scispace - formally typeset
A

Ashar Aziz

Researcher at FireEye, Inc.

Publications -  51
Citations -  4607

Ashar Aziz is an academic researcher from FireEye, Inc.. The author has contributed to research in topics: Malware & Virtual machine. The author has an hindex of 32, co-authored 51 publications receiving 4607 citations.

Papers
More filters
Patent

Electronic message analysis for malware detection

TL;DR: In this paper, an electronic message is analyzed for malware contained in the message and the analysis may include replaying the suspicious URL in a virtual environment which simulates the intended computing device to receive the electronic message, if the replayed URL is determined to be malicious, the malicious URL is added to a black list which is updated throughout the computer system.
Patent

Dynamic signature creation and enforcement

TL;DR: In this article, a dynamic signature creation and enforcement system can comprise a tap configured to copy network data from a communication network, and a controller coupled to the tap, which is configured to analyze the copy of the network data with a heuristic to determine if the data is suspicious, flag the data as suspicious based on the heuristic determination.
Patent

Virtual machine with dynamic data flow analysis

TL;DR: In this paper, the authors propose a suspicious activity capture system, which consists of a tap configured to copy network data from a communication network, and a controller coupled to the tap.
Patent

Computer Worm Defense System and Method

TL;DR: In this paper, a computer worm defense system comprises multiple containment systems tied together by a management system, each containment system is deployed on a separate communication network and contains a worm sensor and a blocking system.
Patent

Systems and methods for detecting encrypted bot command and control communication channels

TL;DR: In this paper, the presence of a communication channel between a first network device and a second network device is monitored and active and inactive periods of the network device are detected and a reverse channel is determined based on the detection.