FireEye, Inc.

United States of America

Back to Profile

1-28 of 28 for FireEye, Inc. Sort by
Query
Patent
World - WIPO
Excluding Subsidiaries
Aggregations Reset Report
Date
2019 5
Before 2019 23
IPC Class
G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements 15
H04L 29/06 - Communication control; Communication processing characterised by a protocol 11
G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines 3
G06F 11/00 - Error detection; Error correction; Monitoring 2
G06F 21/50 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems 2
See more
Found results for  patents

1.

PLATFORM AND METHOD FOR ENHANCED-CYBER-ATTACK DETECTION AND RESPONSE EMPLOYING A GLOBAL DATA STORE

      
Application Number US2018066964
Publication Number 2019/133451
Status In Force
Filing Date 2018-12-20
Publication Date 2019-07-04
Owner FIREEYE, INC. (USA)
Inventor
  • Vashisht, Sai
  • Otvagin, Alexander

Abstract

A system for detecting artifacts associated with a cyber-attack features a cybersecurity intelligence hub that includes a data store with stored meta-information associated with each artifact of a plurality of artifacts and each stored meta-information includes a verdict classifying an artifact corresponding to the stored meta-information as a malicious classification or a benign classification. The hub is configured to (i) receive meta- information associated with a first artifact from a cybersecurity sensor, and (ii) determine a verdict for the first artifact based on an analysis of meta-information associated with the first artifact stored meta-information associated with each of the plurality of artifacts. A verdict for the first artifact is returned to the cybersecurity sensor in response to a detected match between a portion of stored meta-information and a portion of the meta-information associated with the first artifact.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

2.

PLATFORM AND METHOD FOR RETROACTIVE RECLASSIFICATION EMPLOYING A CYBERSECURITY-BASED GLOBAL DATA STORE

      
Application Number US2018066973
Publication Number 2019/133453
Status In Force
Filing Date 2018-12-20
Publication Date 2019-07-04
Owner FIREEYE, INC. (USA)
Inventor
  • Vashisht, Sai
  • Otvagin, Alexander

Abstract

A system for detecting artifacts associated with a cyber-attack features a cybersecurity intelligence hub remotely located from and communicatively coupled to one or more network devices via a network. The hub includes a data store and retroactive reclassification logic. The data store includes stored meta-information associated with each prior evaluated artifact of a plurality of prior evaluated artifacts. Each meta-information associated with a prior evaluated artifact of the plurality of prior evaluated artifacts includes a verdict classifying the prior evaluated artifact as a malicious classification or a benign classification. The retroactive reclassification logic is configured to analyze the stored meta-information associated with the prior evaluated artifact and either (a) identify whether the verdict associated with the prior evaluated artifact is in conflict with trusted cybersecurity intelligence or (b) identify inconsistent verdicts for the same prior evaluated artifact.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

3.

SYSTEM AND METHOD FOR ANALYZING BINARY CODE FOR MALWARE CLASSIFICATION USING ARTIFICIAL NEURAL NETWORK TECHNIQUES

      
Application Number US2018055508
Publication Number 2019/083737
Status In Force
Filing Date 2018-10-11
Publication Date 2019-05-02
Owner FIREEYE, INC. (USA)
Inventor
  • Johns, Jeffrey Thomas
  • Jones, Brian Sanford
  • Coull, Scott Eric

Abstract

A system for detecting whether a file including content s associated with a cyber-attack is described. The content may include an executable file for example. The system includes an intelligence-driven analysis subsystem and a computation analysis subsystem. The intelligence-driven analysis subsystem is configured to (i) receive the file, (ii) inspect and compute features of the file for indicators associated with a cyber-attack, and (iii) produce a first output representing the detected indicators. The computational analysis subsystem includes an artificial neural network to (i) receive a network input being a first representation of at least one section of binary code from the file as input, and (ii) process the first representation of the section to produce a second output. The first output and the second output are used in determination a classification assigned to the file.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

4.

