FireEye, Inc.

United States of America

Back to Profile

1-48 of 48 for FireEye, Inc. and 2 subsidiaries Sort by
Query
Aggregations
IP Type
        Patent 36
        Trademark 12
Jurisdiction
        World 39
        Europe 3
        United States 3
        Canada 3
Owner / Subsidiary
[Owner] FireEye, Inc. 36
Mandiant Corporation 7
iSight Security, Inc. 5
Date
2021 1
2020 2
2019 5
Before 2019 40
IPC Class
G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements 18
H04L 29/06 - Communication control; Communication processing characterised by a protocol 12
G06F 11/00 - Error detection; Error correction; Monitoring 3
G06F 21/55 - Detecting local intrusion or implementing counter-measures 3
G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines 3
See more
NICE Class
42 - Scientific, technological and industrial services, research and design 11
09 - Scientific and electric apparatus and instruments 7
36 - Financial, insurance and real estate services 4
45 - Legal and security services; personal services for individuals. 4
41 - Education, entertainment, sporting and cultural services 3
See more

1.

CLOUDVISORY

      
Application Number 1572498
Status Registered
Filing Date 2020-12-16
Registration Date 2020-12-16
Owner FireEye, Inc. (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Downloadable enterprise software for monitoring the security of cloud environments. Software as a service (SAAS) services featuring software for monitoring the security of cloud environments.

2.

CLOUDVISORY

      
Application Number 208049500
Status Registered
Filing Date 2020-12-16
Registration Date 2022-09-14
Owner FireEye, Inc. (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

(1) Downloadable enterprise software for monitoring the security of cloud environments. (1) Software as a service (SAAS) services featuring software for monitoring the security of cloud environments.

3.

System and method for predicting and mitigating cybersecurity system misconfigurations

      
Application Number 15940854
Grant Number 10826931
Status In Force
Filing Date 2018-03-29
First Publication Date 2020-11-03
Grant Date 2020-11-03
Owner FireEye, Inc. (USA)
Inventor
  • Quan, Wei
  • Konda, Raghunath

Abstract

A computerized method for reconfiguring one or more malware detection systems each performing cybersecurity analyses on incoming data is described. The method involves receiving meta-information including metrics associated with a malware detection system. Based on the meta-information, a determination is made whether the malware detection system is operating at an optimal performance level. If not, results produced by conducting behavior analyses predicting operability of the malware detection system are determined and the results are provided as feedback to the malware detection system to update one or more configuration parameter values thereof.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 17/18 - Complex mathematical operations for evaluating statistical data

4.

PLATFORM AND METHOD FOR ENHANCED-CYBER-ATTACK DETECTION AND RESPONSE EMPLOYING A GLOBAL DATA STORE

      
Application Number US2018066964
Publication Number 2019/133451
Status In Force
Filing Date 2018-12-20
Publication Date 2019-07-04
Owner FIREEYE, INC. (USA)
Inventor
  • Vashisht, Sai
  • Otvagin, Alexander

Abstract

A system for detecting artifacts associated with a cyber-attack features a cybersecurity intelligence hub that includes a data store with stored meta-information associated with each artifact of a plurality of artifacts and each stored meta-information includes a verdict classifying an artifact corresponding to the stored meta-information as a malicious classification or a benign classification. The hub is configured to (i) receive meta- information associated with a first artifact from a cybersecurity sensor, and (ii) determine a verdict for the first artifact based on an analysis of meta-information associated with the first artifact stored meta-information associated with each of the plurality of artifacts. A verdict for the first artifact is returned to the cybersecurity sensor in response to a detected match between a portion of stored meta-information and a portion of the meta-information associated with the first artifact.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

5.

PLATFORM AND METHOD FOR RETROACTIVE RECLASSIFICATION EMPLOYING A CYBERSECURITY-BASED GLOBAL DATA STORE

      
Application Number US2018066973
Publication Number 2019/133453
Status In Force
Filing Date 2018-12-20
Publication Date 2019-07-04
Owner FIREEYE, INC. (USA)
Inventor
  • Vashisht, Sai
  • Otvagin, Alexander

Abstract

A system for detecting artifacts associated with a cyber-attack features a cybersecurity intelligence hub remotely located from and communicatively coupled to one or more network devices via a network. The hub includes a data store and retroactive reclassification logic. The data store includes stored meta-information associated with each prior evaluated artifact of a plurality of prior evaluated artifacts. Each meta-information associated with a prior evaluated artifact of the plurality of prior evaluated artifacts includes a verdict classifying the prior evaluated artifact as a malicious classification or a benign classification. The retroactive reclassification logic is configured to analyze the stored meta-information associated with the prior evaluated artifact and either (a) identify whether the verdict associated with the prior evaluated artifact is in conflict with trusted cybersecurity intelligence or (b) identify inconsistent verdicts for the same prior evaluated artifact.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

6.

SYSTEM AND METHOD FOR ANALYZING BINARY CODE FOR MALWARE CLASSIFICATION USING ARTIFICIAL NEURAL NETWORK TECHNIQUES

      
Application Number US2018055508
Publication Number 2019/083737
Status In Force
Filing Date 2018-10-11
Publication Date 2019-05-02
Owner FIREEYE, INC. (USA)
Inventor
  • Johns, Jeffrey Thomas
  • Jones, Brian Sanford
  • Coull, Scott Eric

Abstract

A system for detecting whether a file including content s associated with a cyber-attack is described. The content may include an executable file for example. The system includes an intelligence-driven analysis subsystem and a computation analysis subsystem. The intelligence-driven analysis subsystem is configured to (i) receive the file, (ii) inspect and compute features of the file for indicators associated with a cyber-attack, and (iii) produce a first output representing the detected indicators. The computational analysis subsystem includes an artificial neural network to (i) receive a network input being a first representation of at least one section of binary code from the file as input, and (ii) process the first representation of the section to produce a second output. The first output and the second output are used in determination a classification assigned to the file.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

7.

