Cylance, Inc.

United States of America

Back to Profile

1-100 of 111 for Cylance, Inc. Sort by
Query
Patent
United States - USPTO
Aggregations Reset Report
Date
2023 1
2022 6
2021 10
2020 20
2019 16
See more
IPC Class
G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements 64
G06N 20/00 - Machine learning 50
H04L 29/06 - Communication control; Communication processing characterised by a protocol 39
G06N 3/08 - Learning methods 21
G06N 3/04 - Architecture, e.g. interconnection topology 20
See more
Status
Pending 3
Registered / In Force 108
Found results for  patents
  1     2        Next Page

1.

CLUSTERING ANALYSIS FOR DEDUPLICATION OF TRAINING SET SAMPLES FOR MACHINE LEARNING BASED COMPUTER THREAT ANALYSIS

      
Application Number 18179248
Status Pending
Filing Date 2023-03-06
First Publication Date 2023-06-29
Owner Cylance Inc. (USA)
Inventor Brock, John

Abstract

A method, a system, and a computer program product for performing analysis of data to detect presence of malicious code are disclosed. Reduced dimensionality vectors are generated from a plurality of original dimensionality vectors representing features in a plurality of samples. The reduced dimensionality vectors have a lower dimensionality than an original dimensionality of the plurality of original dimensionality vectors. A first plurality of clusters is determined by applying a first clustering algorithm to the reduced dimensionality vectors. A second plurality of clusters is determined by applying a second clustering algorithm to one or more clusters in the first plurality of clusters using the original dimensionality. An exemplar for a cluster in the second plurality of clusters is added to a training set, which is used to train a machine learning model for identifying a file containing malicious code.

IPC Classes  ?

  • G06N 20/00 - Machine learning
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G05B 13/02 - Adaptive control systems, i.e. systems automatically adjusting themselves to have a performance which is optimum according to some preassigned criterion electric
  • G06F 18/23 - Clustering techniques
  • G06F 18/28 - Determining representative reference patterns, e.g. by averaging or distorting; Generating dictionaries
  • G06F 18/232 - Non-hierarchical techniques

2.

METHODS FOR CONVERTING HIERARCHICAL DATA

      
Application Number 17351018
Status Pending
Filing Date 2021-06-17
First Publication Date 2022-12-22
Owner Cylance Inc. (USA)
Inventor
  • Oliinyk, Yaroslav
  • Beveridge, David Neill
  • Liebson, David Michael
  • Jia, Lichun Lily
  • Petersen, Eric Glen

Abstract

Systems, methods, and software can be used for securing in-tunnel messages. One example of a method includes obtaining a parsed file that comprises two or more sub-feature trees, and each of the two or more sub-feature trees comprise at least one feature layer that comprises features. The method further includes generating a feature vector that identifies the features in the at least one feature layer for each of the two or more sub-feature trees. The method yet further includes mapping the features in the at least one feature layer for each of the one or more sub-feature trees to a corresponding position in the feature vector. By converting features in the parsed file into a feature vector, the method provides an applicable format of the feature vector in wide applications for the parsed file.

IPC Classes  ?

  • G06N 3/08 - Learning methods
  • G06K 9/62 - Methods or arrangements for recognition using electronic means
  • G06F 16/28 - Databases characterised by their database models, e.g. relational or object models
  • G06F 16/901 - Indexing; Data structures therefor; Storage structures
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system

3.

Indicator centroids for malware handling

      
Application Number 16796843
Grant Number 11501120
Status In Force
Filing Date 2020-02-20
First Publication Date 2022-11-15
Grant Date 2022-11-15
Owner Cylance Inc. (USA)
Inventor
  • Petersen, Eric Glen
  • Hohimer, Michael Alan
  • Luan, Jian
  • Wolff, Matthew
  • Wallace, Brian Michael

Abstract

An artifact is received and features are extracted therefrom to form a feature vector. Thereafter, a determination is made to alter a malware processing workflow based on a distance of one or more features in the feature vector relative to one or more indicator centroids. Each indicator centroid specifying a threshold distance to trigger an action. Based on such a determination, the malware processing workflow is altered.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06K 9/62 - Methods or arrangements for recognition using electronic means
  • G06T 7/60 - Analysis of geometric attributes
  • G06N 3/08 - Learning methods
  • G06F 16/16 - File or folder operations, e.g. details of user interfaces specifically adapted to file systems
  • G06N 3/04 - Architecture, e.g. interconnection topology
  • G06N 20/00 - Machine learning

4.

Clustering software codes in scalable manner

      
Application Number 17235524
Grant Number 11880391
Status In Force
Filing Date 2021-04-20
First Publication Date 2022-10-20
Grant Date 2024-01-23
Owner CYLANCE, INC. (USA)
Inventor
  • Paranjape, Sameer Shashikant
  • Boersma, Bronson
  • Greer, David Alan

Abstract

Systems, methods, and software can be used to cluster software codes in a scalable manner. In some aspects, a computer-implemented method comprises: obtaining a plurality of software samples; computing one or more first hash results for each of the plurality of software samples; computing one or more second hash results for each of the plurality of software samples based on the one or more first hash results, wherein an amount of the one or more second hash results is less than an amount of the one or more first hash results; determining a similarity output based on the one or more second hash results of two of the plurality of software samples; and clustering the plurality of software samples based on the similarity output to generate one or more software sample clusters.

IPC Classes  ?

  • G06F 16/28 - Databases characterised by their database models, e.g. relational or object models
  • G06F 16/22 - Indexing; Data structures therefor; Storage structures

5.

Statistical data fingerprinting and tracing data similarity of documents

      
Application Number 17132767
Grant Number 11430244
Status In Force
Filing Date 2020-12-23
First Publication Date 2022-06-23
Grant Date 2022-08-30
Owner Cylance Inc. (USA)
Inventor
  • Beveridge, David Neill
  • Liebson, David Michael
  • Oliinyk, Yaroslav

Abstract

A method and computing device for statistical data fingerprinting and tracing data similarity of documents. The method comprises applying a statistical function to a subset of text in a first document thereby generating a first fingerprint; applying the statistical function to a subset of text in a second document thereby generating a second fingerprint; comparing the first fingerprint to the second fingerprint; and determining that the subset of text in the first document matches the subset of text in the second document based on the first fingerprint threshold matching the second fingerprint, wherein the statistical function is a measure of randomness of a count of each character in a subset of text against an expected distribution of said characters.

IPC Classes  ?

  • G06V 30/418 - Document matching, e.g. of document images
  • G06K 9/62 - Methods or arrangements for recognition using electronic means
  • G06F 17/18 - Complex mathematical operations for evaluating statistical data
  • G06F 40/279 - Recognition of textual entities
  • G06V 10/75 - Image or video pattern matching; Proximity measures in feature spaces using context analysis; Selection of dictionaries
  • G06F 17/00 - Digital computing or data processing equipment or methods, specially adapted for specific functions

6.

Bayesian continuous user authentication

      
Application Number 17085984
Grant Number 11544358
Status In Force
Filing Date 2020-10-30
First Publication Date 2022-05-05
Grant Date 2023-01-03
Owner Cylance Inc. (USA)
Inventor
  • Wojnowicz, Michael Thomas
  • Nguyen, Dinh Huu
  • Kohn, Alexander Wolfe

Abstract

Bayesian continuous user authentication can be obtained by receiving observed behavior data that collectively characterizes interaction of an active user with at least one computing device or software application. A sequence of events within the observed behavior data can be identified and scored using a universal background model that generates first scores that characterize an extent to which each event or history of events is anomalous for a particular population of users. Further, the events are scored using a user model that generates second scores that characterizes an extent to which each event or history of events is anomalous for the particular user who owns the account. The first scores and the second scores are smoothed using a smoothing function. A probability that the active user is the account owner associated with the user model is determined based on the smoothed first scores and the smoothed second scores.

IPC Classes  ?

  • G06F 21/31 - User authentication
  • G06N 7/00 - Computing arrangements based on specific mathematical models

7.

Computer user authentication using machine learning

      
Application Number 17541110
Grant Number 11893096
Status In Force
Filing Date 2021-12-02
First Publication Date 2022-03-24
Grant Date 2024-02-06
Owner Cylance Inc. (USA)
Inventor
  • Grajek, Garret Florian
  • Lo, Jeffrey
  • Wojnowicz, Michael Thomas
  • Nguyen, Dinh Huu
  • Slawinski, Michael Alan

Abstract

Systems and methods are described herein for computer user authentication using machine learning. Authentication for a user is initiated based on an identification confidence score of the user. The identification confidence score is based on one or more characteristics of the user. Using a machine learning model for the user, user activity of the user is monitored for anomalous activity to generate first data. Based on the monitoring, differences between the first data and historical utilization data for the user determine whether the user's utilization of the one or more resources is anomalous. When the user's utilization of the one or more resource is anomalous, the user's access to the one or more resource is removed.

IPC Classes  ?

8.

Detecting malware with deep generative models

      
Application Number 16887586
Grant Number 11637858
Status In Force
Filing Date 2020-05-29
First Publication Date 2021-12-02
Grant Date 2023-04-25
Owner Cylance Inc. (USA)
Inventor Wojnowicz, Michael Thomas

Abstract

Features are extracted from an artifact so that a vector can be populated. The vector is then inputted into an anomaly detection model comprising a deep generative model to generate a first score. The first score can characterize the artifact as being malicious or benign to access, execute, or continue to execute. In addition, the vector is inputted into a machine learning-based classification model to generate a second score. The second score can also characterize the artifact as being malicious or benign to access, execute, or continue to execute. The second score is then modified based on the first score to result in a final score. The final score can then be provided to a consuming application or process. Related apparatus, systems, techniques and articles are also described.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06N 7/00 - Computing arrangements based on specific mathematical models
  • H04L 9/06 - Arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems

9.

Projected vector modification as mitigation for machine learning model string stuffing

      
Application Number 16832778
Grant Number 11604871
Status In Force
Filing Date 2020-03-27
First Publication Date 2021-09-30
Grant Date 2023-03-14
Owner Cylance Inc. (USA)
Inventor Petersen, Eric Glen

Abstract

An artifact is received from which features are extracted so as to populate a vector. The features in the vector can be reduced using a feature reduction operations to result in a modified vector having a plurality of buckets. A presence of predetermined types of features are identified within buckets of the modified vector influencing a score above a pre-determined threshold. A contribution of the identified features within the high influence buckets of the modified vector is then attenuated. The modified vector is input into a classification model to generate a score which can be provided to a consuming application or process. Related apparatus, systems, techniques and articles are also described.

IPC Classes  ?

  • G06F 21/52 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06N 20/00 - Machine learning
  • G06N 5/04 - Inference or reasoning models

10.

Projected vector overflow penalty as mitigation for machine learning model string stuffing

      
Application Number 16798120
Grant Number 11636202
Status In Force
Filing Date 2020-02-21
First Publication Date 2021-08-26
Grant Date 2023-04-25
Owner Cylance Inc. (USA)
Inventor Petersen, Eric Glen

Abstract

An artifact is received from which features are extracted and used to populate a vector. The features in the vector are then reduced using a feature reduction operation to result in a modified vector having a plurality of buckets. Features within the buckets of the modified vector above a pre-determined projected bucket clipping threshold are then identified. Using the identified features, and overflow vector is then generated. The modified vector is then input into a classification model to generate a score. This score is adjusted based on the overflow vector and can then be provided to a consuming application or process. Related apparatus, systems, techniques and articles are also described.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06N 20/00 - Machine learning
  • G06N 5/00 - Computing arrangements using knowledge-based models
  • G06N 5/04 - Inference or reasoning models

11.

Machine learning model for analysis of instruction sequences

      
Application Number 17127908
Grant Number 11797826
Status In Force
Filing Date 2020-12-18
First Publication Date 2021-08-19
Grant Date 2023-10-24
Owner Cylance Inc. (USA)
Inventor
  • Zhao, Xuan
  • Wolff, Matthew
  • Brock, John
  • Wallace, Brian
  • Wortman, Andy
  • Luan, Jian
  • Azarafrooz, Mahdi
  • Davis, Andrew
  • Wojnowicz, Michael
  • Soeder, Derek
  • Beveridge, David
  • Petersen, Eric
  • Jin, Ming
  • Permeh, Ryan

Abstract

A system is provided for classifying an instruction sequence with a machine learning model. The system may include at least one processor and at least one memory. The memory may include program code that provides operations when executed by the at least one processor. The operations may include: processing an instruction sequence with a trained machine learning model configured to detect one or more interdependencies amongst a plurality of tokens in the instruction sequence and determine a classification for the instruction sequence based on the one or more interdependencies amongst the plurality of tokens; and providing, as an output, the classification of the instruction sequence. Related methods and articles of manufacture, including computer program products, are also provided.

IPC Classes  ?

  • G06N 3/044 - Recurrent networks, e.g. Hopfield networks
  • G06N 20/00 - Machine learning
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

12.

Machine learning model score obfuscation using step function, position-dependent noise

      
Application Number 16951943
Grant Number 11113579
Status In Force
Filing Date 2020-11-18
First Publication Date 2021-03-11
Grant Date 2021-09-07
Owner Cylance Inc. (USA)
Inventor
  • Buckingham, Hailey
  • Beveridge, David N.

