Patents by Inventor AMIT RESH

AMIT RESH has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11269992
    Abstract: Systems and methods for protecting vulnerable code by obtaining an input file comprising code representing executable files; generating a protected executable file by replacing an unencrypted version of each vulnerable function of the input file with a VM-exit generating instruction; and generating a database file including an encrypted version of each vulnerable function deleted from the input file. The protected executable file, database file are stored on a target device. A UEFI application initializes a hypervisor which accesses the decryption key using a TPM device and loads an operating system. When the hypervisor detects an attempt to execute an encrypted version of a vulnerable function it decrypts the encrypted version of the vulnerable function.
    Type: Grant
    Filed: March 22, 2019
    Date of Patent: March 8, 2022
    Inventors: Michael Kiperberg, Raziel Ben Yehuda, Asaf Algawi, Roee Shimon Leon, Amit Resh, Nezer Jacob Zaidenberg
  • Publication number: 20210049263
    Abstract: Systems and methods for protecting vulnerable code by obtaining an input file comprising code representing executable files; generating a protected executable file by replacing an unencrypted version of each vulnerable function of the input file with a VM-exit generating instruction; and generating a database file including an encrypted version of each vulnerable function deleted from the input file. The protected executable file, database file are stored on a target device. A UEFI application initializes a hypervisor which accesses the decryption key using a TPM device and loads an operating system. When the hypervisor detects an attempt to execute an encrypted version of a vulnerable function it decrypts the encrypted version of the vulnerable function.
    Type: Application
    Filed: March 22, 2019
    Publication date: February 18, 2021
    Inventors: MICHAEL KIPERBERG, RAZIEL BEN YEHUDA, ASAF ALGAWI, ROEE SHIMON LEON, AMIT RESH, NEZER JACOB ZAIDENBERG
  • Patent number: 9756048
    Abstract: The present disclosure relates to systems and methods for enabling execution of encrypted managed programs in common managed execution environments. In particular the disclosure relates to method of loading and associating an extension module to the managed execution environment configured to receive execution event notifications. The events corresponding to the execution of encrypted methods are intercepted and passed on to a decryption module operable to execute within an hypervisor environment, such that the managed encrypted program is decrypted, executed in a secured location, preventing access of untrusted party. The decryption module is further configured to discard decrypted instruction if cooperation of the extension module is required, or upon program termination.
    Type: Grant
    Filed: November 11, 2015
    Date of Patent: September 5, 2017
    Assignee: TRULY PROTECT OY
    Inventors: Michael Kiperberg, Amit Resh, Nezer Zaidenberg
  • Patent number: 9753865
    Abstract: The present disclosure relates systems and methods for executing an encrypted code section in a shieldable CPU memory cache. Functional characteristics of the software product of a vendor, such as gaming or video, may be partially encrypted to allow for protected and functional operability and avoid hacking and malicious usage of non-licensed user. The encrypted instructions may be written to the CPU memory cache and decrypted only once the CPU memory cache is switched into a shielded state. The decrypted code instructions may be executed from a designated cache-line of said CPU memory cache still in the shielded state.
    Type: Grant
    Filed: September 12, 2016
    Date of Patent: September 5, 2017
    Assignee: TRULY PROTECT OY
    Inventors: Michael Kiperberg, Amit Resh, Nezer Zaidenberg
  • Publication number: 20160378690
    Abstract: The present disclosure relates systems and methods for executing an encrypted code section in a shieldable CPU memory cache. Functional characteristics of the software product of a vendor, such as gaming or video, may be partially encrypted to allow for protected and functional operability and avoid hacking and malicious usage of non-licensed user. The encrypted instructions may be written to the CPU memory cache and decrypted only once the CPU memory cache is switched into a shielded state. The decrypted code instructions may be executed from a designated cache-line of said CPU memory cache still in the shielded state.
