Binary Search of Byte Sequences Using Inverted Indices

    公开(公告)号:US20200159923A1

    公开(公告)日:2020-05-21

    申请号:US16752374

    申请日:2020-01-24

    Abstract: Techniques for searching an inverted index associating byte sequences of a fixed length and files that contain those byte sequences are described herein. Byte sequences comprising a search query are determined and searched in the inverted index, and an intersection of the results is determined and returned as a response to the search query. Further, search queries in the form of expressions including search terms and logical operators are searched in the inverted index and evaluated using a syntax tree constructed based on the logical operators. Also, byte sequences comprising a file are searched in the inverted index and results of the search are used to generate signatures and fuzzy hashes.

    Binary Search of Byte Sequences Using Inverted Indices

    公开(公告)号:US20190156032A1

    公开(公告)日:2019-05-23

    申请号:US16252428

    申请日:2019-01-18

    Abstract: Techniques for searching an inverted index associating byte sequences of a fixed length and files that contain those byte sequences are described herein. Byte sequences comprising a search query are determined and searched in the inverted index, and an intersection of the results is determined and returned as a response to the search query. Further, search queries in the form of expressions including search terms and logical operators are searched in the inverted index and evaluated using a syntax tree constructed based on the logical operators. Also, byte sequences comprising a file are searched in the inverted index and results of the search are used to generate signatures and fuzzy hashes.

    Binary Search of Byte Sequences Using Inverted Indices

    公开(公告)号:US20190156030A1

    公开(公告)日:2019-05-23

    申请号:US16252359

    申请日:2019-01-18

    Abstract: Techniques for searching an inverted index associating byte sequences of a fixed length and files that contain those byte sequences are described herein. Byte sequences comprising a search query are determined and searched in the inverted index, and an intersection of the results is determined and returned as a response to the search query. Further, search queries in the form of expressions including search terms and logical operators are searched in the inverted index and evaluated using a syntax tree constructed based on the logical operators. Also, byte sequences comprising a file are searched in the inverted index and results of the search are used to generate signatures and fuzzy hashes.

    Analysis of Malware
    4.
    发明申请

    公开(公告)号:US20240386109A1

    公开(公告)日:2024-11-21

    申请号:US18667819

    申请日:2024-05-17

    Abstract: A security service can determine a synthetic context based at least in part on context data associated with a first malware sample, and detonate the first malware sample in the synthetic context to provide one or more first event records representing events performed by the first malware sample and detected during detonation. Additionally or alternatively, the security service can detonate the first malware sample and locate a second malware sample in a corpus based at least in part on the one or more first event records. Additionally or alternatively, the security service can receive event records representing events detected during a detonation of a first malware sample, the detonation based at least in part on context data, and locate a second malware sample in the corpus based at least in part on the one or more reference event records.

    Binary search of byte sequences using inverted indices

    公开(公告)号:US10546127B2

    公开(公告)日:2020-01-28

    申请号:US16252388

    申请日:2019-01-18

    Abstract: Techniques for searching an inverted index associating byte sequences of a fixed length and files that contain those byte sequences are described herein. Byte sequences comprising a search query are determined and searched in the inverted index, and an intersection of the results is determined and returned as a response to the search query. Further, search queries in the form of expressions including search terms and logical operators are searched in the inverted index and evaluated using a syntax tree constructed based on the logical operators. Also, byte sequences comprising a file are searched in the inverted index and results of the search are used to generate signatures and fuzzy hashes.

    Binary search of byte sequences using inverted indices

    公开(公告)号:US10482246B2

    公开(公告)日:2019-11-19

    申请号:US16252359

    申请日:2019-01-18

    Abstract: Techniques for searching an inverted index associating byte sequences of a fixed length and files that contain those byte sequences are described herein. Byte sequences comprising a search query are determined and searched in the inverted index, and an intersection of the results is determined and returned as a response to the search query. Further, search queries in the form of expressions including search terms and logical operators are searched in the inverted index and evaluated using a syntax tree constructed based on the logical operators. Also, byte sequences comprising a file are searched in the inverted index and results of the search are used to generate signatures and fuzzy hashes.

    Binary Search of Byte Sequences Using Inverted Indices

    公开(公告)号:US20190156031A1

    公开(公告)日:2019-05-23

    申请号:US16252388

    申请日:2019-01-18

    Abstract: Techniques for searching an inverted index associating byte sequences of a fixed length and files that contain those byte sequences are described herein. Byte sequences comprising a search query are determined and searched in the inverted index, and an intersection of the results is determined and returned as a response to the search query. Further, search queries in the form of expressions including search terms and logical operators are searched in the inverted index and evaluated using a syntax tree constructed based on the logical operators. Also, byte sequences comprising a file are searched in the inverted index and results of the search are used to generate signatures and fuzzy hashes.

    LARGE LANGUAGE MODEL ASSISTED CYBERSECURITY PLATFORM

    公开(公告)号:US20250036773A1

    公开(公告)日:2025-01-30

    申请号:US18425973

    申请日:2024-01-29

    Abstract: A system and method of using generative AI to convert NL queries to database commands for accessing one or more databases. The method includes receiving a natural language (NL) request for information associated with a private network. The method includes providing the NL request to an artificial intelligence (AI) model trained to identify, from a plurality of access objects associated with a plurality of databases and a plurality of event types, a particular access object that provides access to one or more event datasets associated with the NL request. The method includes generating, by a processing device and using the AI model, a database request associated with the particular access object based on the NL request.

    INCREMENTAL SOLVES USING LLMS FOR API CALLS

    公开(公告)号:US20240427631A1

    公开(公告)日:2024-12-26

    申请号:US18475058

    申请日:2023-09-26

    Abstract: Systems and methods for incremental solves using LLMs for API calls is presented. The systems and methods produce, by a first large learning model (LLM), a processing plan based on a first prompt, wherein the processing plan includes a plurality of tasks corresponding to a plurality of services. The systems and methods send a plurality of messages corresponding to the plurality of tasks to a plurality of service agents, wherein the plurality of service agents correspond to the plurality of services and comprise a plurality of second LLMs that produce a plurality of agent responses. The systems and methods then generate a query response based on the plurality of agent responses.

    DATA-ONLY DECISION VALIDATION MODELS TO UPDATE FALSE PREDICTIONS

    公开(公告)号:US20240248983A1

    公开(公告)日:2024-07-25

    申请号:US18159266

    申请日:2023-01-25

    CPC classification number: G06F21/552 G06F2221/034

    Abstract: A security agent configured to utilize a decision validation model for a prediction model of a security agent of the computing device is described herein. The decision validation model includes non-executable data and is utilized by a function of the security agent along with the input vector and decision value of the prediction model as inputs to the decision validation model. The decision validation model then outputs a different decision value from the decision value of the prediction model. The security agent receives the decision validation model from a security service that trains the decision validation model when the prediction model is generating false predictions.

Patent Agency Ranking