PHISHING ATTACK DETECTION

      
Application Number US2018053561
Publication Number 2019/067993
Status In Force
Filing Date 2018-09-28
Publication Date 2019-04-04
Owner FIREEYE, INC. (USA)
Inventor
  • Kumar, Venkata Satya Phani, Pavan Chitturi
  • Rao, Surya, Prakash

Abstract

A computerized method for analyzing a subject URL to determine whether the subject URL is associated with a phishing attack is disclosed. The method includes steps of detecting keypoints within a screenshot of a webpage corresponding to the subject URL and determining a set of confidences based on an analysis of the detected keypoints with a model. Each confidence within the set of confidences is assigned to feature vector within a set of training feature vectors representing a training set of URLs used in generating the model. The method comprises performing an image comparison between the screenshot and a screenshot corresponding to a feature vector within the set of training feature vectors, the feature vector being assigned a highest confidence. Responsive to determining the image comparison result exceeds a predefined threshold, transmitting an alert indicating that the subject URL is associated with the phishing attack.

IPC Classes  ?

  • G06K 9/46 - Extraction of features or characteristics of the image
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

5.

CYBER-SECURITY SYSTEM AND METHOD FOR WEAK INDICATOR DETECTION AND CORRELATION TO GENERATE STRONG INDICATORS

      
Application Number US2018040470
Publication Number 2019/006412
Status In Force
Filing Date 2018-06-29
Publication Date 2019-01-03
Owner FIREEYE, INC. (USA)
Inventor
  • Jeyaraman, Sundar
  • Ramaswamy, Ramaswamy

Abstract

A method for detecting a cyber-attack after infiltration into an enterprise network is described. The method features receiving a second plurality of weak indicators included as part of a first plurality of weak indicators and performing a correlation operation between the second plurality of weak indicators and one or more patterns or sequences of indicators associated with known malware. The first plurality of weak indicators is greater in number than the second plurality of weak indicators. A report is generated and issued based on results from the correlation operation.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

6.

ATTRIBUTE-CONTROLLED MALWARE DETECTION

      
Application Number US2018025329
Publication Number 2018/183793
Status In Force
Filing Date 2018-03-30
Publication Date 2018-10-04
Owner FIREEYE, INC. (USA)
Inventor
  • Siddiqui, Mumtaz
  • Radhakrishnan, Manju
  • Agarwal, Deepak

Abstract

A computerized method for authenticating access to a subscription-based service to detect an attempted cyber-attack. The method features operations by the cloud broker that include receiving service policy level information and information based on operational metadata. The service policy level information includes at least subscription attributes to identify one or more performance criterion in analyses conducted on one or more objects submitted by a sensor for malware representing an attempted cyber-attack. The operational metadata includes metadata that pertains to an operating state of one or more clusters of a plurality of clusters of the subscription-based service. The cloud broker, using both the service policy level information and the information based on the operational metadata, selecting a cluster of the plurality of clusters to analyze the one or more objects submitted by the sensor and establishes a communication session between the sensor and the cluster via the cloud broker.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

7.

LAUNCHER FOR SETTING ANALYSIS ENVIRONMENT VARIATIONS FOR MALWARE DETECTION

      
Application Number US2016061361
Publication Number 2017/083538
Status In Force
Filing Date 2016-11-10
Publication Date 2017-05-18
Owner FIREEYE, INC. (USA)
Inventor
  • Paithane, Sushant
  • Vashisht, Sai, Omkar
  • Khalid, Yasir
  • Pilipenko, Alexandre

Abstract

A system and method for automatically analyzing an object for malware is described. Operating one or more virtual machines, the system and method provide an analysis environment variation framework to provide a more robust analysis of an object for malware. The multi- application, multi-plugin processing framework is configured within a virtual machine, where the framework generates a plurality of processes for analyzing the object for malware and each of plurality of processes is configured with a different application and plug- in combination selected based in part on a type of object being analyzed.

IPC Classes  ?

  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

8.

