Gili Raanan

Gili Raanan

Israel
7K‏ עוקבים מעל 500 קשרים

מאמרים מאת Gili

פעילות

הצטרפו עכשיו כדי לראות את כל פעילות

ניסיון

  • Cyberstarts גרפי

    Cyberstarts

    Michmoret, Israel

  • -

    United States

  • -

    Greater New York City Area

  • -

  • -

    Tel Aviv, Israel

  • -

    Palo Alto, California

  • -

    Tel Aviv, Israel

  • -

  • -

    Tel Aviv-Yafo, Tel Aviv District, Israel

  • -

  • -

    Tel Aviv, Israel

  • -

  • -

    Tel Aviv District, Israel

  • -

    Tel Aviv District, Israel

פרסומים

  • A Perfecto Verification: Combining Model Checking with Deductive Analysis to Verify Real-Life Software

    International Symposium on Formal Methods - FM99

    The paper presents an approach to the formal verification of a complete software system intended to support the flagship product of Perfecto Technologies which enforces application security over an open communication net.

    Based on initial experimentation, it was decided that the verification method will be based on a combination of model-checking using spin with deductive verification which handles the more data-intensive elements of the design. The analysis was that only such a…

    The paper presents an approach to the formal verification of a complete software system intended to support the flagship product of Perfecto Technologies which enforces application security over an open communication net.

    Based on initial experimentation, it was decided that the verification method will be based on a combination of model-checking using spin with deductive verification which handles the more data-intensive elements of the design. The analysis was that only such a combination can cover by formal verification all the important aspects of the complete system.

    In order to enable model checking of large portions of the design, we have developed an assume-guarantee approach which supports compositional verification. We describe how this general approach was implemented in the spin framework.

    Then, we explain the need to split the verification activity into the modelchecking part which deals with the control issues such as concurrency or deadlocking and a deductive part which handles the data-intensive elements of the design.

    אַחֵר הכותבים
    ראה פרסום

פטנטים

  • System and method for baseline threshold monitoring

    שהונפקו US 7672814

    The present invention provides a system for identifying exceptional behavior of a hardware or software component. According to one embodiment, the system comprises an operational metric calculator that is operative to sample a first behavior of an operational metric and a second behavior of the operational metric. The operational metric may be any metric that quantifies the operation of a hardware or software component, as well as combinations thereof. A baseline threshold calculator is…

    The present invention provides a system for identifying exceptional behavior of a hardware or software component. According to one embodiment, the system comprises an operational metric calculator that is operative to sample a first behavior of an operational metric and a second behavior of the operational metric. The operational metric may be any metric that quantifies the operation of a hardware or software component, as well as combinations thereof. A baseline threshold calculator is operative to calculate a baseline threshold on the basis of the first sampled behavior of the operational metric. The baseline threshold is applied by a baseline threshold analyzer to the second operational metric to generate an alarm when the second sampled behavior of the operational metric deviates from the baseline threshold.

    ראה פטנט
  • Method and system for non intrusive application interaction and dependency mapping

    שהונפקו US 8244853

    The present invention facilitates mapping dependencies between software applications, components, and business processes on a computer network. Packets communicated between software applications are sampled to identify characteristics of the packet. The characteristics are used to identify communicating applications and to generate dependency maps of software applications on a computer network.

    ראה פטנט
  • Method and system for automatic classification of applications and services by packet inspectionv

    שהונפקו US 7590715

    The present invention facilitates identifying applications based on communicated packets between applications. Characteristics of communicated packets are used to identify the packet as being part of a communication between applications. Identification can be accomplished through the use of packet fingerprints or through a K nearest neighbor algorithm.

    ראה פטנט
  • System for determining web application vulnerabilities

    שהונפקו US 6584569

    A method for detecting security vulnerabilities in a web application includes analyzing the client requests and server responses resulting therefrom in order to discover pre-defined elements of the application's interface with external clients and the attributes of these elements. The client requests are then mutated based on a pre-defined set of mutation rules to thereby generate exploits unique to the application. The web application is attacked using the exploits and the results of the…

    A method for detecting security vulnerabilities in a web application includes analyzing the client requests and server responses resulting therefrom in order to discover pre-defined elements of the application's interface with external clients and the attributes of these elements. The client requests are then mutated based on a pre-defined set of mutation rules to thereby generate exploits unique to the application. The web application is attacked using the exploits and the results of the attack are evaluated for anomalous application activity.

    ראה פטנט
  • Method and system for verifying a client request

    שהונפקו US 7293281

    A system and method are presented for authorizing execution of requested actions transmitted between clients and servers of a data processing system. The method includes receiving a message including a set of actions and simulating execution of the set of actions. A list representing allowable actions and user-definable inputs to the simulated actions is defined. The list of allowable actions and user-definable inputs to the allowable action is then compared to user-requested actions and…

    A system and method are presented for authorizing execution of requested actions transmitted between clients and servers of a data processing system. The method includes receiving a message including a set of actions and simulating execution of the set of actions. A list representing allowable actions and user-definable inputs to the simulated actions is defined. The list of allowable actions and user-definable inputs to the allowable action is then compared to user-requested actions and inputs. When elements within the user-requested actions and inputs are included in the allowable actions and input list, the user-requested actions and inputs are authorized for execution.

