The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Jun. 04, 2019

Filed:

Sep. 27, 2017
Applicant:

Symantec Corporation, Mountain View, CA (US);

Inventors:

Ashwin Kumar Kayyoor, Sunnyvale, CA (US);

Petros Efstathopoulos, Los Angeles, CA (US);

Assignee:

SYMANTEC CORPORATION, Mountain View, CA (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
G06F 21/55 (2013.01); G06F 21/56 (2013.01); G06K 9/62 (2006.01); G06F 11/07 (2006.01); G06F 16/901 (2019.01);
U.S. Cl.
CPC ...
G06F 21/552 (2013.01); G06F 11/0706 (2013.01); G06F 11/079 (2013.01); G06F 11/0751 (2013.01); G06F 16/9024 (2019.01); G06F 21/56 (2013.01); G06K 9/6224 (2013.01);
Abstract

Preventing a malicious computer application from executing in a computing environment. In one embodiment, a method may include identifying a base graph, identifying a perturbed graph, determining an importance of each of the edges in the base graph using an Edge Current-Flow Based Betweenness Centrality (ECFBBC) metric, identifying the edges in the base graph that match the edges in the perturbed graph, determining a utility value for the perturbed graph, determining whether the utility value is above a threshold utility value, in response to determining that the utility value is above the threshold utility value, employing the perturbed graph to analyze a computer application and determine that the computer application is malicious, and performing a security action on the malicious computer application to prevent the malicious computer application from executing in a computing environment.


Find Patent Forward Citations

Loading…