MICROVISOR-BASED MALWARE DETECTION ENDPOINT ARCHITECTURE

      
Application Number US2015061238
Publication Number 2016/109042
Status In Force
Filing Date 2015-11-18
Publication Date 2016-07-07
Owner FIREEYE, INC. (USA)
Inventor
  • Ismael, Osman Abdoul
  • Aziz, Ashar

Abstract

A threat-aware microvisor may be deployed in a malware detection endpoint architecture and execute on an endpoint to provide exploit and malware detection within a network environment. Exploit and malware detection on the endpoint may be performed in accordance with one or more processes embodied as software modules or engines configured to detect suspicious and/or malicious behaviors of an operating system process (object), and to correlate and classify the detected behaviors as indicative of malware. Detection of suspicious and/or malicious behaviors may be performed by static and dynamic analysis of the object. Static analysis may perform examination of the object to determine whether it is suspicious, while dynamic analysis may instrument the behavior of the object as the operating system process runs via capability violations of, e.g. operating system events. A behavioral analysis logic engine and a classifier may thereafter cooperate to perform correlation and classification of the detected behaviors.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

9.

INTELLIGENT CONTEXT AWARE USER INTERACTION FOR MALWARE DETECTION

      
Application Number US2015067082
Publication Number 2016/109283
Status In Force
Filing Date 2015-12-21
Publication Date 2016-07-07
Owner FIREEYE, INC. (USA)
Inventor
  • Khalid, Yasir
  • Paithane, Sushant
  • Vashisht, Sai

Abstract

According to one embodiment, a malware detection system is integrated with at least a static analysis engine and a dynamic analysis engine. The static analysis engine is configured to automatically determine an object type of a received object. The dynamic analysis engine is configured to automatically launch the object after selecting an action profile based on the object type. The dynamic analysis engine is further configured to, provide simulated user interaction to the object based on the selected action profile either in response to detecting a request for human interaction or as a result of a lapse of time since a previous simulated human interaction was provided.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

10.

SYSTEM AND METHOD TO COMMUNICATE SENSITIVE INFORMATION VIA ONE OR MORE UNTRUSTED INTERMEDIATE NODES WITH RESILIENCE TO DISCONNECTED NETWORK TOPOLOGY

      
Application Number US2015043854
Publication Number 2016/022717
Status In Force
Filing Date 2015-08-05
Publication Date 2016-02-11
Owner FIREEYE, INC. (USA)
Inventor Cunningham, Sean

Abstract

A system and method to communicate secure information between a plurality of computing machines using an untrusted intermediate with resilience to disconnected network topology. The system and method utilize agnostic endpoints that are generalized to be interoperable among various systems, with their functionality based on their location in a network. The system and method enable horizontal scaling on the network. One or more clusters may be set up in a location within a network or series of networks in electronic communication, e.g., in a cloud or a sub-network, residing between a secure area of the network(s) and an unsecure area such as of an external network or portion of a network. The horizontal scaling allows the system to take advantage of a capacity of a local network. As long as an agent has connectivity to at least one locale of the network, the agent is advantageously operable to move data across the system.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

11.

TRUSTED THREAT-AWARE MICROVISOR

      
Application Number US2015038552
Publication Number 2016/004037
Status In Force
Filing Date 2015-06-30
Publication Date 2016-01-07
Owner FIREEYE, INC. (USA)
Inventor
  • Ismael, Osman Abdoul
  • Aziz, Ashar

Abstract

A trusted threat-aware microvisor may be deployed as a module of a trusted computing base (TCB) that also includes a root task module configured to cooperate with the microvisor to load and initialize one or more other modules executing on a node of a network environment. The root task may cooperate with the microvisor to allocate one or more kernel resources of the node to those other modules. As a trusted module of the TCB, the microvisor may be configured to enforce a security policy of the TCB that, e.g., prevents alteration of a state related to security of the microvisor by a module of or external to the TCB. The security policy of the TCB may be implemented by a plurality of security properties of the microvisor. Trusted (or trustedness) may therefore denote a predetermined level of confidence that the security property is demonstrated by the microvisor.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • H04L 12/26 - Monitoring arrangements; Testing arrangements

12.