Abstract

An artefact is received. Features are extracted from this artefact which are, in turn, used to populate a vector. The vector is then input into a classification model to generate a score. The score is then modified using a step function so that the true score is not obfuscated. Thereafter, the modified score can be provided to a consuming application or process. Related apparatus, systems, techniques and articles are also described.

IPC Classes  ?

  • G06K 9/62 - Methods or arrangements for recognition using electronic means
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06N 20/10 - Machine learning using kernel methods, e.g. support vector machines [SVM]

13.

Prevention of hash-based API importing

      
Application Number 16953154
Grant Number 11403231
Status In Force
Filing Date 2020-11-19
First Publication Date 2021-03-11
Grant Date 2022-08-02
Owner Cylance Inc. (USA)
Inventor Tang, Jeffrey

Abstract

Hash-based application programming interface (API) importing can be prevented by allocating a name page and a guard page in memory. The name page and the guard page being associated with (i) an address of names array, (ii) an address of name ordinal array, and (iii) an address of functions array that are all generated by an operating system upon initiation of an application. The name page can then be filled with valid non-zero characters. Thereafter, protections on the guard page can be changed to no access. An entry is inserted into the address of names array pointing to a relative virtual address corresponding to anywhere within the name page. Access to the guard page causes the requesting application to terminate. Related apparatus, systems, techniques and articles are also described.

IPC Classes  ?

  • G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures
  • G06F 12/1018 - Address translation using page tables, e.g. page table structures involving hashing techniques, e.g. inverted page tables
  • G06F 9/30 - Arrangements for executing machine instructions, e.g. instruction decode
  • G06F 9/54 - Interprogram communication
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

14.

Prevention of hash-based API importing

      
Application Number 16516827
Grant Number 10909042
Status In Force
Filing Date 2019-07-19
First Publication Date 2021-01-21
Grant Date 2021-02-02
Owner Cylance Inc. (USA)
Inventor Tang, Jeffrey

Abstract

Hash-based application programming interface (API) importing can be prevented by allocating a name page and a guard page in memory. The name page and the guard page being associated with (i) an address of names array, (ii) an address of name ordinal array, and (iii) an address of functions array that are all generated by an operating system upon initiation of an application. The name page can then be filled with valid non-zero characters. Thereafter, protections on the guard page can be changed to no access. An entry is inserted into the address of names array pointing to a relative virtual address corresponding to anywhere within the name page. Access to the guard page causes the requesting application to terminate. Related apparatus, systems, techniques and articles are also described.

IPC Classes  ?

  • G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures
  • G06F 12/1018 - Address translation using page tables, e.g. page table structures involving hashing techniques, e.g. inverted page tables
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 9/30 - Arrangements for executing machine instructions, e.g. instruction decode
  • G06F 9/54 - Interprogram communication

15.

Memory space protection

      
Application Number 17031616
Grant Number 11409669
Status In Force
Filing Date 2020-09-24
First Publication Date 2021-01-14
Grant Date 2022-08-09
Owner Cylance Inc. (USA)
Inventor
  • Norris, Michael Ray
  • Soeder, Derek A.

Abstract

Executable memory space is protected by receiving, from a process, a request to configure a portion of memory with a memory protection attribute that allows the process to perform at least one memory operation on the portion of the memory. Thereafter, the request is responded to with a grant, configuring the portion of memory with a different memory protection attribute than the requested memory protection attribute. The different memory protection attribute restricting the at least one memory operation from being performed by the process on the portion of the memory. In addition, it is detected when the process attempts, in accordance with the grant, the at least one memory operation at the configured portion of memory. Related systems and articles of manufacture, including computer program products, are also disclosed.

IPC Classes  ?

  • G06F 12/14 - Protection against unauthorised use of memory
  • G06F 21/79 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules

16.

Centroid for improving machine learning classification and info retrieval

      
Application Number 17024439
Grant Number 11568185
Status In Force
Filing Date 2020-09-17
First Publication Date 2021-01-07
Grant Date 2023-01-31
Owner Cylance Inc. (USA)
Inventor
  • Luan, Jian
  • Wolff, Matthew
  • Wallace, Brian Michael

Abstract

Centroids are used for improving machine learning classification and information retrieval. A plurality of files are classified as malicious or not malicious based on a function dividing a coordinate space into at least a first portion and a second portion such that the first portion includes a first subset of the plurality of files classified as malicious. One or more first centroids are defined in the first portion that classify files from the first subset as not malicious. A file is determined to be malicious based on whether the file is located within the one or more first centroids.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06K 9/62 - Methods or arrangements for recognition using electronic means
  • G06T 7/60 - Analysis of geometric attributes
  • G06N 20/00 - Machine learning
  • G06F 16/16 - File or folder operations, e.g. details of user interfaces specifically adapted to file systems
  • G06N 3/04 - Architecture, e.g. interconnection topology
  • G06N 3/08 - Learning methods

17.

Endpoint detection and response system with endpoint-based artifact storage

      
Application Number 17029996
Grant Number 11528282
Status In Force
Filing Date 2020-09-23
First Publication Date 2021-01-07
Grant Date 2022-12-13
Owner Cylance Inc. (USA)
Inventor
  • Strong, Homer Valentine
  • Permeh, Ryan
  • Oswald, Samuel John

Abstract

Each of a plurality of endpoint computer systems monitors data relating to a plurality of events occurring within an operating environment of the corresponding endpoint computer system. The monitoring can include receiving and/or inferring the data using one or more sensors executing on the endpoint computer systems Thereafter, for each endpoint computer system, artifacts used in connection with the events are stored in a vault maintained on such endpoint computer system. A query is later received by at least a subset of the plurality of endpoint computer systems from a server. Such endpoint computer systems, in response, identify and retrieve artifacts within the corresponding vaults response to the query. Results responsive to the query including or characterizing the identified artifacts is then provided by the endpoint computer systems receiving the query to the server.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06N 5/04 - Inference or reasoning models
  • G06N 20/00 - Machine learning
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/31 - User authentication
  • G06F 16/28 - Databases characterised by their database models, e.g. relational or object models
  • H04L 43/04 - Processing captured monitoring data, e.g. for logfile generation

18.

Machine learning model score obfuscation using multiple classifiers

      
Application Number 16399665
Grant Number 11586975
Status In Force
Filing Date 2019-04-30
First Publication Date 2020-11-05
Grant Date 2023-02-21
Owner Cylance Inc. (USA)
Inventor
  • Beveridge, David N.
  • Buckingham, Hailey

Abstract

An artefact is received. Thereafter, features are extracted from the artefact and a vector is populated. Later, one of a plurality of available classification models is selected. The classification models use different scoring paradigms while providing the same or substantially similar classifications. The vector is input into the selected classification model to generate a score. The score is later provided to a consuming application or process. The classification model can characterize the artefact as being malicious or benign to access, execute, or continue to execute so that appropriate remedial action can be taken or initiated by the consuming application or process. Related apparatus, systems, techniques and articles are also described.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/14 - Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
  • G06N 20/00 - Machine learning
  • G06N 5/048 - Fuzzy inferencing

19.

Machine learning model score obfuscation using step function, position-dependent noise

      
Application Number 16399677
Grant Number 10963752
Status In Force
Filing Date 2019-04-30
First Publication Date 2020-11-05
Grant Date 2021-03-30
Owner Cylance Inc. (USA)
Inventor
  • Buckingham, Hailey
  • Beveridge, David N.

Abstract

An artefact is received. Features are extracted from this artefact which are, in turn, used to populate a vector. The vector is then input into a classification model to generate a score. The score is then modified using a step function so that the true score is not obfuscated. Thereafter, the modified score can be provided to a consuming application or process. Related apparatus, systems, techniques and articles are also described.

IPC Classes  ?

  • G06K 9/62 - Methods or arrangements for recognition using electronic means
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06N 20/10 - Machine learning using kernel methods, e.g. support vector machines [SVM]

20.

Machine learning model score obfuscation using time-based score oscillations

      
Application Number 16399718
Grant Number 11580442
Status In Force
Filing Date 2019-04-30
First Publication Date 2020-11-05
Grant Date 2023-02-14
Owner Cylance Inc. (USA)
Inventor
  • Buckingham, Hailey
  • Beveridge, David N.

Abstract

An artefact is received. Features are later extracted from the artefact and are used to populate a vector. The vector is input into a classification model to generate a score. This score is then modified using a time-based oscillation function and is provided to a consuming application or process. Related apparatus, systems, techniques and articles are also described.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06N 20/00 - Machine learning

21.

Machine learning model score obfuscation using coordinated interleaving

      
Application Number 16399735
Grant Number 11562290
Status In Force
Filing Date 2019-04-30
First Publication Date 2020-11-05
Grant Date 2023-01-24
Owner Cylance Inc. (USA)
Inventor Buckingham, Hailey

Abstract

An artefact is received. Features are extracted from this artefact which are, in turn, used to populate a vector. The vector is then input into a classification model to generate a score. The score is then modified to result in a modified score by interleaving the generated score or a mapping thereof into digits of a pseudo-score. Thereafter, the modified score can be provided to a consuming application or process. Related apparatus, systems, techniques and articles are also described.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06N 20/00 - Machine learning
  • G06N 5/04 - Inference or reasoning models

22.

Machine learning model score obfuscation using vector modification techniques

      
Application Number 16399701
Grant Number 10997471
Status In Force
Filing Date 2019-04-30
First Publication Date 2020-11-05
Grant Date 2021-05-04
Owner Cylance Inc. (USA)
Inventor
  • Beveridge, David N.
  • Buckingham, Hailey

Abstract

An artefact is received. Features from such artefact are extracted and then populated in a vector. Subsequently, one of a plurality of available dimension reduction techniques are selected. Using the selected dimension reduction technique, the features in the vector are reduced. The vector is then input into a classification model and the score can be provided to a consuming application or process. Related apparatus, systems, techniques and articles are also described.

IPC Classes  ?

  • G06K 9/62 - Methods or arrangements for recognition using electronic means
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06N 20/10 - Machine learning using kernel methods, e.g. support vector machines [SVM]
  • G06N 3/00 - Computing arrangements based on biological models
  • G06F 21/14 - Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
  • G06N 3/04 - Architecture, e.g. interconnection topology

23.

System abnormality detection using signal fingerprinting

      
Application Number 16399812
Grant Number 11182477
Status In Force
Filing Date 2019-04-30
First Publication Date 2020-11-05
Grant Date 2021-11-23
Owner Cylance Inc. (USA)
Inventor
  • Walthinsen, Erik
  • Carey, Mark
  • Bathurst, Donald

Abstract

Systems, methods, and devices are described herein for detecting abnormalities within a system based on signal fingerprinting. A plurality of electrical signals are concurrently received from a transceiver over a time period. The time period is partitioned into a plurality of sampling windows. An electrical signal of the plurality of electrical signals is sequentially selected. For the sequentially selected electrical signal, a temporal snapshot of said electrical signal is iteratively captured over a sampling window of the plurality of sampling windows. This iterative capturing is repeated for remaining sampling windows of the plurality of sampling windows. Each captured temporal snapshot is temporally concatenated over the time period according to its respective temporal position of the time period to generate the signal fingerprint.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

24.

Communications bus signal fingerprinting

      
Application Number 16932335
Grant Number 11316870
Status In Force
Filing Date 2020-07-17
First Publication Date 2020-11-05
Grant Date 2022-04-26
Owner Cylance Inc. (USA)
Inventor
  • Bathurst, Donald
  • Carey, Mark

Abstract

Systems are provided herein for communications bus signal fingerprinting. A security module monitors a plurality of voltage lines of at least one electronic control unit (ECU) electrically coupled to a communications bus. A voltage differential across at least two of the plurality of voltage lines of the at least one ECU is measured. The voltage differential is compared to a plurality of predetermined signal fingerprints associated with the at least one ECU. A variance in the compared voltage differential is identified relative to one or more of the plurality of predetermined signal fingerprints. Data characterizing the identified variance is provided.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

25.

Protecting Devices From Malicious Files Based on N-Gram Processing of Sequential Data

      
Application Number 16930206
Status Pending
Filing Date 2020-07-15
First Publication Date 2020-10-29
Owner Cylance Inc. (USA)
Inventor
  • Li, Li
  • Zhao, Xuan
  • Akhavan-Masouleh, Sepehr
  • Brock, John Hendershott
  • Oliinyk, Yaroslav
  • Wolff, Matthew

Abstract

Under one aspect, a method is provided for protecting a device from a malicious file. The method can be implemented by one or more data processors forming part of at least one computing device and can include extracting from the file, by at least one data processor, sequential data comprising discrete tokens. The method also can include generating, by at least one data processor, n-grams of the discrete tokens. The method also can include generating, by at least one data processor, a vector of weights based on respective frequencies of the n-grams. The method also can include determining, by at least one data processor and based on a statistical analysis of the vector of weights, that the file is likely to be malicious. The method also can include initiating, by at least one data processor and responsive to determining that the file is likely to be malicious, a corrective action.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06N 20/00 - Machine learning

26.

