Joseph Chen - Los Angeles CA, US Jamie Jooyoung Park - Los Angeles CA, US
Assignee:
Symantec Corporation - Mountain View CA
International Classification:
G06F 11/00
US Classification:
726 23
Abstract:
To evade heuristic detection, malware is often designed to trick users into installing the malware by being packaged in a standard installer known to the user's computer for typically installing legitimate software. To prevent removal of the malware, the malware modifies or removes its uninstaller. A security module manages this type of evasion technique by monitoring and detecting installations performed on a computer. The module detects attempts to remove or modify the uninstaller for the application to render the uninstaller incapable of uninstalling the application. The module can intercept and block such attempts, and then analyze the application for malicious code. Where the application is determined to be malware, the module prevents malicious activity. The module can also use the malware's own uninstaller to uninstall the malware from the computer.
Heuristic Detection Malicious Code Blacklist Updating And Protection System And Method
Christopher Peterson - Culver City CA, US Joseph H. Chen - Los Angeles CA, US
Assignee:
Symantec Corporation - Mountain View CA
International Classification:
H04L 29/06
US Classification:
726 24, 726 23, 726 25, 713187, 713188
Abstract:
Unknown malicious code is heuristically detected on a host computer system. A virus signature for the malicious code is created locally on the host computer system. A blacklist on the host computer system is updated with the virus signature for the heuristically detected malicious code. Accordingly, the blacklist is updated with the virus signature of the heuristically detected malicious code without distribution of the virus signature to the general public. Further, the host computer system is scanned for other instances of the heuristically detected malicious code using the created virus signature. Accordingly, file based detection and remediation of the malicious code is achieved without requiring execution of the malicious code for detection and the associated risks.
Systems And Methods For Using Property Tables To Perform Non-Iterative Malware Scans
Joseph Chen - Los Angeles CA, US Allen Hair - Los Angeles CA, US
Assignee:
Symantec Corporation - Mountain View CA
International Classification:
G06F 21/00
US Classification:
726 24
Abstract:
A computer-implemented method for using property tables to perform non-iterative malware scans may include (1) obtaining at least one malware signature from a security software provider that identifies at least one property value for an item of malware, (2) accessing a property table for a computing device that identifies property values shared by one or more application packages installed on the computing device and, for each property value, each application package that shares the property value in question, and (3) determining, by comparing each property value identified in the malware signature with the property table, whether any of the application packages match the malware signature without having to iterate through the individual property values of each application package. Various other methods, systems, and computer-readable media are also disclosed.
Robert Conrad - Culver City CA, US Christopher Peterson - Culver City CA, US Joseph H. Chen - Los Angeles CA, US
Assignee:
Symantec Corporation - Mountain View CA
International Classification:
G06F 21/00
US Classification:
726 23, 726 22
Abstract:
A submission filtering component filters malware related content received for analysis. The submission filtering component determines an analysis priority rating for each source from which malware related content is received. An analysis priority ratings is based on various factors indicative of how likely the source is to transmit malware related content that is important to analyze. The malware filtering component transforms the received stream of malware related content into a subset to be analyzed, based on the analysis priority ratings associated with sources from which malware related content is received. A malware analysis component analyzes the subset of malware related content.
Using File Prevalence To Inform Aggressiveness Of Behavioral Heuristics
The prevalence rate of a file to be subject to behavior based heuristics analysis is determined, and the aggressiveness level to use in the analysis is adjusted, responsive to the prevalence rate. The aggressiveness is set to higher levels for lower prevalence files and to lower levels for higher prevalence files. Behavior based heuristics analysis is applied to the file, using the set aggressiveness level. In addition to setting the aggressiveness level, the heuristic analysis can also comprise dynamically weighing lower prevalence files as being more likely to be malicious and higher prevalence files as being less likely. Based on the applied behavior based heuristics analysis, it is determined whether or not the file comprises malware. If it is determined that the file comprises malware, appropriate steps can be taken, such as blocking, deleting, quarantining and/or disinfecting the file.