PHISHING ATTACK DETECTION

      
Application Number US2018053561
Publication Number 2019/067993
Status In Force
Filing Date 2018-09-28
Publication Date 2019-04-04
Owner FIREEYE, INC. (USA)
Inventor
  • Kumar, Venkata Satya Phani, Pavan Chitturi
  • Rao, Surya, Prakash

Abstract

A computerized method for analyzing a subject URL to determine whether the subject URL is associated with a phishing attack is disclosed. The method includes steps of detecting keypoints within a screenshot of a webpage corresponding to the subject URL and determining a set of confidences based on an analysis of the detected keypoints with a model. Each confidence within the set of confidences is assigned to feature vector within a set of training feature vectors representing a training set of URLs used in generating the model. The method comprises performing an image comparison between the screenshot and a screenshot corresponding to a feature vector within the set of training feature vectors, the feature vector being assigned a highest confidence. Responsive to determining the image comparison result exceeds a predefined threshold, transmitting an alert indicating that the subject URL is associated with the phishing attack.

IPC Classes  ?

  • G06K 9/46 - Extraction of features or characteristics of the image
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

8.

CYBER-SECURITY SYSTEM AND METHOD FOR WEAK INDICATOR DETECTION AND CORRELATION TO GENERATE STRONG INDICATORS

      
Application Number US2018040470
Publication Number 2019/006412
Status In Force
Filing Date 2018-06-29
Publication Date 2019-01-03
Owner FIREEYE, INC. (USA)
Inventor
  • Jeyaraman, Sundar
  • Ramaswamy, Ramaswamy

Abstract

A method for detecting a cyber-attack after infiltration into an enterprise network is described. The method features receiving a second plurality of weak indicators included as part of a first plurality of weak indicators and performing a correlation operation between the second plurality of weak indicators and one or more patterns or sequences of indicators associated with known malware. The first plurality of weak indicators is greater in number than the second plurality of weak indicators. A report is generated and issued based on results from the correlation operation.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

9.

ATTRIBUTE-CONTROLLED MALWARE DETECTION

      
Application Number US2018025329
Publication Number 2018/183793
Status In Force
Filing Date 2018-03-30
Publication Date 2018-10-04
Owner FIREEYE, INC. (USA)
Inventor
  • Siddiqui, Mumtaz
  • Radhakrishnan, Manju
  • Agarwal, Deepak

Abstract

A computerized method for authenticating access to a subscription-based service to detect an attempted cyber-attack. The method features operations by the cloud broker that include receiving service policy level information and information based on operational metadata. The service policy level information includes at least subscription attributes to identify one or more performance criterion in analyses conducted on one or more objects submitted by a sensor for malware representing an attempted cyber-attack. The operational metadata includes metadata that pertains to an operating state of one or more clusters of a plurality of clusters of the subscription-based service. The cloud broker, using both the service policy level information and the information based on the operational metadata, selecting a cluster of the plurality of clusters to analyze the one or more objects submitted by the sensor and establishes a communication session between the sensor and the cluster via the cloud broker.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

10.

LAUNCHER FOR SETTING ANALYSIS ENVIRONMENT VARIATIONS FOR MALWARE DETECTION

      
Application Number US2016061361
Publication Number 2017/083538
Status In Force
Filing Date 2016-11-10
Publication Date 2017-05-18
Owner FIREEYE, INC. (USA)
Inventor
  • Paithane, Sushant
  • Vashisht, Sai, Omkar
  • Khalid, Yasir
  • Pilipenko, Alexandre

Abstract

A system and method for automatically analyzing an object for malware is described. Operating one or more virtual machines, the system and method provide an analysis environment variation framework to provide a more robust analysis of an object for malware. The multi- application, multi-plugin processing framework is configured within a virtual machine, where the framework generates a plurality of processes for analyzing the object for malware and each of plurality of processes is configured with a different application and plug- in combination selected based in part on a type of object being analyzed.

IPC Classes  ?

  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

11.

MICROVISOR-BASED MALWARE DETECTION ENDPOINT ARCHITECTURE

      
Application Number US2015061238
Publication Number 2016/109042
Status In Force
Filing Date 2015-11-18
Publication Date 2016-07-07
Owner FIREEYE, INC. (USA)
Inventor
  • Ismael, Osman Abdoul
  • Aziz, Ashar

Abstract

A threat-aware microvisor may be deployed in a malware detection endpoint architecture and execute on an endpoint to provide exploit and malware detection within a network environment. Exploit and malware detection on the endpoint may be performed in accordance with one or more processes embodied as software modules or engines configured to detect suspicious and/or malicious behaviors of an operating system process (object), and to correlate and classify the detected behaviors as indicative of malware. Detection of suspicious and/or malicious behaviors may be performed by static and dynamic analysis of the object. Static analysis may perform examination of the object to determine whether it is suspicious, while dynamic analysis may instrument the behavior of the object as the operating system process runs via capability violations of, e.g. operating system events. A behavioral analysis logic engine and a classifier may thereafter cooperate to perform correlation and classification of the detected behaviors.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

12.

INTELLIGENT CONTEXT AWARE USER INTERACTION FOR MALWARE DETECTION

      
Application Number US2015067082
Publication Number 2016/109283
Status In Force
Filing Date 2015-12-21
Publication Date 2016-07-07
Owner FIREEYE, INC. (USA)
Inventor
  • Khalid, Yasir
  • Paithane, Sushant
  • Vashisht, Sai

Abstract

According to one embodiment, a malware detection system is integrated with at least a static analysis engine and a dynamic analysis engine. The static analysis engine is configured to automatically determine an object type of a received object. The dynamic analysis engine is configured to automatically launch the object after selecting an action profile based on the object type. The dynamic analysis engine is further configured to, provide simulated user interaction to the object based on the selected action profile either in response to detecting a request for human interaction or as a result of a lapse of time since a previous simulated human interaction was provided.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

13.

