Log in
Enquire now
‌

US Patent 7644441 Methods for identifying malicious software

OverviewStructured DataIssuesContributors

Contents

Patent abstractTimelineTable: Further ResourcesReferences
Is a
Patent
Patent
1

Patent attributes

Patent Jurisdiction
United States Patent and Trademark Office
United States Patent and Trademark Office
1
Patent Number
76444411
Patent Inventor Names
Matthew N. Schmid1
David Geyer1
Michael Haddox-Schatz1
Michael Weber1
Date of Patent
January 5, 2010
1
Patent Application Number
109481471
Date Filed
September 24, 2004
1
Patent Citations Received
‌
US Patent 12130909 Enterprise search
2
‌
US Patent 11949698 Dynamically remote tuning of a malware content detection system
3
‌
US Patent 11949692 Method and system for efficient cybersecurity analysis of endpoint events
4
‌
US Patent 11979428 Technique for verifying exploit/malware at malware detection appliance through correlation with endpoints
5
‌
US Patent 11997111 Attribute-controlled malware detection
6
‌
US Patent 12063229 System and method for associating cybersecurity intelligence to cyberthreat actors through a similarity matrix
7
‌
US Patent 12069087 System and method for analyzing binary code for malware classification using artificial neural network techniques
8
‌
US Patent 12074887 System and method for selectively processing content after identification and removal of malicious content
9
...
Patent Primary Examiner
‌
Michael J Simitoski
1
Patent abstract

Malicious software is identified in an executable file by identifying malicious structural features, decryption code, and cryptographic functions. A malicious structural feature is identified by comparing a known malicious structural feature to one or more instructions of the executable file. A malicious structural feature is also identified by graphically and statistically comparing windows of bytes or instructions in a section of the executable file. Cryptography is an indicator of malicious software. Decryption code is identified in an executable file by identifying a tight loop around a reversible instruction that writes to random access memory. Cryptographic functions are identified in an executable file be obtaining a known cryptographic function and performing a string comparison of the numeric constants of the known cryptographic function with the executable file.

Timeline

No Timeline data yet.

Further Resources

Title
Author
Link
Type
Date
No Further Resources data yet.

References

Find more entities like US Patent 7644441 Methods for identifying malicious software

Use the Golden Query Tool to find similar entities by any field in the Knowledge Graph, including industry, location, and more.
Open Query Tool
Access by API
Golden Query Tool
Golden logo

Company

  • Home
  • Press & Media
  • Blog
  • Careers
  • WE'RE HIRING

Products

  • Knowledge Graph
  • Query Tool
  • Data Requests
  • Knowledge Storage
  • API
  • Pricing
  • Enterprise
  • ChatGPT Plugin

Legal

  • Terms of Service
  • Enterprise Terms of Service
  • Privacy Policy

Help

  • Help center
  • API Documentation
  • Contact Us
By using this site, you agree to our Terms of Service.