VERIFICATION OF TRUSTED THREAT-AWARE MICROVISOR

      
Application Number US2015038616
Publication Number 2016/004080
Status In Force
Filing Date 2015-06-30
Publication Date 2016-01-07
Owner FIREEYE, INC. (USA)
Inventor
  • Ismael, Osman Abdoul
  • Tews, Hendrik

Abstract

A trusted threat-aware microvisor may be deployed as a module of a trusted computing base (TCB). The microvisor is illustratively configured to enforce a security policy of the TCB, which may be implemented as a security property of the microvisor. The microvisor may manifest (i.e., demonstrate) the security property in a manner that enforces the security policy. Trustedness denotes a predetermined level of confidence that the security property is demonstrated by the microvisor. The predetermined level of confidence is based on an assurance (i.e., grounds) that the microvisor demonstrates the security property. Trustedness of the microvisor may be verified by subjecting the TCB to enhanced verification analysis configured to ensure that the TCB conforms to an operational model with an appropriate level of confidence over an appropriate range of activity. The operational model may then be configured to analyze conformance of the microvisor to the security property. A combination of conformance by the microvisor to the operational model and to the security property provides assurance (i.e., grounds) for the level of confidence and, thus, verifies trustedness.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • H04L 9/00 - Arrangements for secret or secure communications; Network security protocols

13.

MALWARE DETECTION AND REMEDIATION FOR ENDPOINT DEVICES

      
Application Number US2015037213
Publication Number 2015/200340
Status In Force
Filing Date 2015-06-23
Publication Date 2015-12-30
Owner FIREEYE, INC. (USA)
Inventor Eyada, Hatem

Abstract

According to one embodiment, a computerized method is directed to neutralizing callback malware. This method involves intercepting an incoming message from a remote source directed to a compromised endpoint device. Next, a first portion of information within the incoming message is substituted with a second portion of information. The second portion of information is designed to mitigate operability of the callback malware. Thereafter, the modified incoming message, which includes the second portion of the information, is returned to the compromised endpoint device.

IPC Classes  ?

  • G06F 11/00 - Error detection; Error correction; Monitoring

14.

MALWARE DETECTION AND REMEDIATION FOR ENDPOINT DEVICED

      
Application Number US2015037245
Publication Number 2015/200360
Status In Force
Filing Date 2015-06-23
Publication Date 2015-12-30
Owner FIREEYE, INC. (USA)
Inventor Eyada, Hatem

Abstract

According to one embodiment, a computerized method is directed to neutralizing callback malware. This method involves intercepting an incoming message from a remote source directed to a compromised endpoint device. Next, a first portion of information within the incoming message is substituted with a second portion of information. The second portion of information is designed to mitigate operability of the callback malware. Thereafter, the modified incoming message, which includes the second portion of the information, is returned to the compromised endpoint device.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • H04L 29/00 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

15.

THREAT-AWARE MICROVISOR

      
Application Number US2014071847
Publication Number 2015/108675
Status In Force
Filing Date 2014-12-22
Publication Date 2015-07-23
Owner FIREEYE, INC. (USA)
Inventor
  • Ismael, Osman Abdoul
  • Aziz, Ashar

Abstract

A threat-aware microvisor is configured to facilitate real-time security analysis, including exploit detection and threat intelligence, of operating system processes executing on a node of a network environment. The microvisor may be embodied as a module disposed or layered beneath (underlying) an operating system kernel executing on the node to thereby control privileges (i.e., access permissions) to kernel resources, such as one or more central processing units (CPUs), network interfaces, memory, and/or devices, of the node. Illustratively, the microvisor may be configured to control access to one or more of the resources in response to a request by an operating system process to access the resource.

IPC Classes  ?

  • G06F 21/50 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems

16.

MICRO-VIRTUALIZATION ARCHITECTURE FOR THREAT-AWARE MICROVISOR DEPLOYMENT IN A NODE OF A NETWORK ENVIRONMENT

      
Application Number US2014071879
Publication Number 2015/108677
Status In Force
Filing Date 2014-12-22
Publication Date 2015-07-23
Owner FIREEYE, INC. (USA)
Inventor
  • Ismael, Osman Abdoul
  • Aziz, Ashar

Abstract

A micro-virtualization architecture deploys a threat-aware microvisor as a module of a virtualization system configured to facilitate real-time security analysis, including exploit detection and threat intelligence, of operating system processes executing in a memory of a node in a network environment. The micro-virtualization architecture organizes the memory as a user space and kernel space, wherein the microvisor executes in the kernel space of the architecture, while the operating system processes, an operating system kernel, a virtual machine monitor (VMM) and its spawned virtual machines (VMs) execute in the user space. Notably, the microvisor executes at the highest privilege level of a central processing unit of the node to virtualize access to kernel resources. The operating system kernel executes under control of the microvisor at a privilege level lower than a highest privilege level of the microvisor. The VMM and its spawned VMs execute at the highest privilege level of the microvisor.

