`
`
`
`I IIIII IIIIIIII III
`
`US010783241B2
`
`( 12 ) United States Patent
`(12) United States Patent
`Crabtree et al .
`Crabtree et al.
`
`( 10 ) Patent No .: US 10,783,241 B2
`(10) Patent No.: US 10,783,241 B2
`( 45 ) Date of Patent :
`Sep. 22 , 2020
`Sep. 22, 2020
`(45) Date of Patent:
`
`( 54 ) SYSTEM AND METHODS FOR SANDBOXED
`(54) SYSTEM AND METHODS FOR SANDBOXED
`MALWARE ANALYSIS AND AUTOMATED
`MALWARE ANALYSIS AND AUTOMATED
`PATCH DEVELOPMENT , DEPLOYMENT
`PATCH DEVELOPMENT, DEPLOYMENT
`AND VALIDATION
`AND VALIDATION
`( 71 ) Applicant : QOMPLX , Inc. , Reston , VA ( US )
`(71) Applicant: QOMPLX, Inc., Reston, VA (US)
`( 72 ) Inventors : Jason Crabtree , Vienna , VA ( US ) ;
`(72)
`Inventors: Jason Crabtree, Vienna, VA (US);
`Andrew Sellers , Monument , CO ( US )
`Andrew Sellers, Monument, CO (US)
`( 73 ) Assignee : QOMPLX , INC . , Tysons , VA ( US )
`(73) Assignee: QOMPLX, INC., Tysons, VA (US)
`Subject to any disclaimer , the term of this
`( * ) Notice :
`(* ) Notice:
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`patent is extended or adjusted under 35
`U.S.C. 154 ( b ) by 209 days .
`U.S.C. 154(b) by 209 days.
`( 21 ) Appl . No .: 15 / 887,496
`(21) Appl. No.: 15/887,496
`( 22 ) Filed :
`Feb. 2 , 2018
`(22) Filed:
`Feb. 2, 2018
`( 65 )
`Prior Publication Data
`(65)
`Prior Publication Data
`Sep. 27 , 2018
`US 2018/0276372 A1
`US 2018/0276372 Al
`Sep. 27, 2018
`
`Related U.S. Application Data
`Related U.S. Application Data
`( 63 ) Continuation - in - part of application No. 15 / 818,733 ,
`(63) Continuation-in-part of application No. 15/818,733,
`Nov.
`20 ,
`2017 ,
`which is
`filed
`filed
`on Nov.
`20,
`2017, which
`is
`a
`on
`a
`( Continued )
`(Continued)
`
`( 51 ) Int . Ci .
`(51) Int. Cl.
`G06F 21/53
`G06F 21/53
`G06F 21/56
`G06F 21/56
`GO6F 21/57
`G06F 21/57
`GO6F 8/65
`G06F 8/65
`GO6F 9/455
`G06F 9/455
`H04L 29/06
`H04L 29/06
`
`( 52 ) U.S. Ci .
`(52) U.S. Cl.
`CPC
`CPC
`
`( 2013.01 )
`(2013.01)
`( 2013.01 )
`(2013.01)
`( 2013.01 )
`(2013.01)
`( 2018.01 )
`(2018.01)
`( 2018.01 )
`(2018.01)
`( 2006.01 )
`(2006.01)
`( Continued )
`(Continued)
`
`G06F 21/53 ( 2013.01 ) ; G06F 8/65
` G06F 21/53 (2013.01); G06F 8/65
`( 2013.01 ) ; G06F 9/455 ( 2013.01 ) ; G06F
`(2013.01); G06F 9/455 (2013.01); G06F
`21/566 ( 2013.01 ) ; G06F 21/577 ( 2013.01 ) ;
`21/566 (2013.01); G06F 21/577 (2013.01);
`
`G06Q 40/08 ( 2013.01 ) ; H04L 63/1425
`G06Q 40/08 (2013.01); H04L 63/1425
`( 2013.01 ) ; H04L 63/1433 ( 2013.01 ) ; GOOF
`(2013.01); H04L 63/1433 (2013.01); G06F
`2221/033 ( 2013.01 ) ; G06F 2221/2149
`2221/033 (2013.01); G06F 2221/2149
`( 2013.01 ) ; GOON 20/00 ( 2019.01 ) ; G06Q
`(2013.01); G06N 20/00 (2019.01); G06Q
`50/01 ( 2013.01 )
`50/01 (2013.01)
`( 58 ) Field of Classification Search
`(58) Field of Classification Search
`CPC . G06F 21/53 ; G06F 9/455 ; G06F 8/65 ; G06F
`CPC . G06F 21/53; G06F 9/455; G06F 8/65; G06F
`21/577 ; G06F 21/566 ; G06F 2221/2149 ;
`21/577; G06F 21/566; G06F 2221/2149;
`GO6F 2221/033 ; G06F 11/3058 ; H04L
`G06F 2221/033; G06F 11/3058; H04L
`63/1433 ; H04L 63/1425 ; G06Q 40/08 ;
`63/1433; H04L 63/1425; G06Q 40/08;
`G06Q 50/01 ; G06N 20/00
`G06Q 50/01; G06N 20/00
`See application file for complete search history .
`See application file for complete search history.