SYSTEM AND METHOD TO COMMUNICATE SENSITIVE INFORMATION VIA ONE OR MORE UNTRUSTED INTERMEDIATE NODES WITH RESILIENCE TO DISCONNECTED NETWORK TOPOLOGY

      
Application Number US2015043854
Publication Number 2016/022717
Status In Force
Filing Date 2015-08-05
Publication Date 2016-02-11
Owner FIREEYE, INC. (USA)
Inventor Cunningham, Sean

Abstract

A system and method to communicate secure information between a plurality of computing machines using an untrusted intermediate with resilience to disconnected network topology. The system and method utilize agnostic endpoints that are generalized to be interoperable among various systems, with their functionality based on their location in a network. The system and method enable horizontal scaling on the network. One or more clusters may be set up in a location within a network or series of networks in electronic communication, e.g., in a cloud or a sub-network, residing between a secure area of the network(s) and an unsecure area such as of an external network or portion of a network. The horizontal scaling allows the system to take advantage of a capacity of a local network. As long as an agent has connectivity to at least one locale of the network, the agent is advantageously operable to move data across the system.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

14.

TRUSTED THREAT-AWARE MICROVISOR

      
Application Number US2015038552
Publication Number 2016/004037
Status In Force
Filing Date 2015-06-30
Publication Date 2016-01-07
Owner FIREEYE, INC. (USA)
Inventor
  • Ismael, Osman Abdoul
  • Aziz, Ashar

Abstract

A trusted threat-aware microvisor may be deployed as a module of a trusted computing base (TCB) that also includes a root task module configured to cooperate with the microvisor to load and initialize one or more other modules executing on a node of a network environment. The root task may cooperate with the microvisor to allocate one or more kernel resources of the node to those other modules. As a trusted module of the TCB, the microvisor may be configured to enforce a security policy of the TCB that, e.g., prevents alteration of a state related to security of the microvisor by a module of or external to the TCB. The security policy of the TCB may be implemented by a plurality of security properties of the microvisor. Trusted (or trustedness) may therefore denote a predetermined level of confidence that the security property is demonstrated by the microvisor.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • H04L 12/26 - Monitoring arrangements; Testing arrangements

15.

VERIFICATION OF TRUSTED THREAT-AWARE MICROVISOR

      
Application Number US2015038616
Publication Number 2016/004080
Status In Force
Filing Date 2015-06-30
Publication Date 2016-01-07
Owner FIREEYE, INC. (USA)
Inventor
  • Ismael, Osman Abdoul
  • Tews, Hendrik

Abstract

A trusted threat-aware microvisor may be deployed as a module of a trusted computing base (TCB). The microvisor is illustratively configured to enforce a security policy of the TCB, which may be implemented as a security property of the microvisor. The microvisor may manifest (i.e., demonstrate) the security property in a manner that enforces the security policy. Trustedness denotes a predetermined level of confidence that the security property is demonstrated by the microvisor. The predetermined level of confidence is based on an assurance (i.e., grounds) that the microvisor demonstrates the security property. Trustedness of the microvisor may be verified by subjecting the TCB to enhanced verification analysis configured to ensure that the TCB conforms to an operational model with an appropriate level of confidence over an appropriate range of activity. The operational model may then be configured to analyze conformance of the microvisor to the security property. A combination of conformance by the microvisor to the operational model and to the security property provides assurance (i.e., grounds) for the level of confidence and, thus, verifies trustedness.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • H04L 9/00 - Arrangements for secret or secure communications; Network security protocols

16.

MALWARE DETECTION AND REMEDIATION FOR ENDPOINT DEVICES

      
Application Number US2015037213
Publication Number 2015/200340
Status In Force
Filing Date 2015-06-23
Publication Date 2015-12-30
Owner FIREEYE, INC. (USA)
Inventor Eyada, Hatem

Abstract

According to one embodiment, a computerized method is directed to neutralizing callback malware. This method involves intercepting an incoming message from a remote source directed to a compromised endpoint device. Next, a first portion of information within the incoming message is substituted with a second portion of information. The second portion of information is designed to mitigate operability of the callback malware. Thereafter, the modified incoming message, which includes the second portion of the information, is returned to the compromised endpoint device.

IPC Classes  ?

  • G06F 11/00 - Error detection; Error correction; Monitoring

17.

MALWARE DETECTION AND REMEDIATION FOR ENDPOINT DEVICED

      
Application Number US2015037245
Publication Number 2015/200360
Status In Force
Filing Date 2015-06-23
Publication Date 2015-12-30
Owner FIREEYE, INC. (USA)
Inventor Eyada, Hatem

Abstract

According to one embodiment, a computerized method is directed to neutralizing callback malware. This method involves intercepting an incoming message from a remote source directed to a compromised endpoint device. Next, a first portion of information within the incoming message is substituted with a second portion of information. The second portion of information is designed to mitigate operability of the callback malware. Thereafter, the modified incoming message, which includes the second portion of the information, is returned to the compromised endpoint device.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • H04L 29/00 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

18.

FireEye

      
Application Number 1275373
Status Registered
Filing Date 2015-08-19
Registration Date 2015-08-19
Owner FireEye, Inc. (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Computer software and hardware for digital security; computer security products, namely, computer peripherals; computer software and computer hardware for detection, blocking and removal of computer viruses, rootkits, advanced persistent threats, malware, and malicious attacks; computer software and computer hardware for real-time detection, blocking, removal and remediation of computer viruses, rootkits, advanced persistent threats, malware and malicious attacks; computer software for identifying and preventing malicious attacks on computers, computer systems, and digital devices; computer software and hardware providing secure virtual computer systems and virtual computer environments. Technical support services, namely, troubleshooting and support services in the nature of diagnosing computer hardware and software problems, providing back-up computer programs and facilities, virus removal, maintenance of computer software relating to computer security and prevention of computer risks, updating and maintenance of computer software, and software installation for computers, peripherals, USB devices, computer networks and mobile devices.

19.

FIREEYE

      
Application Number 174753600
Status Registered
Filing Date 2015-09-24
Registration Date 2017-03-30
Owner FireEye, Inc. (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

(1) Computer software and hardware for digital security; computer software and computer hardware for detection, blocking and removal of computer viruses, rootkits, advanced persistent threats, malware, and malicious attacks; computer software and computer hardware for real-time detection, blocking, removal and remediation of computer viruses, rootkits, advanced persistent threats, malware and malicious attacks; computer software for identifying and preventing malicious attacks on computers, computer systems, and digital devices (1) Technical support services, namely, troubleshooting and support services in the nature of diagnosing computer hardware and software problems, providing back-up computer programs and facilities, virus removal, maintenance of computer software relating to computer security and prevention of computer risks, updating and maintenance of computer software, and software installation for computers, peripherals, USB devices, computer networks and mobile devices

20.

