Valentin

Abstract

In some embodiments, a spam filtering method includes computing a pattern relevance for each of a set of message feature patterns, and using a neural network filter to classify incoming messages as spam or ham according to the pattern relevancies. Each message feature pattern is characterized by the simultaneous presence within a message of a specific set of message features (e.g., the presence of certain keywords within the message body, various message header heuristics, various message layout features, etc.). Each message feature may be spam- or ham-identifying, and may receive a tunable feature relevance weight from an external source (e.g. data file and/or human operator). The external feature relevance weights modulate the set of neuronal weights calculated through a training process of the neural network.

IPC Classes  ?

  • G06F 15/18 - in which a program is changed according to experience gained by the computer itself during a complete run; Learning machines (adaptive control systems G05B 13/00;artificial intelligence G06N)

100.

Line-structure-based electronic communication filtering systems and methods

      
Application Number 13095316
Grant Number 08065379
Status In Force
Filing Date 2011-04-27
First Publication Date 2011-11-22
Grant Date 2011-11-22
Owner Bitdefender IPR Management Ltd. (Cyprus)
Inventor Musat, Claudiu C. N.

Abstract

In some embodiments, a layout-based electronic communication classification (e.g. spam filtering) method includes generating a layout vector characterizing a layout of a message, assigning the message to a selected cluster according to a hyperspace distance between the layout vector and a central vector of the selected cluster, and classifying the message (e.g. labeling as spam or non-spam) according to the selected cluster. The layout vector is a message representation characterizing a set of relative positions of metaword substructures of the message, as well as metaword substructure counts. Examples of metaword substructures include MIME parts and text lines. For example, a layout vector may have a first component having scalar axes defined by numerical layout feature counts (e.g. numbers of lines, blank lines, links, email addresses), and a second vector component including a line-structure list and a formatting part (e.g. MIME part) list.

IPC Classes  ?

  • G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
  1     2        Next Page