-
公开(公告)号:US20210084055A1
公开(公告)日:2021-03-18
申请号:US16569390
申请日:2019-09-12
Applicant: Avast Software s.r.o.
Inventor: Doron Avraham
Abstract: A method of restricting presentation of known or suspected malicious content in a web browser comprises receiving a request for web content, and determining whether the web content contains known or suspected malicious content. If the requested web content contains known or suspected malicious web content, the requested web content is displayed in a restricted browsing mode that restricts or blocks presentation of one or more elements of the known or suspected malicious content in the requested content.
-
公开(公告)号:US10915183B2
公开(公告)日:2021-02-09
申请号:US15942360
申请日:2018-03-30
Applicant: Avast Software s.r.o.
Inventor: Thomas Wespel , Rajarshi Gupta
IPC: G06F3/023 , H04W4/14 , G06F3/0482 , G06F3/0488 , G06F40/58 , G06F40/263
Abstract: An electronic messaging method is provided, the method implemented by one or more processors. The method includes launching a textual communication application by a user device including a user interface. In the user interface a data entry interface is enabled including language elements in a particular language determined based on an international calling code of a stored textual communication involving a user of the user device or a language of a stored textual communication involving a user of the user device, the stored textual communication comprising text transmitted by the user of the user device or text received by the user of the user device from a particular party. Textual input is received via the data entry interface including the language elements in the particular language.
-
公开(公告)号:US20200288306A1
公开(公告)日:2020-09-10
申请号:US16293152
申请日:2019-03-05
Applicant: Avast Software s.r.o.
Inventor: Juyong Do , Rajarshi Gupta , Ondrej Vlcek Resslova
Abstract: A method includes monitoring data security events on mobile computing devices and positions of the mobile computing devices when the plurality of data security events occurred. A plurality of demographic information of the plurality of geographic positions are determined and a classifier is trained based on the data security events and demographic information. A particular mobile computing device is determined to be located at a particular geographic location and particular demographic information of the particular geographic location is determined. The classifier is applied to the particular demographic information and a particular security risk prediction of the particular geographic location is generated. A particular security measure is activated on the particular mobile computing device based on the particular security risk prediction.
-
74.
公开(公告)号:US10713146B2
公开(公告)日:2020-07-14
申请号:US15192411
申请日:2016-06-24
Applicant: Avast Software s.r.o.
Inventor: Martin Hron
Abstract: Dynamic binary instrumentation (DBI) or dynamic binary translation (DBT) of an examined process can be postponed until a point of interest is reached. Portions of the examined process can be run in native mode until the point of interest is reached. Upon reaching the point of interest, DBI and/or DBT can be performed.
-
公开(公告)号:US10607010B2
公开(公告)日:2020-03-31
申请号:US15720321
申请日:2017-09-29
Applicant: Avast Software s.r.o.
Inventor: Michal Krejdl
Abstract: A file similarity vector for an executable file or executable object can be determined using function lengths of functions in the executable file or data object. The executable file or data object can be scanned, and lengths of functions can be determined. Various statistics such as number of functions, maximum function length, minimum function length, and average function length can be used to create a file similarity vector. The file similarity vector can be used to compare files.
-
公开(公告)号:US10445501B2
公开(公告)日:2019-10-15
申请号:US15719401
申请日:2017-09-28
Applicant: Avast Software s.r.o.
Inventor: Jiri Sejtko
Abstract: Systems and methods normalize an executable script. A file can be received that potentially contains an executable script. The characters in the file are translated to a single case (either upper case or lower case). Duplicate whitespace can be removed. A script is identified within the file. Tokens in the script are processed to create normalized output. The normalized output can include tokens that are retained keywords, control flow characters or data characters from the script file.
-
公开(公告)号:US10437986B2
公开(公告)日:2019-10-08
申请号:US15374670
申请日:2016-12-09
Applicant: Avast Software s.r.o.
Inventor: Martin Vejmelka
Abstract: Systems and methods index and search log files created after execution of binaries. A plurality of log files each have one or more sequences. An index tree is created for the log files. A first log file is placed into a bucket of the index tree according to the lengths of the one or more sequences of the first log file. Remaining logs files are placed the index tree according to their respective sequence lengths. Each log becomes a representative in the bucket or associated with a representative in the bucket. The index tree can be searched, where an incurred distance and a remaining distance is maintained during the search. Nodes are pruned based, at least in part, on the incurred distance and the remaining distance.
-
公开(公告)号:US20190238582A1
公开(公告)日:2019-08-01
申请号:US16256418
申请日:2019-01-24
Applicant: Avast Software s.r.o.
Inventor: Alain G. Sauve , Syed Kamran Bilgrami
CPC classification number: H04L63/1433 , H04L41/046 , H04L41/22 , H04L43/50 , H04L63/20
Abstract: A network security assessment engine can assess security on a remote computer network. Agent programs on computing devices on the remote network can execute security tests. The network security assessment engine receives security test results produced by the security tests. The network security assessment engine can determine security test scores based, at least in part, on the security test results. The network security assessment engine can determine an overall network security score based, at least in part, on the security test scores and present the overall network security score. As an example, a network services provider can utilize the network security assessment engine to provide an adaptive, expressive scoring mechanism, allowing the network services provided to more efficiently digest, assess, and report network anomalies within a multitenant context.
-
公开(公告)号:US20190156037A1
公开(公告)日:2019-05-23
申请号:US16193822
申请日:2018-11-16
Applicant: Avast Software s.r.o.
Inventor: Petr Gronat , Rajarshi Gupta , Filip Havlícek , Michal Wojcik
Abstract: Minimizing the latency of on-device detection of malicious executable files, without sacrificing accuracy, by applying a machine learning model to an executable file in quantized steps. Allowing a threshold confidence level to be set to different values enables controlling the tradeoff between accuracy and latency in generating a confidence level indicative of whether the executable file includes malware.
-
公开(公告)号:US20190102543A1
公开(公告)日:2019-04-04
申请号:US16141268
申请日:2018-09-25
Applicant: Avast Software s.r.o.
Inventor: Hiram Lew , Filip Havlícek , Pablo Sole , Tomás Pop
Abstract: Systems and methods observe and classify device events. A model containing a set of features to be observed can be determined based on machine learning and training methods. A client application can issue a transaction request to an operating system service. A determination can be made whether the operating system service, a method associated with the transaction request, and the client application are currently being observed. In response to determining that the operating system service, a method associated with the transaction request, and the client application are being observed, a behavioral vector associated with the client application can be modified to indicate that the feature represented by the method is associated with the client application. The behavioral vector can be used to determine if the client application is malware.
-
-
-
-
-
-
-
-
-