Patents by Inventor Jana Shakarian

Jana Shakarian has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240176890
    Abstract: Various embodiments of systems and methods for an at-risk system identification via analysis of discussions from various online hacker communities are disclosed herein.
    Type: Application
    Filed: June 28, 2023
    Publication date: May 30, 2024
    Applicants: Arizona Board of Regents on Behalf of Arizona State University, Cyber Reconnaissance, Inc.
    Inventors: Eric Nunes, Jana Shakarian, Paulo Shakarian, Mohammed Almukaynizi, Harshdeep Singh, Gerardo Simari, Anant Sharma
  • Publication number: 20240134728
    Abstract: Various embodiments for predicting which software vulnerabilities will be exploited by malicious hackers and hence prioritized by patching are disclosed.
    Type: Application
    Filed: October 29, 2023
    Publication date: April 25, 2024
    Inventors: Paulo Shakarian, Mohammed Almukaynizi, Jana Shakarian, Eric Nunes, Krishna Dharaiya, Manoj Balasubramaniam Senguttuvan, Alexander Grimm
  • Patent number: 11892897
    Abstract: Various embodiments for predicting which software vulnerabilities will be exploited by malicious hackers and hence prioritized by patching are disclosed.
    Type: Grant
    Filed: October 26, 2018
    Date of Patent: February 6, 2024
    Assignee: Arizona Board of Regents on Behalf of Arizona State University
    Inventors: Paulo Shakarian, Mohammed Almukaynizi, Jana Shakarian, Eric Nunes, Krishna Dharaiya, Manoj Balasubramaniam Senguttuvan, Alexander Grimm
  • Publication number: 20230388333
    Abstract: Systems and methods for predicting enterprise cyber incidents using social network analysis on the darkweb hacker forums are disclosed.
    Type: Application
    Filed: January 5, 2023
    Publication date: November 30, 2023
    Inventors: Soumajyoti Sarkar, Mohammed Almukaynizi, Jana Shakarian, Paulo Shakarian
  • Patent number: 11693972
    Abstract: Various embodiments of systems and methods for an at-risk system identification via analysis of discussions from various online hacker communities are disclosed herein.
    Type: Grant
    Filed: May 15, 2020
    Date of Patent: July 4, 2023
    Assignee: Arizona Board of Regents on Behalf of Arizona State University
    Inventors: Eric Nunes, Jana Shakarian, Paulo Shakarian, Mohammed Almukaynizi, Harshdeep Singh, Gerardo Simari, Anant Sharma
  • Patent number: 11552976
    Abstract: Systems and methods for predicting enterprise cyber incidents using social network analysis on the darkweb hacker forums are disclosed.
    Type: Grant
    Filed: October 15, 2019
    Date of Patent: January 10, 2023
    Assignees: Arizona Board of Regents on behalf of Arizona State University, Cyber Reconnaissance, Inc.
    Inventors: Soumajyoti Sarkar, Mohammed Almukaynizi, Jana Shakarian, Paulo Shakarian
  • Publication number: 20220215102
    Abstract: Embodiments of a computer-implemented system and methods for predicting and/or determining a probability of a cyber-related attack and associated costs are disclosed.
    Type: Application
    Filed: May 20, 2020
    Publication date: July 7, 2022
    Inventors: Paulo Shakarian, Jana Shakarian, Gerardo I. Simari, Harshdeep Singh Sandhu, Anudeep Reddy Sanepalli
  • Publication number: 20220156380
    Abstract: System and methods may detect and mitigate cybersecurity threats to containers. The systems may scan an image of the container using a vulnerability scanner to generate a scan result identifying a cybersecurity vulnerability present in the image. The System may receive threat-intelligence data from a threat intelligence source comprising a first set of information regarding a plurality of cybersecurity vulnerabilities in addition to ground-truth data from a ground-truth data source comprising a second set of information regarding the plurality of cybersecurity vulnerabilities. Ground truth data and threat-intelligence data may be aggregated to generate aggregated data identifying an exploit related to the cybersecurity vulnerability. The aggregated data may be aligned with the scan result to identify the exploit for the cybersecurity vulnerability.
    Type: Application
    Filed: November 16, 2020
    Publication date: May 19, 2022
    Inventors: Piotr Pradzynski, Aditya Shah, Paulo Shakarian, Jana Shakarian
  • Patent number: 11336673
    Abstract: Embodiments for systems and methods for third party assessment related to the evaluation of risks associated with third parties in which hacker conversations on websites are filtered and analyzed using keywords as input to uncover relevant forum and marketplace discussions are disclosed herein.
    Type: Grant
    Filed: May 9, 2019
    Date of Patent: May 17, 2022
    Assignee: Arizona Board of Regents on Behalf of Arizona State University
    Inventors: Eric Nunes, Krishna Dharaiya, Jana Shakarian, Paulo Shakarian
  • Publication number: 20220147533
    Abstract: Embodiments of a computer-implemented system and methods for automated ranking of computer element/asset importance are disclosed.
