מאמרים מאת Gili
פעילות
-
It was 30 years ago. 𝗥𝗶𝗼 Hironobu Maeda and I were factory workers packing Christmas cakes. 𝐍𝐨𝐰, 𝐑𝐢𝐨 𝐢𝐬 𝐚 𝐫𝐞𝐬𝐩𝐞𝐜𝐭𝐞𝐝…
It was 30 years ago. 𝗥𝗶𝗼 Hironobu Maeda and I were factory workers packing Christmas cakes. 𝐍𝐨𝐰, 𝐑𝐢𝐨 𝐢𝐬 𝐚 𝐫𝐞𝐬𝐩𝐞𝐜𝐭𝐞𝐝…
נוסף לייק על ידי Gili Raanan
-
2024, you were amazing. 2025, we're coming for you! Happy holidays season to all of our friends, customers, partners and colleagues. Thank you for…
2024, you were amazing. 2025, we're coming for you! Happy holidays season to all of our friends, customers, partners and colleagues. Thank you for…
נוסף לייק על ידי Gili Raanan
ניסיון
פרסומים
-
A Perfecto Verification: Combining Model Checking with Deductive Analysis to Verify Real-Life Software
International Symposium on Formal Methods - FM99
The paper presents an approach to the formal verification of a complete software system intended to support the flagship product of Perfecto Technologies which enforces application security over an open communication net.
Based on initial experimentation, it was decided that the verification method will be based on a combination of model-checking using spin with deductive verification which handles the more data-intensive elements of the design. The analysis was that only such a…The paper presents an approach to the formal verification of a complete software system intended to support the flagship product of Perfecto Technologies which enforces application security over an open communication net.
Based on initial experimentation, it was decided that the verification method will be based on a combination of model-checking using spin with deductive verification which handles the more data-intensive elements of the design. The analysis was that only such a combination can cover by formal verification all the important aspects of the complete system.
In order to enable model checking of large portions of the design, we have developed an assume-guarantee approach which supports compositional verification. We describe how this general approach was implemented in the spin framework.
Then, we explain the need to split the verification activity into the modelchecking part which deals with the control issues such as concurrency or deadlocking and a deductive part which handles the data-intensive elements of the design.אַחֵר הכותביםראה פרסום
פטנטים
-
System and method for baseline threshold monitoring
שהונפקו US 7672814
The present invention provides a system for identifying exceptional behavior of a hardware or software component. According to one embodiment, the system comprises an operational metric calculator that is operative to sample a first behavior of an operational metric and a second behavior of the operational metric. The operational metric may be any metric that quantifies the operation of a hardware or software component, as well as combinations thereof. A baseline threshold calculator is…
The present invention provides a system for identifying exceptional behavior of a hardware or software component. According to one embodiment, the system comprises an operational metric calculator that is operative to sample a first behavior of an operational metric and a second behavior of the operational metric. The operational metric may be any metric that quantifies the operation of a hardware or software component, as well as combinations thereof. A baseline threshold calculator is operative to calculate a baseline threshold on the basis of the first sampled behavior of the operational metric. The baseline threshold is applied by a baseline threshold analyzer to the second operational metric to generate an alarm when the second sampled behavior of the operational metric deviates from the baseline threshold.
-
Method and system for non intrusive application interaction and dependency mapping
שהונפקו US 8244853
The present invention facilitates mapping dependencies between software applications, components, and business processes on a computer network. Packets communicated between software applications are sampled to identify characteristics of the packet. The characteristics are used to identify communicating applications and to generate dependency maps of software applications on a computer network.
-
Method and system for automatic classification of applications and services by packet inspectionv
שהונפקו US 7590715
The present invention facilitates identifying applications based on communicated packets between applications. Characteristics of communicated packets are used to identify the packet as being part of a communication between applications. Identification can be accomplished through the use of packet fingerprints or through a K nearest neighbor algorithm.
-
System for determining web application vulnerabilities
שהונפקו US 6584569
A method for detecting security vulnerabilities in a web application includes analyzing the client requests and server responses resulting therefrom in order to discover pre-defined elements of the application's interface with external clients and the attributes of these elements. The client requests are then mutated based on a pre-defined set of mutation rules to thereby generate exploits unique to the application. The web application is attacked using the exploits and the results of the…
A method for detecting security vulnerabilities in a web application includes analyzing the client requests and server responses resulting therefrom in order to discover pre-defined elements of the application's interface with external clients and the attributes of these elements. The client requests are then mutated based on a pre-defined set of mutation rules to thereby generate exploits unique to the application. The web application is attacked using the exploits and the results of the attack are evaluated for anomalous application activity.
-
Method and system for verifying a client request
שהונפקו US 7293281
A system and method are presented for authorizing execution of requested actions transmitted between clients and servers of a data processing system. The method includes receiving a message including a set of actions and simulating execution of the set of actions. A list representing allowable actions and user-definable inputs to the simulated actions is defined. The list of allowable actions and user-definable inputs to the allowable action is then compared to user-requested actions and…
A system and method are presented for authorizing execution of requested actions transmitted between clients and servers of a data processing system. The method includes receiving a message including a set of actions and simulating execution of the set of actions. A list representing allowable actions and user-definable inputs to the simulated actions is defined. The list of allowable actions and user-definable inputs to the allowable action is then compared to user-requested actions and inputs. When elements within the user-requested actions and inputs are included in the allowable actions and input list, the user-requested actions and inputs are authorized for execution.
