Patents by Inventor Boris Ruchansky

Boris Ruchansky has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8806629
    Abstract: A system and method for specification of a policy to trigger automatic signature generation, refinement, and confidence characterization is provided. The system monitors incoming payloads and identifies untrusted payloads based on specified characteristics of the process including process name, triggering action, prior actions and/or state and/or conditions. Signatures are automatically generated for untrusted payloads and stored. Additionally, the system enables denial-of-service (DoS) protection based on the number of signature-generation attempts that allows the server process to continue providing service on unaffected interfaces.
    Type: Grant
    Filed: January 2, 2008
    Date of Patent: August 12, 2014
    Assignee: Cisco Technology, Inc.
    Inventors: Mikhail Cherepov, Andrew Zawadowskiy, Jeffrey Albin Kraemer, Boris Ruchansky
  • Patent number: 8474044
    Abstract: Techniques are disclosed for verifying whether payload signatures correspond to a vulnerability or exploit. Generally a security system may be configured to detect an attack on a server while the server is processing a payload. The security system generates (or obtains) a provisional signature corresponding to the vulnerability. For example, a provisional signature may be generated for a vulnerability from a group of payloads determined to correspond to that vulnerability. The effects of subsequent payloads which match the provisional signature may be monitored. If the effects of a payload duplicate the attack symptoms, a confidence metric for provisional signature may be increased. Once the confidence metric exceeds a predetermined threshold, then the provisional signature may be made active and used to block traffic from reaching an intended destination.
    Type: Grant
    Filed: January 5, 2009
    Date of Patent: June 25, 2013
    Assignee: Cisco Technology, Inc
    Inventors: Andrew Zawadowskiy, Boris Ruchansky, Mikhail Cherepov
  • Publication number: 20100175132
    Abstract: Techniques are disclosed for verifying whether payload signatures correspond to a vulnerability or exploit. Generally a security system may be configured to detect an attack on a server while the server is processing a payload. The security system generates (or obtains) a provisional signature corresponding to the vulnerability. For example, a provisional signature may be generated for a vulnerability from a group of payloads determined to correspond to that vulnerability. The effects of subsequent payloads which match the provisional signature may be monitored. If the effects of a payload duplicate the attack symptoms, a confidence metric for provisional signature may be increased. Once the confidence metric exceeds a predetermined threshold, then the provisional signature may be made active and used to block traffic from reaching an intended destination.
    Type: Application
    Filed: January 5, 2009
    Publication date: July 8, 2010
    Inventors: ANDREW ZAWADOWSKIY, Boris Ruchansky, Mikhail Cherepov
  • Patent number: 7607041
    Abstract: A system creates a secondary stack containing execution information of at least one function operating on the computer system, and receives an attack notification of an attack on the computer system. The system determines a point in the secondary stack at which a recovery from the attack is possible. In one embodiment, the system then generates a signature of the attack based on the execution information contained within the secondary stack.
    Type: Grant
    Filed: May 1, 2006
    Date of Patent: October 20, 2009
    Assignee: Cisco Technology, Inc.
    Inventors: Jeffrey A. Kraemer, Andrew Zawadowskiy, Boris Ruchansky
  • Publication number: 20070174912
    Abstract: A system creates a secondary stack containing execution information of at least one function operating on the computer system, and receives an attack notification of an attack on the computer system. The system determines a point in the secondary stack at which a recovery from the attack is possible. In one embodiment, the system then generates a signature of the attack based on the execution information contained within the secondary stack.
    Type: Application
    Filed: May 1, 2006
    Publication date: July 26, 2007
    Inventors: Jeffrey Kraemer, Andrew Zawadowskiy, Boris Ruchansky