THREAT-AWARE MICROVISOR

      
Application Number US2014071847
Publication Number 2015/108675
Status In Force
Filing Date 2014-12-22
Publication Date 2015-07-23
Owner FIREEYE, INC. (USA)
Inventor
  • Ismael, Osman Abdoul
  • Aziz, Ashar

Abstract

A threat-aware microvisor is configured to facilitate real-time security analysis, including exploit detection and threat intelligence, of operating system processes executing on a node of a network environment. The microvisor may be embodied as a module disposed or layered beneath (underlying) an operating system kernel executing on the node to thereby control privileges (i.e., access permissions) to kernel resources, such as one or more central processing units (CPUs), network interfaces, memory, and/or devices, of the node. Illustratively, the microvisor may be configured to control access to one or more of the resources in response to a request by an operating system process to access the resource.

IPC Classes  ?

  • G06F 21/50 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems

21.

MICRO-VIRTUALIZATION ARCHITECTURE FOR THREAT-AWARE MICROVISOR DEPLOYMENT IN A NODE OF A NETWORK ENVIRONMENT

      
Application Number US2014071879
Publication Number 2015/108677
Status In Force
Filing Date 2014-12-22
Publication Date 2015-07-23
Owner FIREEYE, INC. (USA)
Inventor
  • Ismael, Osman Abdoul
  • Aziz, Ashar

Abstract

A micro-virtualization architecture deploys a threat-aware microvisor as a module of a virtualization system configured to facilitate real-time security analysis, including exploit detection and threat intelligence, of operating system processes executing in a memory of a node in a network environment. The micro-virtualization architecture organizes the memory as a user space and kernel space, wherein the microvisor executes in the kernel space of the architecture, while the operating system processes, an operating system kernel, a virtual machine monitor (VMM) and its spawned virtual machines (VMs) execute in the user space. Notably, the microvisor executes at the highest privilege level of a central processing unit of the node to virtualize access to kernel resources. The operating system kernel executes under control of the microvisor at a privilege level lower than a highest privilege level of the microvisor. The VMM and its spawned VMs execute at the highest privilege level of the microvisor.

IPC Classes  ?

  • G06F 9/06 - Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs

22.

EXPLOIT DETECTION SYSTEM WITH THREAT-AWARE MICROVISOR

      
Application Number US2014071923
Publication Number 2015/108679
Status In Force
Filing Date 2014-12-22
Publication Date 2015-07-23
Owner FIREEYE, INC. (USA)
Inventor
  • Ismael, Osman Abdoul
  • Aziz, Ashar

Abstract

An exploit detection system deploys a threat-aware microvisor to facilitate real-time security analysis, including exploit detection and threat intelligence, of an operating system process executing on a node of a network environment. The microvisor may be organized as a main protection domain representative of the operating system process. In response to the process attempting to access a kernel resource for which it does not have permission, a capability violation may be generated at the main protection domain of the microvisor and a micro-virtual machine (VM) may be spawned as a container configured to encapsulate the process. The main protection domain may then be cloned to create a cloned protection domain that is representative of the process and that is bound to the spawned micro-VM. Capabilities of the cloned protection domain may be configured to be more restricted than the capabilities of the main protection domain with respect to access to the kernel resource. The restricted capabilities may be configured to generate more capability violations than those generated by the capabilities of the main protection domain and, in turn, enable further monitoring of the process as it attempts to access the kernel resource.

IPC Classes  ?

  • G06F 21/10 - Protecting distributed programs or content, e.g. vending or licensing of copyrighted material

23.

SYSTEM, APPARATUS AND METHOD FOR AUTOMATICALLY VERIFYING EXPLOITS WITHIN SUSPECT OBJECTS AND HIGHLIGHTING THE DISPLAY INFORMATION ASSOCIATED WITH THE VERIFIED EXPLOITS

      
Application Number US2014072292
Publication Number 2015/100388
Status In Force
Filing Date 2014-12-23
Publication Date 2015-07-02
Owner FIREEYE, INC. (USA)
Inventor
  • Aziz, Ashar
  • Bu, Zheng
  • Amin, Muhammad
  • Ismael, Osman Abdoul

Abstract

According to one embodiment, a threat detection system is integrated with intrusion protection system (IPS) logic and virtual execution logic. The IPS logic is configured to receive a first plurality of objects and filter the first plurality of objects by identifying a second plurality of objects as suspicious objects. The second plurality of objects is a subset of the first plurality of objects and is lesser or equal in number to the first plurality of objects. The virtual execution logic is configured to automatically verify whether any of the suspicious objects is an exploit. The virtual execution logic comprises at least one virtual machine configured to virtually process content within the suspicious objects and monitor for anomalous behaviors during the virtual processing that are indicative of exploits.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

24.

DYNAMICALLY ADAPTIVE FRAMEWORK AND METHOD FOR CLASSIFYING MALWARE USING INTELLIGENT STATIC, EMULATION, AND DYNAMIC ANALYSES

      
Application Number US2014055961
Publication Number 2015/047804
Status In Force
Filing Date 2014-09-16
Publication Date 2015-04-02
Owner FIREEYE, INC. (USA)
Inventor
  • Vincent, Michael
  • Mesdaq, Ali
  • Thioux, Emmanuel
  • Singh, Abhishek
  • Vashisht, Sai

Abstract

Techniques for malware detection are described herein. According to one aspect, control logic determines an analysis plan for analyzing whether a specimen should be classified as malware, where the analysis plan identifies at least first and second analyses to be performed. Each of the first and second analyses identified in the analysis plan including one or both of a static analysis and a dynamic analysis. The first analysis is performed based on the analysis plan to identify suspicious indicators characteristics related to processing of the specimen. The second analysis is performed based on the analysis plan to identify unexpected behaviors having processing or communications anomalies. A classifier determines whether the specimen should be classified as malicious based on the static and dynamic analyses. The analysis plan, the indicators, the characteristics, and the anomalies are stored in a persistent memory.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

25.

