Bitdefender IPR Management Ltd.

Cyprus

Back to Profile

1-53 of 53 for Bitdefender IPR Management Ltd. Sort by
Query
Patent
World - WIPO
Aggregations Reset Report
Date
2024 (YTD) 1
2023 3
2022 3
2021 1
2020 9
See more
IPC Class
H04L 29/06 - Communication control; Communication processing characterised by a protocol 20
G06F 21/55 - Detecting local intrusion or implementing counter-measures 16
G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements 15
G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine 12
G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines 7
See more
Found results for  patents

1.

AGGREGATE EVENT PROFILES FOR DETECTING MALICIOUS MOBILE APPLICATIONS

      
Application Number EP2023072883
Publication Number 2024/042011
Status In Force
Filing Date 2023-08-21
Publication Date 2024-02-29
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Tivadar, Marius M.
  • Bocereg, Alexandra S.
  • Gosa, Razvan G.

Abstract

Described systems and methods protect client devices such as personal computers and IoT devices against malicious software. In some embodiments, a plurality of client devices report the occurrence of various events to a security server, each such event caused by a local instance of a target application (e.g., mobile app) executing on a respective device. The security server then collates the behavior of the respective target application across the plurality of client devices. Some embodiments compute an aggregate event set and/or sequence combining events detected on one device with events detected on other devices, and determine whether the target application is malicious according to the aggregate event set/sequence.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

2.

PRIVACY-PRESERVING FILTERING OF ENCRYPTED TRAFFIC

      
Application Number EP2023061924
Publication Number 2023/227350
Status In Force
Filing Date 2023-05-05
Publication Date 2023-11-30
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Craciun, Ovidiu M.
  • Firuti, Bogdan C.
  • Fetti, Daniel I. A.
  • Cernat, Constantin D.

Abstract

BTD-2104 5/2/2023 33 Privacy-Preserving Filtering of Encrypted Traffic ABSTRACT Described systems and methods protect client devices such as personal computers and IoT 5 devices against harmful or inappropriate Internet content. When a client uses an encrypted handshake to hide the identity of the end server, e.g., in applications implementing an encrypted client hello (ECH), some embodiments employ a modified DNS server to provide a surrogate key to the client instead of the genuine handshake key. A traffic filter executing for instance on a network gateway may then intercept and decrypt the handshake and apply an access policy to 10 selectively allow or deny access to the respective end server. When access is allowed, the traffic filter may re-encrypt the server identifier using the genuine handshake key before forwarding the handshake to its destination. Communication privacy is maintained since the illustrated methods only decrypt the handshake, and not the actual payload.

IPC Classes  ?

3.

SYSTEMS AND METHODS OF CONTROLLING INTERNET ACCESS USING ENCRYPTED DNS

      
Application Number EP2022085576
Publication Number 2023/110844
Status In Force
Filing Date 2022-12-13
Publication Date 2023-06-22
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Boca, Paul Daniel
  • Craciun, Marius
  • Cernat, Constantin Daniel
  • Buda, Adrian

Abstract

Described systems and methods enable protecting client devices (e.g., personal computers and IoT devices) implementing encrypted DNS protocols against harmful or inappropriate Internet content. A DNS proxy intercepts an attempt to establish an encrypted communication session between a client device and a DNS server. Without decrypting any communications, some embodiments of the DNS proxy determine an identifier of the respective session and an identifier of the client device, and send a query tracer connecting the session identifier with the client identifier to a security server. In some embodiments, the security server obtains the domain name included in an encrypted DNS query from the DNS server and instructs the DNS server to allow or block access of the client device to the respective Internet domain according to a device- and/or user-specific access policy.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 61/4511 - Network directories; Name-to-address mapping using standardised directory access protocols using domain name system [DNS]
  • H04L 61/59 - Network arrangements, protocols or services for addressing or naming using proxies for addressing

4.

PRIVACY-PRESERVING DOMAIN NAME SERVICE (DNS)

      
Application Number EP2021080380
Publication Number 2023/078529
Status In Force
Filing Date 2021-11-02
Publication Date 2023-05-11
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Burceanu, Elena
  • Bolboceanu, Mădălina
  • Haller, Emanuela
  • Roşca, Georgiana Miruna
  • Titiu, Radu

Abstract

Described systems and methods allow carrying out privacy-preserving DNS exchanges. In some embodiments, a client machine engages in a private information retrieval (PIR) exchange with a nameserver. In response to receiving an encrypted query from the client, the query formulated according to a domain name, the nameserver may extract a record (e.g., an IP address) from a domain name database without decrypting the respective query. Some embodiments achieve such information retrieval by the use of homomorphic encryption.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 61/4511 - Network directories; Name-to-address mapping using standardised directory access protocols using domain name system [DNS]
  • H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules

5.

ANOMALY DETECTION SYSTEMS AND METHODS

      
Application Number EP2022058130
Publication Number 2022/214348
Status In Force
Filing Date 2022-03-28
Publication Date 2022-10-13
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Andrei M., Manolache
  • Florin M., Brad
  • Alexandru, Novac
  • Elena, Burceanu

Abstract

Some embodiments employ a novel procedure of training an artificial intelligence system (e.g., set of deep neural networks) for anomaly detection in applications such as natural language processing and computer security. Token sequences selected from a training corpus are distorted according to at least one of a plurality of pre-determined sequence transformations, before being fed to a sequence analyzer. In turn, the sequence analyzer is trained to correctly guess which transformation was used to generate the respective input token sequence.

IPC Classes  ?

6.

PRIVACY-PRESERVING IMAGE DISTRIBUTION

      
Application Number EP2021068655
Publication Number 2022/008507
Status In Force
Filing Date 2021-07-06
Publication Date 2022-01-13
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Burceanu, Elena
  • Bolboceanu, Mădălina
  • Haller, Emanuela
  • Rosca, Georgiana M.
  • Cebere, Bogdan
  • Titiu, Radu

Abstract

Some embodiments enable distributing data (e.g., recorded video, photographs, recorded audio, etc.) to a plurality of users in a manner which preserves the privacy of the respective users. Some embodiments leverage homomorphic encryption and proxy re-encryption techniques to manipulate the respective data so that selected portions of it are revealed according to an identity of the user currently accessing the respective data.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

7.

IMAGE DISTRIBUTION USING COMPOSITE RE-ENCRYPTED IMAGES

      
Application Number EP2021068657
Publication Number 2022/008509
Status In Force
Filing Date 2021-07-06
Publication Date 2022-01-13
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Burceanu, Elena
  • Bolboceanu, Mădălina
  • Haller, Emanuela
  • Rosca, Georgiana M.
  • Cebere, Bogdan
  • Titiu, Radu

Abstract

Some embodiments enable distributing data (e.g., recorded video, photographs, recorded audio, etc.) to a plurality of users in a manner which preserves the privacy of the respective users. Some embodiments leverage homomorphic encryption and proxy re-encryption techniques to manipulate the respective data so that selected portions of it are revealed according to an identity of the user currently accessing the respective data.