Endpoint detection and response utilizing machine learning

      
Application Number 16882309
Grant Number 11494490
Status In Force
Filing Date 2020-05-22
First Publication Date 2020-09-10
Grant Date 2022-11-08
Owner Cylance Inc. (USA)
Inventor
  • Kashyap, Rahul Chander
  • Kotov, Vadim Dmitriyevich
  • Oswald, Samuel John
  • Strong, Homer Valentine

Abstract

A plurality of events associated with each of a plurality of computing nodes that form part of a network topology are monitored. The network topology includes antivirus tools to detect malicious software prior to it accessing one of the computing nodes. Thereafter, it is determined that, using at least one machine learning model, at least one of the events is indicative of malicious activity that has circumvented or bypassed the antivirus tools. Data is then provided that characterizes the determination. Related apparatus, systems, techniques and articles are also described.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06N 20/00 - Machine learning
  • H04L 9/40 - Network security protocols
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06N 3/00 - Computing arrangements based on biological models

27.

Machine learning model for malware dynamic analysis

      
Application Number 16867440
Grant Number 11556648
Status In Force
Filing Date 2020-05-05
First Publication Date 2020-08-20
Grant Date 2023-01-17
Owner Cylance Inc. (USA)
Inventor
  • Zhao, Xuan
  • Kapoor, Aditya
  • Wolff, Matthew
  • Davis, Andrew
  • Soeder, Derek A.
  • Permeh, Ryan

Abstract

In some implementations there may be provided a system. The system may include a processor and a memory. The memory may include program code which causes operations when executed by the processor. The operations may include analyzing a series of events contained in received data. The series of events may include events that occur during the execution of a data object. The series of events may be analyzed to at least extract, from the series of events, subsequences of events. A machine learning model may determine a classification for the received data. The machine learning model may classify the received data based at least on whether the subsequences of events are malicious. The classification indicative of whether the received data is malicious may be provided. Related methods and articles of manufacture, including computer program products, are also disclosed.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06N 3/08 - Learning methods
  • G06N 20/00 - Machine learning
  • G06N 3/04 - Architecture, e.g. interconnection topology
  • G06N 5/02 - Knowledge representation; Symbolic representation
  • G06N 7/00 - Computing arrangements based on specific mathematical models
  • G06F 3/048 - Interaction techniques based on graphical user interfaces [GUI]
  • G06N 5/00 - Computing arrangements using knowledge-based models
  • G06N 20/20 - Ensemble learning
  • G06N 20/10 - Machine learning using kernel methods, e.g. support vector machines [SVM]

28.

Password-less software system user authentication

      
Application Number 16862219
Grant Number 11709922
Status In Force
Filing Date 2020-04-29
First Publication Date 2020-08-13
Grant Date 2023-07-25
Owner Cylance Inc. (USA)
Inventor
  • Grajek, Garret Florian
  • Lo, Jeffrey
  • Strong, Homer Valentine
  • Dai, Wulun

Abstract

Data is received as part of an authentication procedure to identify a user. Such data characterizes a user-generated biometric sequence that is generated by the user interacting with at least one input device according to a desired biometric sequence. Thereafter, using the received data and at least one machine learning model trained using empirically derived historical data generated by a plurality of user-generated biometric sequences (e.g., historical user-generated biometric sequences according to the desired biometric sequence, etc.), the user is authenticated if an output of the at least one machine learning model is above a threshold. Data can be provided that characterizes the authenticating. Related apparatus, systems, techniques and articles are also described.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • G06N 5/022 - Knowledge engineering; Knowledge acquisition
  • G06F 21/40 - User authentication by quorum, i.e. whereby two or more security principals are required
  • G06K 9/62 - Methods or arrangements for recognition using electronic means
  • G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
  • H04L 9/40 - Network security protocols
  • G06F 21/36 - User authentication by graphic or iconic representation
  • H04W 12/68 - Gesture-dependent or behaviour-dependent

29.

Container file analysis using machine learning model

      
Application Number 16861026
Grant Number 11283818
Status In Force
Filing Date 2020-04-28
First Publication Date 2020-08-13
Grant Date 2022-03-22
Owner Cylance Inc. (USA)
Inventor
  • Zhao, Xuan
  • Wolff, Matthew
  • Brock, John
  • Wallace, Brian Michael
  • Wortman, Andy
  • Luan, Jian
  • Azarafrooz, Mahdi
  • Davis, Andrew
  • Wojnowicz, Michael Thomas
  • Soeder, Derek A.
  • Beveridge, David N.
  • Oliinyk, Yaroslav
  • Permeh, Ryan

Abstract

A system is provided for training a machine learning model to detect malicious container files. The system may include at least one processor and at least one memory. The memory may include program code which when executed by the at least one processor provides operations including: processing a container file with a trained machine learning model, wherein the trained machine learning is trained to determine a classification for the container file indicative of whether the container file includes at least one file rendering the container file malicious; and providing, as an output by the trained machine learning model, an indication of whether the container file includes the at least one file rendering the container file malicious. Related methods and articles of manufacture, including computer program products, are also disclosed.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06N 3/08 - Learning methods
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06N 20/10 - Machine learning using kernel methods, e.g. support vector machines [SVM]
  • G06N 3/04 - Architecture, e.g. interconnection topology

30.

Malware detection

      
Application Number 16826033
Grant Number 11928213
Status In Force
Filing Date 2020-03-20
First Publication Date 2020-07-09
Grant Date 2024-03-12
Owner Cylance Inc. (USA)
Inventor
  • Davis, Andrew
  • Wolff, Matthew
  • Soeder, Derek A.
  • Chisholm, Glenn
  • Permeh, Ryan

Abstract

In one respect, there is provided a system for training a neural network adapted for classifying one or more scripts. The system may include at least one processor and at least one memory. The memory may include program code which when executed by the at least one memory provides operations including: receiving a disassembled binary file that includes a plurality of instructions; processing the disassembled binary file with a convolutional neural network configured to detect a presence of one or more sequences of instructions amongst the plurality of instructions and determine a classification for the disassembled binary file based at least in part on the presence of the one or more sequences of instructions; and providing, as an output, the classification of the disassembled binary file. Related computer-implemented methods are also disclosed.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06N 3/08 - Learning methods

31.

Deployment of machine learning models for discernment of threats

      
Application Number 16813529
Grant Number 11113398
Status In Force
Filing Date 2020-03-09
First Publication Date 2020-07-02
Grant Date 2021-09-07
Owner Cylance Inc. (USA)
Inventor
  • Harms, Kristopher William
  • Song, Renee
  • Rajamani, Raj
  • Rusell, Braden
  • Sohn, Yoojin
  • Ipsen, Kiefer

Abstract

A mismatch between model-based classifications produced by a first version of a machine learning threat discernment model and a second version of a machine learning threat discernment model for a file is detected. The mismatch is analyzed to determine appropriate handling for the file, and taking an action based on the analyzing. The analyzing includes comparing a human-generated classification status for a file, a first model version status that reflects classification by the first version of the machine learning threat discernment model, and a second model version status that reflects classification by the second version of the machine learning threat discernment model. The analyzing can also include allowing the human-generated classification status to dominate when it is available.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06N 20/00 - Machine learning
  • G06F 21/51 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 3/048 - Interaction techniques based on graphical user interfaces [GUI]

32.

Machine learning classification using Markov modeling

      
Application Number 16804904
Grant Number 11381580
Status In Force
Filing Date 2020-02-28
First Publication Date 2020-06-25
Grant Date 2022-07-05
Owner Cylance Inc. (USA)
Inventor
  • Luan, Jian
  • Soeder, Derek A.

Abstract

Systems, methods, and articles of manufacture, including computer program products, are provided for classification systems and methods using modeling. In some example embodiments, there is provided a system that includes at least one processor and at least one memory including program code which when executed by the at least one memory provides operations. The operations can include generating a representation of a sequence of sections of a file and/or determining, from a model including conditional probabilities, a probability for each transition between at least two sequential sections in the representation. The operations can further include classifying the file based on the probabilities for each transition.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/40 - Network security protocols
  • G06N 3/04 - Architecture, e.g. interconnection topology
  • G06N 20/00 - Machine learning
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06N 7/00 - Computing arrangements based on specific mathematical models

33.

Detection of malware using feature hashing

      
Application Number 16799419
Grant Number 11188650
Status In Force
Filing Date 2020-02-24
First Publication Date 2020-06-18
Grant Date 2021-11-30
Owner Cylance Inc. (USA)
Inventor Davis, Andrew

Abstract

Data is analyzed using feature hashing to detect malware. A plurality of features in a feature set is hashed. The feature set is generated from a sample. The sample includes at least a portion of a file. Based on the hashing, one or more hashed features are indexed to generate an index vector. Each hashed feature corresponds to an index in the index vector. Using the index vector, a training dataset is generated. Using the training dataset, a machine learning model for identifying at least one file having a malicious code is trained.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06N 5/02 - Knowledge representation; Symbolic representation
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06N 20/00 - Machine learning

34.

Artefact classification using xenospace centroids

      
Application Number 16219616
Grant Number 11386308
Status In Force
Filing Date 2018-12-13
First Publication Date 2020-06-18
Grant Date 2022-07-12
Owner Cylance Inc. (USA)
Inventor
  • Beveridge, David N.
  • Buckingham, Hailey
  • Oliinyk, Yaroslav
  • Petersen, Eric

Abstract

An artefact is received and parsed into a plurality of observations. A first subset of the observations are inputted into a machine learning model trained using historical data to classify the artefact. In addition, a second subset of the observations are inputted into a xenospace centroid configured to classify the artefact. Thereafter, the artefact is classified based on a combination of an output of the machine learning model and an output of xenospace centroid. Related apparatus, systems, techniques and articles are also described.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06K 9/62 - Methods or arrangements for recognition using electronic means
  • G06N 20/00 - Machine learning

35.

Verifying user identity through human / computer interaction

      
Application Number 16183411
Grant Number 11095642
Status In Force
Filing Date 2018-11-07
First Publication Date 2020-05-07
Grant Date 2021-08-17
Owner Cylance Inc. (USA)
Inventor Mitzimberg, Justin A.

Abstract

An identity of a user on a first computing node of a plurality of nodes within a computing environment is authenticated. A first authentication score for the user is calculated at the first computing node using at least one machine learning model. The first authentication score characterize interactions of the user with the first computing node. Subsequent to such authentication, traversal of the user from the first computing node to other computing nodes among the plurality of computing nodes are monitored. An authentication score characterizing interactions of the user with the corresponding computing node are calculated at each of the nodes using respective machine learning models executing on such nodes The respective machine learning models use, as an attribute, an authentication score calculated at a previously traversed computing node. Thereafter, an action is initiated at one of the computing nodes based on the calculated authentication scores.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06N 99/00 - Subject matter not provided for in other groups of this subclass
  • G06N 20/00 - Machine learning
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

36.

Anomaly based malware detection

      
Application Number 16661933
Grant Number 11210394
Status In Force
Filing Date 2019-10-23
First Publication Date 2020-02-20
Grant Date 2021-12-28
Owner Cylance Inc. (USA)
Inventor
  • Wojnowicz, Michael
  • Wolff, Matthew
  • Kapoor, Aditya

Abstract

In one respect, there is provided a system for training a neural network adapted for classifying one or more scripts. The system may include at least one processor and at least one memory. The memory may include program code that provides operations when executed by the at least one processor. The operations may include: reducing a dimensionality of a plurality of features representative of a file set; determining, based at least on a reduced dimensional representation of the file set, a distance between a file and the file set; and determining, based at least on the distance between the file and the file set, a classification for the file. Related methods and articles of manufacture, including computer program products, are also provided.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06N 7/00 - Computing arrangements based on specific mathematical models

37.

Training a machine learning model for container file analysis

      
Application Number 16663252
Grant Number 11188646
Status In Force
Filing Date 2019-10-24
First Publication Date 2020-02-20
Grant Date 2021-11-30
Owner Cylance Inc. (USA)
Inventor
  • Zhao, Xuan
  • Wolff, Matthew
  • Brock, John
  • Wallace, Brian
  • Wortman, Andy
  • Luan, Jian
  • Azarafrooz, Mahdi
  • Davis, Andrew
  • Wojnowicz, Michael
  • Soeder, Derek
  • Beveridge, David
  • Oliinyk, Yaroslav
  • Permeh, Ryan

Abstract

In one respect, there is provided a system for training a machine learning model to detect malicious container files. The system may include at least one processor and at least one memory. The at least one memory may include program code that provides operations when executed by the at least one processor. The operations may include: training, based on a training data, a machine learning model to enable the machine learning model to determine whether at least one container file includes at least one file rendering the at least one container file malicious; and providing the trained machine learning model to enable the determination of whether the at least one container file includes at least one file rendering the at least one container file malicious. Related methods and articles of manufacture, including computer program products, are also disclosed.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/50 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
  • G06N 20/20 - Ensemble learning
  • G06N 20/10 - Machine learning using kernel methods, e.g. support vector machines [SVM]
  • G06N 20/00 - Machine learning
  • G06N 3/04 - Architecture, e.g. interconnection topology

38.

