Patents by Inventor Paulo Shakarian

Paulo Shakarian has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240134728
    Abstract: Various embodiments for predicting which software vulnerabilities will be exploited by malicious hackers and hence prioritized by patching are disclosed.
    Type: Application
    Filed: October 29, 2023
    Publication date: April 25, 2024
    Inventors: Paulo Shakarian, Mohammed Almukaynizi, Jana Shakarian, Eric Nunes, Krishna Dharaiya, Manoj Balasubramaniam Senguttuvan, Alexander Grimm
  • Patent number: 11892897
    Abstract: Various embodiments for predicting which software vulnerabilities will be exploited by malicious hackers and hence prioritized by patching are disclosed.
    Type: Grant
    Filed: October 26, 2018
    Date of Patent: February 6, 2024
    Assignee: Arizona Board of Regents on Behalf of Arizona State University
    Inventors: Paulo Shakarian, Mohammed Almukaynizi, Jana Shakarian, Eric Nunes, Krishna Dharaiya, Manoj Balasubramaniam Senguttuvan, Alexander Grimm
  • Publication number: 20230388333
    Abstract: Systems and methods for predicting enterprise cyber incidents using social network analysis on the darkweb hacker forums are disclosed.
    Type: Application
    Filed: January 5, 2023
    Publication date: November 30, 2023
    Inventors: Soumajyoti Sarkar, Mohammed Almukaynizi, Jana Shakarian, Paulo Shakarian
  • Patent number: 11693972
    Abstract: Various embodiments of systems and methods for an at-risk system identification via analysis of discussions from various online hacker communities are disclosed herein.
    Type: Grant
    Filed: May 15, 2020
    Date of Patent: July 4, 2023
    Assignee: Arizona Board of Regents on Behalf of Arizona State University
    Inventors: Eric Nunes, Jana Shakarian, Paulo Shakarian, Mohammed Almukaynizi, Harshdeep Singh, Gerardo Simari, Anant Sharma
  • Patent number: 11552976
    Abstract: Systems and methods for predicting enterprise cyber incidents using social network analysis on the darkweb hacker forums are disclosed.
    Type: Grant
    Filed: October 15, 2019
    Date of Patent: January 10, 2023
    Assignees: Arizona Board of Regents on behalf of Arizona State University, Cyber Reconnaissance, Inc.
    Inventors: Soumajyoti Sarkar, Mohammed Almukaynizi, Jana Shakarian, Paulo Shakarian
  • Patent number: 11520900
    Abstract: Various embodiments of a computer-implemented framework for predicting exploitation of software vulnerabilities are disclosed.
    Type: Grant
    Filed: August 22, 2019
    Date of Patent: December 6, 2022
    Assignees: Arizona Board of Regents on Behalf of Arizona State University, University of Southern California
    Inventors: Nazgol Tavabi, Palash Goyal, Kristina Lerman, Mohammed Almukaynizi, Paulo Shakarian
  • Publication number: 20220229912
    Abstract: Various embodiments of a computer-implemented framework for predicting exploitation of software vulnerabilities are disclosed.
    Type: Application
    Filed: August 22, 2019
    Publication date: July 21, 2022
    Applicants: Arizona Board of Regents on Behalf of Arizona State University, University of Southern California
    Inventors: Nazgol Tavabi, Palash Goyal, Kristina Lerman, Mohammed Almukaynizi, Paulo Shakarian
  • Publication number: 20220215102
    Abstract: Embodiments of a computer-implemented system and methods for predicting and/or determining a probability of a cyber-related attack and associated costs are disclosed.
    Type: Application
    Filed: May 20, 2020
    Publication date: July 7, 2022
    Inventors: Paulo Shakarian, Jana Shakarian, Gerardo I. Simari, Harshdeep Singh Sandhu, Anudeep Reddy Sanepalli
  • Publication number: 20220156380
    Abstract: System and methods may detect and mitigate cybersecurity threats to containers. The systems may scan an image of the container using a vulnerability scanner to generate a scan result identifying a cybersecurity vulnerability present in the image. The System may receive threat-intelligence data from a threat intelligence source comprising a first set of information regarding a plurality of cybersecurity vulnerabilities in addition to ground-truth data from a ground-truth data source comprising a second set of information regarding the plurality of cybersecurity vulnerabilities. Ground truth data and threat-intelligence data may be aggregated to generate aggregated data identifying an exploit related to the cybersecurity vulnerability. The aggregated data may be aligned with the scan result to identify the exploit for the cybersecurity vulnerability.
    Type: Application
    Filed: November 16, 2020
    Publication date: May 19, 2022
    Inventors: Piotr Pradzynski, Aditya Shah, Paulo Shakarian, Jana Shakarian
  • Patent number: 11336673
    Abstract: Embodiments for systems and methods for third party assessment related to the evaluation of risks associated with third parties in which hacker conversations on websites are filtered and analyzed using keywords as input to uncover relevant forum and marketplace discussions are disclosed herein.
