-
公开(公告)号:US10568017B2
公开(公告)日:2020-02-18
申请号:US16370831
申请日:2019-03-29
Applicant: Avast Software s.r.o.
Inventor: Juyong Do , Martin Horváth
Abstract: A processor-implemented method including scanning wirelessly by a plurality of mobile devices and selecting a plurality of wireless access points based on the scanning by the plurality of mobile devices. Particular attributes of the plurality of wireless access points are determined, and the particular attributes of the plurality of wireless access points are compared. A particular set of the plurality of wireless access points are grouped based on the comparing of the particular attributes, and a particular geographic location is assigned to the particular set of the plurality of wireless access points. A particular security protocol is assigned to the particular geographic location based on the particular attributes of the particular set of the plurality of wireless access points. A particular mobile device is determined to be positioned within a particular distance of the particular geographic location, and wireless communication of the particular mobile device is restricted.
-
公开(公告)号:US20190306781A1
公开(公告)日:2019-10-03
申请号:US16370831
申请日:2019-03-29
Applicant: Avast Software s.r.o.
Inventor: Juyong Do , Martin Horváth
Abstract: A processor-implemented method including scanning wirelessly by a plurality of mobile devices and selecting a plurality of wireless access points based on the scanning by the plurality of mobile devices. Particular attributes of the plurality of wireless access points are determined, and the particular attributes of the plurality of wireless access points are compared. A particular set of the plurality of wireless access points are grouped based on the comparing of the particular attributes, and a particular geographic location is assigned to the particular set of the plurality of wireless access points. A particular security protocol is assigned to the particular geographic location based on the particular attributes of the particular set of the plurality of wireless access points. A particular mobile device is determined to be positioned within a particular distance of the particular geographic location, and wireless communication of the particular mobile device is restricted.
-
公开(公告)号:US20190138722A1
公开(公告)日:2019-05-09
申请号:US16184423
申请日:2018-11-08
Applicant: Avast Software s.r.o. , Ústav informatiky AV CR, v.v.i.
Inventor: Marek Krcál , Martin Bálek , Ondrej Svec , Martin Vejmelka
Abstract: A convolutional deep neural network architecture can detect malicious executable files by reading the raw sequence of bytes, that is, without any domain-specific feature extraction or preprocessing.
-
公开(公告)号:US10255436B2
公开(公告)日:2019-04-09
申请号:US15275179
申请日:2016-09-23
Applicant: Avast Software s.r.o.
Inventor: Peter Ková{hacek over (c)}
IPC: G06F21/56
Abstract: Systems and methods automatically determine rules for detecting malware. A fingerprint representing a file is received. A set of nearest neighbor fingerprints from at least a set of malware fingerprints that are nearest neighbors are determined. The set of malware fingerprints are analyzed to determine a representative fingerprint. A malicious file detection rule is generated based, at least in part, on the representative fingerprint.
-
公开(公告)号:US20190007790A1
公开(公告)日:2019-01-03
申请号:US16024606
申请日:2018-06-29
Applicant: Avast Software s.r.o.
Inventor: Cree Howard , Dan Hodges
Abstract: A hybrid location service maintains a user state for each of a plurality of mobile devices communicably coupled to the hybrid location service via one or more networks. The hybrid location service can receive a request for a location of a mobile device. In response, the hybrid location service can determine a consent source. The consent source can include the mobile device or a network operator of the network used by the mobile device. The hybrid location service determines a response to the request for the location of the mobile device based, at least in part, on a user state of the mobile device and a user consent obtained from the consent source.
-
公开(公告)号:US20190005238A1
公开(公告)日:2019-01-03
申请号:US16022587
申请日:2018-06-28
Applicant: Avast Software s.r.o.
Inventor: Zdenek Breitenbacher
Abstract: Systems and methods for normalizing entry point instructions include receiving a scope of instructions starting at an entry point of executable code. For each instruction in the scope of instructions, a determination is made if the instruction performs an ineffective operation or if the instruction, in combination with another instruction, renders either or both instructions ineffective. Ineffective instructions are filtered such that they do not appear in an output buffer.
-
公开(公告)号:US20180293330A1
公开(公告)日:2018-10-11
申请号:US15941668
申请日:2018-03-30
Applicant: Avast Software s.r.o.
Inventor: Peter Kovác
Abstract: Analyzing a large number of files to identify malicious software including evaluating a multigraph including determining a graph having a plurality of nodes, including a source node and target nodes from a data set and merging the graph into a multigraph in response to a node score above a threshold level, for each target node; determining one or more specificity indexes for target node and determining a node score for the target node based, at least in part, on a specificity index
-
公开(公告)号:US10095630B2
公开(公告)日:2018-10-09
申请号:US15394043
申请日:2016-12-29
Applicant: Avast Software s.r.o.
Inventor: Jakub Jermá{hacek over (r)}
IPC: G06F12/10 , G06F12/1009
Abstract: Systems and methods enable initializing and accessing page metadata stored in the last level of a multi-level page table, wherein an effort is made to reduce the number of metadata initializations and the number of page table walks for sequential accesses in comparison with a naïve method realized by a sequence of random accesses.
-
公开(公告)号:US20180268129A1
公开(公告)日:2018-09-20
申请号:US15918874
申请日:2018-03-12
Applicant: Avast Software s.r.o.
Inventor: Nikolaos Chrysaidos
IPC: G06F21/52
CPC classification number: G06F21/52 , G06F21/554 , G06F21/84 , G06F2221/031 , G06F2221/2151
Abstract: Systems and methods detect suspicious application overlays on a device. An overlay detection unit can detect if a first foreground application has been replaced, within a threshold amount of time, by a second foreground application. If the replacement time is below a threshold amount of time, a suspicious overlay detection can be triggered to alert the user to a possible phishing attempt by the second foreground application.
-
公开(公告)号:US20180096148A1
公开(公告)日:2018-04-05
申请号:US15719401
申请日:2017-09-28
Applicant: Avast Software s.r.o.
Inventor: Jiri Sejtko
IPC: G06F21/56
CPC classification number: G06F21/566 , G06F21/562 , G06F2221/034
Abstract: Systems and methods normalize an executable script. A file can be received that potentially contains an executable script. The characters in the file are translated to a single case (either upper case or lower case). Duplicate whitespace can be removed. A script is identified within the file. Tokens in the script are processed to create normalized output. The normalized output can include tokens that are retained keywords, control flow characters or data characters from the script file.
-
-
-
-
-
-
-
-
-