SYSTEM, APPARATUS AND METHOD FOR USING MALWARE ANALYSIS RESULTS TO DRIVE ADAPTIVE INSTRUMENTATION OF VIRTUAL MACHINES TO IMPROVE EXPLOIT DETECTION

      
Application Number US2014056834
Publication Number 2015/047960
Status In Force
Filing Date 2014-09-22
Publication Date 2015-04-02
Owner FIREEYE, INC. (USA)
Inventor Ismael, Osman Abdoul

Abstract

According to one embodiment, an electronic device comprises a memory to store information and a processor. The processor is adapted to receive information associated with content such as network traffic, to process the stored information and to conduct operations on the content. These operations may comprise determining, by a virtual machine processed by the processor, an occurrence of an event during malware analysis of an object associated with the content, and dynamically altering a virtual machine instrumentation of the virtual machine based on information associated with the event.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

26.

ADVANCED PERSISTENT THREAT (APT) DETECTION CENTER

      
Application Number US2014055956
Publication Number 2015/047802
Status In Force
Filing Date 2014-09-16
Publication Date 2015-04-02
Owner FIREEYE, INC. (USA)
Inventor
  • Haq, Thoufique
  • Zhai, Jinjian
  • Pidathala, Vinay K.

Abstract

A computerized method is described in which one or more received objects are analyzed by an advanced persistent threat (APT) detection center to determine if the objects are APTs. The analysis may include the extraction of features describing and characterizing features of the received objects. The extracted features may be compared with features of known APT malware objects and known non-APT malware objects to determine a classification or probability of the received objects being APT malware. Upon determination that the received objects are APT malware, warning messages may be transmitted to a user of associated client devices. Classified objects may also be used to generate analytic data for the prediction and prevention of future APT attacks.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

27.

MALWARE DETECTION BASED ON VM BEHAVIORAL ANALYSIS AND MACHINE LEARNING CLASSIFICATION

      
Application Number US2014055958
Publication Number 2015/047803
Status In Force
Filing Date 2014-09-16
Publication Date 2015-04-02
Owner FIREEYE, INC. (USA)
Inventor
  • Mesdaq, Ali
  • Westin Iii, Paul L.

Abstract

A computerized method is described in which a received object is analyzed by a malicious content detection (MCD) system to determine whether the object is malware or non-malware. The analysis may include the generation of a fuzzy hash based on a collection of behaviors for the received object. The fuzzy hash may be used by the MCD system to determine the similarity of the received object with one or more objects in previously classified/analyzed clusters. Upon detection of a "similar" object, the suspect object may be associated with the cluster and classified based on information attached to the cluster. This similarity matching provides 1) greater flexibility in analyzing potential malware objects, which may share multiple characteristics and behaviors but are also slightly different from previously classified objects and 2) a more efficient technique for classifying/assigning attributes to objects.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

28.

SYSTEM AND METHOD FOR DETECTING MALICIOUS LINKS IN ELECTRONIC MESSAGES

      
Application Number US2014043724
Publication Number 2015/009411
Status In Force
Filing Date 2014-06-23
Publication Date 2015-01-22
Owner FIREEYE, INC. (USA)
Inventor
  • Pidathala, Vinay
  • Uyeno, Henry

Abstract

According to one embodiment, in response to receiving a plurality of uniform resource locator (URL) links for malicious determination, any known URL links are removed from the URL links based on a list of known link signatures. For each of remaining URL links that are unknown, a link analysis is performed on the URL link based on link heuristics to determine whether the URL link is suspicious. For each of the suspicious URL links, a dynamic analysis is performed on a resource of the suspicious URL link. It is classified whether the suspicious URL link is a malicious link based on a behavior of the resource during the dynamic analysis.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

29.

ZERO-DAY DISCOVERY SYSTEM

      
Application Number US2014043726
Publication Number 2014/209913
Status In Force
Filing Date 2014-06-23
Publication Date 2014-12-31
Owner FIREEYE, INC. (USA)
Inventor
  • Bu, Zheng
  • Lin, Yichong

Abstract

A method for determining a zero-day attack by an electronic device is described. According to one embodiment, the method comprises instantiating, by the electronic device, at least one virtual machine, the at least one virtual machine being based on a fortified software profile. The method further comprises executing content capable of behaving as an exploit on the at least one virtual machine, and determining that the exploit is associated with zero-day exploit when the exploit, upon execution of the content on the at least one virtual machine, performs an undesired behavior.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

30.

SYSTEM AND METHOD FOR DETECTING TIME-BOMB MALWARE

      
Application Number US2014043727
Publication Number 2014/209914
Status In Force
Filing Date 2014-06-23
Publication Date 2014-12-31
Owner FIREEYE, INC. (USA)
Inventor
  • Paithane, Sushant
  • Vincent, Michael
  • Vashisht, Sai
  • Kindlund, Darien

Abstract

According to one embodiment, a system comprises one or more counters; comparison logic; and one or more hardware processors communicatively coupled to the one or more counters and the comparison logic. The one or more hardware processors are configured to instantiate one or more virtual machines that are adapted to analyze received content, where the one or more virtual machines are configured to monitor a delay caused by one or more events conducted during processing of the content and identify the content as including malware if the delay exceed a first time period.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

31.

OPTIMIZED RESOURCE ALLOCATION FOR VIRTUAL MACHINES WITHIN A MALWARE CONTENT DETECTION SYSTEM

      
Application Number US2013048739
Publication Number 2014/182321
Status In Force
Filing Date 2013-06-28
Publication Date 2014-11-13
Owner FIREEYE, INC (USA)
Inventor Ismael, Osman Abdoul

Abstract

According to one embodiment, an electronic device comprises a network port and a controller. The network port is adapted to receive incoming content. Coupled to the network port, the controller is configured to (i) determine software profile information associated with the incoming content, (ii) determine whether a first virtual machine instance operating with a first software profile that corresponds to the software profile information is currently running, the first virtual machine instance being allocated resources to provide a first virtual execution environment at a prescribed virtual operating state, and (iii) instantiate a second virtual machine instance operating with the first software profile to conduct malware analysis on the incoming content, the second virtual machine instance being provided access to the resources allocated for use by the first virtual machine instance

IPC Classes  ?