IPC Classes  ?

  • H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
  • G09C 5/00 - Ciphering or deciphering apparatus or methods not provided for in other groups of this subclass, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages
  • H04L 9/14 - Arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms

8.

MACHINE LEARNING SYSTEMS AND METHODS FOR REDUCING THE FALSE POSITIVE MALWARE DETECTION RATE

      
Application Number EP2021060293
Publication Number 2021/214092
Status In Force
Filing Date 2021-04-21
Publication Date 2021-10-28
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Dichiu, Daniel
  • Dincu, Andreea
  • Botarleanu, Robert-Mihail
  • Zamfir, Sorina N.
  • Bosinceanu, Elena A.
  • Prejbeanu, Razvan

Abstract

In some embodiments, a behavior classifier comprises a set of neural networks trained to determine whether a monitored software entity is malicious according to a sequence of computing events caused by the execution of the respective entity. When the behavior classifier indicates that the entity is malicious, some embodiments execute a memory classifier comprising another set of neural networks trained to determine whether the monitored entity is malicious according to a memory snapshot of the monitored entity. Applying the classifiers in sequence may substantially reduce the false positive detection rate, while reducing computational costs.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

9.

SYSTEMS AND METHODS FOR USING DNS MESSAGES TO SELECTIVELY COLLECT COMPUTER FORENSIC DATA

      
Application Number EP2020068644
Publication Number 2020/229707
Status In Force
Filing Date 2020-07-02
Publication Date 2020-11-19
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor Mircescu, Daniel-Alexandru

Abstract

Described systems and methods allow a selective collection of computer security data from client devices such as personal computers, smartphones, and Internet of Things (IoT) devices. A security application executing on each client device comprises a domain name service (DNS) proxy that tags outgoing DNS messages with a client ID. The DNS server selects a client for data collection by returning a DNS reply comprising a service activation flag. Some embodiments thus enable a per-DNS-message selectivity of data collection. In some embodiments, subsequent network access requests by the selected clients are re-routed to a security server for analysis.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04W 12/00 - Security arrangements; Authentication; Protecting privacy or anonymity
  • H04W 12/02 - Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
  • H04L 12/58 - Message switching systems

10.

PARENTAL CONTROL SYSTEMS AND METHODS FOR DETECTING AN EXPOSURE OF CONFIDENTIAL INFORMATION

      
Application Number EP2020062440
Publication Number 2020/225258
Status In Force
Filing Date 2020-05-05
Publication Date 2020-11-12
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor Mircescu, Daniel-Alexandru

Abstract

Some embodiments use text and/or image processing methods to determine whether a child is transmitting confidential information to a conversation partner via an electronic messaging service. Some embodiments detect whether an image transmitted as part of an electronic message shows a bank card, a social security card, or an identity document, among others. When detecting such a situation, some embodiments automatically send a notification to a third party (e.g., parent, teacher, etc.)

IPC Classes  ?

  • H04W 12/00 - Security arrangements; Authentication; Protecting privacy or anonymity
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04W 12/02 - Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
  • H04L 12/58 - Message switching systems

11.

ANTI-CYBERBULLYING SYSTEMS AND METHODS

      
Application Number EP2020051290
Publication Number 2020/152106
Status In Force
Filing Date 2020-01-20
Publication Date 2020-07-30
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Miron, Adrian
  • Zavoiu, Viorel
  • Afloarei, Andrei M.
  • Patru, Elena M.
  • Botezatu, Loredana
  • Bugoiu, Bogdan
  • Holban, Liviu A.

Abstract

Some embodiments use text and/or image processing methods to determine whether a user of an electronic messaging platform is subject to an online threat such as cyberbullying, sexual grooming, and identity theft, among others. In some embodiments, a text content of electronic messages is automatically harvested and aggregated into conversations. Conversation data are then analyzed to extract various threat indicators. A result of a text analysis may be combined with a result of an analysis of an image transmitted as part of the respective conversation. When a threat is detected, some embodiments automatically send a notification to a third party (e.g., parent, teacher, etc.)

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • H04W 12/02 - Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure

12.

PARENTAL CONTROL SYSTEMS AND METHODS FOR DETECTING AN EXPOSURE OF CONFIDENTIAL INFORMATION

      
Application Number EP2020051292
Publication Number 2020/152108
Status In Force
Filing Date 2020-01-20
Publication Date 2020-07-30
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Minea, Cristian
  • Ion, Cristian
  • Miron, Adrian
  • Zavoiu, Viorel
  • Holban, Liviu A.
  • Bugoiu, Bogdan

Abstract

Some embodiments use text and/or image processing methods to determine whether a child is transmitting confidential information to a conversation partner via an electronic messaging service. Some embodiments detect whether an image transmitted as part of an electronic message shows a bank card, a social security card, or an identity document, among others. When detecting such a situation, some embodiments automatically send a notification to a third party (e.g., parent, teacher, etc.)

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • H04W 12/02 - Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure

13.

SYSTEMS AND METHODS FOR BEHAVIORAL THREAT DETECTIION

      
Application Number EP2019084310
Publication Number 2020/120427
Status In Force
Filing Date 2019-12-10
Publication Date 2020-06-18
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Dichiu, Daniel
  • Niculae, Stefan
  • Bosinceanu, Elena A.
  • Zamfir, Sorina N.
  • Dincu, Andreea
  • Apostoae, Andrei A.

Abstract

In some embodiments, a behavioral computer security system protects clients and networks against threats such as malicious software and intrusion. A set of client profiles is constructed according to a training corpus of events occurring on clients, wherein each client profile represents a subset of protected machines, and each client profile is indicative of a normal or baseline pattern of using the machines assigned to the client respective profile. A client profile may group together machines having a similar event statistic. Following training, events detected on a client are selectively analyzed against a client profile associated with the respective client, to detect anomalous behavior. In some embodiments, individual events are analyzed in the context of other events, using a multi-dimensional event embedding space.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

14.

SYSTEMS AND METHODS FOR BEHAVIORAL THREAT DETECTION

      
Application Number EP2019084311
Publication Number 2020/120428
Status In Force
Filing Date 2019-12-10
Publication Date 2020-06-18
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Dichiu, Daniel
  • Niculae, Stefan
  • Bosinceanu, Elena A.
  • Zamfir, Sorina N.
  • Dincu, Andreea
  • Apostoae, Andrei A.