Centroid for improving machine learning classification and info retrieval

      
Application Number 16534683
Grant Number 10810470
Status In Force
Filing Date 2019-08-07
First Publication Date 2019-11-28
Grant Date 2020-10-20
Owner Cylance Inc. (USA)
Inventor
  • Luan, Jian
  • Wolff, Matthew
  • Wallace, Brian

Abstract

Centroids are used for improving machine learning classification and information retrieval. A plurality of files are classified as malicious or not malicious based on a function dividing a coordinate space into at least a first portion and a second portion such that the first portion includes a first subset of the plurality of files classified as malicious. One or more first centroids are defined in the first portion that classify files from the first subset as not malicious. A file is determined to be malicious based on whether the file is located within the one or more first centroids.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06K 9/62 - Methods or arrangements for recognition using electronic means
  • G06T 7/60 - Analysis of geometric attributes
  • G06N 20/00 - Machine learning
  • G06F 16/16 - File or folder operations, e.g. details of user interfaces specifically adapted to file systems
  • G06N 3/04 - Architecture, e.g. interconnection topology
  • G06N 3/08 - Learning methods

39.

Shellcode detection

      
Application Number 16507958
Grant Number 10664597
Status In Force
Filing Date 2019-07-10
First Publication Date 2019-10-31
Grant Date 2020-05-26
Owner Cylance Inc. (USA)
Inventor
  • Azarafrooz, Mahdi
  • Soeder, Derek A.

Abstract

Identifying shellcode in a sequence of instructions by identifying a first instruction, the first instruction identifying a first bound of a sequence of instructions, identifying a second instruction, the second instruction identifying a second bound of the sequence of instructions, and generating a distribution for the sequence of instructions, bounded by the first instruction and the second instructions, the distribution indicative of whether the sequence of instructions is likely to include shellcode.

IPC Classes  ?

  • G06F 12/14 - Protection against unauthorised use of memory
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

40.

Avoidance of malicious content in nested files

      
Application Number 16448679
Grant Number 11093621
Status In Force
Filing Date 2019-06-21
First Publication Date 2019-10-10
Grant Date 2021-08-17
Owner Cylance Inc. (USA)
Inventor
  • Petersen, Eric
  • Soeder, Derek A.

Abstract

A nested file having a primary file and at least one secondary file embedded therein is parsed using at least one parser of a cell. The cell assigns a maliciousness score to each of the parsed primary file and each of the parsed at least one secondary file. Thereafter, the cell generates an overall maliciousness score for the nested file that indicates a level of confidence that the nested file contains malicious content. The overall maliciousness score is provided to a data consumer indicating whether to proceed with consuming the data contained within the nested file.

IPC Classes  ?

  • H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06N 20/00 - Machine learning
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

41.

Retention and accessibility of data characterizing events on an endpoint computer

      
Application Number 16426997
Grant Number 11204997
Status In Force
Filing Date 2019-05-30
First Publication Date 2019-10-03
Grant Date 2021-12-21
Owner Cylance, Inc. (USA)
Inventor
  • Permeh, Ryan
  • Wolff, Matthew
  • Oswald, Samuel John
  • Zhao, Xuan
  • Culley, Mark
  • Polson, Steven

Abstract

An endpoint computer system can harvest data relating to a plurality of events occurring within an operating environment of the endpoint computer system and can add the harvested data to a local data store maintained on the endpoint computer system. A query response can be generated, for example by identifying and retrieving responsive data from the local data store. The responsive data are related to an artifact on the endpoint computer system and/or to an event of the plurality of events. In some examples, the local data store can be an audit log and/or can include one or more tamper resistant features. Systems, methods, and computer program products are described.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06N 20/00 - Machine learning
  • G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06N 5/04 - Inference or reasoning models
  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy

42.

Deployment of machine learning models for discernment of threats

      
Application Number 16425662
Grant Number 10657258
Status In Force
Filing Date 2019-05-29
First Publication Date 2019-09-26
Grant Date 2020-05-19
Owner Cylance Inc. (USA)
Inventor
  • Harms, Kristopher William
  • Song, Renee
  • Rajamani, Raj
  • Rusell, Braden
  • Sohn, Yoojin
  • Ipsen, Kiefer

Abstract

A mismatch between model-based classifications produced by a first version of a machine learning threat discernment model and a second version of a machine learning threat discernment model for a file is detected. The mismatch is analyzed to determine appropriate handling for the file, and taking an action based on the analyzing. The analyzing includes comparing a human-generated classification status for a file, a first model version status that reflects classification by the first version of the machine learning threat discernment model, and a second model version status that reflects classification by the second version of the machine learning threat discernment model. The analyzing can also include allowing the human-generated classification status to dominate when it is available.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06N 20/00 - Machine learning
  • G06F 21/51 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 3/048 - Interaction techniques based on graphical user interfaces [GUI]

43.

Retention and accessibility of data characterizing events on an endpoint computer

      
Application Number 16425479
Grant Number 11204996
Status In Force
Filing Date 2019-05-29
First Publication Date 2019-09-26
Grant Date 2021-12-21
Owner Cylance Inc. (USA)
Inventor
  • Permeh, Ryan
  • Wolff, Matthew
  • Oswald, Samuel John
  • Zhao, Xuan
  • Culley, Mark
  • Polson, Steve

Abstract

An endpoint computer system can harvest data relating to a plurality of events occurring within an operating environment of the endpoint computer system and can add the harvested data to a local data store maintained on the endpoint computer system. In some examples, the local data store can be an audit log and/or can include one or more tamper resistant features. Systems, methods, and computer program products are described.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06N 20/00 - Machine learning
  • G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06N 5/04 - Inference or reasoning models
  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
  • G08B 13/14 - Mechanical actuation by lifting or attempted removal of hand-portable articles

44.

Advanced malware classification

      
Application Number 16428406
Grant Number 11126719
Status In Force
Filing Date 2019-05-31
First Publication Date 2019-09-19
Grant Date 2021-09-21
Owner Cylance Inc. (USA)
Inventor
  • Maisel, Matthew
  • Permeh, Ryan
  • Wolff, Matthew
  • Acevedo, Gabriel
  • Davis, Andrew
  • Brock, John
  • Strong, Homer Valentine
  • Wojnowicz, Michael
  • Beets, Kevin

Abstract

In one respect, there is provided a system for classifying malware. The system may include a data processor and a memory. The memory may include program code that provides operations when executed by the processor. The operations may include: providing, to a display, contextual information associated with a file to at least enable a classification of the file, when a malware classifier is unable to classify the file; receiving, in response to the providing of the contextual information, the classification of the file; and updating, based at least on the received classification of the file, the malware classifier to enable the malware classifier to classify the file. Methods and articles of manufacture, including computer program products, are also provided.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06N 7/00 - Computing arrangements based on specific mathematical models
  • G06N 20/00 - Machine learning

45.

Icon based malware detection

      
Application Number 16428449
Grant Number 10885401
Status In Force
Filing Date 2019-05-31
First Publication Date 2019-09-19
Grant Date 2021-01-05
Owner Cylance Inc. (USA)
Inventor
  • Wolff, Matthew
  • Silva Do Nascimento Neto, Pedro
  • Zhao, Xuan
  • Brock, John
  • Luan, Jian

Abstract

In one respect, there is provided a system for training a neural network adapted for classifying one or more scripts. The system may include at least one processor and at least one memory. The memory may include program code that provides operations when executed by the at least one memory. The operations may include: extracting, from an icon associated with a file, one or more features; assigning, based at least on the one or more features, the icon to one of a plurality of clusters; and generating, based at least on the cluster to which the icon is assigned, a classification for the file associated with the icon. Related methods and articles of manufacture, including computer program products, are also provided.

IPC Classes  ?

  • G06K 9/66 - Methods or arrangements for recognition using electronic means using simultaneous comparisons or correlations of the image signals with a plurality of references, e.g. resistor matrix references adjustable by an adaptive method, e.g. learning
  • G06K 9/46 - Extraction of features or characteristics of the image
  • G06N 20/00 - Machine learning
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06K 9/62 - Methods or arrangements for recognition using electronic means
  • G06N 3/04 - Architecture, e.g. interconnection topology
  • G06N 3/08 - Learning methods

46.

Static feature extraction from structured files

      
Application Number 16424261
Grant Number 10838844
Status In Force
Filing Date 2019-05-28
First Publication Date 2019-09-12
Grant Date 2020-11-17
Owner Cylance Inc. (USA)
Inventor
  • Soeder, Derek A.
  • Permeh, Ryan
  • Golomb, Gary
  • Wolff, Matthew

Abstract

Data is received or accessed that includes a structured file encapsulating data required by an execution environment to manage executable code wrapped within the structured file. Thereafter, code and data regions are iteratively identified in the structured file. Such identification is analyzed so that at least one feature can be extracted from the structured file. Related apparatus, systems, techniques and articles are also described.

IPC Classes  ?

  • G06F 11/36 - Preventing errors by testing or debugging of software
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 16/11 - File system administration, e.g. details of archiving or snapshots
  • G06F 16/188 - Virtual file systems
  • G06F 40/205 - Parsing

47.

Machine learning model for malware dynamic analysis

      
Application Number 15588131
Grant Number 10685112
Status In Force
Filing Date 2017-05-05
First Publication Date 2019-06-20
Grant Date 2020-06-16
Owner Cylance Inc. (USA)
Inventor
  • Zhao, Xuan
  • Kapoor, Aditya
  • Wolff, Matthew
  • Davis, Andrew
  • Soeder, Derek
  • Permeh, Ryan

Abstract

In some implementations there may be provided a system. The system may include a processor and a memory. The memory may include program code which causes operations when executed by the processor. The operations may include analyzing a series of events contained in received data. The series of events may include events that occur during the execution of a data object. The series of events may be analyzed to at least extract, from the series of events, subsequences of events. A machine learning model may determine a classification for the received data. The machine learning model may classify the received data based at least on whether the subsequences of events are malicious. The classification indicative of whether the received data is malicious may be provided. Related methods and articles of manufacture, including computer program products, are also disclosed.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06N 3/08 - Learning methods
  • G06N 20/00 - Machine learning
  • G06N 3/04 - Architecture, e.g. interconnection topology
  • G06N 5/02 - Knowledge representation; Symbolic representation
  • G06N 7/00 - Computing arrangements based on specific mathematical models
  • G06F 3/048 - Interaction techniques based on graphical user interfaces [GUI]
  • G06N 5/00 - Computing arrangements using knowledge-based models
  • G06N 20/20 - Ensemble learning
  • G06N 20/10 - Machine learning using kernel methods, e.g. support vector machines [SVM]

48.

Communications bus data transmission using relative ground shifting

      
Application Number 16284854
Grant Number 10599875
Status In Force
Filing Date 2019-02-25
First Publication Date 2019-06-20
Grant Date 2020-03-24
Owner Cylance Inc. (USA)
Inventor
  • Bathurst, Donald
  • Carey, Mark

Abstract

Methods are described herein for communications bus data transmission using relative ground shifting. A plurality of voltage lines of at least one electronic control unit (ECU) are monitored. The at least one ECU electrically coupled to a communications bus. A voltage differential across at least two of the plurality of voltage lines of the at least one ECU is measured. A pulse or data stream is injected into the communications bus via one or two voltage lines based on the measured voltage differential having an amplitude lower than a predetermined voltage threshold.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/81 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer by operating on the power supply, e.g. enabling or disabling power-on, sleep or resume operations
  • H04L 12/40 - Bus networks
  • G06F 21/75 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation, e.g. to counteract reverse engineering
  • H04L 5/16 - Half-duplex systems; Simplex/duplex switching; Transmission of break signals

49.

Application execution control utilizing ensemble machine learning for discernment

      
Application Number 16256807
Grant Number 10817599
Status In Force
Filing Date 2019-01-24
First Publication Date 2019-06-20
Grant Date 2020-10-27
Owner Cylance Inc. (USA)
Inventor
  • Permeh, Ryan
  • Soeder, Derek A.
  • Chisholm, Glenn
  • Russell, Braden
  • Golomb, Gary
  • Wolff, Matthew
  • Mcclure, Stuart

Abstract

Described are techniques to enable computers to efficiently determine if they should run a program based on an immediate (i.e., real-time, etc.) analysis of the program. Such an approach leverages highly trained ensemble machine learning algorithms to create a real-time discernment on a combination of static and dynamic features collected from the program, the computer's current environment, and external factors. Related apparatus, systems, techniques and articles are also described.

IPC Classes  ?

  • G06F 21/51 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
  • G06N 20/00 - Machine learning
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/52 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure

50.

Malware detection

      
Application Number 16183624
Grant Number 10635814
Status In Force
Filing Date 2018-11-07
First Publication Date 2019-05-23
Grant Date 2020-04-28
Owner Cylance Inc. (USA)
Inventor
  • Davis, Andrew
  • Wolff, Matthew
  • Soeder, Derek A.
  • Chisholm, Glenn
  • Permeh, Ryan

Abstract

In one respect, there is provided a system for training a neural network adapted for classifying one or more scripts. The system may include at least one processor and at least one memory. The memory may include program code which when executed by the at least one memory provides operations including: receiving a disassembled binary file that includes a plurality of instructions; processing the disassembled binary file with a convolutional neural network configured to detect a presence of one or more sequences of instructions amongst the plurality of instructions and determine a classification for the disassembled binary file based at least in part on the presence of the one or more sequences of instructions; and providing, as an output, the classification of the disassembled binary file. Related computer-implemented methods are also disclosed.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06N 3/08 - Learning methods

51.