Joseph H. Chen - Los Angeles CA, US Christopher Peterson - Culver City CA, US Robert Conrad - Culver City CA, US
Assignee:
Symantec Corporation - Mountain View CA
International Classification:
G06F 11/00 G06F 12/14 G06F 12/16 G08B 23/00
US Classification:
726 22, 726 23
Abstract:
A malware analysis component receives information concerning malware infections on a large plurality of client computers, as detected by an anti-malware product or submitted directly by users. The malware analysis component analyzes this wide array of information, and identifies suspicious malware detection and submission activity associated with specific sources. Where identified suspicious patterns of malware detection and submission activity associated with a specific source meet a given threshold over time, the malware analysis component determines that the source is an originator of malware.
Proactively Analyzing Binary Files From Suspicious Sources
Christopher Peterson - Culver City CA, US Robert Conrad - Culver City CA, US Joseph H. Chen - Los Angeles CA, US
Assignee:
Symantec Corporation - Mountain View CA
International Classification:
H04L 29/06
US Classification:
726 24, 726 22, 726 23
Abstract:
A malware source analysis component determines which sources of malware are sufficiently suspicious such that all binary files located thereon should be analyzed. In order to makes such determinations, the malware source analysis component receives information concerning malware infections from a plurality of sources. The malware source analysis component analyzes the received information, and determines suspiciousness levels associated with specific sources. Responsive to identifying a given threshold suspiciousness level associated with a source, the malware source analysis component adjudicates that source to be suspicious. Where a source is adjudicated to be suspicious, the malware source analysis component submits submission instructions to that source, directing it to identify binary files thereon and submit them to be analyzed. The malware source analysis component receives binary files from suspicious sources according to the submission instructions, and analyzes the received binary files.
Joseph Chen - Los Angeles CA, US Adam Glick - Culver City CA, US Jeffrey Wilhelm - Venice CA, US
Assignee:
Symantec Corporation - Mountain View CA
International Classification:
H04L 29/06 G06F 15/16 G06F 11/30
US Classification:
726 22, 709227
Abstract:
A method for detecting malware may include 1) receiving a request to determine whether a connection from a client device to a server is being blocked, 2) attempting to connect to the server from a kernel mode of the client device, 3) determining that the client device successfully connected to the server from the kernel mode, 4) attempting to connect to the server from a user mode of the client device, 5) determining that the client device did not successfully connect to the server from the user mode, 6) determining, based on the client device successfully connecting to the server from the kernel mode and failing to connect to the server from the user mode, that malware is blocking the connection from the client device to the server, and 7) in response to determining that the malware is blocking the connection, performing at least one security action.
Wikipedia References
Joseph Chen
Medicine Doctors
Dr. Joseph Chen, Orange CA - MD (Doctor of Medicine)
Miramar Eye Specialists Medical Group 751 E Daily Dr STE 110, Camarillo, CA 93010 (805)9878705 (phone), (805)9877765 (fax)
Miramar Eye Specialists Medical Group 3085 Loma Vis Rd, Ventura, CA 93003 (805)6483085 (phone), (805)6487027 (fax)
Miramar Eye Specialists Medical Group 1901 Solar Dr STE 155, Oxnard, CA 93036 (805)2780057 (phone), (805)2789925 (fax)
Education:
Medical School Baylor College of Medicine Graduated: 2009
Procedures:
Destruction of Lesion of Retina and Choroid Ophthalmological Exam
Conditions:
Cataract Glaucoma
Languages:
English Spanish
Description:
Dr. Chen graduated from the Baylor College of Medicine in 2009. He works in Ventura, CA and 2 other locations and specializes in Ophthalmology. Dr. Chen is affiliated with Community Memorial Hospital and Ventura County Medical Center.
Kaiser Permanente Medical GroupKaiser Permanente Vallejo Medical Center Gastroenterology 975 Sereno Dr, Vallejo, CA 94589 (707)6513264 (phone), (707)6512783 (fax)
Coast Guard Air Station Clinic 5342 Dudley Blvd, McClellan, CA 95652 (916)5617568 (phone), (916)5617566 (fax)
Education:
Medical School Inst of Med I, Yangon, Myanmar Graduated: 1982
Dr. Chen graduated from the Inst of Med I, Yangon, Myanmar in 1982. She works in Vallejo, CA and 1 other location and specializes in Gastroenterology. Dr. Chen is affiliated with Kaiser Permanente Vallejo Medical Center.