    Type: Application
    Filed: September 12, 2016
    Publication date: December 29, 2016
    Inventors: MICHAEL KIPERBERG, AMIT RESH, NEZER ZAIDENBERG
  • Patent number: 9471511
    Abstract: The present disclosure relates to techniques for system and methods for software-based management of protected data-blocks insertion into the memory cache mechanism of a computerized device. In particular the disclosure relates to preventing protected data blocks from being altered and evicted from the CPU cache coupled with buffered software execution. The technique is based upon identifying at least one conflicting data-block having a memory mapping indication to a designated memory cache-line and preventing the conflicting data-block from being cached. Functional characteristics of the software product of a vendor, such as gaming or video, may be partially encrypted to allow for protected and functional operability and avoid hacking and malicious usage of non-licensed user.
    Type: Grant
    Filed: November 24, 2013
    Date of Patent: October 18, 2016
    Assignee: Truly Protect OY
    Inventors: Michael Kiperberg, Amit Resh, Nezer Zaidenberg
  • Publication number: 20160094555
    Abstract: The present disclosure relates to systems and methods for enabling execution of encrypted managed programs in common managed execution environments. In particular the disclosure relates to method of loading and associating an extension module to the managed execution environment configured to receive execution event notifications. The events corresponding to the execution of encrypted methods are intercepted and passed on to a decryption module operable to execute within an hypervisor environment, such that the managed encrypted program is decrypted, executed in a secured location, preventing access of untrusted party. The decryption module is further configured to discard decrypted instruction if cooperation of the extension module is required, or upon program termination.
    Type: Application
    Filed: November 11, 2015
    Publication date: March 31, 2016
    Inventors: MICHAEL KIPERBERG, AMIT RESH, NEZER ZAIDENBERG
  • Patent number: 9195821
    Abstract: The current disclosure relates to techniques for system and methods for software-based management of remote software authentication of at least one entity machine, addressing various vulnerabilities of software authentication based upon the genuinity based scheme. The disclosure is using challenge execution on at least one suspect machine, providing a technique for CPU event monitoring of a combined count of at least two events monitored on the entity machine during execution of the authentication challenge. The authentication challenge allows further detection functionality of virtual machine or a hypervisor installed. The techniques measures execution time of authentication challenge, comparing the received challenge result with the expected challenge result and accordingly rejects or allows the entity machine through the authentication process.
    Type: Grant
    Filed: November 24, 2013
    Date of Patent: November 24, 2015
    Assignee: Truly Protect OY
    Inventors: Michael Kiperberg, Amit Resh, Nezer Zaidenberg
  • Publication number: 20150150084
    Abstract: The current disclosure relates to techniques for system and methods for software-based management of remote software authentication of at least one entity machine, addressing various vulnerabilities of software authentication based upon the genuinity based scheme. The disclosure is using challenge execution on at least one suspect machine, providing a technique for CPU event monitoring of a combined count of at least two events monitored on the entity machine during execution of the authentication challenge. The authentication challenge allows further detection functionality of virtual machine or a hypervisor installed. The techniques measures execution time of authentication challenge, comparing the received challenge result with the expected challenge result and accordingly rejects or allows the entity machine through the authentication process.
    Type: Application
    Filed: November 24, 2013
    Publication date: May 28, 2015
    Inventors: MICHAEL KIPERBERG, AMIT RESH, NEZER ZAIDENBERG
  • Publication number: 20150149732
    Abstract: The present disclosure relates to techniques for system and methods for software-based management of protected data-blocks insertion into the memory cache mechanism of a computerized device. In particular the disclosure relates to preventing protected data blocks from being altered and evicted from the CPU cache coupled with buffered software execution. The technique is based upon identifying at least one conflicting data-block having a memory mapping indication to a designated memory cache-line and preventing the conflicting data-block from being cached. Functional characteristics of the software product of a vendor, such as gaming or video, may be partially encrypted to allow for protected and functional operability and avoid hacking and malicious usage of non-licensed user.
    Type: Application
    Filed: November 24, 2013
    Publication date: May 28, 2015
    Inventors: MICHAEL KIPERBERG, AMIT RESH, NEZER ZAIDENBERG