Patents by Inventor Gianluca Cangini

Gianluca Cangini has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8443446
    Abstract: A system for identifying malicious messages transmitted over a mobile communication network includes: sentinel modules associated with respective mobile terminals in the network for monitoring messages passing therethrough, wherein the sentinel modules identify as a candidate malicious message, any message passing through the mobile terminals and failing to comply with a first set of patterns and issue a corresponding sentinel identification message; a set of probe modules for monitoring messages transmitted over the network, wherein the probe modules identify as a candidate malicious message any message transmitted over the network and failing to comply with a second set of patterns and issue a corresponding probe identification message; and preferably at least one client honeypot module for receiving and processing any messages sent thereto to produce corresponding processing results, wherein the client honeypot module identifies as a candidate malicious message any message producing a processing result fai
    Type: Grant
    Filed: March 27, 2006
    Date of Patent: May 14, 2013
    Assignee: Telecom Italia S.p.A.
    Inventors: Gerardo Lamastra, Gianluca Cangini, Francesco Coda Zabetta, Luigi Sperti
  • Patent number: 8443439
    Abstract: A honeypot system for protecting a mobile communication network against malware includes one or more user-less mobile devices including a monitoring module for monitoring the events conveying software applications in the associated mobile device as well as a controller client module that emulates human-like interaction with the user-less devices as a function of the events monitored. The system controllably performs, for the applications conveyed by the events monitored, one or more of the following steps: i) installing the application on the device; ii) executing the application installed on the device; and iii) de-installing the application from the device. After any of these steps, the state of the device is checked in order to detect if any anomalous variation has occurred in the state of the device indicative of the device being exposed to the risk of malware. If any anomalous variation is detected, the system issues a malware alert message.
    Type: Grant
    Filed: October 31, 2006
    Date of Patent: May 14, 2013
    Assignee: Telecom Italia S.p.A.
    Inventors: Gerardo Lamastra, Paolo Abeni, Gianluca Cangini, Francesco Coda Zabetta
  • Publication number: 20120151585
    Abstract: A system for identifying malicious messages transmitted over a mobile communication network includes: sentinel modules associated with respective mobile terminals in the network for monitoring messages passing therethrough, wherein the sentinel modules identify as a candidate malicious message, any message passing through the mobile terminals and failing to comply with a first set of patterns and issue a corresponding sentinel identification message; a set of probe modules for monitoring messages transmitted over the network, wherein the probe modules identify as a candidate malicious message any message transmitted over the network and failing to comply with a second set of patterns and issue a corresponding probe identification message; and preferably at least one client honeypot module for receiving and processing any messages sent thereto to produce corresponding processing results, wherein the client honeypot module identifies as a candidate malicious message any message producing a processing result fai
    Type: Application
    Filed: March 27, 2006
    Publication date: June 14, 2012
    Inventors: Gerardo Lamastra, Gianluca Cangini, Francesco Coda Zabetta, Luigi Sperti
  • Patent number: 8185955
    Abstract: Intrusions in a system under surveillance are detected by matching the events occurring during operation of the system against a knowledge base including information on events which occurred during a learning phase. The detection technique includes the steps of: recording, during the learning phase, temporal data related to the events during the learning phase; identifying, as a function of the temporal data recorded, a dynamic part of the knowledge base; discovering patterns that cover the dynamic part of the knowledge base; and using, during the analysis phase, a regular expression match at least with respect to the dynamic part of the knowledge base.
    Type: Grant
    Filed: November 26, 2004
    Date of Patent: May 22, 2012
    Assignee: Telecom Italia S.p.A.
    Inventors: Gianluca Cangini, Francesco Coda Zabetta, Gerardo Lamastra
  • Publication number: 20090144823
    Abstract: A honeypot system for protecting a mobile communication network against malware includes one or more user-less mobile devices including a monitoring module for monitoring the events conveying software applications in the associated mobile device as well as a controller client module that emulates human-like interaction with the user-less devices as a function of the events monitored. The system controllably performs, for the applications conveyed by the events monitored, one or more of the following steps: i) installing the application on the device; ii) executing the application installed on the device; and iii) de-installing the application from the- device. After any of these steps, the state of the device is checked in order to detect if any anomalous variation has occurred in the state of the device indicative of the device being exposed to the risk of malware. If any anomalous variation is detected, the system issues a malware alert message.
    Type: Application
    Filed: October 31, 2006
    Publication date: June 4, 2009
    Inventors: Gerardo Lamastra, Paolo Abeni, Gianluca Cangini, Francesco Coda Zabetta
  • Publication number: 20070300301
    Abstract: Intrusions in a system under surveillance are detected by matching the events occurring during operation of the system against a knowledge base including information on events which occurred during a learning phase. The detection technique includes the steps of: recording, during the learning phase, temporal data related to the events during the learning phase; identifying, as a function of the temporal data recorded, a dynamic part of the knowledge base; discovering patterns that cover the dynamic part of the knowledge base; and using, during the analysis phase, a regular expression match at least with respect to the dynamic part of the knowledge base.
    Type: Application
    Filed: November 26, 2004
    Publication date: December 27, 2007
    Inventors: Gianluca Cangini, Francesco Coda Zabetta, Gerardo Lamastra
  • Publication number: 20070107052
    Abstract: Apparatus for monitoring operation of a processing system includes a set of modules for monitoring operation of a set of system primitives that allocate or release the system resources and are used by different processes running on the system. Preferably, the modules include at least one application knowledge module tracking the processes running on the system and monitoring the resources used thereby, a network knowledge module monitoring connections by the processes running on the system, a file-system analysis module monitoring the file-related operations performed within the system, and a device monitoring module monitoring operation of commonly used modules with the system. A preferred field of application is in host-based intrusion detection systems.
    Type: Application
    Filed: December 17, 2003
    Publication date: May 10, 2007
    Inventors: Gianluca Cangini, Gerardo Lamastra, Francesco Coda Zabetta, Paolo Abeni, Madalina Baltatu, Rosalia D'Alessandro, Stefano Brusotti, Sebastiano Di Paola, Manuel Leone, Federico Frosali