  • G06F 21/50 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
  • G06F 11/30 - Monitoring

32.

TIMELINE WRINKLING SYSTEM AND METHOD

      
Application Number US2013077822
Publication Number 2014/105960
Status In Force
Filing Date 2013-12-26
Publication Date 2014-07-03
Owner MANDIANT CORPORATION (USA)
Inventor Ross, David

Abstract

A method for organizing event data by identifying a primary timeline containing event data, extracting a first timestamp from a first item of the primary timeline, setting a radius around the first timestamp, identifying a second timestamp within the radius, determining whether the second timestamp is already in a wrinkle timeline, and, if not, incorporating the second timestamp into the wrinkle timeline. Event data associated with the first item may be marked and emphasized in the wrinkle timeline. The system may also create one or more indexes of the event data.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 17/00 - Digital computing or data processing equipment or methods, specially adapted for specific functions

33.

SYSTEM AND METHOD TO CREATE A NUMBER OF BREAKPOINTS IN A VIRTUAL MACHINE VIA VIRTUAL MACHINE TRAPPING EVENTS

      
Application Number US2013077838
Publication Number 2014/105969
Status In Force
Filing Date 2013-12-26
Publication Date 2014-07-03
Owner MANDIANT CORPORATION (USA)
Inventor
  • Jung, Robert
  • Saba, Antony

Abstract

A system and method for dynamic software analysis operable to describe program behavior via instrumentation of virtualization events.

IPC Classes  ?

  • G06F 11/36 - Preventing errors by testing or debugging of software
  • G06F 9/44 - Arrangements for executing specific programs

34.

SYSTEM AND METHOD FOR THE PROGRAMMATIC RUNTIME DE-OBFUSCATION OF OBFUSCATED SOFTWARE UTILIZING VIRTUAL MACHINE INTROSPECTION AND MANIPULATION OF VIRTUAL MACHINE GUEST MEMORY PERMISSIONS

      
Application Number US2013077799
Publication Number 2014/105949
Status In Force
Filing Date 2013-12-26
Publication Date 2014-07-03
Owner MANDIANT CORPORATION (USA)
Inventor
  • Jung, Robert
  • Saba, Antony

Abstract

A system and method operable to programmatically perform runtime de-obfuscation of obfuscated software via virtual machine introspection and manipulation of virtual machine guest memory permissions,

IPC Classes  ?

  • G06F 21/14 - Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
  • G06F 9/44 - Arrangements for executing specific programs

35.

IDENTIFICATION OF OBFUSCATED COMPUTER ITEMS USING VISUAL ALGORITHMS

      
Application Number US2014012513
Publication Number 2014/106282
Status In Force
Filing Date 2014-01-22
Publication Date 2014-07-03
Owner MANDIANT CORPORATION (USA)
Inventor
  • Shiffer, Jason
  • Ross, David

Abstract

A method to identify character strings associated with potentially malicious software items. The method includes employing a visual algorithm to translate one or more characters of a character string into corresponding characters in a visual ID for use in grouping and comparing computer items having similar visual [Ds, such as a reference ID for a computer item that is known to be non-malicious. The method may, among other things, elucidate an attacker's attempt to obfuscate malicious software by using file names that are very similar to those used for harmless files.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

36.

FIREEYE

      
Application Number 1194862
Status Registered
Filing Date 2013-08-05
Registration Date 2013-08-05
Owner FireEye, Inc. (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Computer software and hardware for digital security; computer security products, namely, computer peripherals; computer hardware and software, namely, network security appliances, email security appliances, digital data and media security appliances, security software applications, and management stations related to the foregoing; computer software and computer hardware for detection, blocking, and facilitating removal and remediation of computer viruses, rootkits, bootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, worms, cyber-attacks, malicious attacks, and advanced persistent threats; computer software for identifying and preventing malicious attacks on, and unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; computer software and hardware providing secure networks, virtual computer systems and virtual computer environments; computer hardware; computer peripherals. Technical support and consulting services related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; technical and consulting services related to designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, and managing of cyber-security systems for others; technical support services in the nature of detecting and diagnosing computer hardware and software security problems and vulnerabilities, updating and maintenance of computer software relating to computer security and to prevention and mitigation of computer risks; updating and maintaining computer software for others; cloud computing services featuring software and databases for use in computer security and prevention and mitigation of computer risks; computer consultation and research in the field of computer hardware, computer software and network security; computer security consultancy in the field of malware, intrusion and penetration testing and diagnosis of computers and networks to assess information technology security and vulnerability; information technology security services in the nature of providing network access to cyber-threat intelligence, to cyber-attack verification, and to security analysis of network traffic, emails, files, media computer software, and mobile applications; application service provider (ASP) featuring software for use for detection, blocking, and facilitating removal and remediation of computer viruses, rootkits, advanced persistent threats, malware and malicious attacks in computers, computer systems, networks, hardware, software applications, digital devices, and mobile digital devices; application service provider (ASP) featuring software that provides secure virtual computer systems and virtual computing environments.

37.

PHYSICAL MEMORY FORENSICS SYSTEM AND METHOD

      
Application Number US2013051533
Publication Number 2014/018458
Status In Force
Filing Date 2013-07-22
Publication Date 2014-01-30
Owner MANDIANT CORPORATION (USA)
Inventor Butler, James

Abstract

The method of the present inventive concept is configured to utilize Operating System data structures related to memory-mapped binaries to reconstruct processes. These structures provide a system configured to facilitate the acquisition of data that traditional memory analysis tools fail to identify, including by providing a system configured to traverse a virtual address descriptor, determine a pointer to a control area, traverse a PPTE array, copy binary data identified in the PPTE array, generate markers to determine whether the binary data is compromised, and utilize the binary data to reconstruct a process.

IPC Classes  ?

  • G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures
  • G06F 12/08 - Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems

38.

