40 patents
Utility
Vulnerability Assessment of Machine Images In Development Phase
18 Jan 24
In an embodiment, a software object development system generates a pre-release version of a machine image of a software object, and transmits information associated with the pre-release version of the software object to a vulnerability management system.
Matthew WIRGES, Omprakash MOOLCHANDANI
Filed: 15 Jul 22
Utility
Vulnerability Scanning of a Remote File System
18 Jan 24
In an embodiment, a vulnerability scanner component determines one or more target software objects of a remote file system for a vulnerability scan, and performs, via a file system application programming interface (API), a file system decoding procedure based on information associated with the remote file system to determine a subset of disk blocks of the remote file system that comprise the one or more target software objects.
Kevin DOUGLAS, Matthew WIRGES
Filed: 28 Mar 23
Utility
Mapping a Vulnerability to a Stage of an Attack Chain Taxonomy
23 Nov 23
In an embodiment, a semantic model and a semantic model training method that obtains a textual description of one or more features associated with a first vulnerability that has been used in one or more attacks.
Aditya KUPPA, Lamine AOUAD, Thomas PARSONS
Filed: 2 Aug 23
Utility
Predicting cyber risk for assets with limited scan information using machine learning
14 Nov 23
Techniques, methods and/or apparatuses are disclosed that enable prediction of cyber risks of assets of networks.
Damien McParland, Bryan Doyle, Vincent Gilcreest, Renaud Deraison
Filed: 22 Feb 21
Utility
System and Method for Strategic Anti-malware Monitoring
9 Nov 23
The system and method described herein may leverage active network scanning and passive network monitoring to provide strategic anti-malware monitoring in a network.
Marcus J. RANUM, Ron GULA
Filed: 11 Jul 23
Utility
System and Method for Evaluating Risk of a Vulnerability
19 Oct 23
Techniques, methods and/or apparatuses are disclosed that enable prioritization of vulnerabilities in different applications or the same application on different assets.
Paul Gregory ELLSWORTH
Filed: 15 Apr 22
Utility
Host operating system identification using transport layer probe metadata and machine learning
17 Oct 23
Techniques, methods and/or apparatuses are disclosed that enable detection of an operating system of a host.
Barry Sheridan, Jesus Garcia Galan
Filed: 15 Jan 21
Utility
System and Method for Managing a Competition
5 Oct 23
A system and method are disclosed for automatic management of a capture-the-flag competition and the visual display of the scoring thereof.
Nicholas MILES
Filed: 29 Mar 22
Utility
Interactive Web Application Scanning
14 Sep 23
Techniques, methods and/or apparatuses are disclosed that enable facilitation of remediation of one or more vulnerabilities detected in a web application.
Fergus COONEY, Greg KURUC
Filed: 17 May 23
Utility
Mapping a vulnerability to a stage of an attack chain taxonomy
15 Aug 23
In an embodiment, a semantic model and a semantic model training method that obtains a textual description of one or more features associated with a first vulnerability that has been used in one or more attacks.
Aditya Kuppa, Lamine Aouad, Thomas Parsons
Filed: 21 May 20
Utility
Elastic asset-based licensing model for use in a vulnerability management system
1 Aug 23
The disclosure generally relates to a vulnerability management system configured to implement an asset-based identification algorithm to identify, update, and otherwise reconcile assets in a network according to various identification attributes that are ordered on a spectrum from authoritative to speculative based on an ability that each identification attribute has to accurately link a host to a given asset.
Philippe J. Moore, Matthew Nehrbass, Daniel Kahan
Filed: 16 Apr 21
Utility
System and Method for Automatic Decompilation and Detection of Errors In Software
27 Jul 23
A system is disclosed for automatic retrieval and analysis of PLC code including at least one code disassembler configured to receive, via one or more passive or active scanners connected to an automation network, compiled code configured for execution on one or more devices of the automation network, the at least one code disassembler automatically disassembling the compiled code into program code.
Dan SHMIDT, Segev DAGAN, Ido TRIVIZKI, David ERUKHIMOVICH, Moria BERGMAN
Filed: 21 Jan 22
Utility
Vulnerability scanning of a remote file system
9 May 23
In an embodiment, a vulnerability scanner component determines one or more target software objects of a remote file system for a vulnerability scan, and performs, via a file system application programming interface (API), a file system decoding procedure based on information associated with the remote file system to determine a subset of disk blocks of the remote file system that comprise the one or more target software objects.
Kevin Douglas, Matthew Wirges
Filed: 14 Jul 22
Utility
Managing supersedence of solutions for security issues among assets of an enterprise network
4 Apr 23
In an embodiment, a security auditing component obtains a solution set that is based upon a security audit of an enterprise network, the solution set characterizing a set of solutions associated with a set of security issues associated with one or more assets of the enterprise network, detects that the solution set can be condensed into a condensed solution set that mitigates the set of security issues to the same degree as the solution set, the detection being based at least in part upon (i) one or more rules applied to one or more solution texts and/or (ii) asset-specific metadata and/or (iii) static metadata, and condenses, based on the detecting, the solution set into the condensed solution set by combining two or more subsets of related solutions and/or filtering the solution set to remove one or more subsets of redundant or superseded solutions.
Katherine Alice Sexton, Nicholas Miles, Nicolas Pouvesle, Renaud Deraison, Clint Merrill, John Walker, Charles Joseph Bacon
Filed: 14 May 20
Utility
System, device, and method of determining cyber attack vectors and mitigating cyber attacks
24 Jan 23
System, device, and method of determining cyber-attack vectors and mitigating cyber-attacks.
Itamar Yaakov Mizrahi, Matan Hart, Yona Hollander
Filed: 14 Apr 21
Utility
Threat Score Prediction Model
19 Jan 23
In an embodiment, a threat score prediction model is generated for assigning a threat score to a software vulnerability.
Bryan Peter DOYLE, Vincent GILCREEST, Wei TAI, Damien MCPARLAND, Renaud DERAISON
Filed: 16 Sep 22
Utility
Detecting untracked software components on an asset
22 Nov 22
In an embodiment, an asset may utilize one or more scanning techniques to detect a first set of software components that is not being natively tracked by an operating system of the asset, the one or more scanning techniques comprising one or more of an evaluation of metadata associated with one or more running processes of the asset, and an evaluation of file system information that characterizes the first set of software components.
Tony Huffman, Nicholas Miles
Filed: 22 Jan 20
Utility
Threat score prediction model
1 Nov 22
In an embodiment, a threat score prediction model is generated for assigning a threat score to a software vulnerability.
Bryan Peter Doyle, Vincent Gilcreest, Wei Tai, Damien McParland, Renaud Deraison
Filed: 28 Dec 18
Utility
Continuous Scoring of Security Controls and Dynamic Tuning of Security Policies
8 Sep 22
Techniques, methods and/or apparatuses are disclosed that enable of cyber risks on assets of networks to be evaluated in presence of security controls on the assets.
Aditya KUPPA, Lamine AOUAD, Bryan Doyle
Filed: 8 Mar 21
Utility
Automatic Generation of Vulnerabity Metrics Using Machine Learning
8 Sep 22
Techniques, methods and/or apparatuses are disclosed that enable generation of vulnerability vectors of newly identified vulnerabilities (e.g., CVEs).
Cathal MULLANEY
Filed: 8 Mar 21