Techniques for variable memory allocation using constant-sized structures

    公开(公告)号:US12175312B2

    公开(公告)日:2024-12-24

    申请号:US17953801

    申请日:2022-09-27

    Abstract: A first message structure is selected from a first subset of a plurality of message structures based on a size of a message payload and a message type of the message payload. Each of the first subset of the plurality of message structures has a different size. A size of the first message structure is greater than or equal to the size of the message payload. A first request is transmitted to an application programming interface (API) utilizing the size of the first message structure. In response to transmitting the first request to the API, a reference is received to a buffer structure. The message payload is copied into the buffer structure using the reference to the buffer structure.

    TECHNIQUES FOR DETECTING FILE SIMILARITY

    公开(公告)号:US20240370407A1

    公开(公告)日:2024-11-07

    申请号:US18142333

    申请日:2023-05-02

    Abstract: A computer-implemented method of detecting similarity between a first file and a plurality of second files, the method includes generating a first vector corresponding to the first file and a plurality of second vectors each corresponding to one of the plurality of second files; determining that the first file is similar to at least one of the plurality of second files based on a comparison of the first vector to the plurality of second vectors; and responsive to determining that the first file is similar to the at least one of the plurality of second files, performing a remediation operation on the first file.

    Artificial Intelligence Monitoring
    14.
    发明公开

    公开(公告)号:US20240281352A1

    公开(公告)日:2024-08-22

    申请号:US18110456

    申请日:2023-02-16

    Inventor: Andrew Southgate

    CPC classification number: G06F11/3065 G06F11/327

    Abstract: An artificial intelligence (AI) monitoring service detects, in real time or in near real time, misbehaving AI. The AI monitoring service monitors any of inputs to the AI, incoming/outgoing communications, API calls, inter-service/inter-container activities associated with the AI, and/or an output generated by the AI. Any activity conducted by, or associated with, the AI may be compared to an AI behavior profile defining permissible/impermissible activities. If any activity fails to conform to the AI behavior profile, alerts are sent and threat procedures are implemented. Very early stages of abnormal AI behavior are detected, thus quickly exposing abnormal AI behavior before the artificial intelligence can implement undesirable, or even harmful, actions.

    DATA-ONLY DECISION VALIDATION MODELS TO UPDATE FALSE PREDICTIONS

    公开(公告)号:US20240248983A1

    公开(公告)日:2024-07-25

    申请号:US18159266

    申请日:2023-01-25

    CPC classification number: G06F21/552 G06F2221/034

    Abstract: A security agent configured to utilize a decision validation model for a prediction model of a security agent of the computing device is described herein. The decision validation model includes non-executable data and is utilized by a function of the security agent along with the input vector and decision value of the prediction model as inputs to the decision validation model. The decision validation model then outputs a different decision value from the decision value of the prediction model. The security agent receives the decision validation model from a security service that trains the decision validation model when the prediction model is generating false predictions.

    IDENTIFICATION OF A COMPUTING DEVICE DURING AUTHENTICATION

    公开(公告)号:US20240054209A1

    公开(公告)日:2024-02-15

    申请号:US17884295

    申请日:2022-08-09

    CPC classification number: G06F21/46

    Abstract: Techniques and systems are described for enabling an identity provider to identify a computing device during authentication of a user that uses the computing device, and to do so in a manner that is independent of a browser and/or a client application and/or an operating system on the computing device. For example, upon receiving, from a first identity provider, redirection data to redirect an authentication request to a second identity provider, a security agent executing on the computing device may intercept the authentication request, retrieve data about the computing device, and send the authentication request with the device data to the second identity provider. Upon receiving, from the second identity provider, a signed response to the authentication request, the computing device may send the signed response to the first identity provider to receive a result of the authentication request from the first identity provider.

    Detecting security-violation-associated event data

    公开(公告)号:US11899786B2

    公开(公告)日:2024-02-13

    申请号:US16507194

    申请日:2019-07-10

    Abstract: An event can be analyzed for association with a security violation. Characters or other values of event data (e.g., command-line text) associated with the event can be provided sequentially to a trained representation mapping to determine respective representation vectors. Respective indicators can be determined by applying the vectors to a trained classifer. A token in the event data can be located based on the indicators. The event's can be determined to be associated with a security violation based on the token satisfying a token-security criterion. The representation mapping can be trained by adjusting model parameters so the trained representation predicts, based on a character of training command-line text, an immediately following character in the training command-line text. The classifier can be determined based on the trained representation mapping and classification training data indicating whether respective portions of training event data are associated with security violations.

    METHODS AND SYSTEMS FOR IDENTITY CONTROL
    18.
    发明公开

    公开(公告)号:US20240007491A1

    公开(公告)日:2024-01-04

    申请号:US17855360

    申请日:2022-06-30

    CPC classification number: H04L63/1425 H04L63/1441

    Abstract: Methods and systems for detecting malicious attacks in a network and preventing lateral movement in the network by identity control are disclosed. According to an implementation, a security appliance may receive telemetry data from an endpoint device collected during a period of time. The security appliance may determine a threat behavior based on the telemetry data. The threat behavior may be associated with a user identity or user account. The security appliance further determines one or more additional user identities based on the user identity connected to the threat behavior. The security appliance may enforce one or more security actions on the user identity and the one or more additional user identities to prevent attacks to a plurality of computing domains from the endpoint device using the one or more additional user identities. The security appliance may be implemented on any network participants including servers, cloud device, cloud-based services/platforms, etc.

    Distributed Digital Security System for Predicting Malicious Behavior

    公开(公告)号:US20230421587A1

    公开(公告)日:2023-12-28

    申请号:US17849537

    申请日:2022-06-24

    CPC classification number: H04L63/1425

    Abstract: A distributed security system includes instances of a compute engine that can receive an event stream comprising event data associated with an occurrence of one or more events on one or more client computing devices and generate new event data based on the event data in the event stream. A predictions engine coupled in communication with the compute engine(s) receives the new event data and applies at least a portion of the received new event data to one or more machine learning models of the distributed security system based to the received new event data. The one or more machine learning models generate a prediction result that indicates whether the occurrence of the one or more events from which the new event data was generated represents one or more target behaviors, based on the applying of at least the portion of the received new event data to the one or more machine learning models according to the received new event data.

    DERIVING STATISTICALLY PROBABLE AND STATISTICALLY RELEVANT INDICATOR OF COMPROMISE SIGNATURE FOR MATCHING ENGINES

    公开(公告)号:US20230351016A1

    公开(公告)日:2023-11-02

    申请号:US17733721

    申请日:2022-04-29

    CPC classification number: G06F21/565 G06F21/563 G06F21/552 G06F21/577

    Abstract: Methods and systems are provided for a histogram model configuring a computing system to derive an indicator of compromise signature based on a sliding window index of identified malware samples, and a matching rule constructor configuring a computing system to generate matching signatures by selecting statistically relevant n-grams of an unidentified file sample. A matching rule constructor configures the computing system to construct a matching rule including, as a signature, 32 n-grams found in the unidentified file sample which occur most frequently, and another 32 n-grams found in the unidentified file sample which occur least frequently amongst records of the threat database across 32 discrete file size ranges. These functions can configure backend operations to a sample identification operation performed by a user operating a client computing device, in a fashion that does not require a user to manually discern strings from the unidentified file sample to derive a signature for the matching engine to search against the threat database.

Patent Agency Ranking