Password-less software system user authentication

      
Application Number 15808533
Grant Number 10680823
Status In Force
Filing Date 2017-11-09
First Publication Date 2019-05-09
Grant Date 2020-06-09
Owner Cylance Inc. (USA)
Inventor
  • Grajek, Garret Florian
  • Lo, Jeffrey
  • Strong, Homer Valentine
  • Dai, Wulun

Abstract

Data is received as part of an authentication procedure to identify a user. Such data characterizes a user-generated biometric sequence that is generated by the user interacting with at least one input device according to a desired biometric sequence. Thereafter, using the received data and at least one machine learning model trained using empirically derived historical data generated by a plurality of user-generated biometric sequences (e.g., historical user-generated biometric sequences according to the desired biometric sequence, etc.), the user is authenticated if an output of the at least one machine learning model is above a threshold. Data can be provided that characterizes the authenticating. Related apparatus, systems, techniques and articles are also described.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • G06N 5/02 - Knowledge representation; Symbolic representation
  • G06F 21/40 - User authentication by quorum, i.e. whereby two or more security principals are required
  • G06K 9/62 - Methods or arrangements for recognition using electronic means
  • G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/36 - User authentication by graphic or iconic representation
  • H04W 12/00 - Security arrangements; Authentication; Protecting privacy or anonymity

52.

Dimensionality reduction of computer programs

      
Application Number 16095314
Grant Number 11106790
Status In Force
Filing Date 2017-04-21
First Publication Date 2019-05-09
Grant Date 2021-08-31
Owner Cylance Inc. (USA)
Inventor
  • Wojnowicz, Michael
  • Nguyen, Dinh Huu
  • Davis, Andrew
  • Chisholm, Glenn
  • Wolff, Matthew

Abstract

In one aspect, a computer-implemented method is disclosed. The computer-implemented method may include determining a sketch matrix that approximates a matrix representative of a reference dataset. The reference dataset may include at least one computer program having a predetermined classification. A reduced dimension representation of the reference dataset may be generated based at least on the sketch matrix. The reduced dimension representation may have a fewer quantity of features than the reference dataset. A target computer program may be classified based on the reduced dimension representation. The target computer program may be classified to determine whether the target computer program is malicious. Related systems and articles of manufacture, including computer program products, are also disclosed.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06N 20/10 - Machine learning using kernel methods, e.g. support vector machines [SVM]
  • G06F 17/16 - Matrix or vector computation
  • G06F 21/51 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06K 9/62 - Methods or arrangements for recognition using electronic means

53.

Macro-script execution control

      
Application Number 16204688
Grant Number 10649877
Status In Force
Filing Date 2018-11-29
First Publication Date 2019-03-28
Grant Date 2020-05-12
Owner Cylance Inc. (USA)
Inventor Soeder, Derek A.

Abstract

An agent inserts one or more hooks into a sub-execution runtime environment that is configured to include a script and/or targeted to include the script. The agent including the one or more hooks monitors a behavior of the sub-execution runtime environment and/or the script. The agent subsequently obtains context information regarding the sub-execution runtime environment and/or the script so that it can control the runtime of at least the sub-execution runtime environment. Related systems, methods, and articles of manufacture are also disclosed.

IPC Classes  ?

  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
  • G06F 21/54 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by adding security routines or objects to programs
  • G06F 9/448 - Execution paradigms, e.g. implementations of programming paradigms
  • G06F 9/46 - Multiprogramming arrangements
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

54.

Endpoint detection and response system with endpoint-based artifact storage

      
Application Number 15961659
Grant Number 10819714
Status In Force
Filing Date 2018-04-24
First Publication Date 2018-11-01
Grant Date 2020-10-27
Owner Cylance Inc. (USA)
Inventor
  • Strong, Homer Valentine
  • Permeh, Ryan
  • Oswald, Samuel John

Abstract

Each of a plurality of endpoint computer systems monitors data relating to a plurality of events occurring within an operating environment of the corresponding endpoint computer system. The monitoring can include receiving and/or inferring the data using one or more sensors executing on the endpoint computer systems Thereafter, for each endpoint computer system, artifacts used in connection with the events are stored in a vault maintained on such endpoint computer system. A query is later received by at least a subset of the plurality of endpoint computer systems from a server. Such endpoint computer systems, in response, identify and retrieve artifacts within the corresponding vaults response to the query. Results responsive to the query including or characterizing the identified artifacts is then provided by the endpoint computer systems receiving the query to the server.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • G06N 5/04 - Inference or reasoning models
  • G06N 20/00 - Machine learning
  • G06F 16/28 - Databases characterised by their database models, e.g. relational or object models
  • G06F 21/31 - User authentication

55.

Endpoint detection and response system event characterization data transfer

      
Application Number 15961685
Grant Number 10944761
Status In Force
Filing Date 2018-04-24
First Publication Date 2018-11-01
Grant Date 2021-03-09
Owner Cylance Inc. (USA)
Inventor
  • Strong, Homer Valentine
  • Permeh, Ryan
  • Oswald, Samuel John

Abstract

An endpoint computer system monitors data relating to a plurality of events occurring within an operating environment of the endpoint computer system. The monitoring can include receiving and/or inferring the data using one or more sensors executing on the endpoint computer system. The endpoint computer system can store artifacts used in connection with the plurality of events in a vault maintained on such endpoint computer system. The endpoint computer system, in response to a trigger, identifies and retrieves metadata characterizing artifacts associated with the trigger from the vault. Such identified and retrieved metadata is then provided by the endpoint computer system to a remote server.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06N 5/04 - Inference or reasoning models
  • G06N 99/00 - Subject matter not provided for in other groups of this subclass
  • G06N 20/00 - Machine learning
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • G06F 16/28 - Databases characterised by their database models, e.g. relational or object models
  • G06F 21/31 - User authentication

56.

Protecting devices from malicious files based on n-gram processing of sequential data

      
Application Number 15490797
Grant Number 10754948
Status In Force
Filing Date 2017-04-18
First Publication Date 2018-10-18
Grant Date 2020-08-25
Owner Cylance Inc. (USA)
Inventor
  • Li, Li
  • Zhao, Xuan
  • Akhavan-Masouleh, Sepehr
  • Brock, John Hendershott
  • Oliinyk, Yaroslav
  • Wolff, Matthew

Abstract

Under one aspect, a method is provided for protecting a device from a malicious file. The method can be implemented by one or more data processors forming part of at least one computing device and can include extracting from the file, by at least one data processor, sequential data comprising discrete tokens. The method also can include generating, by at least one data processor, n-grams of the discrete tokens. The method also can include generating, by at least one data processor, a vector of weights based on respective frequencies of the n-grams. The method also can include determining, by at least one data processor and based on a statistical analysis of the vector of weights, that the file is likely to be malicious. The method also can include initiating, by at least one data processor and responsive to determining that the file is likely to be malicious, a corrective action.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06N 20/00 - Machine learning

57.

Electronic control unit protection framework using security zones

      
Application Number 15462565
Grant Number 10462155
Status In Force
Filing Date 2017-03-17
First Publication Date 2018-09-20
Grant Date 2019-10-29
Owner Cylance Inc. (USA)
Inventor
  • Bathurst, Donald
  • Carey, Mark

Abstract

Systems are provided herein for a hardware protection framework. A security module monitors a plurality of voltage lines of at least one electronic control unit (ECU) electrically coupled to a communications bus. A voltage differential across at least two of the plurality of voltage lines of the at least one ECU is measured. The voltage differential is compared to a plurality of predetermined signal fingerprints associated with the at least one ECU. A variance in the compared voltage differential is identified relative to one or more of the plurality of predetermined signal fingerprints. Data characterizing the identified variance is provided. In some aspects, a pulse or a data stream is injected based on the voltage differential having an amplitude lower than a predetermined voltage threshold.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 11/00 - Error detection; Error correction; Monitoring

58.

Communications bus signal fingerprinting

      
Application Number 15462591
Grant Number 10757113
Status In Force
Filing Date 2017-03-17
First Publication Date 2018-09-20
Grant Date 2020-08-25
Owner Cylance Inc. (USA)
Inventor
  • Bathurst, Donald
  • Carey, Mark

Abstract

Methods are provided herein for communications bus signal fingerprinting. A security module monitors a plurality of voltage lines of at least one electronic control unit (ECU) electrically coupled to a communications bus. A voltage differential across at least two of the plurality of voltage lines of the at least one ECU is measured. The voltage differential is compared to a plurality of predetermined signal fingerprints associated with the at least one ECU. A variance in the compared voltage differential is identified relative to one or more of the plurality of predetermined signal fingerprints. Data characterizing the identified variance is provided.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

59.

Communications bus data transmission using relative ground shifting

      
Application Number 15462611
Grant Number 10275615
Status In Force
Filing Date 2017-03-17
First Publication Date 2018-09-20
Grant Date 2019-04-30
Owner Cylance Inc. (USA)
Inventor
  • Bathurst, Donald
  • Carey, Mark

Abstract

Methods are described herein for communications bus data transmission using relative ground shifting. A plurality of voltage lines of at least one electronic control unit (ECU) are monitored. The at least one ECU electrically coupled to a communications bus. A voltage differential across at least two of the plurality of voltage lines of the at least one ECU is measured. A pulse or data stream is injected into the communications bus via one or two voltage lines based on the measured voltage differential having an amplitude lower than a predetermined voltage threshold.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/81 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer by operating on the power supply, e.g. enabling or disabling power-on, sleep or resume operations
  • H04L 12/40 - Bus networks
  • G06F 21/75 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation, e.g. to counteract reverse engineering
  • H04L 5/16 - Half-duplex systems; Simplex/duplex switching; Transmission of break signals

60.

Redaction of artificial intelligence training documents

      
Application Number 15452623
Grant Number 11436520
Status In Force
Filing Date 2017-03-07
First Publication Date 2018-09-13
Grant Date 2022-09-06
Owner Cylance Inc. (USA)
Inventor
  • Beveridge, David Neill
  • Oliinyk, Yaroslav
  • Liebson, David Michael

Abstract

Systems and methods are provided herein for redaction of artificial intelligence (AI) training documents. Data comprising an unredacted document is received. The unredacted document comprises a plurality of objects arranged according to a first topology. The unredacted document is parsed to identify objects either directly or relationally containing user sensitive information using a predetermined rule set based on the first topology. The user sensitive information within the unredacted document is substituted with placeholder information to generate a redacted document having a second topology. The second topology is substantially identical to the first topology. In some variations, the redacted document is provided to an AI model for training.

IPC Classes  ?

  • G06N 20/00 - Machine learning
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules

61.

Dictionary based deduplication of training set samples for machine learning based computer threat analysis

      
Application Number 15873673
Grant Number 11373065
Status In Force
Filing Date 2018-01-17
First Publication Date 2018-07-26
Grant Date 2022-06-28
Owner Cylance Inc. (USA)
Inventor Davis, Andrew

Abstract

Presence of malicious code can be identified in one or more data samples. A feature set extracted from a sample is vectorized to generate a sparse vector. A reduced dimension vector representing the sparse vector can be generated. A binary representation vector of reduced dimension vector can be created by converting each value of a plurality of values in the reduced dimension vector to a binary representation. The binary representation vector can be added as a new element in a dictionary structure if the binary representation is not equal to an existing element in the dictionary structure. A training set for use in training a machine learning model can be created to include one vector whose binary representation corresponds to each of a plurality of elements in the dictionary structure.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06N 20/00 - Machine learning
  • G06N 3/08 - Learning methods
  • G06K 9/62 - Methods or arrangements for recognition using electronic means
  • G06N 20/10 - Machine learning using kernel methods, e.g. support vector machines [SVM]
  • G06N 20/20 - Ensemble learning
  • G06V 10/40 - Extraction of image or video features

62.

Detection of malware using feature hashing

      
Application Number 15873746
Grant Number 10621349
Status In Force
Filing Date 2018-01-17
First Publication Date 2018-07-26
Grant Date 2020-04-14
Owner Cylance Inc. (USA)
Inventor Davis, Andrew

Abstract

Data is analyzed using feature hashing to detect malware. A plurality of features in a feature set is hashed. The feature set is generated from a sample. The sample includes at least a portion of a file. Based on the hashing, one or more hashed features are indexed to generate an index vector. Each hashed feature corresponds to an index in the index vector. Using the index vector, a training dataset is generated. Using the training dataset, a machine learning model for identifying at least one file having a malicious code is trained.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06N 5/02 - Knowledge representation; Symbolic representation
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06N 20/00 - Machine learning

63.