Abstract

In some embodiments, a behavioral computer security system protects clients and networks against threats such as malicious software and intrusion. A set of client profiles is constructed according to a training corpus of events occurring on clients, wherein each client profile represents a subset of protected machines, and each client profile is indicative of a normal or baseline pattern of using the machines assigned to the client respective profile. A client profile may group together machines having a similar event statistic. Following training, events detected on a client are selectively analyzed against a client profile associated with the respective client, to detect anomalous behavior. In some embodiments, individual events are analyzed in the context of other events, using a multi-dimensional event embedding space.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

15.

SYSTEMS AND METHODS FOR BEHAVIORAL THREAT DETECTION

      
Application Number EP2019084312
Publication Number 2020/120429
Status In Force
Filing Date 2019-12-10
Publication Date 2020-06-18
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Dichiu, Daniel
  • Niculae, Stefan
  • Bosinceanu, Elena A.
  • Zamfir, Sorina N.
  • Dincu, Andreea
  • Apostoae, Andrei A.

Abstract

In some embodiments, a behavioral computer security system protects clients and networks against threats such as malicious software and intrusion. A set of client profiles is constructed according to a training corpus of events occurring on clients, wherein each client profile represents a subset of protected machines, and each client profile is indicative of a normal or baseline pattern of using the machines assigned to the client respective profile. A client profile may group together machines having a similar event statistic. Following training, events detected on a client are selectively analyzed against a client profile associated with the respective client, to detect anomalous behavior. In some embodiments, individual events are analyzed in the context of other events, using a multi-dimensional event embedding space.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

16.

SYSTEMS AND METHODS FOR REPORTING COMPUTER SECURITY INCIDENTS

      
Application Number IB2019056172
Publication Number 2020/016834
Status In Force
Filing Date 2019-07-18
Publication Date 2020-01-23
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Warmenhoven, Adrianus
  • Hofstede, Richard J.

Abstract

inter aliainter alia, to the analysis of high-volume network flows in corporate networks. In some embodiments, flows are pre-tagged with extra metadata to facilitate detection of malware and/or intrusion.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 12/24 - Arrangements for maintenance or administration
  • G05B 23/02 - Electric testing or monitoring

17.

SYSTEMS AND METHODS FOR TRANSLATING NATURAL LANGUAGE SENTENCES INTO DATABASE QUERIES

      
Application Number EP2019066794
Publication Number 2020/002309
Status In Force
Filing Date 2019-06-25
Publication Date 2020-01-02
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Traian, Rebedea
  • Elena, Burceanu
  • Florin, Brad

Abstract

Described systems and methods allow an automatic translation from a natural language (e.g., English) into an artificial language such as a structured query language (SQL). In some embodiments, a translator module includes an encoder component and a decoder component, both components comprising recurrent neural networks. Training the translator module comprises two stages. A first stage trains the translator module to produce artificial language (AL) output when presented with an AL input. For instance, the translator is first trained to reproduce an AL input. A second stage of training comprises training the translator to produce AL output when presented with a natural language (NL) input.

IPC Classes  ?

18.

SECURE STORAGE DEVICE

      
Application Number EP2018070692
Publication Number 2019/025423
Status In Force
Filing Date 2018-07-31
Publication Date 2019-02-07
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Lukacs, Sandor
  • Turicu, Dan-Cristian

Abstract

Described systems and methods allow protecting a host system against computer security threats, and in particular against ransomware and unauthorized access to private data. In some embodiments, a conventional non-volatile storage unit (e.g., magnetic, optical, or solid state drive) is paired with a dedicated security processor, forming a secure storage device which may connect to the primary processor of the host system via a conventional storage interface, such as a SATA, PCI, or USB connector. The primary processor and the security processor exchange messages and data via the storage interface. The security processor controls access of the primary processor to the storage unit, and may execute security and data encryption operations.

IPC Classes  ?

  • G06F 21/60 - Protecting data
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 3/06 - Digital input from, or digital output to, record carriers
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 17/30 - Information retrieval; Database structures therefor

19.

EVENT FILTERING FOR VIRTUAL MACHINE SECURITY APPLICATIONS

      
Application Number EP2017083579
Publication Number 2018/114970
Status In Force
Filing Date 2017-12-19
Publication Date 2018-06-28
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor Lutas, Andrei-Vlad

Abstract

Described systems and methods allow protecting a hardware virtualization system from malicious software. Some embodiments use a hybrid event notification/analysis system, wherein a first component executing within a protected virtual machine (VM) registers as a handler for processor exceptions triggered by violations of memory access permissions, and wherein a second component executing outside the respective VM registers as a handler for VM exit events. The first component filters permission violation events according to a set of rules and only notifies the second component about events which are deemed relevant to security. The second component analyzes notified events to detect malicious software.

IPC Classes  ?

  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

20.

DYNAMIC REPUTATION INDICATOR FOR OPTIMIZING COMPUTER SECURITY OPERATIONS

      
Application Number EP2017077390
Publication Number 2018/077996
Status In Force
Filing Date 2017-10-26
Publication Date 2018-05-03
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Hajmasan, Gheorghe-Florin
  • Mondoc, Alexandra
  • Portase, Radu-Marian

Abstract

Described systems and methods allow protecting a computer system from malware such as viruses, worms, and spyware. A reputation manager executes on the computer system concurrently with an anti-malware engine. The reputation manager associates a dynamic reputation indicator to each executable entity seen as a unique combination of individual components (e.g., a main executable and a set of loaded libraries). The reputation indicator indicates a probability that the respective entity is malicious. The reputation of benign entities may increase in time. When an entity performs certain actions which may be indicative of malicious activity, the reputation of the respective entity may drop. The anti-malware engine uses an entity-specific protocol to scan and/or monitor each target entity for malice, the protocol varying according to the entity's reputation. Entities trusted to be non-malicious may be analyzed using a more relaxed protocol than unknown or untrusted entities.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

21.

SYSTEM AND METHODS FOR DETECTING ONLINE FRAUD

      
Application Number EP2017067192
Publication Number 2018/011104
Status In Force
Filing Date 2017-07-10
Publication Date 2018-01-18
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor Damian, Alin-Octavian

Abstract

Described systems and methods enable a swift and efficient detection of fraudulent Internet domains, i.e., domains used to host or distribute fraudulent electronic documents such as fraudulent webpages and electronic messages. Some embodiments use a reverse IP analysis to select a set of fraud candidates from among a set of domains hosted at the same IP address as a known fraudulent domain. The candidate set is further filtered according to domain registration data. Online content hosted at each filtered candidate domain is further analyzed to identify truly fraudulent domains. A security module may then prevent users from accessing a content of such domains.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

22.