University Of Iowa Orthopaedics & Rehabilitation 200 Hawkins Dr STE 01067 PAPA JOHN PAVILION, Iowa City, IA 52242 (319)3562466 (phone), (319)3538968 (fax)
Education:
Medical School Brown University Alpert Medical School Graduated: 1996
Procedures:
Neurological Testing Physical Medicine and Rehabilitation, Tests and Measurements Physical Therapy Physical Therapy Evaluation
Languages:
English Spanish
Description:
Dr. Chen graduated from the Brown University Alpert Medical School in 1996. He works in Iowa City, IA and specializes in Physical Medicine & Rehabilitation. Dr. Chen is affiliated with University Of Iowa Hospitals & Clinics.
Smith Chen Inc 11455 Fallbrook Dr STE 302, Houston, TX 77065 (281)8901158 (phone), (281)8900710 (fax)
Conditions:
Tempromandibular Joint Disorders (TMJ)
Languages:
Chinese English French Spanish
Description:
Dr. Chen works in Houston, TX and specializes in Oral & Maxillofacial Surgery. Dr. Chen is affiliated with Baylor St Lukes Medical Center and Houston Methodist Hospital.
Sep 2002 to 2000 Associate ManagerCenter for Immunization Research (CIR), Johns Hopkins Baltimore, MD Sep 2013 to Aug 2014 Laboratory TechnicianB. Braun Medical Inc. Irvine, CA Sep 2011 to Jul 2012 Microbiology Quality Control Analyst IIIrvine Eye Physicians & Surgeons
Sep 2010 to Mar 2011 Ophthalmic TechnicianWestminster House Berkeley, CA Jun 2007 to Sep 2007 Summer Resident Assistant
Education:
Johns Hopkins School of Public Health 2012 to 2013 MHS in Microbiology & ImmunologyUniversity of California, Berkeley Berkeley, CA Aug 2006 to Aug 2010 BA in Integrative Biology
Skills:
Research<br/>Management Experience<br/>Communication<b... Management<br/>Testing<br/>Fir... Aid Certified<br/>Microsoft Office<br/>Creative Problem Solving<br/>Six Sigma<br/>Calibration<br/>Writ... Development<br/>Customer Service<br/>Computer Skills<br/>Database Management<br/>Marketing<br/>N... Management
A U.S. Navy helicopter that was flying by spotted the driver, Joseph Chen, 45, of Greenville, N.C., on top of the vehicle's cab and hoisted him aboard about 5 minutes later, according toMike Maus, spokesman for Naval Air Force Atlantic. Chen died as the helicopter was flying him to a hospital.
Date: Feb 10, 2017
Category: U.S.
Source: Google
CBBT Police say wind was not a factor in deadly tractor trailer accident
Chief Edward Spencer says the truck went over the side of the CBBT after trying to pass another tractor trailer. Chief Spencer says Joseph Chen was in the right lane and attempting to pass a tractor trailer in front of him by driving into the left lane. Once in the left lane, Chen's truck rode up on
Date: Feb 10, 2017
Category: U.S.
Source: Google
Wife: Driver who went over bridge was ' an awesome husband'
Forty-seven-year-old Joseph Chen of Greenville, North Carolina, died Thursday, shortly after he was plucked from the frigid water by a U.S. Navy helicopter crew. After the truck fell into the bay amid strong winds, Chen was briefly seen standing on top of the trailer.
Date: Feb 10, 2017
Category: U.S.
Source: Google
Man Drives Truck off Bridge; Dies After Helicopter Rescue
The truck driver died on the way to a hospital in Norfolk, said Thomas Anderson, deputy director of the Virginia-based Chesapeake Bay Bridge and Tunnel District. Anderson identified the driver as Joseph Chen, 47, of Greenville, North Carolina.