Advanced malware classification

      
Application Number 15410599
Grant Number 10360380
Status In Force
Filing Date 2017-01-19
First Publication Date 2018-07-19
Grant Date 2019-07-23
Owner Cylance Inc. (USA)
Inventor
  • Maisel, Matthew
  • Permeh, Ryan
  • Wolff, Matthew
  • Acevedo, Gabriel
  • Davis, Andrew
  • Brock, John
  • Strong, Homer
  • Wojnowicz, Michael
  • Beets, Kevin

Abstract

In one respect, there is provided a system for classifying malware. The system may include a data processor and a memory. The memory may include program code that provides operations when executed by the processor. The operations may include: providing, to a display, contextual information associated with a file to at least enable a classification of the file, when a malware classifier is unable to classify the file; receiving, in response to the providing of the contextual information, the classification of the file; and updating, based at least on the received classification of the file, the malware classifier to enable the malware classifier to classify the file. Methods and articles of manufacture, including computer program products, are also provided.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06N 7/00 - Computing arrangements based on specific mathematical models
  • G06N 20/00 - Machine learning

64.

Endpoint detection and response utilizing machine learning

      
Application Number 15862067
Grant Number 10699012
Status In Force
Filing Date 2018-01-04
First Publication Date 2018-07-12
Grant Date 2020-06-30
Owner Cylance Inc. (USA)
Inventor
  • Kashyap, Rahul Chander
  • Kotov, Vadim Dmitriyevich
  • Oswald, Samuel John
  • Strong, Homer Valentine

Abstract

A plurality of events associated with each of a plurality of computing nodes that form part of a network topology are monitored. The network topology includes antivirus tools to detect malicious software prior to it accessing one of the computing nodes. Thereafter, it is determined that, using at least one machine learning model, at least one of the events is indicative of malicious activity that has circumvented or bypassed the antivirus tools. Data is then provided that characterizes the determination. Related apparatus, systems, techniques and articles are also described.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06N 20/00 - Machine learning
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06N 3/00 - Computing arrangements based on biological models

65.

Isolating data for analysis to avoid malicious attacks

      
Application Number 15886610
Grant Number 11182471
Status In Force
Filing Date 2018-02-01
First Publication Date 2018-06-07
Grant Date 2021-11-23
Owner Cylance Inc. (USA)
Inventor
  • Permeh, Ryan
  • Soeder, Derek A.
  • Wolff, Matthew
  • Jin, Ming
  • Zhao, Xuan

Abstract

Determining, by a machine learning model in an isolated operating environment, whether a file is safe for processing by a primary operating environment. The file is provided, when the determining indicates the file is safe for processing, to the primary operating environment for processing by the primary operating environment. When the determining indicates the file is unsafe for processing, the file is prevented from being processed by the primary operating environment. The isolated operating environment can be maintained on an isolated computing system remote from a primary computing system maintaining the primary operating system. The isolating computing system and the primary operating system can communicate over a cloud network.

IPC Classes  ?

  • G06F 21/51 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06N 20/00 - Machine learning

66.

Static feature extraction from structured files

      
Application Number 15890186
Grant Number 10394686
Status In Force
Filing Date 2018-02-06
First Publication Date 2018-06-07
Grant Date 2019-08-27
Owner Cylance Inc. (USA)
Inventor
  • Soeder, Derek A.
  • Permeh, Ryan
  • Golomb, Gary
  • Wolff, Matthew

Abstract

Data is received or accessed that includes a structured file encapsulating data required by an execution environment to manage executable code wrapped within the structured file. Thereafter, code and data regions are iteratively identified in the structured file. Such identification is analyzed so that at least one feature can be extracted from the structured file. Related apparatus, systems, techniques and articles are also described.

IPC Classes  ?

  • G06F 9/44 - Arrangements for executing specific programs
  • G06F 11/00 - Error detection; Error correction; Monitoring
  • G06F 12/14 - Protection against unauthorised use of memory
  • G06F 12/16 - Protection against loss of memory contents
  • G06F 11/36 - Preventing errors by testing or debugging of software
  • G06F 16/11 - File system administration, e.g. details of archiving or snapshots
  • G06F 16/188 - Virtual file systems
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 17/27 - Automatic analysis, e.g. parsing, orthograph correction

67.

Detection of vulnerable code

      
Application Number 15829646
Grant Number 11080406
Status In Force
Filing Date 2017-12-01
First Publication Date 2018-06-07
Grant Date 2021-08-03
Owner Cylance Inc. (USA)
Inventor Mehta, Paul

Abstract

A machine learning model is applied to at least determine whether a computer program includes vulnerable code. The machine learning model is trained to determine whether the computer program includes vulnerable code based at least on a presence and/or absence of a first trait. An indication can be provided, via a user interface, an indication that the computer program includes vulnerable code, when the computer program is determined to include vulnerable code. Related methods and articles of manufacture, including computer program products, are also provided.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

68.

Clustering analysis for deduplication of training set samples for machine learning based computer threat analysis

      
Application Number 15800603
Grant Number 11620471
Status In Force
Filing Date 2017-11-01
First Publication Date 2018-05-31
Grant Date 2023-04-04
Owner Cylance Inc. (USA)
Inventor Brock, John

Abstract

A method, a system, and a computer program product for performing analysis of data to detect presence of malicious code are disclosed. Reduced dimensionality vectors are generated from a plurality of original dimensionality vectors representing features in a plurality of samples. The reduced dimensionality vectors have a lower dimensionality than an original dimensionality of the plurality of original dimensionality vectors. A first plurality of clusters is determined by applying a first clustering algorithm to the reduced dimensionality vectors. A second plurality of clusters is determined by applying a second clustering algorithm to one or more clusters in the first plurality of clusters using the original dimensionality. An exemplar for a cluster in the second plurality of clusters is added to a training set, which is used to train a machine learning model for identifying a file containing malicious code.

IPC Classes  ?

  • G06N 20/00 - Machine learning
  • G06K 9/62 - Methods or arrangements for recognition using electronic means
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G05B 13/02 - Adaptive control systems, i.e. systems automatically adjusting themselves to have a performance which is optimum according to some preassigned criterion electric

69.

Icon based malware detection

      
Application Number 15358009
Grant Number 10354173
Status In Force
Filing Date 2016-11-21
First Publication Date 2018-05-24
Grant Date 2019-07-16
Owner Cylance Inc. (USA)
Inventor
  • Wolff, Matthew
  • Silva Do Nascimento Neto, Pedro
  • Zhao, Xuan
  • Brock, John
  • Luan, Jian

Abstract

In one respect, there is provided a system for training a neural network adapted for classifying one or more scripts. The system may include at least one processor and at least one memory. The memory may include program code that provides operations when executed by the at least one memory. The operations may include: extracting, from an icon associated with a file, one or more features; assigning, based at least on the one or more features, the icon to one of a plurality of clusters; and generating, based at least on the cluster to which the icon is assigned, a classification for the file associated with the icon. Related methods and articles of manufacture, including computer program products, are also provided.

IPC Classes  ?

  • G06K 9/66 - Methods or arrangements for recognition using electronic means using simultaneous comparisons or correlations of the image signals with a plurality of references, e.g. resistor matrix references adjustable by an adaptive method, e.g. learning
  • G06K 9/62 - Methods or arrangements for recognition using electronic means
  • G06N 20/00 - Machine learning
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06K 9/46 - Extraction of features or characteristics of the image

70.

Anomaly based malware detection

      
Application Number 15358093
Grant Number 10489589
Status In Force
Filing Date 2016-11-21
First Publication Date 2018-05-24
Grant Date 2019-11-26
Owner Cylance Inc. (USA)
Inventor
  • Wojnowicz, Michael
  • Wolff, Matthew
  • Kapoor, Aditya

Abstract

In one respect, there is provided a system for training a neural network adapted for classifying one or more scripts. The system may include at least one processor and at least one memory. The memory may include program code that provides operations when executed by the at least one processor. The operations may include: reducing a dimensionality of a plurality of features representative of a file set; determining, based at least on a reduced dimensional representation of the file set, a distance between a file and the file set; and determining, based at least on the distance between the file and the file set, a classification for the file. Related methods and articles of manufacture, including computer program products, are also provided.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

71.

Shellcode detection

      
Application Number 15806229
Grant Number 10482248
Status In Force
Filing Date 2017-11-07
First Publication Date 2018-05-10
Grant Date 2019-11-19
Owner Cylance Inc. (USA)
Inventor
  • Azarafrooz, Mahdi
  • Soeder, Derek A.

Abstract

Identifying shellcode in a sequence of instructions by identifying a first instruction, the first instruction identifying a first bound of a sequence of instructions, identifying a second instruction, the second instruction identifying a second bound of the sequence of instructions, and generating a distribution for the sequence of instructions, bounded by the first instruction and the second instructions, the distribution indicative of whether the sequence of instructions is likely to include shellcode.

IPC Classes  ?

  • G06F 12/14 - Protection against unauthorised use of memory
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

72.

Recurrent neural networks for malware analysis

      
Application Number 15566687
Grant Number 10691799
Status In Force
Filing Date 2016-04-15
First Publication Date 2018-04-12
Grant Date 2020-06-23
Owner Cylance Inc. (USA)
Inventor
  • Davis, Andrew
  • Wolff, Matthew
  • Soeder, Derek A.
  • Chisholm, Glenn

Abstract

Using a recurrent neural network (RNN) that has been trained to a satisfactory level of performance, highly discriminative features can be extracted by running a sample through the RNN, and then extracting a final hidden state hh where i is the number of instructions of the sample. This resulting feature vector may then be concatenated with the other hand-engineered features, and a larger classifier may then be trained on hand-engineered as well as automatically determined features. Related apparatus, systems, techniques and articles are also described.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06N 3/04 - Architecture, e.g. interconnection topology
  • G06N 3/08 - Learning methods

73.

Machine learning classification using Markov modeling

      
Application Number 15716284
Grant Number 10652252
Status In Force
Filing Date 2017-09-26
First Publication Date 2018-04-05
Grant Date 2020-05-12
Owner Cylance Inc. (USA)
Inventor
  • Luan, Jian
  • Soeder, Derek

Abstract

Systems, methods, and articles of manufacture, including computer program products, are provided for classification systems and methods using modeling. In some example embodiments, there is provided a system that includes at least one processor and at least one memory including program code which when executed by the at least one memory provides operations. The operations can include generating a representation of a sequence of sections of a file and/or determining, from a model including conditional probabilities, a probability for each transition between at least two sequential sections in the representation. The operations can further include classifying the file based on the probabilities for each transition.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06N 3/04 - Architecture, e.g. interconnection topology
  • G06N 20/00 - Machine learning
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06N 7/00 - Computing arrangements based on specific mathematical models

74.

Centroid for improving machine learning classification and info retrieval

      
Application Number 15720372
Grant Number 10417530
Status In Force
Filing Date 2017-09-29
First Publication Date 2018-04-05
Grant Date 2019-09-17
Owner Cylance Inc. (USA)
Inventor
  • Luan, Jian
  • Wolff, Matthew
  • Wallace, Brian

Abstract

Centroids are used for improving machine learning classification and information retrieval. A plurality of files are classified as malicious or not malicious based on a function dividing a coordinate space into at least a first portion and a second portion such that the first portion includes a first subset of the plurality of files classified as malicious. One or more first geometric regions are defined in the first portion that classify files from the first subset as not malicious. A file is determined to be malicious based on whether the file is located within the one or more first geometric regions.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06K 9/62 - Methods or arrangements for recognition using electronic means
  • G06T 7/60 - Analysis of geometric attributes
  • G06N 20/00 - Machine learning
  • G06N 3/04 - Architecture, e.g. interconnection topology
  • G06N 3/08 - Learning methods
  • G06F 16/16 - File or folder operations, e.g. details of user interfaces specifically adapted to file systems

75.

Machine learning model for analysis of instruction sequences

      
Application Number 15345433
Grant Number 11074494
Status In Force
Filing Date 2016-11-07
First Publication Date 2018-03-15
Grant Date 2021-07-27
Owner Cylance Inc. (USA)
Inventor
  • Zhao, Xuan
  • Wolff, Matthew
  • Brock, John
  • Wallace, Brian
  • Wortman, Andy
  • Luan, Jian
  • Azarafrooz, Mahdi
  • Davis, Andrew
  • Wojnowicz, Michael
  • Soeder, Derek
  • Beveridge, David
  • Petersen, Eric
  • Jin, Ming
  • Permeh, Ryan

Abstract

In one respect, there is provided a system for classifying an instruction sequence with a machine learning model. The system may include at least one processor and at least one memory. The memory may include program code that provides operations when executed by the at least one processor. The operations may include: processing an instruction sequence with a trained machine learning model configured to detect one or more interdependencies amongst a plurality of tokens in the instruction sequence and determine a classification for the instruction sequence based on the one or more interdependencies amongst the plurality of tokens; and providing, as an output, the classification of the instruction sequence. Related methods and articles of manufacture, including computer program products, are also provided.

IPC Classes  ?

  • G06N 3/04 - Architecture, e.g. interconnection topology
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

76.