SYSTEM AND METHODS FOR DECRYPTING NETWORK TRAFFIC IN A VIRTUALIZED ENVIRONMENT

      
Application Number EP2017057422
Publication Number 2017/174418
Status In Force
Filing Date 2017-03-29
Publication Date 2017-10-12
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor Caragea, Radu

Abstract

Described systems and methods enable a decryption of encrypted communication between a client system and a remote party, for applications such as detection and analysis of malicious software, intrusion detection, and surveillance, among others. The client system executes a virtual machine and an introspection engine outside the virtual machine. The introspection engine is configured to identify memory pages whose contents have changed between a first session event (e.g., a ServerHello message) and a second session event (e.g., a ClientFinished message). The respective memory pages are likely to contain encryption key material for the respective communication session. A decryption engine may then attempt to decrypt an encrypted payload of the respective communication session using information derived from the content of the identified memory pages.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

23.

SYSTEM AND METHODS FOR AUTOMATIC DEVICE DETECTION

      
Application Number EP2017057471
Publication Number 2017/167836
Status In Force
Filing Date 2017-03-29
Publication Date 2017-10-05
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor Cebere, Bogdan-Constantin

Abstract

Described systems and methods enable an automatic device detection/discovery, particularly of 'Internet of Things' client devices such as wearables, mobile communication devices, and smart home appliances, among others. Device detection comprises assigning a target device to a device category, such as "tablet computer from an unknown manufacturer, running Android®". Some embodiments determine multiple preliminary category assignments according to distinct inputs such as HTTP user agent data, DHCP data, mDNS data, and MAC data. Each preliminary category assignment may come with an associated score. A definitive category assignment may be made according to an aggregate score. Applications include computer security, software provisioning, and remote device management, among others.

IPC Classes  ?

  • H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]

24.

SYSTEM AND METHODS FOR AUDITING A VIRTUAL MACHINE

      
Application Number EP2017050112
Publication Number 2017/118648
Status In Force
Filing Date 2017-01-04
Publication Date 2017-07-13
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Lukacs, Sandor
  • Lutas, Andrei-Vlad
  • Anichitei, Ionel C.

Abstract

Described systems and methods enable performing software audits remotely and automatically, on a relatively large number of client systems (e.g., a corporate network, a virtual desktop infrastructure system, etc.) An audit engine executes on each client system, in a hardware virtualization configuration wherein the audit engine executes outside an audited virtual machine. When receiving an audit request from an audit server, some embodiments of the audit engine drop an audit agent into the audited virtual machine, and remove the audit agent upon completion of the audit.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

25.

DUAL MEMORY INTROSPECTION FOR SECURING MULTIPLE NETWORK ENDPOINTS

      
Application Number EP2016081697
Publication Number 2017/103254
Status In Force
Filing Date 2016-12-19
Publication Date 2017-06-22
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Lutas, Dan-Horea
  • Lukacs, Sandor
  • Ticle, Daniel-Ioan
  • Ciocas, Radu-Ioan
  • Anichitei, Ionel-Cristinel

Abstract

Described systems and methods enable protecting multiple client systems (e.g., a corporate network) from computer security threats such as malicious software and intrusion. In some embodiments, each protected client operates a live introspection engine and an on-demand introspection engine. The live introspection engine detects the occurrence of certain events within a protected virtual machine exposed on the respective client system, and communicates the occurrence to a remote security server. In turn, the server may request a forensic analysis of the event from the client system, by indicating a forensic tool to be executed by the client. Forensic tools may be stored in a central repository accessible to the client. In response to receiving the analysis request, the on-demand introspection engine may retrieve and execute the forensic tool, and communicate a result of the forensic analysis to the security server. The server may use the information to determine whether the respective client is under attack by malicious software or an intruder.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

26.

SYSTEM AND METHODS FOR DETECTING DOMAIN GENERATION ALGORITHM (DGA) MALWARE

      
Application Number EP2016076343
Publication Number 2017/076859
Status In Force
Filing Date 2016-11-02
Publication Date 2017-05-11
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Minea, Octavian Mihai
  • Vatamanu, Cristina
  • Benchea, Mihai-Razvan
  • Gavrilut, Dragos-Teodor

Abstract

Domain generation algorithm (DGA) malware is detected by intercepting an external time request sent by a potential DGA malware host, and replacing the received real time with an accelerated (future) real time designed to trigger time-dependent DGA activity. The interception and replacement are performed outside the physical or virtual DGA host, on a different physical or virtual system such as a distinct external physical server or router, or distinct hypervisor or virtual machine running on the same physical system, in order to reduce the risk that the DGA malware identifies the time substitution. Failed DGA malware external access requests triggered only at future times are then used to identify domain names generated by the DGA malware, allowing proactive count ermeasures.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

27.

SYSTEMS AND METHODS FOR TRACKING MALICIOUS BEHAVIOR ACROSS MULTIPLE SOFTWARE ENTITIES

      
Application Number EP2016065737
Publication Number 2017/016814
Status In Force
Filing Date 2016-07-04
Publication Date 2017-02-02
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Hajmasan, Gheorghe-Florin
  • Portase, Radu-Marian

Abstract

Described systems and methods allow protecting a computer system from malicious software. In some embodiments, a security application divides a set of monitored executable entities (e.g., processes) into a plurality of groups, wherein all members of a group are related by filiation or code injection. The security application may further associate a set of scores with each entity group. Such group scores may be incremented when a member of the respective group performs certain actions. Thus, even though actions performed by individual members may not be malware-indicative per se, the group score may capture collective malicious behavior and trigger malware detection. In some embodiments, group membership rules vary according to whether an entity is part of a selected subset of entities including certain OS processes, browsers and file managers. When an entity is determined to be malicious, anti-malware measures may be taken against a whole group of related entities.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

28.

COMPUTER SECURITY SYSTEMS AND METHODS USING ASYNCHRONOUS INTROSPECTION EXCEPTIONS

      
Application Number EP2016066745
Publication Number 2017/009415
Status In Force
Filing Date 2016-07-14
Publication Date 2017-01-19
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Lukacs, Sandor
  • Sirb, Cristian-Bogdan
  • Lutas, Andrei-Vlad

Abstract

Described systems and methods enable an efficient analysis of security-relevant events, especially in hardware virtualization platforms. In some embodiments, a notification handler detects the occurrence of an event within a virtual machine, and communicates the respective event to security software. The security software then attempts to match the respective event to a collection of behavioral and exception signatures. An exception comprises a set of conditions which, when satisfied by an tuple, indicates that the respective entity is not malicious. In some embodiments, a part of exception matching is performed synchronously (i.e., while execution of the entity that triggered the respective event is suspended), while another part of exception matching is performed asynchronously (i.e., after the triggering entity is allowed to resume execution).

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/54 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by adding security routines or objects to programs

29.

