1
Ali Mesdaq, Paul L Westin III: Fuzzy hash of behavioral results. FireEye, Rutan & Tucker, William W Schaal, March 22, 2016: US09294501 (42 worldwide citation)

A computerized method is described in which a received object is analyzed by a malicious content detection (MCD) system to determine whether the object is malware or non-malware. The analysis may include the generation of a fuzzy hash based on a collection of behaviors for the received object. The f ...


2
Ali Mesdaq, Paul L Westin III: Fuzzy hash of behavioral results. FireEye, Rutan & Tucker, March 6, 2018: US09912691 (2 worldwide citation)

A computerized method for classifying objects in a malware system is described. The method includes detecting behaviors of an object for classification after processing of the object has begun. Data associated with the detected behaviors is collected, and a fuzzy hash for the received object is gene ...


3
FUZZY HASH OF BEHAVIORAL RESULTS. FireEye, April 2, 2015: US20150096023-A1

A computerized method is described in which a received object is analyzed by a malicious content detection (MCD) system to determine whether the object is malware or non-malware. The analysis may include the generation of a fuzzy hash based on a collection of behaviors for the received object. The f ...


4
FUZZY HASH OF BEHAVIORAL RESULTS. FireEye, September 8, 2016: US20160261612-A1

A computerized method for classifying objects in a malware system is described. The method includes detecting behaviors of an object for classification after processing of the object has begun. Data associated with the detected behaviors is collected, and a fuzzy hash for the received object is gene ...