“Rahul is a great leader, with strong business knowledge and great technologist. Always ready to roll up his sleeves and take charge to lead the way in finding the best solution to the new challenges. It was a pleasure working with him.”
About
Activity
-
Google says it recently fixed an authentication weakness that allowed crooks to circumvent email verification needed to create a Google Workspace…
Google says it recently fixed an authentication weakness that allowed crooks to circumvent email verification needed to create a Google Workspace…
Liked by Rahul Kashyap
-
Protect secrets with essentially a 26 bit key and pay the price. “The repository included the private portion of the platform key in encrypted form.…
Protect secrets with essentially a 26 bit key and pay the price. “The repository included the private portion of the platform key in encrypted form.…
Liked by Rahul Kashyap
-
Eleven years at Carbon Black has come to an end for me. In November 2012 I joined a motley collection of eight, scattered over the US, with barely…
Eleven years at Carbon Black has come to an end for me. In November 2012 I joined a motley collection of eight, scattered over the US, with barely…
Liked by Rahul Kashyap
Experience & Education
Patents
-
Transferring control of potentially malicious bit sets to secure micro-virtual machine
Issued US US10095530B1
-
Micro-virtual machine forensics and detection
Issued US US 14/981,514
The execution of a process within a VM may be monitored, and when a trigger event occurs, additional monitoring is initiated, including storing behavior data describing the real-time events taking place inside the VM. This behavior data may then be compared to information about the expected behavior of that type of process in order to determine whether malware has compromised the VM.
Other inventorsSee patent -
Securing file trust with file format conversions
Issued US US 14/194,747
Approaches for ensuring a digital file does not contain malicious code. A digital file in an original format may or may not contain malicious code. An intermediate copy of the digital file in an intermediate format is created from the digital file in the original format. The intermediate format preserves a visual or audio presentation of the digital file without supporting metadata or file format data structures of the original format. A sterilized copy of the digital file is created from the…
Approaches for ensuring a digital file does not contain malicious code. A digital file in an original format may or may not contain malicious code. An intermediate copy of the digital file in an intermediate format is created from the digital file in the original format. The intermediate format preserves a visual or audio presentation of the digital file without supporting metadata or file format data structures of the original format. A sterilized copy of the digital file is created from the intermediate copy. The sterilized copy is in the original format. The sterilized copy comprises a digital signature indicating that the sterilized copy has been converted from the intermediate format to the original format. Advantageously, the sterilized copy is guaranteed to not possess any malicious code.
Other inventorsSee patent -
Automatic initiation of execution analysis
Issued US US 15/133,077
Approaches for transferring control to a bit set. Execution of a bit set upon a host operating system is monitored. A determination is made that the execution of the bit set exhibits a suspicious characteristic. In response, the execution of the bit set on the host operating system is ceased. Then, the bit set is copied into an isolated environment and control to the bit set is transferred within the isolated environment. Thereafter, execution analysis upon the bit set is initiated in the…
Approaches for transferring control to a bit set. Execution of a bit set upon a host operating system is monitored. A determination is made that the execution of the bit set exhibits a suspicious characteristic. In response, the execution of the bit set on the host operating system is ceased. Then, the bit set is copied into an isolated environment and control to the bit set is transferred within the isolated environment. Thereafter, execution analysis upon the bit set is initiated in the isolated environment. The isolated environment may, but need not, reside on a different physical device than upon which executes the host operating system.
-
Centralized storage and management of malware manifests
Issued US US 13/932,465
Updating a central repository with information about malware resident upon a computer system. Upon detecting the malware executing in a virtual machine, a software module, without manual instruction, sends malware manifest data to a central repository over a network. The malware manifest data may comprise a copy of the malware and data identifying or comprising a set of files infected by the malware. The central repository may receive, over a network from at least two computer systems, distinct…
Updating a central repository with information about malware resident upon a computer system. Upon detecting the malware executing in a virtual machine, a software module, without manual instruction, sends malware manifest data to a central repository over a network. The malware manifest data may comprise a copy of the malware and data identifying or comprising a set of files infected by the malware. The central repository may receive, over a network from at least two computer systems, distinct sets of malware manifest data and may subsequently store the sets of malware manifest data.