`References Cited
`References Cited
`
`( 56 )
`(56)
`
`U.S. PATENT DOCUMENTS
`U.S. PATENT DOCUMENTS
`7/2001 Weissinger
`6,256,544 B1
`7/2001 Weissinger
`6,256,544 B1
`9,141,360 B1 *
`9/2015 Chen
`9/2015 Chen
`9,141,360 B1 *
`( Continued )
`(Continued)
`FOREIGN PATENT DOCUMENTS
`FOREIGN PATENT DOCUMENTS
`
`G06F 8/52
` G06F 8/52
`
`10/2014
`WO
`2014159150 A1
`10/2014
`2014159150 Al
`WO
`WO
`2017075543 A1
`5/2017
`5/2017
`2017075543 Al
`WO
`Primary Examiner — Cheng - Feng Huang
`Primary Examiner — Cheng-Feng Huang
`( 74 ) Attorney , Agent , or Firm — Brian S. Boon ; Brian R.
`(74) Attorney, Agent, or Firm — Brian S. Boon; Brian R.
`Galvin ; Galvin Patent Law LLC
`Galvin; Galvin Patent Law LLC
`( 57 )
`ABSTRACT
`ABSTRACT
`(57)
`A system and methods for sandboxed malware analysis and
`A system and methods for sandboxed malware analysis and
`automated patch development , deployment and validation ,
`automated patch development, deployment and validation,
`that uses a business operating system , vulnerability scoring
`that uses a business operating system, vulnerability scoring
`engine , binary translation engine , sandbox simulation
`engine, binary translation engine, sandbox simulation
`engine , at least one network endpoint , at least one database ,
`engine, at least one network endpoint, at least one database,
`a network , and a combination of machine learning and
`a network, and a combination of machine learning and
`vulnerability probing techniques , to analyze software , locate
`vulnerability probing techniques, to analyze software, locate
`any vulnerabilities or malicious behavior , and attempt to
`any vulnerabilities or malicious behavior, and attempt to
`patch and prevent undesired behavior from occurring ,
`patch and prevent undesired behavior from occurring,
`autonomously .
`autonomously.
`2 Claims , 12 Drawing Sheets
`2 Claims, 12 Drawing Sheets
`
`5101
`5107
`
`520 vt
`520
`
`530v%_
`5301
`
`Translate target
`Translate target
`file into binary
`file into binary
`
`Transfer translated
`Transfer translated
`file to sandbox
`file to sandbox
`environment
`environment
`
`540 _
`540
`
`550
`550
`
`560 _
`560
`
`Execute file in
`Execute file in
`sandbox environment
`sandbox environment
`
`Examine executing
`Examine executing
`software for
`software for
`irregularities
`irregularities
`
`Probe for known or
`Probe for known or
`expected
`expected
`vulnerabilities
`vulnerabilities
`
`Learn new behaviors
`Learn new behaviors
`based on analysis of
`based on analysis of
`software
`software
`
`WIZ, Inc. EXHIBIT - 1046
`WIZ, Inc. v. Orca Security LTD.
`
`WIZ, Inc. EXHIBIT - 1046
`WIZ, Inc. v. Orca Security LTD.
`
`
`
`US 10,783,241 B2
`US 10,783,241 B2
`Page 2
`Page 2
`
`Related U.S. Application Data
`Related U.S. Application Data
`continuation - in - part of application No. 15 / 725,274 ,
`continuation-in-part of application No. 15/725,274,
`filed on Oct. 4 , 2017 , now Pat . No. 10,609,079 , which
`filed on Oct. 4, 2017, now Pat. No. 10,609,079, which
`is a continuation - in - part of application No. 15/655 ,
`is a continuation-in-part of application No. 15/655,
`113 , filed on Jul . 20 , 2017 , which is a continuation
`113, filed on Jul. 20, 2017, which is a continuation-
`in - part of application No. 157616,427 , filed on Jun . 7 ,
`in-part of application No. 15/616,427, filed on Jun. 7,
`2017 , and a continuation - in - part of application No.
`2017, and a continuation-in-part of application No.
`15 / 237,625 , filed on Aug. 15 , 2016 , now Pat . No.
`15/237,625, filed on Aug. 15, 2016, now Pat. No.
`10,248,910 , which is a continuation - in - part of appli
`10,248,910, which is a continuation-in-part of appli-
`cation No. 15 / 206,195 , filed on Jul . 8 , 2016 , which is
`cation No. 15/206,195, filed on Jul. 8, 2016, which is
`a continuation - in - part of application No. 15 / 186,453 ,
`a continuation-in-part of application No. 15/186,453,
`filed on Jun . 18 , 2016 , which is a continuation - in - part
`filed on Jun. 18, 2016, which is a continuation-in-part
`of application No. 15 / 166,158 , filed on May 26 , 2016 ,
`of application No. 15/166,158, filed on May 26, 2016,
`which is a continuation - in - part of application No.
`which is a continuation-in-part of application No.
`15 / 141,752 , filed on Apr. 28 , 2016 , which is a con
`15/141,752, filed on Apr. 28, 2016, which is a con-
`tinuation - in - part of application No. 15 / 091,563 , filed
`tinuation-in-part of application No. 15/091,563, filed
`on Apr. 5 , 2016 , now Pat . No. 10,204,147 , and a
`on Apr. 5, 2016, now Pat. No. 10,204,147, and a
`continuation - in - part of application No. 14 / 986,536 ,
`continuation-in-part of application No. 14/986,536,
`filed on Dec. 31 , 2015 , now Pat . No. 10,210,255 , and
`filed on Dec. 31, 2015, now Pat. No. 10,210,255, and
`a continuation - in - part of application No. 14 / 925,974 ,
`a continuation-in-part of application No. 14/925,974,
`filed on Oct. 28 , 2015 , application No. 15 / 887,496 ,
`filed on Oct. 28, 2015, application No. 15/887,496,
`which is a continuation - in - part of application No.
`which is a continuation-in-part of application No.
