Inteum Company
Links
seedsprint
Visible Legacy
RSS
News & Resources
Inteum Company News
Inteum Library
Subscribe
Search Results - kevin+butler
3
Results
Sort By:
Published Date
Updated Date
Title
ID
Descending
Ascending
Binary Analysis of USB Device Firmware to Detect Malicious Activity
Uses Domain Knowledge of USB Protocol to Validate Device Firmware Against Its Expected FunctionalityThis USB-specific firmware analysis framework combines symbolic execution and static analysis to model USB controller firmware binaries and characterize a device’s potential for malicious behavior. The USB protocol is extremely versatile, open,...
Published: 3/23/2023
|
Inventor(s):
Kevin Butler
,
Tuba Yavuz
,
Grant Hernandez
,
Jing Tian
,
Farhaan Fowze
Keywords(s):
binary analysis
,
firmware
,
symbolic execution
Category(s):
Technology Classifications > Engineering > Computer Science
Ransomware Protection through Data Transformation Monitoring
Anti-Malware System Indicator Automatically Detects Malware Based on User Data Changes This anti-ransomware system indicator monitors an end user?s data to automatically detect malware based on changes to that data. Data breaches occur when sensitive, protected, or confidential data is copied, transmitted, viewed, stolen, or otherwise used by an unauthorized...
Published: 6/27/2021
|
Inventor(s):
Walter Scaife
,
Patrick Traynor
,
Henry Carter
,
Kevin Butler
Keywords(s):
intrusion detection
,
Malware Blocker
,
Malware Intrusion Detection
Category(s):
Technology Classifications > Software > Others
Mobile Phone Security System
Detects SS7 Network Attacks Through Phone Conversations and Alerts Callers in Real TimeThis mobile phone security system detects Signaling System 7 (SS7) redirection attacks during phone calls. SS7 is a global network that links together mobile phones, but unfortunately, hackers can abuse necessary functions of SS7 to reroute phone calls, track locations...
Published: 3/10/2022
|
Inventor(s):
Patrick Traynor
,
Hadi Abdullah
,
Jasmine Bowers
,
Kevin Butler
,
Christian Peeters
,
Bradley Reaves
,
Walter Scaife
Keywords(s):
Security
,
Security Applications
,
SS7
,
telephony
Category(s):
Technology Classifications > Engineering > Computer Science