Training a machine learning model for analysis of instruction sequences

      
Application Number 15345436
Grant Number 10922604
Status In Force
Filing Date 2016-11-07
First Publication Date 2018-03-15
Grant Date 2021-02-16
Owner Cylance Inc. (USA)
Inventor
  • Zhao, Xuan
  • Wolff, Matthew
  • Brock, John
  • Wallace, Brian
  • Wortman, Andy
  • Luan, Jian
  • Azarafrooz, Mahdi
  • Davis, Andrew
  • Wojnowicz, Michael
  • Soeder, Derek
  • Beveridge, David
  • Petersen, Eric
  • Jin, Ming
  • Permeh, Ryan

Abstract

In one respect, there is provided a system for training a neural network adapted for classifying one or more instruction sequences. The system may include at least one processor and at least one memory. The memory may include program code which when executed by the at least one processor provides operations including: training, based at least on training data, a machine learning model to detect one or more predetermined interdependencies amongst a plurality of tokens in the training data; and providing the trained machine learning model to enable classification of one or more instruction sequences. Related methods and articles of manufacture, including computer program products, are also provided.

IPC Classes  ?

  • G06N 3/04 - Architecture, e.g. interconnection topology
  • G06N 3/08 - Learning methods
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

77.

Memory space protection

      
Application Number 15638114
Grant Number 10824572
Status In Force
Filing Date 2017-06-29
First Publication Date 2018-03-15
Grant Date 2020-11-03
Owner Cylance Inc. (USA)
Inventor
  • Norris, Michael Ray
  • Soeder, Derek A.

Abstract

Executable memory space is protected by receiving, from a process, a request to configure a portion of memory with a memory protection attribute that allows the process to perform at least one memory operation on the portion of the memory. Thereafter, the request is responded to with a grant, configuring the portion of memory with a different memory protection attribute than the requested memory protection attribute. The different memory protection attribute restricting the at least one memory operation from being performed by the process on the portion of the memory. In addition, it is detected when the process attempts, in accordance with the grant, the at least one memory operation at the configured portion of memory. Related systems and articles of manufacture, including computer program products, are also disclosed.

IPC Classes  ?

  • G06F 12/14 - Protection against unauthorised use of memory
  • G06F 21/79 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules

78.

Computer user authentication using machine learning

      
Application Number 15696057
Grant Number 11301550
Status In Force
Filing Date 2017-09-05
First Publication Date 2018-03-08
Grant Date 2022-04-12
Owner Cylance Inc. (USA)
Inventor
  • Grajek, Garret Florian
  • Lo, Jeffrey
  • Wojnowicz, Michael Thomas
  • Nguyen, Dinh Huu
  • Slawinski, Michael Alan

Abstract

Systems and methods are described herein for computer user authentication using machine learning. Authentication for a user is initiated based on an identification confidence score of the user. The identification confidence score is based on one or more characteristics of the user. Using a machine learning model for the user, user activity of the user is monitored for anomalous activity to generate first data. Based on the monitoring, differences between the first data and historical utilization data for the user determine whether the user's utilization of the one or more resources is anomalous. When the user's utilization of the one or more resource is anomalous, the user's access to the one or more resource is removed.

IPC Classes  ?

79.

Container file analysis using machine learning model

      
Application Number 15345444
Grant Number 10637874
Status In Force
Filing Date 2016-11-07
First Publication Date 2018-03-01
Grant Date 2020-04-28
Owner Cylance Inc. (USA)
Inventor
  • Zhao, Xuan
  • Wolff, Matthew
  • Brock, John
  • Wallace, Brian
  • Wortman, Andrew
  • Luan, Jian
  • Azarafrooz, Mahdi
  • Davis, Andrew
  • Wojnowicz, Michael
  • Soeder, Derek
  • Beveridge, David
  • Oliinyk, Yaroslav
  • Permeh, Ryan

Abstract

In one respect, there is provided a system for training a machine learning model to detect malicious container files. The system may include at least one processor and at least one memory. The memory may include program code which when executed by the at least one processor provides operations including: processing a container file with a trained machine learning model, wherein the trained machine learning is trained to determine a classification for the container file indicative of whether the container file includes at least one file rendering the container file malicious; and providing, as an output by the trained machine learning model, an indication of whether the container file includes the at least one file rendering the container file malicious. Related methods and articles of manufacture, including computer program products, are also disclosed.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06N 3/08 - Learning methods
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06N 20/10 - Machine learning using kernel methods, e.g. support vector machines [SVM]
  • G06N 3/04 - Architecture, e.g. interconnection topology

80.

Automated systems and methods for generative multimodel multiclass classification and similarity analysis using machine learning

      
Application Number 15789765
Grant Number 11657317
Status In Force
Filing Date 2017-10-20
First Publication Date 2018-03-01
Grant Date 2023-05-23
Owner Cylance Inc. (USA)
Inventor
  • Permeh, Ryan
  • Mcclure, Stuart
  • Wolff, Matthew
  • Golomb, Gary
  • Soeder, Derek A.
  • Levites, Seagen
  • O'Dea, Michael
  • Acevedo, Gabriel
  • Chisholm, Glenn

Abstract

Under one aspect, a computer-implemented method includes receiving a query at a query interface about whether a computer file comprises malicious code. It is determined, using at least one machine learning sub model corresponding to a type of the computer file, whether the computer file comprises malicious code. Data characterizing the determination are provided to the query interface. Generating the sub model includes receiving computer files at a collection interface. Multiple sub populations of the computer files are generated based on respective types of the computer files, and random training and testing sets are generated from each of the sub populations. At least one sub model for each random training set is generated.

IPC Classes  ?

  • G06N 20/00 - Machine learning
  • G06N 5/02 - Knowledge representation; Symbolic representation
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

81.

Training a machine learning model for container file analysis

      
Application Number 15345439
Grant Number 10503901
Status In Force
Filing Date 2016-11-07
First Publication Date 2018-03-01
Grant Date 2019-12-10
Owner Cylance Inc. (USA)
Inventor
  • Zhao, Xuan
  • Wolff, Matthew
  • Brock, John
  • Wallace, Brian
  • Wortman, Andy
  • Luan, Jian
  • Azarafrooz, Mahdi
  • Davis, Andrew
  • Wojnowicz, Michael
  • Soeder, Derek
  • Beveridge, David
  • Oliinyk, Yaroslav
  • Permeh, Ryan

Abstract

In one respect, there is provided a system for training a machine learning model to detect malicious container files. The system may include at least one processor and at least one memory. The at least one memory may include program code that provides operations when executed by the at least one processor. The operations may include: training, based on a training data, a machine learning model to enable the machine learning model to determine whether at least one container file includes at least one file rendering the at least one container file malicious; and providing the trained machine learning model to enable the determination of whether the at least one container file includes at least one file rendering the at least one container file malicious. Related methods and articles of manufacture, including computer program products, are also disclosed.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/50 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
  • G06N 20/00 - Machine learning

82.

Avoidance of malicious content in nested files

      
Application Number 15613878
Grant Number 10409996
Status In Force
Filing Date 2017-06-05
First Publication Date 2017-12-14
Grant Date 2019-09-10
Owner Cylance Inc. (USA)
Inventor
  • Petersen, Eric
  • Soeder, Derek A.

Abstract

A nested file having a primary file and at least one secondary file embedded therein is parsed using at least one parser of a cell. The cell assigns a maliciousness score to each of the parsed primary file and each of the parsed at least one secondary file. Thereafter, the cell generates an overall maliciousness score for the nested file that indicates a level of confidence that the nested file contains malicious content. The overall maliciousness score is provided to a data consumer indicating whether to proceed with consuming the data contained within the nested file.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06N 20/00 - Machine learning
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

83.

Macro-script execution control

      
Application Number 15614355
Grant Number 10191831
Status In Force
Filing Date 2017-06-05
First Publication Date 2017-12-14
Grant Date 2019-01-29
Owner Cylance Inc. (USA)
Inventor Soeder, Derek A.

Abstract

An agent inserts one or more hooks into a sub-execution runtime environment that is configured to include a script and/or targeted to include the script. The agent including the one or more hooks monitors a behavior of the sub-execution runtime environment and/or the script. The agent subsequently obtains context information regarding the sub-execution runtime environment and/or the script so that it can control the runtime of at least the sub-execution runtime environment. Related systems, methods, and articles of manufacture are also disclosed.

IPC Classes  ?

  • G06F 9/46 - Multiprogramming arrangements
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
  • G06F 21/54 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by adding security routines or objects to programs
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 9/448 - Execution paradigms, e.g. implementations of programming paradigms

84.

Deployment of machine learning models for discernment of threats

      
Application Number 15615609
Grant Number 10372913
Status In Force
Filing Date 2017-06-06
First Publication Date 2017-12-14
Grant Date 2019-08-06
Owner Cylance Inc. (USA)
Inventor
  • Harms, Kristopher William
  • Song, Renee
  • Rajamani, Raj
  • Rusell, Braden
  • Sohn, Yoojin
  • Ipsen, Kiefer

Abstract

A mismatch between model-based classifications produced by a first version of a machine learning threat discernment model and a second version of a machine learning threat discernment model for a file is detected. The mismatch is analyzed to determine appropriate handling for the file, and taking an action based on the analyzing. The analyzing includes comparing a human-generated classification status for a file, a first model version status that reflects classification by the first version of the machine learning threat discernment model, and a second model version status that reflects classification by the second version of the machine learning threat discernment model. The analyzing can also include allowing the human-generated classification status to dominate when it is available.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06N 20/00 - Machine learning
  • G06F 21/51 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 3/048 - Interaction techniques based on graphical user interfaces [GUI]

85.

Man in the middle attack detection using active learning

      
Application Number 15283051
Grant Number 09781150
Status In Force
Filing Date 2016-09-30
First Publication Date 2017-10-03
Grant Date 2017-10-03
Owner Cylance Inc. (USA)
Inventor
  • Zhao, Xuan
  • Wallace, Brian Michael

Abstract

Data is received that includes a plurality of samples that each characterize interception of data traffic to a computing device over a network. Thereafter, the plurality of samples characterizing the interception of data traffic are grouped into a plurality of clusters. At least a portion of the samples are labeled to characterize a likelihood of each such sample as relating to an unauthorized interception of data traffic. Each cluster is assigned with a label corresponding to a majority of samples within such cluster. At least one machine learning model is trained using the assigned labeled clusters such that, once trained, the at least one machine learning model determines a likelihood of future samples as relating to an unauthorized interception of data traffic to a corresponding computing device.

IPC Classes  ?

  • G06F 12/14 - Protection against unauthorised use of memory
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06N 99/00 - Subject matter not provided for in other groups of this subclass

86.

Isolating data for analysis to avoid malicious attacks

      
Application Number 15252106
Grant Number 09928363
Status In Force
Filing Date 2016-08-30
First Publication Date 2017-08-31
Grant Date 2018-03-27
Owner Cylance Inc. (USA)
Inventor
  • Permeh, Ryan
  • Soeder, Derek A.
  • Wolff, Matthew
  • Jin, Ming
  • Zhao, Xuan

Abstract

Determining, by a machine learning model in an isolated operating environment, whether a file is safe for processing by a primary operating environment. The file is provided, when the determining indicates the file is safe for processing, to the primary operating environment for processing by the primary operating environment. When the determining indicates the file is unsafe for processing, the file is prevented from being processed by the primary operating environment. The isolated operating environment can be maintained on an isolated computing system remote from a primary computing system maintaining the primary operating system. The isolating computing system and the primary operating system can communicate over a cloud network.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/51 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06N 99/00 - Subject matter not provided for in other groups of this subclass
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine

87.

Retention and accessibility of data characterizing events on an endpoint computer

      
Application Number 15356029
Grant Number 10354067
Status In Force
Filing Date 2016-11-18
First Publication Date 2017-08-31
Grant Date 2019-07-16
Owner Cylance Inc. (USA)
Inventor
  • Permeh, Ryan
  • Wolff, Matthew
  • Oswald, Samuel John
  • Zhao, Xuan
  • Culley, Mark
  • Polson, Steve

Abstract

An endpoint computer system can harvest data relating to a plurality of events occurring within an operating environment of the endpoint computer system and can add the harvested data to a local data store maintained on the endpoint computer system. In some examples, the local data store can be an audit log and/or can include one or more tamper resistant features. Systems, methods, and computer program products are described.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06N 20/00 - Machine learning
  • G06N 5/04 - Inference or reasoning models
  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
  • G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
  • G06Q 10/08 - Logistics, e.g. warehousing, loading or distribution; Inventory or stock management

88.

Sub-execution environment controller

      
Application Number 15441952
Grant Number 10339305
Status In Force
Filing Date 2017-02-24
First Publication Date 2017-08-31
Grant Date 2019-07-02
Owner Cylance Inc. (USA)
Inventor
  • Permeh, Ryan
  • Soeder, Derek
  • Wolff, Matthew
  • Jin, Ming
  • Zhao, Xuan

Abstract

In one aspect there is provided a method. The method may include: determining that an executable implements a sub-execution environment, the sub-execution environment being configured to receive an input, and the input triggering at least one event at the sub-execution environment; intercepting the event at the sub-execution environment; and applying a security policy to the intercepted event, the applying of the policy comprises blocking the event, when the event is determined to be a prohibited event. Systems and articles of manufacture, including computer program products, are also provided.

IPC Classes  ?