`15 / 823,285 , filed on Nov. 27 , 2017 , which is a con
`15/823,285, filed on Nov. 27, 2017, which is a con-
`tinuation - in - part of application No. 15 / 788,718 , filed
`tinuation-in-part of application No. 15/788,718, filed
`on Oct. 19 , 2017 , which is a continuation - in - part of
`on Oct. 19, 2017, which is a continuation-in-part of
`application No. 15 / 788,002 , filed on Oct. 19 , 2017 ,
`application No. 15/788,002, filed on Oct. 19, 2017,
`which is a continuation - in - part of application No.
`which is a continuation-in-part of application No.
`15 / 787,601 , filed on Oct. 18 , 2017 , which is a con
`15/787,601, filed on Oct. 18, 2017, which is a con-
`
`tinuation - in - part of application No. 15 / 616,427 , filed
`tinuation-in-part of application No. 15/616,427, filed
`on Jun . 7 , 2017 , which is a continuation - in - part of
`on Jun. 7, 2017, which is a continuation-in-part of
`application No. 14 / 925,974 , filed on Oct. 28 , 2015 .
`application No. 14/925,974, filed on Oct. 28, 2015.
`( 60 ) Provisional application No. 62 / 568,307 , filed on Oct.
`(60) Provisional application No. 62/568,307, filed on Oct.
`4 , 2017 , provisional application No. 62 / 568,305 , filed
`4, 2017, provisional application No. 62/568,305, filed
`on Oct. 4 , 2017 ,
`provisional application No.
`on Oct. 4, 2017, provisional application No.
`62 / 568,312 , filed on Oct. 4 , 2017 .
`62/568,312, filed on Oct. 4, 2017.
`( 51 ) Int . CI .
`(51) Int. Cl.
`G06Q 40/08
`G06Q 40/08
`GOON 20/00
`G06N 20/00
`G06Q 50/00
`G06Q 50/00
`
`( 56 )
`(56)
`
`( 2012.01 )
`(2012.01)
`( 2019.01 )
`(2019.01)
`( 2012.01 )
`(2012.01)
`References Cited
`References Cited
`U.S. PATENT DOCUMENTS
`U.S. PATENT DOCUMENTS
`12/2005 Sabharwal
`2005/0289072 A1
`12/2005 Sabharwal
`2005/0289072 Al
`1/2007 Venolia
`2007/0011659 Al
`1/2007 Venolia
`2007/0011659 Al
`2013/0097706 A1 *
`4/2013 Titonis
`4/2013 Titonis
`2013/0097706 Al *
`
`H04W 12/12
`H04W 12/12
`726/24
`726/24
`G06F 21/57
`GO6F 21/57
`726/17
`726/17
`
`HO4L 63/1433
`H04L 63/1433
`726/23
`726/23
`
`1/2016 Chen
`2016/0004858 A1 *
`2016/0004858 Al* 1/2016 Chen
`
`2016/0028758 Al
`2016/0028758 Al
`2016/0099960 A1 *
`2016/0099960 Al *
`
`1/2016 Ellis et al .
`1/2016 Ellis et al.
`4/2016 Gerritz
`4/2016 Gerritz
`
`2016/0275123 A1
`2016/0275123 Al
`2017/0126712 A1
`2017/0126712 Al
`2017/0139763 Al
`2017/0139763 Al
`2017/0149802 Al
`2017/0149802 Al
`* cited by examiner
`* cited by examiner
`
`9/2016 Lin et al .
`9/2016 Lin et al.
`5/2017 Crabtree et al .
`5/2017 Crabtree et al.
`5/2017 Ellwein
`5/2017 Ellwein
`5/2017 Huang et al .
`5/2017 Huang et al.
`
`
`
`U.S. Patent
`lualud °S11
`
`Sep. 22 , 2020
`
`Sheet 1 of 12
`Z1 Jo 1 WIN
`
`US 10,783,241 B2
`za trecn`ot sa
`
`112
`
`Administration
`Device
`
`Administration Device
`
`Sensor
`Device
`
`Sensor Device
`
`Data
`Stream
`Management
`Engine
`
`Data Stream Management Engine
`
`120
`
`120
`
`110a
`
`110a
`
`Network
`
`Network
`
`Sensor
`Device
`
`Sensor Device
`
`Sensor Device
`www 110b
`
`Sensor
`Device
`
`110b
`
`Web server
`Engine
`ic\\\.
`
`N 115
`
`\,1
`115
`
`server Engine
`Web
`
`Data
` 1* Archive
`Storage
`
`Data Archive Storage
`
`Multidimensional
`Time Series
`tow
`Data Store
`
`Series Data
`Store
`
`\
`
`4
`
`130
`
`130
`
`125
`
`125
`
`Multidimensional Time
`
`EITEEdfid-
`Query
`Interpreter
`
`Structured Query Interpreter
`
``- 135
`
`135
`
`110n
`
`110n
`
`Fig. 1
`
`Fig . 1
`
`
`
`U.S. Patent
`lualud °S11
`
`Sep. 22 , 2020
`
`Sheet 2 of 12
`Z1 JO Z WIN
`
`US 10,783,241 B2
`za trecn`ot sa
`
`3
`
`&
`
` =‘.
`Client
`access
`
`205
`Client access
`
`205
`
`2
`
`4/ 210
`
`210
`
`+++
`
`* 224
`
`web crawler module
`High volume
`
`volume web
`crawler
`module
`
`sional time
`series
`database
`
`215
`
`215
`
`2202
`
`Action
`outcome
`simulation
`module
`
`Action outcome simulation module
`
`230—
`fa-Servation,
`and state
`estimation
`' service
`'sr
`
`240
`
`240
`
`Automated planning service module
`230 Observation and
`state estimation service
`
`II service
`
`module
`
`225
`
`225
`
`247 ,
`
`' s
`
`, Autom-ated
`planning
`
`High bandwidth cloud interface
`
`bandwidth 14
`cloud
`interface
`
`r.
