Patent Issued for Similarity Search and Malware Prioritization (USPTO 9197665)

Computer Weekly News |

By a News Reporter-Staff News Editor at Computer Weekly News -- From Alexandria, Virginia, VerticalNews journalists report that a patent by the inventors Cabot, Charles (Baltimore, MD); Borbely, Rebecca A. (Baltimore, MD); West, Michael W. (Ellicott City, MD); Raugas, Mark V. (Baltimore, MD), filed on , was published online on .

The patent's assignee for patent number 9197665 is Cyberpoint International LLC (N/A).

News editors obtained the following quote from the background information supplied by the inventors: "Malware, or malicious software, may refer to software that is used to disrupt computer systems and networks. Malware may be analyzed to study and detect threats of malware. However, existing malware analysis services suffer from several deficiencies. For instance, malware analysis services may not be able to keep pace with the rapidly evolving nature of malicious software. Therefore a faster and more efficient method is needed to process files to detect malware. In addition, because numerous malware are generated on a daily basis, a method to prioritize malware samples for analysis is also needed."

As a supplement to the background information on this patent, VerticalNews correspondents also obtained the inventors' summary information for this patent: "Various implementations are generally directed to malware analysis to overcome the aforementioned problems.

"One or more implementations may include a computer-implemented method for processing a malware sample executed by one or more processors. The method includes: receiving two or more malware samples; analyzing, by the one or more processors, the two or more malware samples to extract information from the two or more malware samples; generating, by the one or more processors, at least one set of strings for each of the two or more malware samples using the extracted information; determining, by the one or more processors, a similarity between the two or more malware samples based on the at least one set of strings for each of the two or more malware samples; and providing, by the one or more processors, an output indicating the similarity between the two or more malware samples.



"One or more implementations may include a non-transitory computer-readable storage medium encoded with a computer program, the program includes instructions that upon execution by a computer cause the computer to perform operations including: receiving two or more malware samples; analyzing the two or more malware samples to extract information from the two or more malware samples; generating at least one set of strings for each of the two or more malware samples using the extracted information; determining a similarity between the two or more malware samples based on the at least one set of strings for each of the two or more malware samples; and providing an output indicating the similarity between the two or more malware samples.

"One or more implementations may include a system having one or more processors and one or more computer storage media storing instructions that are operable, when executed by the one or more processors, to cause the one or more processors to perform operations including: receiving two or more malware samples; analyzing the two or more malware samples to extract information from the two or more malware samples; generating at least one set of strings for each of the two or more malware samples using the extracted information; determining a similarity between the two or more malware samples based on the at least one set of strings for each of the two or more malware samples; and providing an output indicating the similarity between the two or more malware samples.

"These and other features and advantages will be apparent from a reading of the following detailed description and a review of the associated drawings. It is to be understood that both the foregoing general description and the following detailed description are explanatory only and are not restrictive of aspects as claimed."

For additional information on this patent, see: Cabot, Charles; Borbely, Rebecca A.; West, Michael W.; Raugas, Mark V.. Similarity Search and Malware Prioritization. U.S. Patent Number 9197665, filed , and published online on . Patent URL: http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=%2Fnetahtml%2FPTO%2Fsrchnum.htm&r=1&f=G&l=50&s1=9197665.PN.&OS=PN/9197665RS=PN/9197665

Keywords for this news article include: Software, Computers, Cyberpoint International LLC.

Our reports deliver fact-based news of research and discoveries from around the world. Copyright 2015, NewsRx LLC

DISCLOSURE: The views and opinions expressed in this article are those of the authors, and do not represent the views of equities.com. Readers should not consider statements made by the author as formal recommendations and should consult their financial advisor before making any investment decisions. To read our full disclosure, please go to: http://www.equities.com/disclaimer

Comments

Emerging Growth

Valuesetters Inc

Valuesetters Inc is a next generation technology company. The Company is focused in providing technologies and infrastructure-as-a-service (Iaas) to consumer through enterprise communications, entertainment, and game platforms.

Private Markets

iPRO Network, LLC

We provide the platform, tools, and resources to empower individuals and professionals to market desirable goods and services to the public, taking the place of traditional methods of commerce.

Quants Inc

Quants, Inc, a California Corporation, develops, markets and operates financial technology platforms and alternative investment products offering sophisticated risk management since 2010. The Company has primarily sharpened its focus with…