Systems and methods for improving application analysis

    公开(公告)号:US11062034B1

    公开(公告)日:2021-07-13

    申请号:US17006608

    申请日:2020-08-28

    IPC分类号: G06F21/54 G06F21/57

    摘要: The disclosed computer-implemented method for improving application analysis may include (i) configuring a computing environment to execute an application such that the computing environment spoofs a simulated geolocation that is detected by the application, (ii) performing a dynamic analysis of how the application behaves within the simulated geolocation, and (iii) generating a holistic security analysis of the application based on both a result of the dynamic analysis performed for the simulated geolocation and an additional result of at least one additional dynamic analysis performed for a second geolocation that is distinct from the simulated geolocation. Various other methods, systems, and computer-readable media are also disclosed.

    Systems and methods for detecting certificate pinning

    公开(公告)号:US11044102B1

    公开(公告)日:2021-06-22

    申请号:US17006581

    申请日:2020-08-28

    IPC分类号: H04L29/06 H04L9/32 H04L29/12

    摘要: The disclosed computer-implemented method for detecting certificate pinning may include (i) attempting, by a security network proxy, to break a network connection between a client device and a server device, (ii) detecting, by the security network proxy, whether the network connection between the client device and the server device is certificate pinned based on a result of attempting to break the network connection, and (iii) performing a security action by the security network proxy to protect the client device at least in part based on detecting whether the network connection between the client device and the server device is certificate pinned. Various other methods, systems, and computer-readable media are also disclosed.

    Classification using projection of graphs into summarized spaces

    公开(公告)号:US11032303B1

    公开(公告)日:2021-06-08

    申请号:US16134109

    申请日:2018-09-18

    摘要: A method for anomaly detection using grouping-based graph summarization is performed by one or more computing devices, each including one or more processors. The method includes identifying a first graph from a stream of incoming graphs, generating a first summary of the first graph, classifying the first summary in a first category, identifying a second graph from the stream of incoming graphs, generating a second summary of the second graph, comparing the first summary with the second summary, mapping the first summary and the second summary to the first category upon determining that the comparing indicates a similarity between the first summary and the second summary satisfies a graph similarity threshold, analyzing a frequency of graphs being mapped to graph categories, the graph categories including at least the first category, and detecting an anomaly in one of the graph categories based at least in part on the analysis.

    Systems and methods for certifying geolocation coordinates of computing devices

    公开(公告)号:US10812981B1

    公开(公告)日:2020-10-20

    申请号:US15466156

    申请日:2017-03-22

    摘要: The disclosed computer-implemented method for certifying geolocation coordinates of computing devices may include (i) receiving, from a client computing device, a set of geolocation coordinates that purport to identify the physical location of the client computing device, (ii) identifying, in response to receiving the geolocation coordinates, at least one cooperating geolocation device that is within physical proximity to the geolocation coordinates provided by the client computing device, (iii) performing a proximity validation check that demonstrates that the client computing device is within physical proximity to the cooperating geolocation device, and (iv) certifying, based on the proximity validation check, the geolocation coordinates as valid geolocation coordinates. Various other methods, systems, and computer-readable media are also disclosed.

    Automatically adjusting backup set rules based on anomalous backup activity

    公开(公告)号:US10810089B1

    公开(公告)日:2020-10-20

    申请号:US15665257

    申请日:2017-07-31

    发明人: Lei Gu Ilya Sokolov

    IPC分类号: G06F11/14 G06F16/11

    摘要: Backup metrics are received from multiple endpoints. Backup baselines are established, based on backup metrics received over a period of time. Each established backup baseline specifies an empirically determined baseline level of backup activity according to specific criteria. Changes in backup behavior are detected, as measured against established backup baselines, based on analyzing received backup metrics. Such changes can be detected by applying a non-supervised machine learning technique to backup metrics. Detected backup behavior changes that meet a corresponding threshold are further analyzed to determine whether to alter corresponding backup activity in response. Backup activity on endpoints can be modified, in response to the analysis. This can take the form of omitting specific files or folders from corresponding backups, or changing default backup configuration(s). For example, a new or modified default backup configuration can be transmitted to one or more endpoints.

    Systems and methods for executing application launchers

    公开(公告)号:US10803167B1

    公开(公告)日:2020-10-13

    申请号:US15899384

    申请日:2018-02-20

    摘要: The disclosed computer-implemented method for executing application launchers may include (i) creating a security sandbox within an operating system environment, (ii) executing an original application launcher within the security sandbox, and (iii) registering the security sandbox as a new application launcher within the operating system environment such that the original application launcher is still available to a user through the security sandbox and the security sandbox supplements the original application launcher by providing a layer of protection for the user. Various other methods, systems, and computer-readable media are also disclosed.

    Identifying and protecting against computer security threats while preserving privacy of individual client devices using condensed local differential privacy (CLDP)

    公开(公告)号:US10789363B1

    公开(公告)日:2020-09-29

    申请号:US16146189

    申请日:2018-09-28

    摘要: Identifying and protecting against computer security threats while preserving privacy of individual client devices using condensed local differential privacy (CLDP). In one embodiment, a method may include mapping non-ordinal data values to ordinal data values, generating a first ordering scheme for the ordinal data values, accessing actual non-ordinal data values, converting the actual non-ordinal data values to actual ordinal data values according to the mapping, generating first perturbed ordinal data values by adding noise, and aggregating the first perturbed ordinal data values. The method may also include generating a second ordering scheme for the ordinal data values by denoising and refining the aggregated first perturbed ordinal data values, generating second perturbed ordinal data values by adding noise, aggregating the second perturbed ordinal data values, analyzing the aggregated second perturbed ordinal data values to identify a computer security threat, and in response, thwarting the computer security threat.

    Systems and methods for preventing sensitive information exposure based on a surrounding audience

    公开(公告)号:US10783261B1

    公开(公告)日:2020-09-22

    申请号:US15981266

    申请日:2018-05-16

    发明人: Lei Gu Ilya Sokolov

    IPC分类号: G06F21/60 G06K9/00 H04L29/06

    摘要: The disclosed computer-implemented method for preventing sensitive information exposure based on a surrounding audience may include (1) detecting, from one or more communication devices, surrounding audience data associated with an audience presentation on a presentation device, the audience presentation including sensitive information and non-sensitive information, (2) determining an audience profile based on the surrounding audience data, the audience profile identifying one or more unintended audience members in the surrounding audience, (3) assigning an information exposure policy to the audience presentation based on the audience profile, and (4) performing a security action to enforce the information exposure policy on the presentation device such that the sensitive information is prevented from being exposed to the surrounding audience during the audience presentation. Various other methods, systems, and computer-readable media are also disclosed.