Patents by Inventor Andrew Zawadowskiy

Andrew Zawadowskiy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7607041
    Abstract: A system creates a secondary stack containing execution information of at least one function operating on the computer system, and receives an attack notification of an attack on the computer system. The system determines a point in the secondary stack at which a recovery from the attack is possible. In one embodiment, the system then generates a signature of the attack based on the execution information contained within the secondary stack.
    Type: Grant
    Filed: May 1, 2006
    Date of Patent: October 20, 2009
    Assignee: Cisco Technology, Inc.
    Inventors: Jeffrey A. Kraemer, Andrew Zawadowskiy, Boris Ruchansky
  • Publication number: 20070256127
    Abstract: A system receives information from at least one security interceptor associated with at least one computer system. The information identifies details associated with a traffic flow in a computer system of the computer networking environment. The system determines a probability that an attack on the computer system is in progress based on a probabilistic link provided by the information. The probabilistic link is determined by attack information associated with previous attacks. Based on the information provided by the at least one security interceptor, the system generates a signature utilized to prevent a similar attack on the computer system.
    Type: Application
    Filed: August 4, 2006
    Publication date: November 1, 2007
    Inventors: Jeffrey A. Kraemer, Andrew Zawadowskiy
  • Publication number: 20070174912
    Abstract: A system creates a secondary stack containing execution information of at least one function operating on the computer system, and receives an attack notification of an attack on the computer system. The system determines a point in the secondary stack at which a recovery from the attack is possible. In one embodiment, the system then generates a signature of the attack based on the execution information contained within the secondary stack.
    Type: Application
    Filed: May 1, 2006
    Publication date: July 26, 2007
    Inventors: Jeffrey Kraemer, Andrew Zawadowskiy, Boris Ruchansky
  • Publication number: 20070143850
    Abstract: A system defines at least one key event to be monitored by at least one agent, and creates a graphical model for the at least one key event. The system observes the at least one key event. The system infers a degree of attack on the computer system based on an observation of the at least one key event in conjunction with a result of an effect the at least one key event has on the graphical model. The system then adjusts a security policy based on an output of the graphical model.
    Type: Application
    Filed: May 1, 2006
    Publication date: June 21, 2007
    Inventors: Jeffrey Kraemer, Andrew Zawadowskiy
  • Publication number: 20070143847
    Abstract: A system inserts at least one notifying identifier in the computer system. The at least one notifying identifier provides execution information associated with the computer system. The system receives execution information from the at least one notifying identifier, the execution information identifies details associated with a traffic flow on the computer system. The system then generates a signature based on a deterministic link provided by the execution information provided by the at least one notifying identifier. The signature is utilized to prevent further damage caused to the computer system by at least one attack.
    Type: Application
    Filed: May 1, 2006
    Publication date: June 21, 2007
    Inventors: Jeffrey Kraemer, Andrew Zawadowskiy, Philip Gladstone
  • Publication number: 20070143848
    Abstract: A system detects an attack on the computer system. The system identifies the attack as polymorphic, capable of modifying itself for every instance of execution of the attack. The modification of the attack is utilized to defeat detection of the attack. In one embodiment, the system determines generation of an effective signature of the attack has failed. The signature is utilized to prevent execution of the attack. The system then adjusts access to an interface to prevent further damage caused to the computer system by the attack.
    Type: Application
    Filed: May 1, 2006
    Publication date: June 21, 2007
    Inventors: Jeffrey Kraemer, Andrew Zawadowskiy