1
Matthew Falk, Timothy Yousaf, Joseph Staehle, Lucas Lemanowicz, Sebastien Noury, Robin Lim, Michael Glazer: Malware data item analysis. Palantir Technologies, Knobbe Martens Olson & Bear, April 28, 2015: US09021260 (69 worldwide citation)

Embodiments of the present disclosure relate to a data analysis system that may automatically analyze a suspected malware file, or group of files. Automatic analysis of the suspected malware file(s) may include one or more automatic analysis techniques. Automatic analysis of may include production a ...


2
Alexander Visbal, James Thompson, Marvin Sum, Jason Ma, Bing Jie Fu, Ilya Nepomnyashchiy, Devin Witherspoon, Victoria Lai, Steven Berler, Alexei Smaliy, Suchan Lee: Systems and user interfaces for dynamic and interactive investigation of bad actor behavior based on automatic clustering of related data in various data structures. PALANTIR TECHNOLOGIES, Knobbe Martens Olson & Bear, March 7, 2017: US09589299 (1 worldwide citation)

Embodiments of the present disclosure relate to a data analysis system that may automatically generate memory-efficient clustered data structures, automatically analyze those clustered data structures, automatically tag and group those clustered data structures, and provide results of the automated ...


3
Matthew Falk, Timothy Yousaf, Joseph Staehle, Lucas Lemanowicz, Sebastien Noury, Robin Lim, Michael Glazer: Malware data item analysis. Palantir Technologies, Knobbe Martens Olson & Bear, October 10, 2017: US09785773 (1 worldwide citation)

Embodiments of the present disclosure relate to a data analysis system that may automatically analyze a suspected malware file, or group of files. Automatic analysis of the suspected malware file(s) may include one or more automatic analysis techniques. Automatic analysis of may include production a ...


4
David Cohen, Jason Ma, Bing Jie Fu, Ilya Nepomnyashchiy, Steven Berler, Alex Smaliy, Jack Grossman, James Thompson, Julia Boortz, Matthew Sprague, Parvathy Menon, Michael Kross, Michael Harris, Adam Borochoff: External malware data item clustering and analysis. Palantir Technologies, Knobbe Martens Olson & Bear, May 8, 2018: US09965937

Embodiments of the present disclosure relate to a data analysis system that may automatically generate memory-efficient clustered data structures, automatically analyze those clustered data structures, and provide results of the automated analysis in an optimized way to an analyst. The automated ana ...


5
MALWARE DATA ITEM ANALYSIS. January 7, 2016: US20160004864-A1

Embodiments of the present disclosure relate to a data analysis system that may automatically analyze a suspected malware file, or group of files. Automatic analysis of the suspected malware file(s) may include one or more automatic analysis techniques. Automatic analysis of may include production a ...


6
SYSTEMS AND USER INTERFACES FOR HOLISTIC, DATA-DRIVEN INVESTIGATION OF BAD ACTOR BEHAVIOR BASED ON CLUSTERING AND SCORING OF RELATED DATA. February 2, 2017: US20170032463-A1

Embodiments of the present disclosure relate to a data analysis system that may automatically generate memory-efficient clustered data structures, automatically analyze those clustered data structures, automatically tag and group those clustered data structures, and provide results of the automated ...


7
SYSTEMS AND USER INTERFACES FOR DYNAMIC AND INTERACTIVE INVESTIGATION OF BAD ACTOR BEHAVIOR BASED ON AUTOMATIC CLUSTERING OF RELATED DATA IN VARIOUS DATA STRUCTURES. August 24, 2017: US20170244735-A1

Embodiments of the present disclosure relate to a data analysis system that may automatically generate memory-efficient clustered data structures, automatically analyze those clustered data structures, automatically tag and group those clustered data structures, and provide results of the automated ...


8
MALWARE DATA ITEM ANALYSIS. February 15, 2018: US20180046801-A1

Embodiments of the present disclosure relate to a data analysis system that may automatically analyze a suspected malware file, or group of files. Automatic analysis of the suspected malware file(s) may include one or more automatic analysis techniques. Automatic analysis of may include production a ...


9
EXTERNAL MALWARE DATA ITEM CLUSTERING AND ANALYSIS. September 20, 2018: US20180270264-A1

Embodiments of the present disclosure relate to a data analysis system that may automatically generate memory-efficient clustered data structures, automatically analyze those clustered data structures, and provide results of the automated analysis in an optimized way to an analyst. The automated ana ...