`
`2
`
`255\
`
`255
`
`DT-Fe-did
`computa-
`tional graph
`module
`
`}
`
`I I260
`
`1260
`
`' a
`
`transformer tran: former
`service
`module
`
`I '
`
`le
`transformer
`service
`module
`
`5
`Graph
`stack
`service
`
`Multidimen sional
`time series database
`Directed computa tional
`graph module
`250 Graph stack service
`Decomposab le transformer service module
`General transformer service module
`
`2
`
`245
`
`245
`
`2
`
`Fig. 2
`
`Fig . 2 .
`
`
`
`U.S. Patent
`lualud °S11
`
`Sep. 22 , 2020
`
`Sheet 3 of 12
`Z1 JO £ WIN
`
`US 10,783,241 B2
`za trecn`ot sa
`
`125
`
`125
`
`Multi-dimensional
`time-series database
`
`Multi - dimensional time - series
`database
`
`330
`
`330
`
`Device
`Endpoints
`
`Device Endpoints
`
`Internet
`
`Internet
`
`310
`
`310
`
`Task
`engine
`
`Task engine
`
`320
`
`320
`
`Scoring engine
`
`Scoring
`engine
`
`Fig. 3
`
`Fig . 3
`
`
`
`U.S. Patent
`lualud °S11
`
`Sep. 22 , 2020
`
`Sheet 4 of 12
`Z1 JO 17 1"11S
`
`US 10,783,241 B2
`za trecn`ot sa
`
`1
`I
`I
`
`1
`
`413
`Sandbox
`environment
`
`0101010101010140.
`
`Business OS
`412
`Binary file
`translation
`
`Business OS
`412
`
`Binary
`
`410
`
`410
`
`141/41 ,1
`
`411
`
`Kernel
`
`MOMMeddeddel
`
`413 Sandbox environment
`file translation
`Kernel
`
`1
`
`I
`
`I 411
`I
`I
`
`440
`
`440
`
`Score generation
`system
`
`generation system
`Score
`
`430
`
`430
`
`420
`
`420
`
`Network
`
`Network
`
`Database
`
`Database
`
`450
`
`450
`
`MINIM
`
`V alIVIV6
`
`
`
`453
`Endpoint n
`
`453
`
`Endpoint n
`
`452
`Endpoint 2
`
`452
`
`Endpoint 2
`
`Device endpoints
`
`Device
`endpoints
`
`451
`
`
`
`t&A
`
`x451
`
`I Endpoint 1
`
`| Endpoint 1
`
`Fig. 4
`
`Fig . 4
`
`
`
`U.S. Patent
`lualud °S11
`
`Sep. 22 , 2020
`
`Sheet 5 of 12
`Z1 JO S JamiS
`
`US 10,783,241 B2
`za trecn`ot sa
`
`Translate target
`file into binary
`I
`Transfer translated
`file to sandbox
`environment
`
`translated file to sandbox environment
`Transfer
`
`Translate
`target file
`into
`binary
`
`Execute file in
`sandbox environment
`
`file in sandbox
`environment
`
`Execute
`
`Examine executing
`software for
`irregularities
`
`executing software for irregularities
`Examine
`
`Probe for known or
`expected
`vulnerabilities
`
`known or expected vulnerabilities
`
`Probe
`for
`
`510`
`
`510 V
`
`520 _
`
`520
`
`530 _
`
`530
`
`540 _
`
`540
`
`550 _
`
`550
`
`560
`
`560
`
`Learn new behaviors
`based on analysis of
`software
`
`behaviors based on analysis of software
`Learn
`new
`
`Fig. 5
`
`Fig . 5
`
`
`
`U.S. Patent
`lualud °S11
`
`Sep. 22 , 2020
`
`Sheet 6 of 12
`Z1 .19 9 WIN
`
`US 10,783,241 B2
`za trecn`ot sa
`
`610
`
`610
`
`Endpoint instrumentation
`is installed on device
`
`Endpoint
`instrumentation is installed on device
`
`620
`
`620
`
`data is queried remotely
`Device
`
`Device data is queried
`remotely
`
`Device-specific data
`is sent back to OS
`
`Device - specific
`data is sent
`back to OS
`
`630 v),
`
`630
`
`640
`
`640
`
`Device data is used to
`analyze potential
`vulnerabilities for testing
`
`potential vulnerabilities for
`testing
`data is used to analyze
`
`Device
`
`Fig. 6
`
`Fig . 6
`
`
`
`U.S. Patent
`lualud °S11
`
`Sep. 22 , 2020
`
`Sheet 7 of 12
`ZI JO L WIN
`
`US 10,783,241 B2
`za trecn`ot sa
`
`710
`kek
`Vulnerabilities and exploits
`located in executed software
`are relayed to scoring engine
`
`exploits located in executed
`Vulnerabilities and
`software are
`relayed to scoring
`engine
`
`710
`
`720
`
`720
`
`Vulnerabilities and exploits are
`scored based on perceived
`criticality
`
`exploits are scored
`Vulnerabilities and
`based on perceived criticality
`
`730
`
`730
`
`Most critical vulnerabilities and
`exploits are schedule to be
`patched first
`
`schedule to be patched
`first
`and exploits
`are
`Most
`critical
`vulnerabilities
`
`Fig. 7
`
`Fig . 7
`
`
`
`U.S. Patent
`lualud °S11
`
`Sep. 22 , 2020