BEHAVIORAL MALWARE DETECTION USING AN INTERPRETER VIRTUAL MACHINE

      
Application Number EP2016062882
Publication Number 2016/198392
Status In Force
Filing Date 2016-06-07
Publication Date 2016-12-15
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Hajmasan, Gheorghe-Florin
  • Lukacs, Sandor
  • Fulop, Botond

Abstract

Described systems and methods allow protecting a computer system from computer security threats such as malware and spyware. In some embodiments, a security application executes a set of detection routines to determine whether a set of monitored entities (processes, threads, etc.) executing on the computer system comprise malicious software. The detection routines are formulated in bytecode and executed within a bytecode translation virtual machine. Execution of a detection routine comprises translating bytecode instructions of the respective routine into native processor instructions, for instance via interpretation or just-in-time compilation. Execution of the respective routines is triggered selectively, due to the occurrence of specific events within the protected client system. Detection routines may output a set of scores, which may be further used by the security application to determine whether a monitored entity is malicious.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

30.

CASCADING CLASSIFIERS FOR COMPUTER SECURITY APPLICATIONS

      
Application Number EP2016060244
Publication Number 2016/184702
Status In Force
Filing Date 2016-05-07
Publication Date 2016-11-24
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Gavrilut, Dragos-Teodor
  • Vatamanu, Cristina
  • Cosovan, Doina
  • Luchian, Henri

Abstract

Described systems and methods allow a computer security system to automatically classify target objects using a cascade of trained classifiers, for applications including malware, spam, and/or fraud detection. The cascade comprises several levels, each level including a set of classifiers. Classifiers are trained in the predetermined order of their respective levels. Each classifier is trained to divide a corpus of records into a plurality of record groups so that a substantial proportion (e.g., at least 95%, or all) of the records in one such group are members of the same class. Between training classifiers of consecutive levels of the cascade, a set of training records of the respective group is discarded from the training corpus. When used to classify an unknown target object, some embodiments employ the classifiers in the order of their respective levels.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/51 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability

31.

COMPUTER SECURITY SYSTEMS AND METHODS USING HARDWARE-ACCELERATED ACCESS TO GUEST MEMORY FROM BELOW THE OPERATING SYSTEM

      
Application Number RO2015050007
Publication Number 2016/118031
Status In Force
Filing Date 2015-08-11
Publication Date 2016-07-28
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Lukacs, Sandor
  • Lutas, Andrei-Vlad

Abstract

Described systems and methods allow computer security software to access a memory of a host system with, improved efficiency. A processor and a memory management unit (MMU) of the host system: may be configured to perform memory access operations (read/write) in a target memory context, which may differ from the implicit memory context of the currently executing process. In some embodiments, the instruction set of the processor is extended to include new- categories of instructions, which, when, called from outside a guest virtual machine (VM) exposed by the host system, instruct the processor of the host system to perform memory access directly in a guest context, e.g., in a memory context of a process executing within the guest VM.

IPC Classes  ?

  • G06F 12/08 - Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems
  • G06F 12/1027 - Address translation using associative or pseudo-associative address translation means, e.g. translation look-aside buffer [TLB]
  • G06F 12/109 - Address translation for multiple virtual address spaces, e.g. segmentation
  • G06F 12/1009 - Address translation using page tables, e.g. page table structures
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 12/14 - Protection against unauthorised use of memory
  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

32.

SYSTEMS AND METHODS FOR EXPOSING A CURRENT PROCESSOR INSTRUCTION UPON EXITING A VIRTUAL MACHINE

      
Application Number RO2015050008
Publication Number 2016/118032
Status In Force
Filing Date 2015-08-11
Publication Date 2016-07-28
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Lukacs, Sandor
  • Lutas, Andrei-Vlad

Abstract

Described systems and methods enable a host system to efficiently perform computer security activities, when operating in a hardware visualization configuration. A processor is configured to generate a VM suspend event (e.g., a VM exit or a virtualization exception) when software executing within a guest VM performs a memory access violation. In some embodiments, the processor is further configured to save disassembly data determined for the processor instruction which triggered the VM suspend event to a special location (e.g., a specific processor register) before generating the event. Saved disassembly data may include the contents of individual instruction encoding fields, such as Prefix, Opcode, Mod R/M, SIB, Displacement, and Immediate fields on Intel® platforms.

IPC Classes  ?

  • G06F 12/08 - Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems
  • G06F 12/1027 - Address translation using associative or pseudo-associative address translation means, e.g. translation look-aside buffer [TLB]
  • G06F 12/109 - Address translation for multiple virtual address spaces, e.g. segmentation
  • G06F 12/14 - Protection against unauthorised use of memory
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

33.

SYSTEMS AND METHODS FOR EXPOSING A RESULT OF A CURRENT PROCESSOR INSTRUCTION UPON EXITING A VIRTUAL MACHINE

      
Application Number RO2015050009
Publication Number 2016/118033
Status In Force
Filing Date 2015-08-11
Publication Date 2016-07-28
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Lukacs, Sandor
  • Lutas, Andrei-Vlad

Abstract

Described systems and methods enable a host system to efficiently perform computer security activities, when operating in a hardware virtualization configuration. A processor is configured to generate a VM suspend event (e.g., a VM exit or a virtualization exception) when a guest instruction executing within a guest VM. performs a memory access violation. In some embodiments, the processor is further configured to delay generating the VM suspend event until the execution stage of the pipeline for the guest instruction is complete, and to save results of the execution stage to a specific location (e.g. a specific processor register readable by security-software) before generating the event.

IPC Classes  ?

  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 12/08 - Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems
  • G06F 12/14 - Protection against unauthorised use of memory
  • G06F 12/109 - Address translation for multiple virtual address spaces, e.g. segmentation
  • G06F 12/1027 - Address translation using associative or pseudo-associative address translation means, e.g. translation look-aside buffer [TLB]
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

34.

USER INTERFACE FOR SECURITY PROTECTION AND REMOTE MANAGEMENT OF NETWORK ENDPOINTS

      
Application Number RO2015050010
Publication Number 2016/093721
Status In Force
Filing Date 2015-12-11
Publication Date 2016-06-16
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Cebere, Bogdan-Constantin
  • Achim, Ioan-Alexandru
  • Padina, Mirela-Luiza
  • Miron, Monica-Maria
  • Stan, Cosmin-Claudiu
  • Albisteanu, Catalina
  • Berte, Dan-Radu
  • Dumitrache, Bogdan-Teodor
  • Mircescu, Daniel-Alexandru
  • Novac, Alexandru

Abstract

In some embodiments, a network regulator device protects a local network of client systems (e.g. Internet-of-things devices such as smartphones, home appliances, wearables, etc.) against computer security threats. Various aspects of the operation of the network regulator may be managed remotely via a graphical user interface (GUI) executing on an administration device, such as a mobile phone. The GUI is further configured to display a security notification to a user of the administration device, the security notification indicating the occurrence of a security event caused by an action of a protected client system.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 12/24 - Arrangements for maintenance or administration
  • H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
  • H04W 4/00 - Services specially adapted for wireless communication networks; Facilities therefor
  • H04W 8/00 - Network data management
  • H04L 29/12 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups characterised by the data terminal

35.