  • Method and system for extracting application protocol characteristics

    שהונפקו US 6311278

    A method and computer program for automatically and continually extracting application protocols (i.e., defining a set of allowable or authorized actions) for any application. The method involves receiving a message from a server before it is sent or in parallel with sending to a client. The message may be in response to a specific request for it from the client. The program then extracts the application protocol data from the server message. Working with a copy of the message, the program…

    A method and computer program for automatically and continually extracting application protocols (i.e., defining a set of allowable or authorized actions) for any application. The method involves receiving a message from a server before it is sent or in parallel with sending to a client. The message may be in response to a specific request for it from the client. The program then extracts the application protocol data from the server message. Working with a copy of the message, the program strips off the communications protocol(s) from the message and parses the remaining message to identify user-selectable options contained in the message such as commands, fields, etc. These items represent the set of allowable or authorized user actions for the particular “stage” of the current version of the application as set forth in the message. The set of allowable user actions is then stored by the extraction program in a protocol database accessible to a gateway or filter module.

  • Method and system for protecting operations of trusted internal networks

    שהונפקו US 6321337

    The present invention is a security gateway system positioned between an external, untrusted computing environment and an internal, trusted computing environment that converts messages received from the external environment into simplified messages and converts the simplified messages into messages suitable for use on the internal environment. The conversion involves the removal of external environment transfer protocols and the reduction of the content of the messages left after removing the…

    The present invention is a security gateway system positioned between an external, untrusted computing environment and an internal, trusted computing environment that converts messages received from the external environment into simplified messages and converts the simplified messages into messages suitable for use on the internal environment. The conversion involves the removal of external environment transfer protocols and the reduction of the content of the messages left after removing the protocols into a simplified representation of the content to create a simplified message. The simplified representation is then converted to an internal message by converting the simplified representation to a representation appropriate to the internal environment, including to applications operating on the internal environment, and adding internal environment protocols, including transfer protocols, to the converted message. Simplified representations exist for some but not necessarily all types of content which may be received from the external environment, thus limiting the content which may be passed from the external to the internal environment.

    ראה פטנט
  • Method and system for maintaining restricted operating environments for application programs or operating systems

    שהונפקו US 6199181

    A method for protecting an operating environment on a processor from a rogue program operating on the processor comprising isolating simultaneously executing programs or operating systems is disclosed. Memory space for use only by the first program while the first program is executing is allocated. Communication between the first program and the computer's operating environment is accomplished through a single link employing one of several methods including using shared memory space, a…

    A method for protecting an operating environment on a processor from a rogue program operating on the processor comprising isolating simultaneously executing programs or operating systems is disclosed. Memory space for use only by the first program while the first program is executing is allocated. Communication between the first program and the computer's operating environment is accomplished through a single link employing one of several methods including using shared memory space, a dedicated interrupt or a dedicated I/O port. The monitor manages a restricted operating environment for the first program on the processor, the restricted operating environment preventing the first program from accessing resources on the processor except for the allocated memory space the single communication link.

    ראה פטנט
  • CAPTCHA - Method and system for discriminating a human action from a computerized action

    מתויק US US20050114705A1

    A method and system are disclosed for discriminating automatic computerized action from a human performed action. The invention is based on applying human advantage in applying sensory and cognitive skills to solving simple problems that prove to be extremely hard for computer software. Such skills include, but are not limited to processing of sensory information such as identification of objects and letters within a noisy graphical environment, signals and speech within an auditory signal…

    A method and system are disclosed for discriminating automatic computerized action from a human performed action. The invention is based on applying human advantage in applying sensory and cognitive skills to solving simple problems that prove to be extremely hard for computer software. Such skills include, but are not limited to processing of sensory information such as identification of objects and letters within a noisy graphical environment, signals and speech within an auditory signal, patterns and objects within a video or animation sequence. Human skills also include higher level cognitive processing such as understanding natural language and logical assignments. The method for discriminating between humans and computerized actions can be used during authentication, to limit access by automated agents, and for confirmation of actions.

    ראה פטנט

המלצות התקבל

עוד פעילות על ידי Gili

הצג Gili את הפרופיל המלא

  • ראה את מי שאתה מכיר במשותף
  • הכירו
  • צור קשר Gili ישירות
הצטרפו נוף הפרופיל המלא

פרופילים דומים אחרים

אנשים אחרים ששמם Gili Raanan

1 שם Gili Raanan אחר נמצא על לינקדאין

הצג/י אנשים אחרים בשם Gili Raanan