Sterling Reasor - Bellevue WA, US Jonathan Keller - Redmond WA, US Jason Joyce - Redmond WA, US Ahmed Hussain - Redmond WA, US Kanwaljit Marok - Seattle WA, US Nizan Manor - Seattle WA, US Santanu Chakraborty - Redmond WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 21/00
US Classification:
726 23
Abstract:
An arrangement for dynamically identifying and intercepting potential software threats before they execute on a computer system is provided in which a file system filter driver (called a “mini-filter”) interfaces with an anti-malware service to selectively generate an alert event and allow the threat to run, in addition to generating an alert event and suspending the threat. The decision to suspend the threat or allow it to run is made through application of a cascading logic hierarchy that includes respective policy-defined actions, user-defined actions, and signature-defined actions. The mini-filter generates the alert event to the anti-malware service whenever a file is opened, or modified and closed. The service uses an engine to scan the file to identify potential threats which are handled though application of the logic hierarchy which provides for configurations defined in a lower tier of the hierarchy to be overridden by those contained in a higher tier.
Michael Jarrett - Kirkland WA, US Vishal Kapoor - Seattle WA, US Charles Turner - Bothel WA, US Joseph Johnson - Seattle WA, US Jason J. Joyce - Redmond WA, US
Assignee:
MICROSOFT CORPORATION - Redmond WA
International Classification:
G06F 11/00
US Classification:
726 24
Abstract:
Methods, systems, and computer program products are provided for recovering from false positives of malware detection. Malware signatures that are defective may be causing false positives during software scanning for malware. Such defective malware signatures may be detected (e.g., by user feedback, etc.) and revoked. Computers that are using the malware signatures to detect malware may be notified of the revoked signatures, and may be enabled to re-scan content identified as containing malware using malware signatures that do not include the revoked malware signatures. As such, if the content is determined during the re-scan to not be infected, the content may be re-enabled for usage on the computer (e.g., may be restored from quarantine storage).
Malware Remediation System And Method For Modern Applications
Vishal Kapoor - Seattle WA, US Jason J. Joyce - Redmond WA, US Gregory W. Nichols - Bellevue WA, US Joshua W. Dunn - Maple Valley WA, US Michael S. Jarrett - Kirkland WA, US Adrian M. Marinescu - Sammamish WA, US Marc E. Seinfeld - Fort Lauderdale FL, US Axel Andrejs - Sammamish WA, US Jayaraman Kalyana Sundaram - Redmond WA, US
Assignee:
MICROSOFT CORPORATION - Redmond WA
International Classification:
G06F 21/00 G06F 15/16
US Classification:
726 24
Abstract:
A system is described for remediating a malicious modern application installed on an end user device. In an embodiment, the system includes an antimalware program executing on the end user device that can detect and attempt to remediate the malicious modern application, an operating system executing on the end user device that is configured to interact with the antimalware program for the purpose of facilitating the establishment of a connection between the end user device and an application support system in response to determining that the antimalware program has detected and attempted to remediate the malicious modern application, and the application support system that can perform remediation operations beyond those that can be performed by the antimalware program.
VISHAL KAPOOR - Seattle WA, US Jason Joyce - Redmond WA, US Gregory Nichols - Bellevue WA, US
Assignee:
Microsoft Corproation - Redmond WA
International Classification:
G06F 11/00
US Classification:
726 24
Abstract:
An anti-malware program monitors the behavior of a system after a system restore to determine the likelihood of a hidden infection of malicious code still existing after the system restore. The anti-malware program observes the dynamic behavior of the system by monitoring conditions that are likely to signify the possibility of an infection thereby necessitating the need to initiate anti-malware detection. The anti-malware program may observe the restoration history, system settings, malware infection history, to determine the likelihood of an existing hidden infection after a system restore.
Computer System For Automated Assessment At Scale Of Topic-Specific Social Media Impact
- Redmond WA, US Hung-Chih YANG - Bellevue WA, US Xiong ZHANG - Shanghai, CN Graham A. WHEELER - Redmond WA, US Jason J. JOYCE - Redmond WA, US David M. MOORE - Snohomish WA, US Bhalchandra PANDIT - Redmond WA, US
A system includes a processing device configured to execute instructions including accessing messages sent by a first user and other users. The instructions include identifying a first subset of messages that were sent by the first user and identifying a second subset of messages that are related to a first topic and were sent by the first user. The instructions include determining an authority value based on counts of the first and second subsets. The instructions include identifying a third subset of messages that resulted from the other users forwarding the second subset. The instructions include determining a power value based on a count of users that sent the third subset and computing an impact score for the first user on the first topic based on the authority and power values. The instructions include, based on the impact score, contacting the first user in relation to the first topic.
- Redmond WA, US Hung-Chih YANG - Bellevue WA, US Xiong ZHANG - Shanghai, CN Graham A. WHEELER - Redmond WA, US Jason J. JOYCE - Redmond WA, US David M. MOORE - Snohomish WA, US Bhalchandra PANDIT - Redmond WA, US
A system for identifying influential users of a social network platform. The system may compute a score for each of multiple users. Such a score may be topic-based, leading to a more accurate identification of influential users. Such a topic-based score may indicate authority and/or impact of a user with respect to a topic. The impact may be computed based on authority combined with other factors, such as power of the user. The authority score may be simply computed, in whole or in part, directly from a tweet log without, for example creating a retweet graph. As a result, the scores may be computed, using MapReduce primitives or other constructs that allow the computations to be distributed across multiple parallel processors. Such scores may be used to select users based on impact as part of social trend analysis, marketing or other functions.
- Redmond WA, US Hung-Chih Yang - Bellevue WA, US Xiong Zhang - Shanghai, CN Graham A. Wheeler - Redmond WA, US Jason J. Joyce - Redmond WA, US David M. Moore - Snohomish WA, US Bhalchandra Pandit - Redmond WA, US
Assignee:
MICROSOFT CORPORATION - Redmond WA
International Classification:
H04L 29/08
US Classification:
715753, 709204, 709206
Abstract:
A system for identifying influential users of a social network platform. The system may compute a score for each of multiple users. Such a score may be topic-based, leading to a more accurate identification of influential users. Such a topic-based score may indicate authority and/or impact of a user with respect to a topic. The impact may be computed based on authority combined with other factors, such as power of the user. The authority score may be simply computed, in whole or in part, directly from a tweet log without, for example creating a retweet graph. As a result, the scores may be computed, using MapReduce primitives or other constructs that allow the computations to be distributed across multiple parallel processors. Such scores may be used to select users based on impact as part of social trend analysis, marketing or other functions.
the fight of their political lives this year werent scheduled to speak: Cory Gardner (CO), Martha McSally (AZ), Steve Daines (MT), Thom Tillis (NC), and David Perdue (GA). And rather than hearing from Maine Sen. Susan Collins at the convention, viewers got a lobsterman from that state, Jason Joyce.