    Type: Application
    Filed: November 10, 2021
    Publication date: May 12, 2022
    Inventors: Paulo Shakarian, Jana Shakarian, Chandra Mohan
  • Publication number: 20220141247
    Abstract: Embodiments of a computer-implemented system and methods for identifying and analyzing cyber threats and associated vulnerabilities associated with implementation of remote network devices are disclosed.
    Type: Application
    Filed: November 1, 2021
    Publication date: May 5, 2022
    Inventors: Paulo Shakarian, Jana Shakarian, Jacob Cox, Tirth Shah
  • Publication number: 20220078203
    Abstract: A computing device configured for predictive functions related to cyber threat risk accesses historical cybersecurity event data that lists past attacks on particular companies in different industry vertical classifications. Using vulnerability data associated with each attack, enhanced by metadata specifying vulnerable hardware and/or software stacks associated with the attacks, exemplary technology configurations are created that map industry vertical classifications to vulnerable hardware and/or software stacks. These exemplary technology configurations are used as bases for comparison to subject technology configurations under evaluation.
    Type: Application
    Filed: March 15, 2021
    Publication date: March 10, 2022
    Inventors: Paulo Shakarian, Jana Shakarian, Kazuaki Kashihara
  • Publication number: 20220070196
    Abstract: Systems and methods for predicting enterprise cyber incidents using social network analysis on the darkweb hacker forums are disclosed.
    Type: Application
    Filed: October 15, 2019
    Publication date: March 3, 2022
    Inventors: Soumajyoti Sarkar, Mohammed Almukaynizi, Jana Shakarian, Paulo Shakarian
  • Publication number: 20220004630
    Abstract: Systems may anticipate exploitation of cyber threats to various technologies. The systems may receive threat-intelligence data from a threat intelligence source, extracting a technology identified in the threat-intelligence data, and extract a first tactic from the threat-intelligence data wherein the tactic is associated with the technology. The system may receive ground-truth data from a ground-truth data source and extract a second technology identified in the ground-truth data. The first technology may match the second technology. The system may extract a second tactic from the ground-truth data wherein the tactic is associated with the technology with the first tactic matching the second tactic. The system may train a statistical model to predict threats to at least one of the first technology or the second technology.
    Type: Application
    Filed: June 24, 2021
    Publication date: January 6, 2022
    Inventors: Mohammed Almukaynizi, Paulo Shakarian, Jana Shakarian, Malay Shah
  • Publication number: 20210365837
    Abstract: Various embodiments of a system and associated method for determining a social structure in unstructured and/or structured social media forums are disclosed herein.
    Type: Application
    Filed: May 19, 2021
    Publication date: November 25, 2021
    Applicants: Arizona Board of Regents on Behalf of Arizona State University, Cyber Reconnaissance, Inc.
    Inventors: Kazuaki Kashihara, Jana Shakarian
  • Publication number: 20210349975
    Abstract: Various embodiments of a system and associated method for generating and training a name-entity recognition model for automatic dataset labeling and corpus generation for cybersecurity related entities are disclosed.
    Type: Application
    Filed: April 30, 2021
    Publication date: November 11, 2021
    Applicant: Arizona Board of Regents on Behalf of Arizona State University
    Inventors: Kazuaki Kashihara, Jana Shakarian
  • Publication number: 20210288991
    Abstract: Computer-implemented methods and systems for assessing software vulnerabilities through a combination of external threat intelligence and internal information technology data are disclosed.
    Type: Application
    Filed: March 15, 2021
    Publication date: September 16, 2021
    Inventors: Paulo Shakarian, Jana Shakarian, Mohammed Almukaynizi, Malay Shah
  • Publication number: 20210273969
    Abstract: Embodiments of a computer-implemented system and methods for predicting and/or determining a probability of a cyber-related attack in view of data indicative of hacking discussions are disclosed.
    Type: Application
    Filed: June 11, 2020
    Publication date: September 2, 2021
    Inventors: Paulo Shakarian, Jana Shakarian, Harshdeep Singh Sandhu, Mohammed Almukaynizi, Malay Shah
  • Publication number: 20200364349
    Abstract: Various embodiments of systems and methods for an at-risk system identification via analysis of discussions from various online hacker communities are disclosed herein.
    Type: Application
    Filed: May 15, 2020
    Publication date: November 19, 2020
    Inventors: Eric Nunes, Jana Shakarian, Paulo Shakarian, Mohammed Almukaynizi, Harshdeep Singh, Gerardo Simari, Anant Sharma
  • Publication number: 20200356675
    Abstract: Various embodiments for predicting which software vulnerabilities will be exploited by malicious hackers and hence prioritized by patching are disclosed.
    Type: Application
    Filed: October 26, 2018
    Publication date: November 12, 2020
    Inventors: Paulo Shakarian, Mohammed Almukaynizi, Jana Shakarian, Eric Nunes, Krishna Dharaiya, Manoj Balasubramaniam Senguttuvan, Alexander Grimm