-
Method and system for extracting application protocol characteristics
שהונפקו US 6311278
A method and computer program for automatically and continually extracting application protocols (i.e., defining a set of allowable or authorized actions) for any application. The method involves receiving a message from a server before it is sent or in parallel with sending to a client. The message may be in response to a specific request for it from the client. The program then extracts the application protocol data from the server message. Working with a copy of the message, the program…
A method and computer program for automatically and continually extracting application protocols (i.e., defining a set of allowable or authorized actions) for any application. The method involves receiving a message from a server before it is sent or in parallel with sending to a client. The message may be in response to a specific request for it from the client. The program then extracts the application protocol data from the server message. Working with a copy of the message, the program strips off the communications protocol(s) from the message and parses the remaining message to identify user-selectable options contained in the message such as commands, fields, etc. These items represent the set of allowable or authorized user actions for the particular “stage” of the current version of the application as set forth in the message. The set of allowable user actions is then stored by the extraction program in a protocol database accessible to a gateway or filter module.
-
Method and system for protecting operations of trusted internal networks
שהונפקו US 6321337
The present invention is a security gateway system positioned between an external, untrusted computing environment and an internal, trusted computing environment that converts messages received from the external environment into simplified messages and converts the simplified messages into messages suitable for use on the internal environment. The conversion involves the removal of external environment transfer protocols and the reduction of the content of the messages left after removing the…
The present invention is a security gateway system positioned between an external, untrusted computing environment and an internal, trusted computing environment that converts messages received from the external environment into simplified messages and converts the simplified messages into messages suitable for use on the internal environment. The conversion involves the removal of external environment transfer protocols and the reduction of the content of the messages left after removing the protocols into a simplified representation of the content to create a simplified message. The simplified representation is then converted to an internal message by converting the simplified representation to a representation appropriate to the internal environment, including to applications operating on the internal environment, and adding internal environment protocols, including transfer protocols, to the converted message. Simplified representations exist for some but not necessarily all types of content which may be received from the external environment, thus limiting the content which may be passed from the external to the internal environment.
-
Method and system for maintaining restricted operating environments for application programs or operating systems
שהונפקו US 6199181
A method for protecting an operating environment on a processor from a rogue program operating on the processor comprising isolating simultaneously executing programs or operating systems is disclosed. Memory space for use only by the first program while the first program is executing is allocated. Communication between the first program and the computer's operating environment is accomplished through a single link employing one of several methods including using shared memory space, a…
A method for protecting an operating environment on a processor from a rogue program operating on the processor comprising isolating simultaneously executing programs or operating systems is disclosed. Memory space for use only by the first program while the first program is executing is allocated. Communication between the first program and the computer's operating environment is accomplished through a single link employing one of several methods including using shared memory space, a dedicated interrupt or a dedicated I/O port. The monitor manages a restricted operating environment for the first program on the processor, the restricted operating environment preventing the first program from accessing resources on the processor except for the allocated memory space the single communication link.
-
CAPTCHA - Method and system for discriminating a human action from a computerized action
מתויק US US20050114705A1
A method and system are disclosed for discriminating automatic computerized action from a human performed action. The invention is based on applying human advantage in applying sensory and cognitive skills to solving simple problems that prove to be extremely hard for computer software. Such skills include, but are not limited to processing of sensory information such as identification of objects and letters within a noisy graphical environment, signals and speech within an auditory signal…
A method and system are disclosed for discriminating automatic computerized action from a human performed action. The invention is based on applying human advantage in applying sensory and cognitive skills to solving simple problems that prove to be extremely hard for computer software. Such skills include, but are not limited to processing of sensory information such as identification of objects and letters within a noisy graphical environment, signals and speech within an auditory signal, patterns and objects within a video or animation sequence. Human skills also include higher level cognitive processing such as understanding natural language and logical assignments. The method for discriminating between humans and computerized actions can be used during authentication, to limit access by automated agents, and for confirmation of actions.
המלצות התקבל
2 אנשים המליצו Gili
הצטרפו עכשיו כדי נוףעוד פעילות על ידי Gili
-
Great news that one of the finest tech companies of our generation has invested in Island and see the huge potential in the enterprise browser market.
Great news that one of the finest tech companies of our generation has invested in Island and see the huge potential in the enterprise browser market.
נוסף לייק על ידי Gili Raanan
-
In a world where web3 scams cost users billions, visibility is crucial. So today, we’re releasing a dashboard that shares the data Blockaid sees.…
In a world where web3 scams cost users billions, visibility is crucial. So today, we’re releasing a dashboard that shares the data Blockaid sees.…
נוסף לייק על ידי Gili Raanan
-
#dspm for Snowflake : 📈 Massive Exabyte SCALE 🚀Hyper SPEED 2PB/day for any customer! 🤑 Low COST 🎯 High PRECISION What? Yes!! All of the KPIs one…
#dspm for Snowflake : 📈 Massive Exabyte SCALE 🚀Hyper SPEED 2PB/day for any customer! 🤑 Low COST 🎯 High PRECISION What? Yes!! All of the KPIs one…
נוסף לייק על ידי Gili Raanan
-
Building 🚀 Thanks Greylock for the hospitality. True pros!
Building 🚀 Thanks Greylock for the hospitality. True pros!
נוסף לייק על ידי Gili Raanan
-
Another amazing re:invent in the books! Fantastic to see the Upwind Security team firing on all cylinders with their $100M fundraise. Up & Upwind…
Another amazing re:invent in the books! Fantastic to see the Upwind Security team firing on all cylinders with their $100M fundraise. Up & Upwind…
נוסף לייק על ידי Gili Raanan
-
We had the pleasure of hosting Gili Raanan, Emily Heath, Lior Simon and the Cyberstarts portfolio family at the NYSE for their holiday party. Best…
We had the pleasure of hosting Gili Raanan, Emily Heath, Lior Simon and the Cyberstarts portfolio family at the NYSE for their holiday party. Best…
נוסף לייק על ידי Gili Raanan