1
George Tuvell, Deepak Venugopal, Matthew Pfefferle: Non-signature malware detection system and method for mobile platforms. Juniper Networks, Shumaker & Sieffert P A, November 13, 2012: US08312545 (149 worldwide citation)

A system and method for detecting malware on a mobile platform in a mobile network. The system and method verifies that an executable is malware-free by computing the checksum of the executable and comparing that checksum with a checksum obtained from a malware-free copy of the executable. The check ...


2
George Tuvell, Deepak Venugopal, Guoning Hu: Malware modeling detection system and method for mobile platforms. Juniper Networks, Shumaker & Sieffert P A, November 27, 2012: US08321941 (143 worldwide citation)

A system and method for detecting malware by modeling the behavior of malware and comparing a suspect executable with the model. The system and method extracts feature elements from malware-infected applications, groups the feature elements into feature sets, and develops rules describing a maliciou ...


3
Tuvell George, Venugopal Deepak: Malware detection system and method for comprssed data on mobile platforms. Smobile Systems, Tuvell George, Venugopal Deepak, DORTENZO Megan, October 18, 2007: WO/2007/117636 (105 worldwide citation)

A system and method for detecting malware in compressed data. The system and method identifies a set of search strings extracted from compressed executables, each of which is infected with malware from a family of malware. The search strings detect the presence of the family of malware in other comp ...


4
Yury G Parshin, Vladislav V Pintiysky: System and method for detecting malware targeting the boot process of a computer using boot process emulation. Kaspersky Lab ZAO, Patterson Thuente Christensen Pedersen P A, January 29, 2013: US08365297 (102 worldwide citation)

System and method for detecting malware on a target computer system having a bootable device. Boot process information stored on the bootable device that at least partially defines a boot process of the target computer system is obtained, along with physical parameter data defining a storage arrange ...


5
Christoph Alme: Systems, apparatus, and methods for detecting malware. McAfee, Wong Cabello Lutsch Rutherford & Brucculeri, November 13, 2012: US08312546 (100 worldwide citation)

Various embodiments, including a method comprising creating a first fuzzy fingerprint of a known malware file, the first fuzzy fingerprint including a first set of calculated complexity approximations and weightings for each of a plurality of blocks within the known malware file, creating a second f ...


6
Anand Bodke: Systems and methods for detecting malware on mobile platforms. Symantec Corporation, ALG Intellectual Property, July 15, 2014: US08782792 (94 worldwide citation)

A computer-implemented method for detecting malware on mobile platforms may include (1) identifying an application on a mobile computing platform subject to a malware evaluation, (2) transmitting the application to a security server, (3) providing emulation information to the security server, the em ...


7
Lee Codel Lawson Tarbotton, Kevin Andrew Gudgion: Detecting malware carried by an e-mail message. McAfee, Zilka Kotab PC, Christophert J Hamaty, June 26, 2007: US07237008 (62 worldwide citation)

An anti-virus system provider distributes an e-mail identifying content filtering rule seeking to identify e-mail messages suspected of containing an item of malware from a central source (20) to users (2). This distribution may be by an e-mail message itself which is appropriately signed and encryp ...


8
Hahnsang Kim, Kang G Shin: System and method for detecting energy consumption anomalies and mobile malware variants. The Regents of The University of Michigan, Harness Dickey & Pierce, December 11, 2012: US08332945 (25 worldwide citation)

A system is presented for detecting malware applications residing on a mobile device powered by a battery. The system includes a power monitoring module, a data analysis module and a data store that stores a plurality of known power signatures signifying a power consumption anomaly. The power monito ...


9
Emmanouil Antonakakis, Roberto Perdisci, Wenke Lee, Gunter Ollmann: Method and system for detecting malware. Damballa, DLA Piper US, November 5, 2013: US08578497 (23 worldwide citation)

A system and method of analysis. NX domain names are collected from an asset in a real network. The NX domain names are domain names that are not registered. The real network NX domain names are utilized to create testing vectors. The testing vectors are classified as benign vectors or malicious vec ...


10
Lee Codel Lawson Tarbotton, Kevin Andrew Gudgion: Detecting malware carried by an E-mail message. McAfee, Patent Capital Group, August 13, 2013: US08510839 (21 worldwide citation)

An anti-virus system provider distributes an e-mail identifying content filtering rule seeking to identify e-mail messages suspected of containing an item of malware from a central source (20) to users (2). This distribution may be by an e-mail message itself which is appropriately signed and encryp ...