Patents by Inventor Carlos Emilio Sarraute Yamada

Carlos Emilio Sarraute Yamada has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8490196
    Abstract: A system and method for extending automated penetration testing of a target network is provided. The method comprises: computing a scenario, comprises the steps of: translating a workspace having at least one target computer in the target network, to a planning definition language, translating penetration modules available in a penetration testing framework to a planning definition language, and defining a goal in the target network and translating the goal into a planning definition language; building a knowledge database with information regarding the target network, properties of hosts in the network, parameters and running history of modules in the penetration testing framework; and running an attack plan solver module, comprising: running an attack planner using the scenario as input, to produce at least one attack plan that achieves the goal, and executing actions defined in the at least one attack plan against the target network from the penetration testing framework.
    Type: Grant
    Filed: August 5, 2010
    Date of Patent: July 16, 2013
    Assignee: Core Security Technologies
    Inventors: Jorge Lucangeli Obes, Carlos Emilio Sarraute Yamada, Gerardo Gabriel Richarte
  • Patent number: 8490193
    Abstract: A system and method for automated probabilistic planning of network attacks against infrastructures of computer networks and applications is provided. The embodiments automate the analysis and probabilistic planning of multi-step attacks to computer and application networks (in particular in the context of automating penetration tests), optimizing with respect to one of the following metrics: the probability of success of the actions, a numerical parameter that must be minimized (e.g., running time), or the number of logs generated by the control devices in the target network.
    Type: Grant
    Filed: September 8, 2010
    Date of Patent: July 16, 2013
    Assignee: Core Security Technologies
    Inventors: Carlos Emilio Sarraute Yamada, Ariel Futoransky, Gerardo Gabriel Richarte, Jorge Lucangeli Obes
  • Patent number: 8356353
    Abstract: The present invention provides a system and method for providing computer network attack simulation. The method includes the steps of: receiving a network configuration and setup description; simulating the network configuration based on the received network configuration; receiving at least one confirmed vulnerability of at least one computer, machine, or network device in the simulated network; receiving a method for compromising the confirmed vulnerability of the at least one computer, machine, or network device; and virtually installing a network agent on the at least one computer, machine, or network device, wherein the network agent allows a penetration tester to execute arbitrary operating system calls on the at least one computer, machine, or network device.
    Type: Grant
    Filed: June 26, 2008
    Date of Patent: January 15, 2013
    Assignee: Core SDI, Incorporated
    Inventors: Ariel Futoransky, Fernando Carlos Miranda, Jose Ignacio Orlicki, Carlos Emilio Sarraute Yamada
  • Publication number: 20110061104
    Abstract: A system and method for automated probabilistic planning of network attacks against infrastructures of computer networks and applications is provided. The embodiments automate the analysis and probabilistic planning of multi-step attacks to computer and application networks (in particular in the context of automating penetration tests), optimizing with respect to one of the following metrics: the probability of success of the actions, a numerical parameter that must be minimized (e.g., running time), or the number of logs generated by the control devices in the target network.
    Type: Application
    Filed: September 8, 2010
    Publication date: March 10, 2011
    Applicant: CORE SDI, INC.
    Inventors: Carlos Emilio Sarraute Yamada, Ariel Futoransky, Gerardo Gabriel Richarte, Jorge Lucangeli Obes
  • Publication number: 20110035803
    Abstract: A system and method for extending automated penetration testing of a target network is provided. The method comprises: computing a scenario, comprises the steps of: translating a workspace having at least one target computer in the target network, to a planning definition language, translating penetration modules available in a penetration testing framework to a planning definition language, and defining a goal in the target network and translating the goal into a planning definition language; building a knowledge database with information regarding the target network, properties of hosts in the network, parameters and running history of modules in the penetration testing framework; and running an attack plan solver module, comprising: running an attack planner using the scenario as input, to produce at least one attack plan that achieves the goal, and executing actions defined in the at least one attack plan against the target network from the penetration testing framework.
    Type: Application
    Filed: August 5, 2010
    Publication date: February 10, 2011
    Applicant: Core Security Technologies
    Inventors: Jorge Lucangeli Obes, Carlos Emilio Sarraute Yamada, Gerardo Gabriel Richarte
  • Patent number: 7549147
    Abstract: A method for protecting software is provided, where source code for the software has a first directive marking an encryption beginning point and a second directive marking an encryption end point. The method contains the steps of: processing the source code to identify a block of code between the first and second directives; compiling the source code to produce a binary file; generating a valid key and a random string; encrypting the random string with the key to obtain a first encrypted value; encrypting a portion of the binary file corresponding to the block of code with the valid key to obtain a second encrypted value; and replacing the portion of the binary file corresponding to the block of code with the second encrypted value and code that can decrypt the second encrypted value during execution of the software.
    Type: Grant
    Filed: April 15, 2003
    Date of Patent: June 16, 2009
    Assignee: Core SDI, Incorporated
    Inventors: Ariel Futoransky, Carlos Emilio Sarraute Yamada, Diego Ariel Bendersky, Luciano Notarfrancesco, Ariel Waissbein
  • Publication number: 20090007270
    Abstract: The present invention provides a system and method for providing computer network attack simulation. The method includes the steps of: receiving a network configuration and setup description; simulating the network configuration based on the received network configuration; receiving at least one confirmed vulnerability of at least one computer, machine, or network device in the simulated network; receiving a method for compromising the confirmed vulnerability of the at least one computer, machine, or network device; and virtually installing a network agent on the at least one computer, machine, or network device, wherein the network agent allows a penetration tester to execute arbitrary operating system calls on the at least one computer, machine, or network device.
    Type: Application
    Filed: June 26, 2008
    Publication date: January 1, 2009
    Applicant: Core SDI, Inc
    Inventors: Ariel Futoransky, Fernando Carlos Miranda, Jose Ignacio Orlicki, Carlos Emilio Sarraute Yamada
  • Publication number: 20030221116
    Abstract: A security framework is provided for protecting software. The source code for the software has directives marking portions of the source code to be modified or encrypted. The source code is modified using a random factor based on the directives. The source code is compiled to produce a binary file. Source code starting and ending lines and binary file positions of each of the blocks to be encrypted are stored. Portions of the binary file that correspond to each of these blocks are encrypted. Each of these blocks is decrypted when a function inside the block is required during execution of the software.
    Type: Application
    Filed: April 15, 2003
    Publication date: November 27, 2003
    Applicant: Core SDI, Incorporated
    Inventors: Ariel Futoransky, Carlos Emilio Sarraute Yamada, Diego Ariel Bendersky, Luciano Notarfrancesco, Ariel Waissbein