Other inventorsSee patent -
Clipboard hardening
Issued US US 13/923,212
A software module executes on a first operating system running. The software module determines that the first operating system has caused data to the written to a first clipboard maintained by the first operating system. The software module consults policy data to determine whether the data should additionally be written to a second clipboard maintained by a second operating system. The policy data may only allow the data to be written to the second clipboard if the data was written to the…
A software module executes on a first operating system running. The software module determines that the first operating system has caused data to the written to a first clipboard maintained by the first operating system. The software module consults policy data to determine whether the data should additionally be written to a second clipboard maintained by a second operating system. The policy data may only allow the data to be written to the second clipboard if the data was written to the first clipboard at the initiation of or approved by a user. If the software module determines that the policy data allows the data to be written to the second clipboard, then the software module, without human instruction, causes the data to written to the second clipboard
-
System and method for real-time customized threat protection
Issued US PCT/US2012/055630
A method is provided in one example embodiment that includes receiving event information associated with reports from sensors distributed throughout a network environment and correlating the event information to identify a threat. A customized security policy based on the threat may be sent to the sensors.
Other inventorsSee patent -
Method and system for protecting against unknown malicious activities by detecting a heap spray attack on an electronic device
Issued US US 12/962,439
A method and system for protecting against unknown malicious activities by detecting a heap spray attack on a electronic device are disclosed. A script is received at an electronic device from a remote device via a network and a loop operation is detected in the script that contains a write operation operable to write data to a memory of the electronic device. The amount of the data operable to be written to the memory by the write operation is determined and the data is prevented from being…
A method and system for protecting against unknown malicious activities by detecting a heap spray attack on a electronic device are disclosed. A script is received at an electronic device from a remote device via a network and a loop operation is detected in the script that contains a write operation operable to write data to a memory of the electronic device. The amount of the data operable to be written to the memory by the write operation is determined and the data is prevented from being written to the memory if the amount of the data is greater than or equal to a threshold.
Other inventorsSee patent -
Detection of malicious system calls
Issued US US 12/775,773
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for detecting malicious system calls. In one aspect, a method includes monitoring a function vulnerable to a buffer overflow attack; receiving a call to the function, the call associated with a call stack, the call stack including one or more base pointers, and a destination buffer associated with the function; identifying a first critical memory address vulnerable to the buffer overflow attack…
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for detecting malicious system calls. In one aspect, a method includes monitoring a function vulnerable to a buffer overflow attack; receiving a call to the function, the call associated with a call stack, the call stack including one or more base pointers, and a destination buffer associated with the function; identifying a first critical memory address vulnerable to the buffer overflow attack comprising: determining the first critical memory address based on a base pointer of the one or more base pointers, wherein the base pointer address is greater than an address of the destination buffer; identifying a first address based on the base pointer of the one or more base pointers; and determining that the first address is a critical memory address in response to the first memory address is greater than the address of the destination buffer.