IPC Classes  ?

  • G06F 9/06 - Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs

17.

EXPLOIT DETECTION SYSTEM WITH THREAT-AWARE MICROVISOR

      
Application Number US2014071923
Publication Number 2015/108679
Status In Force
Filing Date 2014-12-22
Publication Date 2015-07-23
Owner FIREEYE, INC. (USA)
Inventor
  • Ismael, Osman Abdoul
  • Aziz, Ashar

Abstract

An exploit detection system deploys a threat-aware microvisor to facilitate real-time security analysis, including exploit detection and threat intelligence, of an operating system process executing on a node of a network environment. The microvisor may be organized as a main protection domain representative of the operating system process. In response to the process attempting to access a kernel resource for which it does not have permission, a capability violation may be generated at the main protection domain of the microvisor and a micro-virtual machine (VM) may be spawned as a container configured to encapsulate the process. The main protection domain may then be cloned to create a cloned protection domain that is representative of the process and that is bound to the spawned micro-VM. Capabilities of the cloned protection domain may be configured to be more restricted than the capabilities of the main protection domain with respect to access to the kernel resource. The restricted capabilities may be configured to generate more capability violations than those generated by the capabilities of the main protection domain and, in turn, enable further monitoring of the process as it attempts to access the kernel resource.

IPC Classes  ?

  • G06F 21/10 - Protecting distributed programs or content, e.g. vending or licensing of copyrighted material

18.

SYSTEM, APPARATUS AND METHOD FOR AUTOMATICALLY VERIFYING EXPLOITS WITHIN SUSPECT OBJECTS AND HIGHLIGHTING THE DISPLAY INFORMATION ASSOCIATED WITH THE VERIFIED EXPLOITS

      
Application Number US2014072292
Publication Number 2015/100388
Status In Force
Filing Date 2014-12-23
Publication Date 2015-07-02
Owner FIREEYE, INC. (USA)
Inventor
  • Aziz, Ashar
  • Bu, Zheng
  • Amin, Muhammad
  • Ismael, Osman Abdoul

Abstract

According to one embodiment, a threat detection system is integrated with intrusion protection system (IPS) logic and virtual execution logic. The IPS logic is configured to receive a first plurality of objects and filter the first plurality of objects by identifying a second plurality of objects as suspicious objects. The second plurality of objects is a subset of the first plurality of objects and is lesser or equal in number to the first plurality of objects. The virtual execution logic is configured to automatically verify whether any of the suspicious objects is an exploit. The virtual execution logic comprises at least one virtual machine configured to virtually process content within the suspicious objects and monitor for anomalous behaviors during the virtual processing that are indicative of exploits.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

19.

DYNAMICALLY ADAPTIVE FRAMEWORK AND METHOD FOR CLASSIFYING MALWARE USING INTELLIGENT STATIC, EMULATION, AND DYNAMIC ANALYSES

      
Application Number US2014055961
Publication Number 2015/047804
Status In Force
Filing Date 2014-09-16
Publication Date 2015-04-02
Owner FIREEYE, INC. (USA)
Inventor
  • Vincent, Michael
  • Mesdaq, Ali
  • Thioux, Emmanuel
  • Singh, Abhishek
  • Vashisht, Sai

Abstract

Techniques for malware detection are described herein. According to one aspect, control logic determines an analysis plan for analyzing whether a specimen should be classified as malware, where the analysis plan identifies at least first and second analyses to be performed. Each of the first and second analyses identified in the analysis plan including one or both of a static analysis and a dynamic analysis. The first analysis is performed based on the analysis plan to identify suspicious indicators characteristics related to processing of the specimen. The second analysis is performed based on the analysis plan to identify unexpected behaviors having processing or communications anomalies. A classifier determines whether the specimen should be classified as malicious based on the static and dynamic analyses. The analysis plan, the indicators, the characteristics, and the anomalies are stored in a persistent memory.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

20.

