-
公开(公告)号:US20170286677A1
公开(公告)日:2017-10-05
申请号:US15474007
申请日:2017-03-30
Applicant: Avast Software s.r.o.
Inventor: Libor Morkovský
CPC classification number: G06F21/562 , G06F16/22 , G06F16/2379 , G06N5/04
Abstract: Systems and methods are described which integrate file properties that in conventional systems has been considered weaker evidence of malware and analyzes the information to produce reliable results. Properties such as file paths, file names, source domains, IP protocol ASNs, section checksums, digital signatures that are not always present and not always reliable can be integrated into the classification process using a graph. A 1-neighborhood of object values in the graph may be created and analyzed to suggest a malware family label based on files having similar properties.
-
公开(公告)号:US20170085585A1
公开(公告)日:2017-03-23
申请号:US15275039
申请日:2016-09-23
Applicant: Avast Software s.r.o.
Inventor: Libor Morkovský
IPC: H04L29/06
CPC classification number: H04L63/1425 , G06F21/316 , G06F21/562 , G06F2221/2133 , H04L63/0227 , H04L63/1416 , H04L63/145
Abstract: Systems and methods analyze input files to automatically determine malware signatures. A set of input files known to contain a particular type of malware can be provided to a file analyzer. The file analyzer can analyze the file using a sliding window to create vectors from values that are provided by multiple filters that process each window. The vectors created for a file define a response matrix. The response matrices for a set of input files can be analyzed by a classifier to determine useful vector components that can define a signature for the malware.
-
公开(公告)号:US20170279841A1
公开(公告)日:2017-09-28
申请号:US15468769
申请日:2017-03-24
Applicant: Avast Software s.r.o.
Inventor: Antonín Kríz , Libor Morkovský
Abstract: A similarity fingerprint for a data object such as a file can be automatically determined using one or more anchor values. The one or more anchor values can be provided or determined. For each anchor value, a set of distances between each instance of the anchor value in the data object is determined. The set of distances for the instance of the anchor value is aggregated into a single value. The single value is added as a component of the similarity fingerprint. Thus, if there are N anchor values, there can be N components of the similarity fingerprint. The similarity fingerprints of different data objects can be compared and the results of the comparison can be used to determine how similar the data objects are.
-
公开(公告)号:US20180096149A1
公开(公告)日:2018-04-05
申请号:US15721244
申请日:2017-09-29
Applicant: Avast Software s.r.o.
Inventor: Libor Morkovský
Abstract: Detecting malware includes monitoring an event stream for an executable program, where the event stream includes a plurality of events such as API call events. A first plurality of hash values is determined for the event stream. In response to an occurrence of a trigger event in the event stream, the first plurality of hash values for the event stream can be compared with a second plurality of hash values that represents an event stream for a known malware executable. A determination can be made if a behavior represented by the first plurality of hash values is a permitted behavior based on the comparison.
-
-
-