SYSTEM TO BYPASS A COMPROMISED MASS STORAGE DEVICE DRIVER STACK AND METHOD THEREOF

      
Application Number US2013030964
Publication Number 2013/138488
Status In Force
Filing Date 2013-03-13
Publication Date 2013-09-19
Owner MANDIANT CORPORATION (USA)
Inventor Lemasters, Aaron

Abstract

A method to circumvent malicious software via a system configured to bypass a device driver stack and, consequently, also bypass the malicious software that may be adversely affecting the device driver stack by using an alternative stack such as a crash dump I/O stack. The crash dump I/O stack is poorly documented relative to the device driver stack and functions independently from the device driver stack.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 13/14 - Handling requests for interconnection or transfer

39.

FIREEYE

      
Application Number 163842100
Status Registered
Filing Date 2013-08-06
Registration Date 2015-10-15
Owner FireEye, Inc., a legal entity, (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 37 - Construction and mining; installation and repair services
  • 38 - Telecommunications services
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

(1) Computer software and hardware for digital security; computer software, namely, security software applications; computer software and computer hardware for detection, blocking, and facilitating removal and remediation of computer viruses, rootkits, bootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, worms, cyber-attacks, malicious attacks, and advanced persistent threats; computer software for identifying and preventing malicious attacks on, and unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; computer software and hardware that provides virtual computer systems and virtual computer environments for the purpose of providing network security; computer hardware providing secure networks, virtual computer systems and virtual computer environments; computer hardware; computer software for monitoring, filtering, and recording network traffic; computer software for detecting, reporting, blocking and eliminating viruses, worms, malware, spyware, unauthorized software and network attacks. (2) Computer hardware; computer software for monitoring, filtering and reporting network traffic; computer software for detecting, reporting, blocking and eliminating viruses, worms, malware, spyware, unauthorized software and network attacks. (1) Technical support and consulting services related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; technical and consulting services related to designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, and managing of cyber-security systems for others; technical support services in the nature of detecting and diagnosing computer hardware and software security problems and vulnerabilities, updating and maintenance of computer software relating to computer security and to prevention and mitigation of computer risks; updating and maintaining computer software for others; cloud computing services featuring software and databases for use in computer security and prevention and mitigation of computer risks; computer consultation and research in the field of computer hardware, computer software and network security; computer security consultancy in the field of malware, intrusion and penetration testing and diagnosis of computers and networks to assess information technology security and vulnerability; information technology security services in the nature of analyzing network traffic, emails, computer files, computer software media, and mobile applications for the presence of malware or other evidence of cyber attacks; application service provider (ASP) featuring software for use for detection, blocking, and facilitating removal and remediation of computer viruses, rootkits, advanced persistent threats, malware and malicious attacks in computers, computer systems, networks, hardware, software applications, digital devices, and mobile digital devices; application service provider that provides access to software that houses virtual computer systems and virtual computing environments to analyze network traffic, emails, computer files, computer software media, and mobile applications for the presence of malware or other evidence of cyber attacks; information technology security services in the nature of providing access to information about cyber-threats; information technology security services in the nature of verifying the existence of cyber attacks; technical support services, namely, troubleshooting of computer hardware and software problems. (2) Technical support services, namely, troubleshooting of computer hardware and software problems.

40.

ISIGHT

      
Application Number 011352721
Status Registered
Filing Date 2012-11-16
Registration Date 2013-05-28
Owner iSIGHT Security, Inc. (USA)
NICE Classes  ?
  • 35 - Advertising and business services
  • 36 - Financial, insurance and real estate services
  • 41 - Education, entertainment, sporting and cultural services
  • 42 - Scientific, technological and industrial services, research and design
  • 45 - Legal and security services; personal services for individuals.

Goods & Services

Business risk management and business risk management consultation relating to cyber and information security; none of the aforesaid including market research services. Financial risk management; financial risk management consultation. Computer security interdiction training, using a simulated enterprise network computer environment, said simulation to include simulated hardware, software, servers, workstations, portable computers, routers, switches, and security elements, namely, router firewalls, proxy servers and network address translation devices, for the foregoing equipment; Educational testing of others in the field of computer security interdiction, using a simulated enterprise network computer environment, said simulation to include simulated hardware, software, servers, workstations, portable computers, routers, switches, and security elements, namely router firewalls, proxy servers and network address translation devices, for the foregoing equipment; Organizing competitions in the field of computer security interdiction, using a simulated enterprise network computer environment, said simulation to include simulated hardware, software, servers, workstations, portable computers, routers, switches, and security elements, namely router firewalls, proxy servers and network address translation devices, for the foregoing equipment; Providing training for all aspects of computer network attack, defense, response and investigation. Computer consultation in the field of computer security; research in the field of intelligence and security technology; Computer services, namely, computer programming to create a simulated enterprise network computer environment, said simulation to include simulated hardware, software, servers, workstations, portable computers, routers, switches and security elements, namely router firewalls, proxy servers and network address translation devices, for the foregoing, intended to be used to conduct computer security interdiction training, testing and competitions; Consulting services in the field of maintaining the security and integrity of databases. Consulting services in the field of national security.

41.

ELECTRONIC MESSAGE ANALYSIS FOR MALWARE DETECTION

      
Application Number US2012026402
Publication Number 2012/145066
Status In Force
Filing Date 2012-02-23
Publication Date 2012-10-26
Owner FIREEYE, INC. (USA)
Inventor
  • Aziz, Ashar
  • Uyeno, Henry
  • Manni, Jay
  • Sukhera, Amin
  • Staniford, Stuart

Abstract

An electronic message is analyzed for malware contained in the message. Text of an electronic message may be analyzed to detect and process malware content in the electronic message itself. The present technology may analyze an electronic message and attachments to electronic messages to detect a uniform resource location (URL), identify whether the URL is suspicious, and analyze all suspicious URLs to determine if they are malware. The analysis may include re-playing the suspicious URL in a virtual environment which simulates the intended computing device to receive the electronic message. If the re-played URL is determined to be malicious, the malicious URL is added to a black list which is updated throughout the computer system.

IPC Classes  ?

  • G06F 11/00 - Error detection; Error correction; Monitoring

42.