`
`Sheet 8 of 12
`Z1 JO 8 WIN
`
`US 10,783,241 B2
`za trecn`ot sa
`
`810
`
`810
`
`enhancements on vulnerable
`patching and security
`software
`Business OS attempts various
`
`Business OS attempts
`various patching and
`security enhancements on
`vulnerable software
`
`Failure
`
`Failure
`
`Success
`
`Success
`
`830 sk,"
`
`830
`
`OS learns to try other
`measures first in
`similar future instances
`
`first in similar
`other measures
`future
`instances
`OS learns to try
`
`820
`
`820
`
`OS uses reinforcement
`learning to test similar
`measures in the future
`
`similar measures in the
`future
`reinforcement learning to test
`OS uses
`
`840
`Iv\
`Patch or enhancement is
`sent to endpoint for
`deployment
`
`Patch or enhancement is sent to endpoint for deployment
`
`840
`
`Fig. 8
`
`Fig . 8
`
`
`
`U.S. Patent
`lualud °S11
`
`Sep. 22 , 2020
`
`Sheet 9 of 12
`Z1 JO 6 WIN
`
`US 10,783,241 B2
`za trecn`ot sa
`
`Interfaces
`
`Interfaces
`
`15 --I'
`
`15
`
`Remote
`Storage
`16
`
`Remote Storage h 91
`
`14
`
`14 r
`
`2
`
`13
`
`1413
`212
`Processor ( s )
`
`Processor(s)
`
`Fig. 9
`
`Fig . 9
`
`1 0
`
`10
`
`Local
`Storage
`
`Local Storage
`
`11
`
`114
`
`
`
`U.S. Patent
`lualud °S11
`
`Sep. 22 , 2020
`
`Sheet 10 of 12
`Z1 JO 01 WIN
`
`US 10,783,241 B2
`za trecn`ot sa
`
`8
`
`28
`
`Inputs
`
`Inputs
`
`Outputs
`
`27
`
`127 ? Memory
`ha 26
`125
`Outputs
`Storage
`
`Storage
`
`Memory
`
`Clients
`
`Clients
`
`24
`
`24
`
`Services
`
`Services
`
`23
`
`OSes
`
`OSes
`
`22
`
`21 NS\
`
`21 Processors
`
`Processors
`
`220
`
`20
`
`Fig. 10
`
`Fig . 10
`
`
`
`U.S. Patent
`wawa °S11
`
`Sep. 22 , 2020
`
`ZI Jo II WIN
`Sheet 11 of 12
`
`za trecn`ot sa
`US 10,783,241 B2
`
`Servers
`
`Servers
`
`32
`
`..200000006.
`
`Databases
`
`Databases
`
`1
`
`31
`
`Network ( s )
`
`Network.(s)
`
`Et Svcs
`
`Ext
`Svcs
`
`37
`
`37
`
`Clients
`
`Clients
`
`33
`
`Sec.
`
`Sec .
`
`36
`
`36
`
`30
`
`30
`
`Fig. 11
`
`Fig . 11
`
`34
`
`34
`
`35
`
`35 Config
`
`Con fig
`
`
`
`U.S. Patent
`lualud °S11
`
`Sep. 22 , 2020
`
`Sheet 12 of 12
`Z1 JO Z1 WIN
`
`US 10,783,241 B2
`za trecn`ot sa
`
`AC
`
`PSU
`
`46
`
`46
`
`45
`
`45
`
`42
`
`44
`
`NVM
`S ? IVM
`Mem
`
`•••••••••••••••••••••••••••••••••••••••••••••••••••
`
`Mem NVM
`
`48
`
`Yre
`
`51
`
`51
`arch
`48
`
`s ?
`
`/1,3
`
`43
`
`40
`
`40
`
`CPU
`
`CPU
`
`41
`
`54
`
`( 54
`
`NIC
`
`NIC
`
`11O
`
`I / O
`
`47
`
`47 Display
`
`Display
`
`53
`
`53
`HDD 152
`
`II DD
`
`52
`
`50
`
`5
`49
`
`(2
`49
`
`Fig. 12
`
`Fig . 12
`
`
`
`US 10,783,241 B2
`US 10,783,241 B2
`
`Field of the Art
`Field of the Art
`
`1
`1
`SYSTEM AND METHODS FOR SANDBOXED
`SYSTEM AND METHODS FOR SANDBOXED
`MALWARE ANALYSIS AND AUTOMATED
`MALWARE ANALYSIS AND AUTOMATED
`PATCH DEVELOPMENT , DEPLOYMENT
`PATCH DEVELOPMENT, DEPLOYMENT
`AND VALIDATION
`AND VALIDATION
`
`2
`2
`FOR SOFTWARE DEVELOPMENT ” , filed on Nov. 27 ,
`FOR SOFTWARE DEVELOPMENT", filed on Nov. 27,
`2017 , which is a continuation - in - part of U.S. patent appli
`2017, which is a continuation-in-part of U.S. patent appli-
`cation Ser . No. 15 / 788,718 titled “ DATA MONETIZATION
`cation Ser. No. 15/788,718 titled "DATA MONETIZATION
`AND EXCHANGE PLATFORM ” , filed on Oct. 19 , 2017 ,
`AND EXCHANGE PLATFORM", filed on Oct. 19, 2017,
`5 which claims benefit of , and priority to , U.S. provisional
`5 which claims benefit of, and priority to, U.S. provisional
`CROSS - REFERENCE TO RELATED
`patent application 62 / 568,307 titled “ DATA MONETIZA
`CROSS-REFERENCE TO RELATED
`patent application 62/568,307 titled "DATA MONETIZA-
`APPLICATIONS
`APPLICATIONS
`TION AND EXCHANGE PLATFORM ” , filed on Oct. 4 ,
`TION AND EXCHANGE PLATFORM", filed on Oct. 4,
`2017 , and is also a continuation - in - part of U.S. patent
`2017, and is also a continuation-in-part of U.S. patent
`This application is a continuation - in - part of Ser . No.