SYSTEM, APPARATUS AND METHOD FOR USING MALWARE ANALYSIS RESULTS TO DRIVE ADAPTIVE INSTRUMENTATION OF VIRTUAL MACHINES TO IMPROVE EXPLOIT DETECTION

      
Application Number US2014056834
Publication Number 2015/047960
Status In Force
Filing Date 2014-09-22
Publication Date 2015-04-02
Owner FIREEYE, INC. (USA)
Inventor Ismael, Osman Abdoul

Abstract

According to one embodiment, an electronic device comprises a memory to store information and a processor. The processor is adapted to receive information associated with content such as network traffic, to process the stored information and to conduct operations on the content. These operations may comprise determining, by a virtual machine processed by the processor, an occurrence of an event during malware analysis of an object associated with the content, and dynamically altering a virtual machine instrumentation of the virtual machine based on information associated with the event.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

21.

ADVANCED PERSISTENT THREAT (APT) DETECTION CENTER

      
Application Number US2014055956
Publication Number 2015/047802
Status In Force
Filing Date 2014-09-16
Publication Date 2015-04-02
Owner FIREEYE, INC. (USA)
Inventor
  • Haq, Thoufique
  • Zhai, Jinjian
  • Pidathala, Vinay K.

Abstract

A computerized method is described in which one or more received objects are analyzed by an advanced persistent threat (APT) detection center to determine if the objects are APTs. The analysis may include the extraction of features describing and characterizing features of the received objects. The extracted features may be compared with features of known APT malware objects and known non-APT malware objects to determine a classification or probability of the received objects being APT malware. Upon determination that the received objects are APT malware, warning messages may be transmitted to a user of associated client devices. Classified objects may also be used to generate analytic data for the prediction and prevention of future APT attacks.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

22.

MALWARE DETECTION BASED ON VM BEHAVIORAL ANALYSIS AND MACHINE LEARNING CLASSIFICATION

      
Application Number US2014055958
Publication Number 2015/047803
Status In Force
Filing Date 2014-09-16
Publication Date 2015-04-02
Owner FIREEYE, INC. (USA)
Inventor
  • Mesdaq, Ali
  • Westin Iii, Paul L.

Abstract

A computerized method is described in which a received object is analyzed by a malicious content detection (MCD) system to determine whether the object is malware or non-malware. The analysis may include the generation of a fuzzy hash based on a collection of behaviors for the received object. The fuzzy hash may be used by the MCD system to determine the similarity of the received object with one or more objects in previously classified/analyzed clusters. Upon detection of a "similar" object, the suspect object may be associated with the cluster and classified based on information attached to the cluster. This similarity matching provides 1) greater flexibility in analyzing potential malware objects, which may share multiple characteristics and behaviors but are also slightly different from previously classified objects and 2) a more efficient technique for classifying/assigning attributes to objects.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

23.

SYSTEM AND METHOD FOR DETECTING MALICIOUS LINKS IN ELECTRONIC MESSAGES

      
Application Number US2014043724
Publication Number 2015/009411
Status In Force
Filing Date 2014-06-23
Publication Date 2015-01-22
Owner FIREEYE, INC. (USA)
Inventor
  • Pidathala, Vinay
  • Uyeno, Henry

Abstract

According to one embodiment, in response to receiving a plurality of uniform resource locator (URL) links for malicious determination, any known URL links are removed from the URL links based on a list of known link signatures. For each of remaining URL links that are unknown, a link analysis is performed on the URL link based on link heuristics to determine whether the URL link is suspicious. For each of the suspicious URL links, a dynamic analysis is performed on a resource of the suspicious URL link. It is classified whether the suspicious URL link is a malicious link based on a behavior of the resource during the dynamic analysis.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

24.

ZERO-DAY DISCOVERY SYSTEM

      
Application Number US2014043726
Publication Number 2014/209913
Status In Force
Filing Date 2014-06-23
Publication Date 2014-12-31
Owner FIREEYE, INC. (USA)
Inventor
  • Bu, Zheng
  • Lin, Yichong

Abstract

A method for determining a zero-day attack by an electronic device is described. According to one embodiment, the method comprises instantiating, by the electronic device, at least one virtual machine, the at least one virtual machine being based on a fortified software profile. The method further comprises executing content capable of behaving as an exploit on the at least one virtual machine, and determining that the exploit is associated with zero-day exploit when the exploit, upon execution of the content on the at least one virtual machine, performs an undesired behavior.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

25.