SYSTEMS AND METHODS FOR DETECTING MALICIOUS PDF NETWORK CONTENT

      
Application Number US2012021916
Publication Number 2012/100088
Status In Force
Filing Date 2012-01-19
Publication Date 2012-07-26
Owner FIREEYE, INC. (USA)
Inventor
  • Staniford, Stuart Gresley
  • Aziz, Ashar

Abstract

Systems and methods for detecting malicious PDF network content are provided herein. According to some embodiments, the methods may include at least the steps of examining received PDF network content to determine if one or more suspicious characteristics indicative of malicious network content are included in the PDF network content, providing PDF network content determined to include at least one suspicious characteristic to one or more virtual machines, and analyzing responses received from the one or more virtual machines to verify the inclusion of malicious network content in the PDF network content determined to include at least one suspicious characteristic.

IPC Classes  ?

  • G06F 12/14 - Protection against unauthorised use of memory

43.

ISIGHT

      
Serial Number 85650617
Status Registered
Filing Date 2012-06-13
Registration Date 2014-06-17
Owner iSight Security Inc. ()
NICE Classes  ?
  • 35 - Advertising and business services
  • 36 - Financial, insurance and real estate services
  • 41 - Education, entertainment, sporting and cultural services
  • 42 - Scientific, technological and industrial services, research and design
  • 45 - Legal and security services; personal services for individuals.

Goods & Services

Business risk management; business risk management consultation Financial risk management; financial risk management consultation Training in the use of a simulated enterprise network computer environment, said simulation consisting of simulated hardware, software, servers, workstations, portable computers, routers, switches, and security elements, namely, router firewalls, proxy servers and network address translation devices, for the foregoing equipment for computer security interdiction training; Educational testing services, namely, the testing of others in the field of computer security interdiction, using a simulated enterprise network computer environment, said simulation consisting of simulated hardware, software, servers, workstations, portable computers, routers, switches, and security elements, namely router firewalls, proxy servers and network address translation devices, for the foregoing equipment; Organizing educational competitions in the field of computer security interdiction, using a simulated enterprise network computer environment, said simulation consisting of simulated hardware, software, servers, workstations, portable computers, routers, switches, and security elements, namely router firewalls, proxy servers and network address translation devices, for the foregoing equipment; Providing training in the use of computers for all aspects of computer network attack, defense, response and investigation Computer consultation in the field of computer security; research in the field of intelligence and security technology Consulting services in the field of maintaining the security and integrity of databases; consulting services in the field of national security

44.

THREATSPACE

      
Application Number 010407013
Status Registered
Filing Date 2011-11-10
Registration Date 2012-04-17
Owner iSIGHT Security, Inc. (USA)
NICE Classes  ?
  • 37 - Construction and mining; installation and repair services
  • 41 - Education, entertainment, sporting and cultural services
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Installation and maintenance of computer systems, computer networks, simulated computer networks and simulated computer environments; installation and maintenance of computer systems and computer networks relating to computer security, computer network security and computer security interdiction; installation and maintenance of computer systems and computer networks for the purpose of conducting training, educational testing of others, and organising of competitions, all in the field of computer security, computer network security and computer security interdiction. Training and education services relating to computer security and computer network security; computer security interdiction training; training and education services relating to the defence of, response to and investigation of computer and computer network attacks; educational testing of others in the field of computer security, computer network security and computer security interdiction; organising of competitions in the field of computer security, computer network security and computer security interdiction. Design and development of computer hardware and software; computer programming services; installation and maintenance of computer software; computer consultancy services; provision of computer security services, computer network security services, and computer security interdiction services.

45.

SYSTEM AND METHOD FOR DETECTING EXECUTABLE MACHINE INSTRUCTIONS IN A DATA STREAM

      
Application Number US2010054262
Publication Number 2011/053637
Status In Force
Filing Date 2010-10-27
Publication Date 2011-05-05
Owner MANDIANT (USA)
Inventor
  • Silberman, Peter, J.
  • Butler, James, R.
  • Harbour, Nick, J.

Abstract

Detecting executable machine instructions in a data is accomplished by accessing a plurality of values representing data contained within a memory of a computer system and performing pre-processing on the plurality of values to produce a candidate data subset. The pre-processing may include determining whether the plurality of values meets (a) a randomness condition, (b) a length condition, and/or (c) a string ratio condition. The candidate data subset is inspected for computer instructions, characteristics of the computer instructions are determined, and a predetermined action taken based on the characteristics of the computer instructions.

IPC Classes  ?

  • G06F 11/00 - Error detection; Error correction; Monitoring

46.

THREATSCAPE

      
Application Number 009371411
Status Registered
Filing Date 2010-09-13
Registration Date 2011-02-25
Owner iSIGHT Security Inc. (USA)
NICE Classes  ?
  • 36 - Financial, insurance and real estate services
  • 42 - Scientific, technological and industrial services, research and design
  • 45 - Legal and security services; personal services for individuals.

Goods & Services

Risk management; risk management consultation. Computer consultation in the field of computer security; research in the field of intelligence and security; Consulting services in the field of maintaining the security and integrity of databases. Consulting services in the field of national security.

47.

THREATSCAPE

      
Serial Number 77121733
Status Registered
Filing Date 2007-03-04
Registration Date 2008-07-01
Owner iSIGHT Security inc. ()
NICE Classes  ?
  • 36 - Financial, insurance and real estate services
  • 42 - Scientific, technological and industrial services, research and design
  • 45 - Legal and security services; personal services for individuals.

Goods & Services

[ Risk management; Risk management consultation ] Computer consultation in the field of computer security; [ Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; ] Research in the field of intelligence and security [ Consulting services in the field of maintaining the security and integrity of databases; Consulting services in the field of national security ] [ ; Monitoring security systems; Consulting and legal services in the field of privacy and security laws, regulations, and requirements ]

48.

FIREEYE

      
Application Number 892561
Status Registered
Filing Date 2006-01-17
Registration Date 2006-01-17
Owner FireEye, Inc. (USA)
NICE Classes  ? 09 - Scientific and electric apparatus and instruments

Goods & Services

Computer hardware; computer software; computer peripherals; computer software for monitoring, filtering and reporting network traffic; computer software for detecting, reporting, blocking and eliminating viruses, worms, malware, spyware, unauthorized software and network attacks.