`application Ser . No. 15 / 788,002 titled “ ALGORITHM
`This application is a continuation-in-part of Ser. No.
`application Ser. No. 15/788,002 titled "ALGORITHM
`titled “ SYSTEM AND METHOD FOR 10 MONETIZATION AND EXCHANGE PLATFORM ” filed
`15 / 818,733 ,
`15/818,733,
`titled "SYSTEM AND METHOD FOR
`10 MONETIZATION AND EXCHANGE PLATFORM" filed
`CYBERSECURITY ANALYSIS AND SCORE GENERA on Oct. 19 , 2017 , which claims priority to U.S. provisional
`CYBERSECURITY ANALYSIS AND SCORE GENERA-
`on Oct. 19, 2017, which claims priority to U.S. provisional
`TION FOR INSURANCE PURPOSES ” , filed on Nov. 20 ,
`patent application 62 / 568,305 titled “ ALGORITHM MON
`TION FOR INSURANCE PURPOSES", filed on Nov. 20,
`patent application 62/568,305 titled "ALGORITHM MON-
`2017 , which is a continuation - in - part of Ser . No. 15/725 ,
`ETIZATION AND EXCHANGE PLATFORM ” , filed on
`2017, which is a continuation-in-part of Ser. No. 15/725,
`ETIZATION AND EXCHANGE PLATFORM", filed on
`274 , titled “ APPLICATION OF ADVANCED CYBERSE
`274, titled "APPLICATION OF ADVANCED CYBERSE-
`Oct. 4 , 2017 , and is also a continuation - in - part of U.S. patent
`Oct. 4, 2017, and is also a continuation-in-part of U.S. patent
`CURITY THREAT MITIGATION TO ROGUE DEVICES , 15 application Ser . No. 15 / 787,601 , titled “ METHOD AND
`CURITY THREAT MITIGATION TO ROGUE DEVICES,
`15 application Ser. No. 15/787,601, titled "METHOD AND
`PRIVILEGE ESCALATION , AND RISK - BASED VUL
`APPARATUS FOR CROWDSOURCED DATA GATHER
`PRIVILEGE ESCALATION, AND RISK-BASED VUL-
`APPARATUS FOR CROWDSOURCED DATA GATHER-
`NERABILITY AND PATCH MANAGEMENT ” , filed on
`ING , EXTRACTION , AND COMPENSATION ” , filed on
`NERABILITY AND PATCH MANAGEMENT", filed on
`ING, EXTRACTION, AND COMPENSATION", filed on
`Oct. 4 , 2017 , which is a continuation - in - part of U.S. patent
`Oct. 18 , 2017 , which claims priority to U.S. provisional
`Oct. 4, 2017, which is a continuation-in-part of U.S. patent
`Oct. 18, 2017, which claims priority to U.S. provisional
`application Ser . No. 15 / 655,113 ,
`titled “ ADVANCED
`patent application 62 / 568,312 titled “ METHOD AND
`application Ser. No. 15/655,113, titled "ADVANCED
`patent application 62/568,312 titled "METHOD AND
`CYBERSECURITY THREAT MITIGATION USING 20 APPARATUS FOR CROWDSOURCED DATA GATHER
`CYBERSECURITY THREAT MITIGATION USING
`20 APPARATUS FOR CROWDSOURCED DATA GATHER-
`BEHAVIORAL AND DEEP ANALYTICS ” , filed on Jul . 20 ,
`BEHAVIORAL AND DEEP ANALYTICS", filed on Jul. 20,
`ING , EXTRACTION , AND COMPENSATION ” , filed on
`ING, EXTRACTION, AND COMPENSATION", filed on
`2017 , which is a continuation - in - part of U.S. patent appli
`Oct. 4 , 2017 , and is also a continuation - in - part of U.S. patent
`2017, which is a continuation-in-part of U.S. patent appli-
`Oct. 4, 2017, and is also a continuation-in-part of U.S. patent
`cation Ser . No. 15 / 616,427 , titled “ RAPID PREDICTIVE
`application Ser . No. 15 / 616,427 titled “ RAPID PREDIC
`cation Ser. No. 15/616,427, titled "RAPID PREDICTIVE
`application Ser. No. 15/616,427 titled "RAPID PREDIC-
`ANALYSIS OF VERY LARGE DATA SETS USING AN TIVE ANALYSIS OF VERY LARGE DATA SETS USING
`ANALYSIS OF VERY LARGE DATA SETS USING AN
`TIVE ANALYSIS OF VERY LARGE DATA SETS USING
`ACTOR - DRIVEN DISTRIBUTED COMPUTATIONAL 25 AN ACTOR - DRIVEN DISTRIBUTED COMPUTA
`ACTOR-DRIVEN DISTRIBUTED COMPUTATIONAL
`25 AN ACTOR-DRIVEN DISTRIBUTED COMPUTA-
`GRAPH ” , filed on Jun . 7 , 2017 , and is also a continuation
`GRAPH", filed on Jun. 7, 2017, and is also a continuation-
`TIONAL GRAPH ” , filed on Jun . 7 , 2017 , which is a
`TIONAL GRAPH", filed on Jun. 7, 2017, which is a
`in - part of U.S. patent application Ser . No. 15 / 237,625 , titled
`continuation - in - part of U.S. patent application Ser . No.