  • G06F 21/54 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by adding security routines or objects to programs
  • G06N 20/00 - Machine learning
  • G06F 21/44 - Program or device authentication
  • G06F 21/50 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

89.

Retention and accessibility of data characterizing events on an endpoint computer

      
Application Number 15354966
Grant Number 10354066
Status In Force
Filing Date 2016-11-17
First Publication Date 2017-08-31
Grant Date 2019-07-16
Owner Cylance Inc. (USA)
Inventor
  • Permeh, Ryan
  • Wolff, Matthew
  • Oswald, Samuel John
  • Zhao, Xuan
  • Culley, Mark
  • Polson, Steve

Abstract

An endpoint computer system can harvest data relating to a plurality of events occurring within an operating environment of the endpoint computer system and can add the harvested data to a local data store maintained on the endpoint computer system. A query response can be generated, for example by identifying and retrieving responsive data from the local data store. The responsive data are related to an artifact on the endpoint computer system and/or to an event of the plurality of events. In some examples, the local data store can be an audit log and/or can include one or more tamper resistant features. Systems, methods, and computer program products are described.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06N 20/00 - Machine learning
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06N 5/04 - Inference or reasoning models
  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
  • G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
  • G06F 12/14 - Protection against unauthorised use of memory
  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]

90.

Transaction terminal malware detection and prevention

      
Application Number 15052753
Grant Number 09858557
Status In Force
Filing Date 2016-02-24
First Publication Date 2017-08-24
Grant Date 2018-01-02
Owner Cylance Inc. (USA)
Inventor Soeder, Derek A.

Abstract

Transaction terminal malicious software is detected by monitoring calls of a first process to identify attempts by the first process to read memory used by a second process. The first and second processes are different from each other and are executed by at least one data processor forming part of a transaction terminal system having at least one transaction terminal. Thereafter, it is determined that the memory used by the second process comprises patterns indicative of sensitive financial or identification information. In response, at least one corrective action is initiated to prevent use of the financial or identification information. Related apparatus, systems, techniques and articles are also described.

IPC Classes  ?

  • G06Q 20/10 - Payment architectures specially adapted for home banking systems
  • G06Q 20/38 - Payment architectures, schemes or protocols - Details thereof
  • G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
  • G06Q 20/20 - Point-of-sale [POS] network systems
  • G06Q 20/18 - Payment architectures involving self-service terminals [SST], vending machines, kiosks or multimedia terminals
  • G06Q 20/30 - Payment architectures, schemes or protocols characterised by the use of specific devices
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

91.

Endpoint-based man in the middle attack detection using machine learning models

      
Application Number 15380896
Grant Number 09762611
Status In Force
Filing Date 2016-12-15
First Publication Date 2017-08-17
Grant Date 2017-09-12
Owner Cylance Inc. (USA)
Inventor
  • Wallace, Brian Michael
  • Zhao, Xuan
  • Miller, Jonathan Wesley

Abstract

A first node of a networked computing environment initiates each of a plurality of different types of man-in-the middle (MITM) detection tests to determine whether communications between first and second nodes of a computing network are likely to have been subject to an interception or an attempted interception by a third node. Thereafter, it is determined, by the first node, that at least one of the tests indicate that the communications are likely to have been intercepted by a third node. Data is then provided, by the first node, data that characterizes the determination. In some cases, one or more of the MITM detection tests utilizes a machine learning model. Related apparatus, systems, techniques and articles are also described.

IPC Classes  ?

  • G06F 11/00 - Error detection; Error correction; Monitoring
  • G06F 12/14 - Protection against unauthorised use of memory
  • G06F 12/16 - Protection against loss of memory contents
  • G08B 23/00 - Alarms responsive to unspecified undesired or abnormal conditions
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/06 - Arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
  • G06N 99/00 - Subject matter not provided for in other groups of this subclass
  • H04W 12/12 - Detection or prevention of fraud

92.

Neural attention mechanisms for malware analysis

      
Application Number 15216661
Grant Number 09721097
Status In Force
Filing Date 2016-07-21
First Publication Date 2017-08-01
Grant Date 2017-08-01
Owner Cylance Inc. (USA)
Inventor
  • Davis, Andrew
  • Wolff, Matthew
  • Wojnowicz, Michael
  • Soeder, Derek A.
  • Zhao, Xuan

Abstract

As part of an analysis of the likelihood that a given input (e.g. a file, etc.) includes malicious code, a convolutional neural network can be used to review a sequence of chunks into which an input is divided to assess how best to navigate through the input and to classify parts of the input in a most optimal manner. At least some of the sequence of chunks can be further examined using a recurrent neural network in series with the convolutional neural network to determine how to progress through the sequence of chunks. A state of the at least some of the chunks examined using the recurrent neural network summarized to form an output indicative of the likelihood that the input includes malicious code. Methods, systems, and articles of manufacture are also described.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06N 3/04 - Architecture, e.g. interconnection topology
  • G06N 3/08 - Learning methods
  • G06N 7/00 - Computing arrangements based on specific mathematical models

93.

Neural attention mechanisms for malware analysis

      
Application Number 15246333
Grant Number 09705904
Status In Force
Filing Date 2016-08-24
First Publication Date 2017-07-11
Grant Date 2017-07-11
Owner Cylance Inc. (USA)
Inventor
  • Davis, Andrew
  • Wolff, Matthew
  • Wojnowicz, Michael
  • Soeder, Derek A.
  • Zhao, Xuan

Abstract

As part of an analysis of the likelihood that a given input (e.g. a file, etc.) includes malicious code, a convolutional neural network can be used to review a sequence of chunks into which an input is divided to assess how best to navigate through the input and to classify parts of the input in a most optimal manner. At least some of the sequence of chunks can be further examined using a recurrent neural network in series with the convolutional neural network to determine how to progress through the sequence of chunks. A state of the at least some of the chunks examined using the recurrent neural network summarized to form an output indicative of the likelihood that the input includes malicious code. Methods, systems, and articles of manufacture are also described.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06N 3/04 - Architecture, e.g. interconnection topology
  • G06N 3/08 - Learning methods
  • G06N 7/00 - Computing arrangements based on specific mathematical models

94.

Endpoint-based man in the middle attack detection using multiple types of detection tests

      
Application Number 15288374
Grant Number 09680860
Status In Force
Filing Date 2016-10-07
First Publication Date 2017-06-13
Grant Date 2017-06-13
Owner Cylance Inc. (USA)
Inventor
  • Wallace, Brian Michael
  • Miller, Jonathan Wesley

Abstract

A first node of a networked computing environment initiates each of a plurality of different man-in-the middle (MITM) detection tests to determine whether communications between first and second nodes of a computing network are likely to have been subject to an interception or an attempted interception by a third node. Thereafter, it is determined, by the first node, that at least one of the tests indicate that the communications are likely to have been intercepted by a third node. Data is then provided, by the first node, data that characterizes the determination. Related apparatus, systems, techniques and articles are also described.

IPC Classes  ?

  • G06F 11/00 - Error detection; Error correction; Monitoring
  • G06F 12/14 - Protection against unauthorised use of memory
  • G06F 12/16 - Protection against loss of memory contents
  • G08B 23/00 - Alarms responsive to unspecified undesired or abnormal conditions
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04W 12/12 - Detection or prevention of fraud

95.

Native service controller

      
Application Number 15236328
Grant Number 09672081
Status In Force
Filing Date 2016-08-12
First Publication Date 2017-06-06
Grant Date 2017-06-06
Owner Cylance Inc. (USA)
Inventor
  • Esparza, Alejandro Espinoza
  • Russell, Braden
  • Pan, Haiming
  • Jin, Ming
  • Wolff, Matthew
  • Permeh, Ryan

Abstract

In one respect, there is provided a system for loading managed applications. The system may include at least one processor and at least one memory. The memory may include program code which when executed by the at least one memory provides operations including: generating a single process, the generating comprising running a native code executable, the running of the native code execute loading a loader manager as part of the single process; loading, by the loader manager running within the single process, a runtime environment corresponding to a non-native code application; and loading, by the loader manager, the non-native code application, the non-native code application being loaded to run as part of the single process.

IPC Classes  ?

  • G06F 13/00 - Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
  • G06F 9/54 - Interprogram communication
  • G06F 9/44 - Arrangements for executing specific programs
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules

96.

Endpoint-based man in the middle attack detection

      
Application Number 15045071
Grant Number 09602531
Status In Force
Filing Date 2016-02-16
First Publication Date 2017-03-21
Grant Date 2017-03-21
Owner Cylance, Inc. (USA)
Inventor
  • Wallace, Brian Michael
  • Miller, Jonathan Wesley

Abstract

A first node of a networked computing environment initiates each of a plurality of different man-in-the middle (MITM) detection tests to determine whether communications between first and second nodes of a computing network are likely to have been subject to an interception or an attempted interception by a third node. Thereafter, it is determined, by the first node, that at least one of the tests indicate that the communications are likely to have been intercepted by a third node. Data is then provided, by the first node, data that characterizes the determination. Related apparatus, systems, techniques and articles are also described.

IPC Classes  ?

  • G06F 7/04 - Identity comparison, i.e. for like or unlike values
  • G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
  • G06F 17/30 - Information retrieval; Database structures therefor
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04W 12/12 - Detection or prevention of fraud

97.

Malware detection

      
Application Number 15210761
Grant Number 10157279
Status In Force
Filing Date 2016-07-14
First Publication Date 2017-01-19
Grant Date 2018-12-18
Owner Cylance Inc. (USA)
Inventor
  • Davis, Andrew
  • Wolff, Matthew
  • Soeder, Derek A.
  • Chisholm, Glenn
  • Permeh, Ryan

Abstract

In one respect, there is provided a system for training a neural network adapted for classifying one or more scripts. The system may include at least one processor and at least one memory. The memory may include program code which when executed by the at least one memory provides operations including: receiving a disassembled binary file that includes a plurality of instructions; processing the disassembled binary file with a convolutional neural network configured to detect a presence of one or more sequences of instructions amongst the plurality of instructions and determine a classification for the disassembled binary file based at least in part on the presence of the one or more sequences of instructions; and providing, as an output, the classification of the disassembled binary file. Related computer-implemented methods are also disclosed.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06N 3/08 - Learning methods

98.

Wavelet decomposition of software entropy to identify malware

      
Application Number 15236316
Grant Number 09946876
Status In Force
Filing Date 2016-08-12
First Publication Date 2016-12-29
Grant Date 2018-04-17
Owner Cylance Inc. (USA)
Inventor
  • Wojnowicz, Michael
  • Chisholm, Glenn
  • Wolff, Matthew
  • Soeder, Derek A.
  • Zhao, Xuan

Abstract

A plurality of data files is received. Thereafter, each file is represented as an entropy time series that reflects an amount of entropy across locations in code for such file. A wavelet transform is applied, for each file, to the corresponding entropy time series to generate an energy spectrum characterizing, for the file, an amount of entropic energy at multiple scales of code resolution. It can then be determined, for each file, whether or not the file is likely to be malicious based on the energy spectrum. Related apparatus, systems, techniques and articles are also described.

IPC Classes  ?

  • G06F 11/00 - Error detection; Error correction; Monitoring
  • G06F 12/14 - Protection against unauthorised use of memory
  • G06F 12/16 - Protection against loss of memory contents
  • G08B 23/00 - Alarms responsive to unspecified undesired or abnormal conditions
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06N 3/08 - Learning methods

99.

Recurrent neural networks for malware analysis

      
Application Number 15236289
Grant Number 10558804
Status In Force
Filing Date 2016-08-12
First Publication Date 2016-12-01
Grant Date 2020-02-11
Owner Cylance Inc. (USA)
Inventor
  • Davis, Andrew
  • Wolff, Matthew
  • Soeder, Derek A.
  • Chisholm, Glenn
  • Permeh, Ryan

Abstract

i, where i is the number of instructions of the sample. This resulting feature vector may then be concatenated with the other hand-engineered features, and a larger classifier may then be trained on hand-engineered as well as automatically determined features. Related apparatus, systems, techniques and articles are also described.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06N 3/04 - Architecture, e.g. interconnection topology
  • G06N 3/08 - Learning methods

100.

Run-time interception of software methods

      
Application Number 14835218
Grant Number 10635415
Status In Force
Filing Date 2015-08-25
First Publication Date 2016-11-10
Grant Date 2020-04-28
Owner Cylance Inc. (USA)
Inventor Soeder, Derek A.

Abstract

The present disclosure involves systems and computer-implemented methods for installing software hooks. One process includes identifying a target method and a hook code, where the hook code is to execute instead of at least a portion of the target method, and wherein the target method and the hook code are executed within a managed code environment. A compiled version of the target method and a compiled version of the hook code are located in memory, where the compiled versions of the target method and the hook code are compiled in native code. Then, the compiled version of the target method is modified to direct execution of at least a portion of the compiled version of the target method to the compiled version of the hook code. The non-compiled version of the target method may be originally stored as bytecode. The managed code environment may comprise a managed .NET environment.

IPC Classes  ?

  • G06F 9/45 - Compilation or interpretation of high level programme languages
  • G06F 8/41 - Compilation
  • G06F 9/448 - Execution paradigms, e.g. implementations of programming paradigms
  1     2        Next Page