SYSTEMS AND METHODS FOR AUTOMATIC DEVICE DETECTION, DEVICE MANAGEMENT, AND REMOTE ASSISTANCE

      
Application Number RO2015050012
Publication Number 2016/093723
Status In Force
Filing Date 2015-12-11
Publication Date 2016-06-16
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Cebere, Bogdan-Constanstin
  • Achim, Ioan-Alexandru
  • Stan, Cosmin-Claudiu
  • Rusu, Andrei

Abstract

In some embodiments, a network regulator device protects a local network of client systems (e.g. Internet-of-things devices such as smartphones, home appliances, wearables, etc.) against computer security threats. When introduced to the local network, some embodiments of network regulator take over some network services from a router, and automatically install the network regulator as gateway to the local network. The network regulator then carries out an automatic device discovery procedure and distribute device-specific utility agents to the protected client systems. An exemplary utility agent detects when its host device has left the local network, and in response, sets up a virtual private network (VPN) tunnel with a security server to maintain protection of the respective device.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 12/24 - Arrangements for maintenance or administration
  • H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
  • H04W 4/00 - Services specially adapted for wireless communication networks; Facilities therefor
  • H04W 8/00 - Network data management
  • H04L 29/12 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups characterised by the data terminal

36.

SYSTEMS AND METHODS FOR AUTOMATIC DEVICE DETECTION, DEVICE MANAGEMENT, AND REMOTE ASSISTANCE

      
Application Number RO2015050013
Publication Number 2016/093724
Status In Force
Filing Date 2015-12-11
Publication Date 2016-06-16
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Cebere, Bogdan-Constantin
  • Mircescu, Daniel-Alexandru

Abstract

In some embodiments, a network regulator device protects a local network of client systems (e.g. Internet-of-things devices such as smartphones, home appliances, wearables, etc.) against computer security threats. When introduced to the local network, some embodiments of network regulator set up a secure tunnel connecting the network regulator with a remote configuration server. The tunnel may be configured to redirect communications received via the tunnel to a router providing network services to client systems on the local network. In some embodiments, the tunnel is used by the configuration server to transmit a communication to the router, the communication configured to disrupt the operation of the router. In response to the disruption, the network regulator may take over the network services from the router, and automatically install the network regulator as gateway to the local network.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 12/24 - Arrangements for maintenance or administration
  • H04L 29/12 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups characterised by the data terminal
  • H04W 4/00 - Services specially adapted for wireless communication networks; Facilities therefor
  • H04W 8/00 - Network data management
  • H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]

37.

SYSTEMS AND METHODS FOR SECURING NETWORK ENDPOINTS

      
Application Number RO2015050011
Publication Number 2016/093722
Status In Force
Filing Date 2015-12-11
Publication Date 2016-06-16
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Cebere, Bogdan-Constantin
  • Achim, Iona-Alexandru
  • Stan, Cosmin-Claudiu
  • Rusu, Andrei

Abstract

In some embodiments, a network regulator device protects a local network of client systems (e.g. Internet-of-things devices such as smartphones, home appliances, wearables, etc.) against computer security threats. When introduced to the local network, some embodiments of network regulator automatically take over network services from an existing router, and install the network regulator as gateway to the local network. In response to taking over the network services, some embodiments redirect a request by a protected client system to access a remote resource to a security server configured to determine whether granting access to the resource constitutes a computer security threat to the client system.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 12/24 - Arrangements for maintenance or administration
  • H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
  • H04W 4/00 - Services specially adapted for wireless communication networks; Facilities therefor
  • H04W 8/00 - Network data management
  • H04L 29/12 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups characterised by the data terminal

38.

SYSTEMS AND METHODS FOR DYNAMICALLY PROTECTING A STACK FROM BELOW THE OPERATING SYSTEM

      
Application Number RO2015050005
Publication Number 2015/199568
Status In Force
Filing Date 2015-06-23
Publication Date 2015-12-30
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor Lutas, Andrei-Vlad

Abstract

Described systems and methods allow protecting a host system against malware, using hardware virtualization technology, A memory introspection engine executes at the level of a hypervisor, protecting a virtual machine (VM) from exploits targeting the call stack of a thread executing within the respective VM. The introspection engine identifies a virtual memory page reserved for the stack, but not committed to the stack, and intercepts an attempt to write to the respective page. In response to intercepting the write attempt, the memory introspection engine marks the respective page as non-executable, thus protecting the stack against exploits.

IPC Classes  ?

  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

39.

SYSTEM AND METHODS FOR MUTUAL INTEGRITY ATTESTATION BETWEEN A NETWORK ENDPOINT AND A NETWORK APPLIANCE

      
Application Number RO2015050003
Publication Number 2015/183118
Status In Force
Filing Date 2015-04-02
Publication Date 2015-12-03
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Lucaks, Sandor
  • Colesa, Adrian-Viorel
  • Lutas, Dan-Horea

Abstract

Described systems and methods allow malware-protecting a client system (e.g., computer system, smartphone, etc.) connected to a network. In some embodiments, a network appliance transmits a boot image over the network, on demand, to the client system. The boot image may install a hypervisor, which may further load a local OS and applications into a virtual machine. The client system performs a mutual integrity attestation transaction with the network appliance over the network, wherein each side of the transaction verifies the integrity of software objects executing on the other side. When the network appliance determines that the client system is not in a trusted state, the network appliance may block access of the client system to the network. When the client system determines that the network appliance is not in a trusted state, the client system may block communications between the client system and the network appliance.

IPC Classes  ?

  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine

40.

COMPUTER SECURITY SYSTEMS AND METHODS USING VIRTUALIZATION EXCEPTIONS

      
Application Number RO2015050001
Publication Number 2015/183116
Status In Force
Filing Date 2015-01-07
Publication Date 2015-12-03
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Tosa, Raul-Vasile
  • Lutas, Dan-Horea
  • Ticle, Daniel-Ioan
  • Lukacs, Sandor

Abstract

Described systems and methods enable a host system to efficiently perform computer security activities, when operating in a hardware virtualization configuration, A hypervisor exposes a virtual machine On the host system, in some embodiments, the hypervisor further configures a processor of the host system to generate a virtualization exception in response to detecting a memory access violation, and to deliver such exceptions to a computer security program operating within the virtual machine. The hypervisor may further set access permissions to a section of memory containing a part of a function targeted for hooking, so that an attempt to execute the respective target function triggers a virtualization exception. Some embodiments thus achieve hooking of the target function without resorting to conventional methods, such as patching, inline hooking, and MSR hooking.