`in-part of U.S. patent application Ser. No. 15/237,625, titled
`continuation-in-part of U.S. patent application Ser. No.
`“ DETECTION MITIGATION AND REMEDIATION OF
`"DETECTION MITIGATION AND REMEDIATION OF
`14 / 925,974 , titled “ RAPID PREDICTIVE ANALYSIS OF
`14/925,974, titled "RAPID PREDICTIVE ANALYSIS OF
`CYBERATTACKS EMPLOYING AN ADVANCED
`CYBERATTACKS EMPLOYING AN ADVANCED
`VERY LARGE DATA SETS USING THE DISTRIBUTED
`VERY LARGE DATA SETS USING THE DISTRIBUTED
`30 COMPUTATIONAL GRAPH ” , filed on Oct. 28 , 2015 , the
`CYBER - DECISION PLATFORM ” , filed on Aug. 15 , 2016 ,
`CYBER-DECISION PLATFORM", filed on Aug. 15, 2016,
`30 COMPUTATIONAL GRAPH", filed on Oct. 28, 2015, the
`entire specification of each of which is incorporated herein
`which is a continuation - in - part of U.S. patent application
`which is a continuation-in-part of U.S. patent application
`entire specification of each of which is incorporated herein
`Ser . No. 15 / 206,195 , titled " SYSTEM FOR AUTOMATED by reference .
`Ser. No. 15/206,195, titled "SYSTEM FOR AUTOMATED
`by reference.
`CAPTURE AND ANALYSIS OF BUSINESS INFORMA
`CAPTURE AND ANALYSIS OF BUSINESS INFORMA-
`TION FOR RELIABLE BUSINESS VENTURE OUT
`BACKGROUND OF THE INVENTION
`TION FOR RELIABLE BUSINESS VENTURE OUT-
`BACKGROUND OF THE INVENTION
`COME PREDICTION ” , filed on Jul . 8 , 2016 , which is a 35
`COME PREDICTION", filed on Jul. 8, 2016, which is a 35
`continuation in - part of U.S. patent application Ser . No.
`continuation in-part of U.S. patent application Ser. No.
`15 / 186,453 , titled “ SYSTEM FOR AUTOMATED CAP
`15/186,453, titled "SYSTEM FOR AUTOMATED CAP-
`The disclosure relates to the field of computer manage
`TURE AND ANALYSIS OF BUSINESS INFORMATION
`TURE AND ANALYSIS OF BUSINESS INFORMATION
`The disclosure relates to the field of computer manage-
`FOR RELIABLE BUSINESS VENTURE OUTCOME ment , and more particularly to the field of cybersecurity and
`FOR RELIABLE BUSINESS VENTURE OUTCOME
`ment, and more particularly to the field of cybersecurity and
`PREDICTION ” , filed on Jun . 18 , 2016 , which is a continu- 40 threat analytics .
`PREDICTION", filed on Jun. 18, 2016, which is a continu-
`40 threat analytics.
`ation - in - part of U.S. patent application Ser . No. 15 / 166,158 ,
`ation-in-part of U.S. patent application Ser. No. 15/166,158,
`Discussion of the State of the Art
`titled “ SYSTEM FOR AUTOMATED CAPTURE AND
`titled "SYSTEM FOR AUTOMATED CAPTURE AND
`Discussion of the State of the Art
`ANALYSIS OF BUSINESS INFORMATION FOR SECU
`ANALYSIS OF BUSINESS INFORMATION FOR SECU-
`RITY AND CLIENT - FACING INFRASTRUCTURE
`On Aug. 4 , 2016 , United States government's DEFENSE
`RITY AND CLIENT-FACING
`INFRASTRUCTURE
`On Aug. 4, 2016, United States government's DEFENSE
`RELIABILITY ” , filed on May 26 , 2016 , which is a con- 45 ADVANCED RESEARCH PROJECTS AGENCY
`RELIABILITY", filed on May 26, 2016, which is a con-
`45 ADVANCED RESEARCH
`PROJECTS AGENCY
`tinuation - in - part of U.S. patent application Ser . No. 15/141 ,
`( DARPA ) TM hosted an event in 2016 called the Cyber Grand
`tinuation-in-part of U.S. patent application Ser. No. 15/141,
`(DARPA)TM hosted an event in 2016 called the Cyber Grand
`752 , titled " SYSTEM FOR FULLY INTEGRATED CAP
`Challenge , aimed at creating an automatic defense system
`752, titled "SYSTEM FOR FULLY INTEGRATED CAP-
`Challenge, aimed at creating an automatic defense system
`TURE , AND ANALYSIS OF BUSINESS INFORMATION
`for network defense and vulnerability detection and patch
`TURE, AND ANALYSIS OF BUSINESS INFORMATION
`for network defense and vulnerability detection and patch-
`RESULTING IN PREDICTIVE DECISION MAKING
`ing . During the event numerous teams and individuals
`RESULTING IN PREDICTIVE DECISION MAKING
`ing. During the event numerous teams and individuals
`AND SIMULATION ” , filed on Apr. 28 , 2016 , which is a 50 competed to develop a system which could automatically
`AND SIMULATION", filed on Apr. 28, 2016, which is a
`so competed to develop a system which could automatically
`continuation - in - part of U.S. patent application Ser . No.
`detect vulnerabilities and exploits in software systems ,
`continuation-in-part of U.S. patent application Ser. No.