Date: Feb 09, 2017
Category: U.S.
Source: Google
Kenya is the latest battleground for China's supremacy over Taiwan
According to Joseph Chen, from Taiwans office in South Africa, the Chinese diplomat told him he had no authority to speak to the accused because Kenya does not recognize Taiwan and there is no Taiwanese consulate in Kenya.
Date: Apr 12, 2016
Category: World
Source: Google
Fundrise Raises $31+ Million, Led by Renren Inc., Silverstein Properties, and the ...
Joseph Chen, Chairman and CEO of Renren Inc., commented, We have seen crowdfunding sweep through large verticals of consumer finance, including student loans and credit card debt. We believe that the real estate market is the newe
"We have to have great virtual reality content," said senior product manager Joseph Chen. "That's why we're putting such emphasis on game developers...We think new games will evolve out of this. It's not just going to be 'go there/ kill this.'"
Date: Apr 02, 2013
Category: Sci/Tech
Source: Google
Microsoft Patch Tuesday Swats 23 Security Bugs, Including Duqu Exploit
The .NET vulnerabilities are also prominent in this months patches, said Joseph Chen, engineering director, security technology and response, at Symantec. Exploits for this vulnerability are likely to be hosted as drive-by downloads on maliciously created or otherwise compromised Websites. So, a
Date: May 08, 2012
Category: Sci/Tech
Source: Google
Googleplus
Joseph Chen
Lived:
Los Alamitos, CA Taipei, Taiwan San Francisco
Work:
Health Care Agency - Physician (1993) UCSF - Physician (1986-1989) UCLA - Physician (1983-1986) National Cheng Kung University - Faculty physician (1989-1993)
Education:
Harvard - MPH, National Taiwan University - Medicine, Chien-Guo High School, Taipei, Taiwan, Taiwan University, Harvard University, UCLA, UCSF
Joseph Chen
Lived:
Kaohsiung Hsinchu Taipei Buffalo, NY Suzhou
Work:
Wah Hong Industrial Corp. - Investor Relations (2011) STL Technology - IA Manager (2010-2011) Mega Securities Co., Ltd. - Deputy Manager (2003-2010)
Education:
NCTU, SUNY-Buffalo
Joseph Chen
Education:
University of California, Los Angeles - Communication Studies, University of California, San Diego - Communication
Bragging Rights:
Ate an entire large pizza by myself
Joseph Chen
Education:
Chinese University of Hong Kong - EMBA
Joseph Chen
Work:
IGS
Education:
National Chiao Tung University - Mechanical Engineering
Joseph Chen
Education:
National Tsing Hua University, National Central University - Computer Science
Tagline:
A castle in the air
Joseph Chen
Joseph Chen
Work:
Electroline Equipment Inc. - Director of Business Development (2010)
Youtube
CEO Spotlight: Joseph Chen, CEO of Renren
05/04/11 Renren Chairman and CEO, Joseph Chen, discusses the company's...
Category:
News & Politics
Uploaded:
29 Jun, 2011
Duration:
3m 11s
Joe Chen Qiao En with Ethan Ruan Jing Tian an...
Joe Chen Qiao En with Ethan Ruan and other casts of Fated to Love You ...
Category:
Music
Uploaded:
07 Apr, 2009
Duration:
3m 36s
Just a Dream Cover/Remix (Nelly)- Joseph Vinc...
Here's the link to purchase this song on Itunes: bit.ly Check out this...
Category:
Music
Uploaded:
04 Sep, 2010
Duration:
3m 25s
ariel lin Y joe chen (love or bread)
mmmm mi primer video jajaja espero ke les guste mmm es el primero de m...
Category:
Comedy
Uploaded:
20 Jan, 2009
Duration:
4m 40s
China 2.0: RenRen CEO Chen's Opening Keynote
Joseph Chen (MBA '99), founder and chief executive of Renren Inc. deli...
Category:
Education
Uploaded:
07 Oct, 2011
Duration:
42m 15s
Waterloo Festival for Animated Cinema- WFAC 2...
This my thank you to Joseph Chen and all of the guys who were at the W...