    Type: Grant
    Filed: May 9, 2019
    Date of Patent: May 17, 2022
    Assignee: Arizona Board of Regents on Behalf of Arizona State University
    Inventors: Eric Nunes, Krishna Dharaiya, Jana Shakarian, Paulo Shakarian
  • Publication number: 20220147533
    Abstract: Embodiments of a computer-implemented system and methods for automated ranking of computer element/asset importance are disclosed.
    Type: Application
    Filed: November 10, 2021
    Publication date: May 12, 2022
    Inventors: Paulo Shakarian, Jana Shakarian, Chandra Mohan
  • Publication number: 20220141247
    Abstract: Embodiments of a computer-implemented system and methods for identifying and analyzing cyber threats and associated vulnerabilities associated with implementation of remote network devices are disclosed.
    Type: Application
    Filed: November 1, 2021
    Publication date: May 5, 2022
    Inventors: Paulo Shakarian, Jana Shakarian, Jacob Cox, Tirth Shah
  • Patent number: 11275900
    Abstract: Embodiments of a computer-implemented system for improving classification of data associated with the deep web or dark net are disclosed.
    Type: Grant
    Filed: May 7, 2019
    Date of Patent: March 15, 2022
    Assignee: Arizona Board of Regents on Behalf of Arizona State University
    Inventors: Revanth Patil, Paulo Shakarian, Ashkan Aleali, Ericsson Marin
  • Publication number: 20220078203
    Abstract: A computing device configured for predictive functions related to cyber threat risk accesses historical cybersecurity event data that lists past attacks on particular companies in different industry vertical classifications. Using vulnerability data associated with each attack, enhanced by metadata specifying vulnerable hardware and/or software stacks associated with the attacks, exemplary technology configurations are created that map industry vertical classifications to vulnerable hardware and/or software stacks. These exemplary technology configurations are used as bases for comparison to subject technology configurations under evaluation.
    Type: Application
    Filed: March 15, 2021
    Publication date: March 10, 2022
    Inventors: Paulo Shakarian, Jana Shakarian, Kazuaki Kashihara
  • Publication number: 20220070196
    Abstract: Systems and methods for predicting enterprise cyber incidents using social network analysis on the darkweb hacker forums are disclosed.
    Type: Application
    Filed: October 15, 2019
    Publication date: March 3, 2022
    Inventors: Soumajyoti Sarkar, Mohammed Almukaynizi, Jana Shakarian, Paulo Shakarian
  • Publication number: 20220004630
    Abstract: Systems may anticipate exploitation of cyber threats to various technologies. The systems may receive threat-intelligence data from a threat intelligence source, extracting a technology identified in the threat-intelligence data, and extract a first tactic from the threat-intelligence data wherein the tactic is associated with the technology. The system may receive ground-truth data from a ground-truth data source and extract a second technology identified in the ground-truth data. The first technology may match the second technology. The system may extract a second tactic from the ground-truth data wherein the tactic is associated with the technology with the first tactic matching the second tactic. The system may train a statistical model to predict threats to at least one of the first technology or the second technology.
    Type: Application
    Filed: June 24, 2021
    Publication date: January 6, 2022
    Inventors: Mohammed Almukaynizi, Paulo Shakarian, Jana Shakarian, Malay Shah
  • Patent number: 11126679
    Abstract: Embodiments of a system and methods for detecting social media designed to spread malicious information to “viral” proportions are disclosed. Historical cascade event data from preselected social media accounts as well as information from related accounts is applied to one or more causality metrics to generate a set of causality values. Causality values are further refined and analyzed to determine how casual a user is with respect to a cascade as opposed to other similar users.
    Type: Grant
    Filed: February 8, 2019
    Date of Patent: September 21, 2021
    Assignee: Arizona Board of Regents on Behalf of Arizona State University
    Inventors: Elham Shaabani, Paulo Shakarian, Hamidreza Alvari, Ruocheng Guo
  • Publication number: 20210288991
    Abstract: Computer-implemented methods and systems for assessing software vulnerabilities through a combination of external threat intelligence and internal information technology data are disclosed.
    Type: Application
    Filed: March 15, 2021
    Publication date: September 16, 2021
    Inventors: Paulo Shakarian, Jana Shakarian, Mohammed Almukaynizi, Malay Shah
  • Publication number: 20210273969
    Abstract: Embodiments of a computer-implemented system and methods for predicting and/or determining a probability of a cyber-related attack in view of data indicative of hacking discussions are disclosed.
    Type: Application
    Filed: June 11, 2020
    Publication date: September 2, 2021
    Inventors: Paulo Shakarian, Jana Shakarian, Harshdeep Singh Sandhu, Mohammed Almukaynizi, Malay Shah
  • Publication number: 20200410028
    Abstract: Embodiments of a system and methods for detecting social media designed to spread malicious information to “viral” proportions are disclosed. Historical cascade event data from preselected social media accounts as well as information from related accounts is applied to one or more causality metrics to generate a set of causality values. Causality values are further refined and analyzed to determine how casual a user is with respect to a cascade as opposed to other similar users.
    Type: Application
    Filed: February 8, 2019
    Publication date: December 31, 2020
    Inventors: Elham Shaabani, Paulo Shakarian, Hamidreza Alvari, Ruocheng Guo