1
Abhishek Singh, Jayaraman Manni: Systems and methods for automatically detecting backdoors. FireEye, Blakely Sokoloff Taylor & Zafman, March 24, 2015: US08990944 (98 worldwide citation)

Techniques for detecting malicious attacks may monitor activities during execution of content (e.g., network downloads and email) to identify an instruction backdoor on a computer. An instruction backdoor is malware that opens a port for listening for instructions from a remote server. Such instruct ...


2
Lyle W Paczkowski, William M Parsel, Carl J Persson, Matthew C Schlesener: JTAG fuse vulnerability determination and protection using a trusted execution environment. Sprint Communications Company, April 28, 2015: US09021585 (38 worldwide citation)

A method of configuring a trusted security zone into a portable electronic device. The method comprises executing instructions on a processor of the portable electronic device that determine the state of a JTAG (JTAG) port of the portable electronic device, if the JTAG port is determined to be enabl ...


3
Edmund J Jones, Matthew W Costello, Martin Schleiff, David S Miller, Aradhna Chetal, Marion M Belden, Volha V Gallup: Threat modeling and analysis. The Boeing Company, Womble Carlyle Sandridge & Rice, March 21, 2017: US09602529 (28 worldwide citation)

A system is provided for modeling and analysis of cybersecurity threats may include a data flow diagram (DFD) creator, threat indicator and threat analyzer. The DFD creator may identify elements of an information system, and compose a DFD including nodes and edges representing components and data fl ...


4
Jayesh Sreedharan, Rahul Mohandas: Systems and methods for risk rating and pro-actively detecting malicious online ads. McAfee, Wong Cabello Lutsch Rutherford & Brucculeri, August 19, 2014: US08813232 (28 worldwide citation)

Methods and systems for risk rating and pro-actively detecting malicious online ads are described. In one example embodiment, a system for risk rating and pro-actively detecting malicious online ads includes an extraction module, an analysis engine, and a filter module. The extraction module is conf ...


5
Aaron LeMasters: System to bypass a compromised mass storage device driver stack and method thereof. MANDIANT, Polsinelli PC, Adam C Rehm, March 1, 2016: US09275229 (24 worldwide citation)

A method to circumvent malicious software via a system configured to bypass a device driver stack and, consequently, also bypass the malicious software that may be adversely affecting the device driver stack by using an alternative stack such as a crash dump I/O stack. The crash dump I/O stack is po ...


6
Gabriel Bassett: System and method for cyber security analysis and human behavior prediction. David E Mixon, Bradley Arant Boult Cummings, March 22, 2016: US09292695 (21 worldwide citation)

A method for analyzing computer network security has been developed. The method first establishes multiple nodes, where each node represents an actor, an event, a condition, or an attribute related to the network security. Next, an estimate is created for each node that reflects the case of realizin ...


7
Ilya Sokolov: Systems and methods for performing security analyses of applications configured for cloud-based platforms. Symantec Corporation, ALG Intellectual Property, December 29, 2015: US09223961 (21 worldwide citation)

A computer-implemented method for performing security analyses of applications configured for cloud-based platforms may include 1) identifying an online platform that hosts an online service and that is capable of hosting a plurality of third-party applications integrated with the online service and ...


8
Kevin K Moshir, Sean Moshir, Hournan Shafiezadeh: Secure mobile information management system and method. CellTrust Corporation, Tiffany & Bosco P A, October 6, 2015: US09154612 (19 worldwide citation)

Information or items that otherwise might be carried in a person's wallet or purse may be managed and stored on a mobile phone. Embodiments include a software application loaded on a mobile phone and an Internet website through which certain information can be transmitted to the phone by the user, t ...


9
David Clark, John Strand, Jonathan Thyer: Active attack detection system. Meadow Hills, Goodhue Coleman & Owens P C, April 18, 2017: US09628502 (18 worldwide citation)

A method and system of detecting security attacks on a wireless networked computer system includes a remote sensor having a wireless adapter, processor, storage and memory, the remote sensor configured and arranged to emulate a client workstation that is activated and instructed to connect to a wire ...


10
Shireen Rivera, Peter Ashley: Techniques for detecting advanced security threats. Symantec Corporation, Wilmer Cutler Pickering Hale and Dorr, August 16, 2016: US09418222 (18 worldwide citation)

Techniques for detecting advanced security threats are disclosed. In one particular embodiment, the techniques may be realized as a method for detecting a security threat including generating a resource at a client, implementing the resource on the client, monitoring system behavior of the client ha ...