Other inventorsSee patent -
System, method and computer program product for detecting encoded shellcode in network traffic
Issued US US 11/450,110
A system, method and computer program product are provided for detecting encoded shellcode. In use, network traffic that is encoded is identified. Further, it is determined whether the network traffic that is encoded includes shellcode
Honors & Awards
-
Silicon Valley 40 under 40
Silicon Valley Business Journal
http://www.bizjournals.com/sanjose/news/2013/12/05/silicon-valley-40-under-40-rahul.html
-
Q4 2010 Top performer
McAfee
Award from Network Security BU
-
Q2 2009 Top performer
McAfee
Q2 2009 McAfee Labs Top performer award
-
Q2 2008 Top Performer
McAfee
Q2 McAfee Labs Top Performer Award
-
McAfee ClubGeek - Phuket
McAfee
Worldwide top engineering talent award
Recommendations received
28 people have recommended Rahul
Join now to viewMore activity by Rahul
-
We are pleased to announce that Andy Bechtolsheim, Founder and Chief Architect of Arista Networks, has accepted our invitation to give a talk at Hot…
We are pleased to announce that Andy Bechtolsheim, Founder and Chief Architect of Arista Networks, has accepted our invitation to give a talk at Hot…
Liked by Rahul Kashyap
-
Siddharth Hiregowdara and Lucas Hansen have released a clever and well executed demonstration of the ease with which deepfakes can be made and the…
Siddharth Hiregowdara and Lucas Hansen have released a clever and well executed demonstration of the ease with which deepfakes can be made and the…
Liked by Rahul Kashyap
-
GLOBAL ALERT: As reported by several news outlets, access to the Internet has been shutdown in Bangladesh due to the protests that have escalated.…
GLOBAL ALERT: As reported by several news outlets, access to the Internet has been shutdown in Bangladesh due to the protests that have escalated.…
Liked by Rahul Kashyap
-
Rahul Dravid: The Gentleman of Cricket I just read that Rahul Dravid refused 2.5 Cr that BCCI wanted to pay him over and above what it was paying…
Rahul Dravid: The Gentleman of Cricket I just read that Rahul Dravid refused 2.5 Cr that BCCI wanted to pay him over and above what it was paying…
Liked by Rahul Kashyap
-
Consider this statement: “Steve Jobs was absolutely great at execution” If someone’s response to this statement is “no” or “absolutely not”, and…
Consider this statement: “Steve Jobs was absolutely great at execution” If someone’s response to this statement is “no” or “absolutely not”, and…
Liked by Rahul Kashyap
-
On Friday we failed you, and for that I'm deeply sorry. I’ve been in my professional life for almost 40 years, and my North Star has always been to…
On Friday we failed you, and for that I'm deeply sorry. I’ve been in my professional life for almost 40 years, and my North Star has always been to…
Liked by Rahul Kashyap
-
Back in 2006, shortly after I joined McAfee as the Lead Architect for Avert Labs, we encountered a critical issue: our antivirus mistakenly flagged…
Back in 2006, shortly after I joined McAfee as the Lead Architect for Avert Labs, we encountered a critical issue: our antivirus mistakenly flagged…
Liked by Rahul Kashyap
-
Last week Morgan Stanley Research shared its 2Q 2024 #CIO survey. In the survey, they asked 100 CIOs (73 from US and 27 from Europe) a set of…
Last week Morgan Stanley Research shared its 2Q 2024 #CIO survey. In the survey, they asked 100 CIOs (73 from US and 27 from Europe) a set of…
Liked by Rahul Kashyap
-
I very am confused by the “remove EDRs from the kernel” crowd given the prevalence of BYOVD in ransomware and targeted attacks. Also, why is it…
I very am confused by the “remove EDRs from the kernel” crowd given the prevalence of BYOVD in ransomware and targeted attacks. Also, why is it…
Liked by Rahul Kashyap
-
In my latest CISO Monthly roundup, I share key findings from our analysis of ValleyRAT, SmokeLoader, and a campaign involving the threat group…
In my latest CISO Monthly roundup, I share key findings from our analysis of ValleyRAT, SmokeLoader, and a campaign involving the threat group…
Liked by Rahul Kashyap
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Rahul Kashyap in United States
-
Rahul Kashyap
Associate at McKinsey & Company
-
Rahul Kashyap
Business Unit Head at NexoGlobal Inc
-
Rahul Kashyap
Postdoctoral Fellow at Penn State University
-
Rahul Kashyap
30 others named Rahul Kashyap in United States are on LinkedIn
See others named Rahul Kashyap