IPC Classes  ?

  • G06F 21/74 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

41.

BELOW-OS SECURITY SOLUTION FOR DISTRIBUTED NETWORK ENDPOINTS

      
Application Number RO2015050002
Publication Number 2015/183117
Status In Force
Filing Date 2015-03-18
Publication Date 2015-12-03
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Lukacs, Sandor
  • Colesa, Adrian-Viorel

Abstract

Described systems and methods allow protecting a client system, such as a computer system or smartphone, from malware. In some embodiments, a network regulator device is used to distribute a bootable image of a hypervisor, on demand, to each of a set of client systems connected to a network. After booting on a client system, the hypervisor loads the local OS and applications into a virtual machine. Integrity measurements of the hypervisor and/or OS are sent to the network regulator for verification. When the network regulator determines that software executing on a client system, such as the hypervisor and/or the OS, are not in a trusted state, the network regulator may block access of the respective client system to the network.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 9/44 - Arrangements for executing specific programs
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

42.

STRONGLY ISOLATED MALWARE SCANNING USING SECURE VIRTUAL CONTAINERS

      
Application Number RO2014050003
Publication Number 2015/174874
Status In Force
Filing Date 2014-12-15
Publication Date 2015-11-19
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Lukacs, Sandor
  • Sirb, Cristian-Bogdan
  • Lutas, Dan-Horea
  • Colesa, Adrian-Viorel

Abstract

Described systems and methods allow protecting a host system, such as a computer or smartphone, from malware. In some embodiments, an anti-malware application installs a hypervisor, which displaces an operating system executing on the host system to a guest virtual machine (VM). The hypervisor further creates a set of virtual containers (VC), by setting up a memory domain for each VC, isolated from the memory domain of the guest, VM, The hypervisor then maps a memory image of a malware scanner to each VC. When a target object is selected for scanning, the anti-malware application launches the malware scanner. Upon intercepting the launch, the hypervisor switches the memory context of the malware scanner to the memory domain of a selected VC, for the duration of the scan. Thus, malware scanning is performed within an isolated environment.

IPC Classes  ?

  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 9/46 - Multiprogramming arrangements

43.

SYSTEMS AND METHODS FOR USING A REPUTATION INDICATOR TO FACILITATE MALWARE SCANNING

      
Application Number RO2014000028
Publication Number 2015/171007
Status In Force
Filing Date 2014-09-25
Publication Date 2015-11-12
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor Mircescu, Daniel-Alexandru

Abstract

Described systems and methods allow protecting a computer system from malware, such as viruses, Trojans, and spyware. A reputation manager executes in conjunction with an anti- malware engine. The reputation manager determines a reputation of a target process executing on the computer system according to a reputation of a set of executable modules, such as shared libraries, loaded by the target process. The anti-malware engine may be configured to employ a process-specific protocol to scan the target process for malware, the protocol selected according to process reputation. Processes trusted to be non-malicious may thus be scanned using a more relaxed protocol than unknown or untrusted processes. The reputation of executable modules may be static; an indicator of module reputation may be stored and/or retrieved by a remote reputation server. Process reputation may be dynamically changeable, i.e. re-computed repeatedly by the reputation manager in response to process life-cycle and/or security events.

IPC Classes  ?

  • G06F 21/51 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

44.

PAGE FAULT INJECTION IN VIRTUAL MACHINES TO CAUSE MAPPING OF SWAPPED-OUT MEMORY PAGES INTO VM] VIRTU ALIZED MEMORY

      
Application Number RO2014000018
Publication Number 2015/152747
Status In Force
Filing Date 2014-07-02
Publication Date 2015-10-08
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor Luţas, Andrei-Vlad

Abstract

Described systems and methods allow protecting a host system from malware using virtualization technology. In some embodiments, a memory introspection engine operates below a virtual machine (VM) executing on the host system. The engine is configured to analyze the content of a virtual memory page used by software executing within the VM, and/or to protect the respective content from unauthorized modification, for instance by malware. When the respective content is swapped out of memory, the memory introspection engine injects a page fault into the respective VM, to force a swap-in of the respective content.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 12/08 - Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems

45.

PROCESS EVALUATION FOR MALWARE DETECTION IN VIRTUAL MACHINES

      
Application Number RO2014000019
Publication Number 2015/152748
Status In Force
Filing Date 2014-07-02
Publication Date 2015-10-08
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Lukacs, Sandor
  • Toşa, Raul-Vasile
  • Boca, Paul-Daniel
  • Hajmaşan, Gheorghe-Florin
  • Luţas, Andrei-Vlad

Abstract

Described systems and methods allow protecting a computer system from malware, such as viruses and rootkits. An anti-malware component executes within a virtual machine (VM) exposed by a hypervisor executing on the computer system. A memory introspection engine executes outside the virtual machine, at the processor privilege level of the hypervisor, and protects a process executing within the virtual machine by write-protecting a memory page of the respective process. By combining anti-malware components executing inside and outside the respective VM, some embodiments of the present invention may use the abundance of behavioral data that inside- VM components have access to, while protecting the integrity of such components from outside the respective VM.

IPC Classes  ?

  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

46.

SYSTEMS AND METHODS FOR DETECTING RETURN-ORIENTED PROGRAMMING (ROP) EXPLOITS

      
Application Number RO2014050002
Publication Number 2015/119522
Status In Force
Filing Date 2014-11-03
Publication Date 2015-08-13
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor Tosa, Raul-Vasile

Abstract

Described systems and methods allow protecting a computer system from malware, such as return-oriented programming (ROP) exploits. In some embodiments, a set of references are identified within a call stack used by a thread of a target process, each reference pointing into the memory space of an executable module loaded by the target process. Each such reference is analyzed to determine whether it points to a ROP gadget, and whether the respective reference was pushed on the stack by a legitimate function call. In some embodiments, a ROP score is indicative of whether the target process is subject to a ROP attack, the score determined according to a count of references to a loaded module, according to a stack footprint of the respective module, and further according to a count of ROP gadgets identified within the respective module.

IPC Classes  ?

  • G06F 21/52 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure

47.