`detect vulnerabilities and exploits in software systems,
`15 / 091,563 , titled “ SYSTEM FOR CAPTURE , ANALYSIS
`develop a patch , and deploy the patch within a finite amount
`15/091,563, titled "SYSTEM FOR CAPTURE, ANALYSIS
`develop a patch, and deploy the patch within a finite amount
`AND STORAGE OF TIME SERIES DATA FROM SEN
`of time , in an effort to produce a highly robust system to
`AND STORAGE OF TIME SERIES DATA FROM SEN-
`of time, in an effort to produce a highly robust system to
`SORS WITH HETEROGENEOUS REPORT INTERVAL
`defend software systems from a variety of possible exploits
`SORS WITH HETEROGENEOUS REPORT INTERVAL
`defend software systems from a variety of possible exploits
`PROFILES ” , filed on Apr. 5 , 2016 , which is a continuation- 55 and malicious attacks . The competition was partially suc
`55 and malicious attacks. The competition was partially suc-
`PROFILES", filed on Apr. 5, 2016, which is a continuation-
`in - part of U.S. patent application Ser . No. 14 / 986,536 , titled
`cessful , with the submitted systems from each team com
`in-part of U.S. patent application Ser. No. 14/986,536, titled
`cessful, with the submitted systems from each team com-
`“ DISTRIBUTED SYSTEM FOR LARGE VOLUME DEEP
`peting automatically in a capture - the - flag style competition ,
`"DISTRIBUTED SYSTEM FOR LARGE VOLUME DEEP
`peting automatically in a capture-the-flag style competition,
`WEB DATA EXTRACTION ” , filed on Dec. 31 , 2015 ,
`and the competition in its entirety demonstrated that fully
`WEB DATA EXTRACTION", filed on Dec. 31, 2015,
`and the competition in its entirety demonstrated that fully
`which is a continuation - in - part of U.S. patent application
`autonomous network defense and exploitation is possible .
`which is a continuation-in-part of U.S. patent application
`autonomous network defense and exploitation is possible.
`Ser . No. 14 / 925,974 , titled “ RAPID PREDICTIVE ANALY- 60 No team's submission completed the competition with
`Ser. No. 14/925,974, titled "RAPID PREDICTIVE ANALY-
`60 No team's submission completed the competition with
`SIS OF VERY LARGE DATA SETS USING THE DIS
`100 % success in identifying vulnerabilities and exploits , and
`SIS OF VERY LARGE DATA SETS USING THE DIS-
`100% success in identifying vulnerabilities and exploits, and
`TRIBUTED COMPUTATIONAL GRAPH ” , filed on Oct.
`as of yet no such system is deployed for large scale or
`TRIBUTED COMPUTATIONAL GRAPH", filed on Oct.
`as of yet no such system is deployed for large scale or
`28 , 2015 , the entire specifications of each of which are
`commercial applications in automated analysis and defense
`28, 2015, the entire specifications of each of which are
`commercial applications in automated analysis and defense
`incorporated herein by reference .
`of networks and network - connected devices . Malware of
`incorporated herein by reference.
`of networks and network-connected devices. Malware of
`This application is a continuation - in - part of U.S. patent 65 today is continually being advanced in the area of memory
`This application is a continuation-in-part of U.S. patent
`65 today is continually being advanced in the area of memory
`application Ser . No. 15 / 823,285 titled “ META - INDEXING ,
`scanning , to evade detection from current anti - virus and
`application Ser. No. 15/823,285 titled "META-INDEXING,
`scanning, to evade detection from current anti-virus and
`SEARCH , COMPLIANCE , AND TEST FRAMEWORK antimalware software , and continually advancing and evolv
`SEARCH, COMPLIANCE, AND TEST FRAMEWORK
`antimalware software, and continually advancing and evolv-
`
`
`
`US 10,783,241 B2
`US 10,783,241 B2
`
`5
`
`4
`3
`4
`3
`FIG . 4 is a system diagram illustrating connections
`ing network and system defense techniques are required in
`FIG. 4 is a system diagram illustrating connections
`ing network and system defense techniques are required in
`between important components for analyzing software and
`order to keep up with the pace of advancement of malware
`between important components for analyzing software and
`order to keep up with the pace of advancement of malware
`network - connected endpoints , according to a preferred
`both today and in the future . Even until this competition , no
`network-connected endpoints, according to a preferred
`both today and in the future. Even until this competition, no
`aspect .
`system existed even for research applications which could
`aspect.
`system existed even for research applications which could
`FIG . 5 is a method diagram illustrating important steps in
`reliably identify and patch vulnerabilities and exploits in 5
`FIG. 5 is a method diagram illustrating important steps in
`reliably identify and patch vulnerabilities and exploits in
`detecting and analyzing software exploits or vulnerabilities ,
`software systems and networks before malware took advan
`detecting and analyzing software exploits or vulnerabilities,
`software systems and networks before malware took advan-
`according to a preferred aspect of the invention .
`tage of said vu

Accessing this document will incur an additional charge of $.
After purchase, you can access this document again without charge.
Accept $ ChargeStill Working On It
This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.
Give it another minute or two to complete, and then try the refresh button.
A few More Minutes ... Still Working
It can take up to 5 minutes for us to download a document if the court servers are running slowly.
Thank you for your continued patience.

This document could not be displayed.
We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.
You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.
Set your membership
status to view this document.
With a Docket Alarm membership, you'll
get a whole lot more, including:
- Up-to-date information for this case.
- Email alerts whenever there is an update.
- Full text search for other cases.
- Get email alerts whenever a new case matches your search.

One Moment Please
The filing “” is large (MB) and is being downloaded.
Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!
If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document
We are unable to display this document, it may be under a court ordered seal.
If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.
Access Government Site