SYSTEM AND METHOD FOR DETECTING TIME-BOMB MALWARE

      
Application Number US2014043727
Publication Number 2014/209914
Status In Force
Filing Date 2014-06-23
Publication Date 2014-12-31
Owner FIREEYE, INC. (USA)
Inventor
  • Paithane, Sushant
  • Vincent, Michael
  • Vashisht, Sai
  • Kindlund, Darien

Abstract

According to one embodiment, a system comprises one or more counters; comparison logic; and one or more hardware processors communicatively coupled to the one or more counters and the comparison logic. The one or more hardware processors are configured to instantiate one or more virtual machines that are adapted to analyze received content, where the one or more virtual machines are configured to monitor a delay caused by one or more events conducted during processing of the content and identify the content as including malware if the delay exceed a first time period.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

26.

OPTIMIZED RESOURCE ALLOCATION FOR VIRTUAL MACHINES WITHIN A MALWARE CONTENT DETECTION SYSTEM

      
Application Number US2013048739
Publication Number 2014/182321
Status In Force
Filing Date 2013-06-28
Publication Date 2014-11-13
Owner FIREEYE, INC (USA)
Inventor Ismael, Osman Abdoul

Abstract

According to one embodiment, an electronic device comprises a network port and a controller. The network port is adapted to receive incoming content. Coupled to the network port, the controller is configured to (i) determine software profile information associated with the incoming content, (ii) determine whether a first virtual machine instance operating with a first software profile that corresponds to the software profile information is currently running, the first virtual machine instance being allocated resources to provide a first virtual execution environment at a prescribed virtual operating state, and (iii) instantiate a second virtual machine instance operating with the first software profile to conduct malware analysis on the incoming content, the second virtual machine instance being provided access to the resources allocated for use by the first virtual machine instance

IPC Classes  ?

  • G06F 21/50 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
  • G06F 11/30 - Monitoring

27.

ELECTRONIC MESSAGE ANALYSIS FOR MALWARE DETECTION

      
Application Number US2012026402
Publication Number 2012/145066
Status In Force
Filing Date 2012-02-23
Publication Date 2012-10-26
Owner FIREEYE, INC. (USA)
Inventor
  • Aziz, Ashar
  • Uyeno, Henry
  • Manni, Jay
  • Sukhera, Amin
  • Staniford, Stuart

Abstract

An electronic message is analyzed for malware contained in the message. Text of an electronic message may be analyzed to detect and process malware content in the electronic message itself. The present technology may analyze an electronic message and attachments to electronic messages to detect a uniform resource location (URL), identify whether the URL is suspicious, and analyze all suspicious URLs to determine if they are malware. The analysis may include re-playing the suspicious URL in a virtual environment which simulates the intended computing device to receive the electronic message. If the re-played URL is determined to be malicious, the malicious URL is added to a black list which is updated throughout the computer system.

IPC Classes  ?

  • G06F 11/00 - Error detection; Error correction; Monitoring

28.

SYSTEMS AND METHODS FOR DETECTING MALICIOUS PDF NETWORK CONTENT

      
Application Number US2012021916
Publication Number 2012/100088
Status In Force
Filing Date 2012-01-19
Publication Date 2012-07-26
Owner FIREEYE, INC. (USA)
Inventor
  • Staniford, Stuart Gresley
  • Aziz, Ashar

Abstract

Systems and methods for detecting malicious PDF network content are provided herein. According to some embodiments, the methods may include at least the steps of examining received PDF network content to determine if one or more suspicious characteristics indicative of malicious network content are included in the PDF network content, providing PDF network content determined to include at least one suspicious characteristic to one or more virtual machines, and analyzing responses received from the one or more virtual machines to verify the inclusion of malicious network content in the PDF network content determined to include at least one suspicious characteristic.

IPC Classes  ?

  • G06F 12/14 - Protection against unauthorised use of memory