COMPLEX SCORING FOR MALWARE DETECTION

      
Application Number RO2014000027
Publication Number 2015/050469
Status In Force
Filing Date 2014-09-25
Publication Date 2015-04-09
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Lukacs, Sandor
  • Toşa, Raul-Vasile
  • Boca, Paul-Daniel
  • Hajmaşan, Gheorghe-Florin
  • Lutas, Andrei-Vlad

Abstract

Described systems and methods allow protecting a computer system from malware such as viruses, Trojans, and spyware. For each of a plurality of executable entities (such as processes and threads executing on the computer system), a scoring engine records a plurality of evaluation scores, each score determined according to a distinct evaluation criterion. Every time an entity satisfies an evaluation criterion (e.g, performs an action), the respective score of the entity is updated. Updating a score of an entity may trigger score updates of entities related to the respective entity, even when the related entities are terminated, i.e., no longer active. Related entities include, among others, a parent of the respective entity, and/or an entity injecting code into the respective entity. The scoring engine determines whether an entity is malicious according to the plurality of evaluation scores of the respective entity.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

48.

DOCUMENT CLASSIFICATION USING MULTISCALE TEXT FINGERPRINTS

      
Application Number RO2014000007
Publication Number 2014/137233
Status In Force
Filing Date 2014-02-04
Publication Date 2014-09-12
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Toma, Adrian
  • Tibeică, Marius, Nicolae

Abstract

Described systems and methods allow a classification of electronic documents such as email messages and HTML documents, according to a document-specific text fingerprint. The text fingerprint is calculated for a text block of each target document, and comprises a sequence of characters determined according to a plurality of text tokens of the respective text block. In some embodiments, the length of the text fingerprint is forced within a pre-determined range of lengths (e.g. between 129 and 256 characters) irrespective of the length of the text block, by zooming in for short text blocks, and zooming out for long ones. Classification may include, for instance, determining whether an electronic document represents unsolicited communication (spam) or online fraud such as phishing.

IPC Classes  ?

49.

MEMORY INTROSPECTION ENGINE FOR INTEGRITY PROTECTION OF VIRTUAL MACHINES

      
Application Number RO2014000006
Publication Number 2014/129918
Status In Force
Filing Date 2014-02-04
Publication Date 2014-08-28
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Luţas, Andrei-Vlad
  • Lukacs, Sandor
  • Luţaş, Dan-Horea

Abstract

Described systems and methods allow protecting a computer system from malware, such as viruses and rootkits. In some embodiments, a hypervisor configures a hardware virtualization platform hosting a set of operating systems (OS). A memory introspection engine executing at the processor privilege level of the hypervisor dynamically identifies each OS, and uses an protection priming module to change the way memory is allocated to a target software object by the memory allocation function native to the respective OS. In some embodiments, the change affects only target objects requiring malware protection, and comprises enforcing that memory pages containing data of the target object are reserved exclusively for the respective object. The memory introspection engine then write-protects the respective memory pages.

IPC Classes  ?

  • G06F 12/10 - Address translation
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 12/14 - Protection against unauthorised use of memory
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules

50.

SYSTEM AND METHODS FOR SPAM DETECTION USING FREQUENCY SPECTRA OF CHARACTER STRINGS

      
Application Number RO2012000022
Publication Number 2013/112061
Status In Force
Filing Date 2012-09-05
Publication Date 2013-08-01
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Dichiu, Daniel
  • Lupsescu, Z. Lucian

Abstract

Described spam detection techniques including string identification, pre-filtering, and frequency spectrum and timestamp comparison steps facilitate accurate, computationally-efficient detection of rapidly-changing spam arriving in short-lasting waves. In some embodiments, a computer system extracts a target character string from an electronic communication such as a blog comment, transmits it to an anti-spam server, and receives an indicator of whether the respective electronic communication is spam or non-spam from the anti-spam server. The anti-spam server determines whether the electronic communication is spam or non-spam according to features of the frequency spectrum of the target string. Some embodiments also perform an unsupervised clustering of incoming target strings into clusters, wherein all members of a cluster have similar spectra.

IPC Classes  ?

51.

SYSTEMS AND METHODS FOR SPAM DETECTION USING CHARACTER HISTOGRAMS

      
Application Number RO2012000023
Publication Number 2013/112062
Status In Force
Filing Date 2012-09-05
Publication Date 2013-08-01
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Dichiu, Daniel
  • Lupsescu Z. Lucian

Abstract

Described spam detection techniques including string identification, pre-filtering, and character histogram and timestamp comparison steps facilitate accurate, computationally-efficient detection of rapidly-changing spam arriving in short-lasting waves. In some embodiments, a computer system extracts a target character string from an electronic communication such as a blog comment, transmits it to an anti-spam server, and receives an indicator of whether the respective electronic communication is spam or non-spam from the anti-spam server. The anti- spam server determines whether the electronic communication is spam or non-spam according to certain features of the character histogram of the target string. Some embodiments also perform an unsupervised clustering of incoming target strings into clusters, wherein all members of a cluster have similar character histograms.

IPC Classes  ?

52.

ONLINE FRAUD DETECTION DYNAMIC SCORING AGGREGATION SYSTEMS AND METHODS

      
Application Number RO2012000021
Publication Number 2013/109156
Status In Force
Filing Date 2012-09-05
Publication Date 2013-07-25
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Tibeica, N. Marius
  • Damian, O. Alin
  • Visan, L. Razvan

Abstract

In some embodiments, an online fraud prevention system combines the output of several distinct fraud filters, to produce an aggregate score indicative of the likelihood that a surveyed target document (e.g. webpage, email) is fraudulent. Newly implemented fraud filters can be incorporated and ageing fraud filters can be phased out without the need to recalculate individual scores or to renormalize the aggregate fraud score. Every time the output of an individual filter is calculated, the aggregate score is updated in a manner which ensures the aggregate score remains within predetermined bounds defined by a minimum allowable score and a maximum allowable score (e.g., 0 to 100).

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

53.

FUZZY WHITELISTING ANTI-MALWARE SYSTEMS AND METHODS

      
Application Number RO2012000020
Publication Number 2013/089576
Status In Force
Filing Date 2012-09-05
Publication Date 2013-06-20
Owner BITDEFENDER IPR MANAGEMENT LTD (Cyprus)
Inventor
  • Tofan, I. Vlad
  • Dudea, V. Sorin
  • Canja, D. Viroel

Abstract

In some embodiments, an anti-malware system accounts for benign differences between non- malicious data objects, such as differences introduced by compilers and other polymorphisms. A target object is separated into a multitude of code blocks, and a hash is calculated for each code block. The obtained set of target hashes is then compared against a database of hashes corresponding to code blocks extracted from whitelisted objects. A target object may be labeled as whitelisted (trusted, non-malicious) if it has a substantial number of hashes in common with a whitelisted object. Objects which are slightly different from known whitelisted objects may still receive whitelisting status. By allowing a certain degree of mismatch between the sets of hashes of distinct objects, some embodiments of the present invention increase the efficiency of whitelisting without an unacceptable decrease in safety.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements