Patents by Inventor Anandabrata Pal

Anandabrata Pal has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10972488
    Abstract: Computerized methods and systems determine an entry point or source of an attack on an endpoint, such as a machine, e.g., a computer, node of a network, system or the like. These computerized methods and systems utilize an attack execution/attack or start root, to build an attack tree, which shows the attack on the end point and the damage caused by the attack, as it propagates through the machine, network, system, or the like.
    Type: Grant
    Filed: September 15, 2019
    Date of Patent: April 6, 2021
    Assignee: CHECK POINT SOFTWARE TECHNOLOGIES LTD.
    Inventors: Anandabrata Pal, Lior Arzi, Tamara Leiderfarb
  • Patent number: 10880316
    Abstract: Computerized methods and systems determine an initial execution of an attack on an endpoint. An indicator of the attack is obtained by analysis of a first process on the endpoint. A sequence of processes that includes the first process associates the initial execution of the attack with the first process. Each respective process in the sequence of processes is created or executed by at least one of the initial execution or a process in the sequence of processes. The initial execution is identified based on linking from the first process to the initial execution through a combination of executions and creations of the processes in the sequence of processes.
    Type: Grant
    Filed: December 9, 2015
    Date of Patent: December 29, 2020
    Assignee: CHECK POINT SOFTWARE TECHNOLOGIES LTD.
    Inventors: Anandabrata Pal, Tamara Leiderfarb, Lior Arzi
  • Publication number: 20200084230
    Abstract: Computerized methods and systems determine an entry point or source of an attack on an endpoint, such as a machine, e.g., a computer, node of a network, system or the like. These computerized methods and systems utilize an attack execution/attack or start root, to build an attack tree, which shows the attack on the end point and the damage caused by the attack, as it propagates through the machine, network, system, or the like.
    Type: Application
    Filed: September 15, 2019
    Publication date: March 12, 2020
    Inventors: Anandabrata PAL, Lior ARZI, Tamara LEIDERFARB
  • Patent number: 10511616
    Abstract: Disclosed are methods and systems for detecting malware and potential malware based on using generalized attack trees (generalized attack tree graphs). The generalized attack trees are based on attack trees (attack tree graphs), whose objects, such as links and vertices, have been analyzed, and some of these objects have been generalized, resulting in the generalized attack tree of the invention.
    Type: Grant
    Filed: November 6, 2018
    Date of Patent: December 17, 2019
    Assignee: CHECK POINT SOFTWARE TECHNOLOGIES LTD.
    Inventors: Tamara Leiderfarb, Lior Arzi, Anandabrata Pal
  • Patent number: 10462160
    Abstract: Computerized methods and systems identify events associated with an attack initiated on an endpoint client. A listing of processes executed or created on the endpoint during the attack is obtained. The listing of processes includes a first process and at least one subsequent process executed or created by the first process. The computerized methods and systems analyze for the occurrence of at least one event during a time interval associated with the attack. The computerized methods and systems determine whether the listing of processes includes a process that when executed caused the occurrence of the at least one event. If the listing of processes excludes process that when executed caused the occurrence of the at least one event, the at least one event and the causing process are stored, for example, in a database or memory.
    Type: Grant
    Filed: October 13, 2016
    Date of Patent: October 29, 2019
    Assignee: CHECK POINT SOFTWARE TECHNOLOGIES LTD.
    Inventors: Lior Arzi, Tamara Leiderfarb, Anandabrata Pal
  • Patent number: 10440036
    Abstract: Computerized methods and systems determine an entry point or source of an attack on an endpoint, such as a machine, e.g., a computer, node of a network, system or the like. These computerized methods and systems utilize an attack execution/attack or start root, to build an attack tree, which shows the attack on the end point and the damage caused by the attack, as it propagates through the machine, network, system, or the like.
    Type: Grant
    Filed: December 9, 2015
    Date of Patent: October 8, 2019
    Assignee: CHECKPOINT SOFTWARE TECHNOLOGIES LTD
    Inventors: Anandabrata Pal, Lior Arzi, Tamara Leiderfarb
  • Patent number: 10291634
    Abstract: Computerized methods and systems determine summary events from an attack on an endpoint. The detection and determination of these summary events is performed by a machine, e.g., a computer, node of a network, system or the like.
    Type: Grant
    Filed: December 8, 2016
    Date of Patent: May 14, 2019
    Assignee: CHECKPOINT SOFTWARE TECHNOLOGIES LTD.
    Inventors: Lior Arzi, Anandabrata Pal, Tamara Leiderfarb
  • Publication number: 20190075125
    Abstract: Disclosed are methods and systems for detecting malware and potential malware based on using generalized attack trees (generalized attack tree graphs). The generalized attack trees are based on attack trees (attack tree graphs), whose objects, such as links and vertices, have been analyzed, and some of these objects have been generalized, resulting in the generalized attack tree of the invention.
    Type: Application
    Filed: November 6, 2018
    Publication date: March 7, 2019
    Inventors: Tamara LEIDERFARB, Lior ARZI, Anandabrata PAL
  • Patent number: 10193906
    Abstract: Disclosed are methods and systems for detecting malware and potential malware based on using generalized attack trees (generalized attack tree graphs). The generalized attack trees are based on attack trees (attack tree graphs), whose objects, such as links and vertices, have been analyzed, and some of these objects have been generalized, resulting in the generalized attack tree of the invention.
    Type: Grant
    Filed: December 9, 2016
    Date of Patent: January 29, 2019
    Assignee: CHECKPOINT SOFTWARE TECHNOLOGIES LTD.
    Inventors: Tamara Leiderfarb, Lior Arzi, Anandabrata Pal
  • Publication number: 20170171240
    Abstract: Computerized methods and systems identify events associated with an attack initiated on an endpoint client. A listing of processes executed or created on the endpoint during the attack is obtained. The listing of processes includes a first process and at least one subsequent process executed or created by the first process. The computerized methods and systems analyze for the occurrence of at least one event during a time interval associated with the attack. The computerized methods and systems determine whether the listing of processes includes a process that when executed caused the occurrence of the at least one event. If the listing of processes excludes process that when executed caused the occurrence of the at least one event, the at least one event and the causing process are stored, for example, in a database or memory.
    Type: Application
    Filed: October 13, 2016
    Publication date: June 15, 2017
    Inventors: Lior ARZI, Tamara LEIDERFARB, Anandabrata PAL
  • Publication number: 20170171229
    Abstract: Computerized methods and systems determine summary events from an attack on an endpoint. The detection and determination of these summary events is performed by a machine, e.g., a computer, node of a network, system or the like.
    Type: Application
    Filed: December 8, 2016
    Publication date: June 15, 2017
    Inventors: Lior ARZI, Anandabrata PAL, Tamara LEIDERFARB
  • Publication number: 20170171230
    Abstract: Disclosed are methods and systems for detecting malware and potential malware based on using generalized attack trees (generalized attack tree graphs). The generalized attack trees are based on attack trees (attack tree graphs), whose objects, such as links and vertices, have been analyzed, and some of these objects have been generalized, resulting in the generalized attack tree of the invention.
    Type: Application
    Filed: December 9, 2016
    Publication date: June 15, 2017
    Inventors: Tamara LEIDERFARB, Lior ARZI, Anandabrata PAL
  • Publication number: 20170171225
    Abstract: Computerized methods and systems determine an entry point or source of an attack on an endpoint, such as a machine, e.g., a computer, node of a network, system or the like. These computerized methods and systems utilize an attack execution/attack or start root, to build an attack tree, which shows the attack on the end point and the damage caused by the attack, as it propagates through the machine, network, system, or the like.
    Type: Application
    Filed: December 9, 2015
    Publication date: June 15, 2017
    Inventors: ANANDABRATA PAL, Lior Arzi, Tamara Leiderfarb
  • Publication number: 20170171224
    Abstract: Computerized methods and systems determine an initial execution of an attack on an endpoint. An indicator of the attack is obtained by analysis of a first process on the endpoint. A sequence of processes that includes the first process associates the initial execution of the attack with the first process. Each respective process in the sequence of processes is created or executed by at least one of the initial execution or a process in the sequence of processes. The initial execution is identified based on linking from the first process to the initial execution through a combination of executions and creations of the processes in the sequence of processes.
    Type: Application
    Filed: December 9, 2015
    Publication date: June 15, 2017
    Inventors: ANANDABRATA PAL, Tamara LEIDERFARB, Lior ARZI
  • Patent number: 8407192
    Abstract: File carving is a technique whereby data files are extracted from a digital device without the assistance of file tables or other disk meta-data, and can therefore be used to recover files that are fragmented. Sequential hypothesis testing procedures are used to detect a fragmentation point of a file by sequentially comparing adjacent pairs of blocks from the starting block of a file until the fragmentation point is reached. The detected fragmentation point can be used to help recover the fragmented file. Such a serial analysis helps to minimize errors and improve performance.
    Type: Grant
    Filed: April 4, 2009
    Date of Patent: March 26, 2013
    Assignee: Polytechnic Institute of New York University
    Inventors: Nasir Memon, Anandabrata Pal
  • Patent number: 7941464
    Abstract: Files can be reassembled from fragments by (a) accepting (or determining) adjacency scores for each pair of fragments from a set of fragments, (b) identifying header fragments from among the fragments of the set of fragments, and (c) for each of the header fragments identified, reconstructing a corresponding one of two or more files from the fragments of the set of fragments such that the sum of the adjacency scores are optimized. Any of the fragments, other than the identified header fragments, are permitted to belong, at least provisionally, to more than one of the at least two files when reconstructing the file(s).
    Type: Grant
    Filed: September 19, 2006
    Date of Patent: May 10, 2011
    Assignee: Polytechnic Institute of New York University
    Inventors: Nasir Memon, Anandabrata Pal, Kulesh Shanmugasundaram
  • Patent number: 7895237
    Abstract: Files can be reassembled from fragments by (a) accepting adjacency scores for each pair of fragments from the set of fragments, (b) identifying header fragments from among the fragments of the set of fragments, and (c) for each of the header fragments identified, reconstructing a corresponding one of the two or more files from the fragments of the set of fragments such that the sum of the adjacency scores are optimized, wherein each of the fragments is permitted to belong to only one of the at least two files, and wherein at least two files are reconstructed such that the results are independent of the order in which the files are reconstructed.
    Type: Grant
    Filed: September 19, 2006
    Date of Patent: February 22, 2011
    Assignee: Polytechnic Institute of New York University
    Inventors: Nasir Memon, Anandabrata Pal, Kulesh Shanmugasundaram
  • Publication number: 20100257146
    Abstract: File carving is a technique whereby data files are extracted from a digital device without the assistance of file tables or other disk meta-data, and can therefore be used to recover files that are fragmented. Sequential hypothesis testing procedures are used to detect a fragmentation point of a file by sequentially comparing adjacent pairs of blocks from the starting block of a file until the fragmentation point is reached. The detected fragmentation point can be used to help recover the fragmented file. Such a serial analysis helps to minimize errors and improve performance.
    Type: Application
    Filed: April 4, 2009
    Publication date: October 7, 2010
    Inventors: Nasir MEMON, Anandabrata Pal
  • Patent number: 7756899
    Abstract: Files can be reassembled from fragments by (a) accepting adjacency scores for each pair of fragments from a set of fragments, (b) identifying header fragments from the set of fragments, and (c) for each of the header fragments, (i) setting a current fragment to the identified header fragment, (ii) selecting, from any of the fragments not identified as a header fragment, a fragment with a best adjacency score with the current fragment, (iii) determining if the selected fragment has a better adjacency score with any of the other fragments not identified as a header than with the current fragment, (iv) if so, then (A) selecting another fragment, from any of the fragments not identified as a header fragment, a fragment with a next best adjacency score with the current fragment, and continuing, and otherwise (A) adding the selected fragment to a reassembly path started with the identified header fragment, and (B) setting the current fragment to the selected fragment, and continuing until the file is reconstructed.
    Type: Grant
    Filed: September 19, 2006
    Date of Patent: July 13, 2010
    Assignee: Polytechnic Institute of New York University
    Inventors: Nasir Memon, Anandabrata Pal, Kulesh Shanmugasundaram
  • Publication number: 20100030820
    Abstract: Files can be reassembled from fragments by (a) accepting adjacency scores for each pair of fragments from the set of fragments, (b) identifying header fragments from among the fragments of the set of fragments, and (c) for each of the header fragments identified, reconstructing a corresponding one of the two or more files from the fragments of the set of fragments such that the sum of the adjacency scores are optimized, wherein each of the fragments is permitted to belong to only one of the at least two files, and wherein at least two files are reconstructed such that the results are independent of the order in which the files are reconstructed.
    Type: Application
    Filed: September 19, 2006
    Publication date: February 4, 2010
    Inventors: Nasir Memon, Anandabrata Pal, Kulesh Shanmugasundaram