Patents by Inventor Yona Hollander

Yona Hollander has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11563770
    Abstract: System, device, and method of determining cyber-attack vectors and mitigating cyber-attacks.
    Type: Grant
    Filed: April 14, 2021
    Date of Patent: January 24, 2023
    Assignee: TENABLE, INC.
    Inventors: Itamar Yaakov Mizrahi, Matan Hart, Yona Hollander
  • Publication number: 20220159033
    Abstract: System, device, and method of determining cyber-attack vectors and mitigating cyber-attacks.
    Type: Application
    Filed: April 14, 2021
    Publication date: May 19, 2022
    Inventors: Itamar Yaakov Mizrahi, Matan Hart, Yona Hollander
  • Publication number: 20120131678
    Abstract: A system, method, and computer program product are provided for virtual patching. Initially, information associated with at least one vulnerability of a computer application is collected. Further, at least one host interface is identified that is capable of being used to access the vulnerability. In use, data sent to the at least one host interface is analyzed to determine whether the data is unwanted, based on the information.
    Type: Application
    Filed: January 31, 2012
    Publication date: May 24, 2012
    Inventors: Oded Horovitz, Yona Hollander
  • Patent number: 8132164
    Abstract: A system, method, and computer program product are provided for virtual patching. Initially, information associated with at least one vulnerability of a computer application is collected. Further, at least one host interface is identified that is capable of being used to access the vulnerability. In use, data sent to the at least one host interface is analyzed to determine whether the data is unwanted, based on the information.
    Type: Grant
    Filed: August 1, 2005
    Date of Patent: March 6, 2012
    Assignee: McAfee, Inc.
    Inventors: Oded Horovitz, Yona Hollander
  • Patent number: 7281268
    Abstract: A system, method and computer program product are provided which are capable of intercepting a call. Once intercepted, it is determined whether the call is associated with a previous sequence of calls in order to identify a correct sequence of calls associated with the intercepted call. Next, the call is associated with the correct sequence of calls. State information that is associated with the call is then gathered. Further, sequence state information is updated, and it is determined whether a process is unwanted based, at least in part, on such sequence state information. If it is determined that the process is unwanted, a reaction may be made to the unwanted process. If it is not determined that the process is unwanted, a next call may be intercepted, and so on.
    Type: Grant
    Filed: February 10, 2005
    Date of Patent: October 9, 2007
    Assignee: McAfee, Inc.
    Inventors: Yona Hollander, Oded Horovitz
  • Patent number: 7213153
    Abstract: A method of intercepting application program interface, including dynamic installation of associated software, within the user portion of an operating system. An API interception control server in conjunction with a system call interception module loads into all active process spaces an API interception module. An initializer module within the API interception module hooks and patches all API modules in the active process address space. When called by the application programs, the API routines' flow of execution, by virtue of their patched code, is re-directed into a user-supplied code in a pre-entry routine of the API interception module. The API routine might be completely by-passed or its input parameters might be filtered and changed by the user code. During the operation, the API routine is double-patched by the API interception module to ensure that all simultaneous calls to the API routine will re-direct its flow of control into the API interception module.
    Type: Grant
    Filed: June 22, 2004
    Date of Patent: May 1, 2007
    Assignee: McAfee, Inc.
    Inventors: Yona Hollander, Ophir Rachman, Oded Horovitz
  • Publication number: 20050177752
    Abstract: A system, method and computer program product are provided which are capable of intercepting a call. Once intercepted, it is determined whether the call is associated with a previous sequence of calls in order to identify a correct sequence of calls associated with the intercepted call. Next, the call is associated with the correct sequence of calls. State information that is associated with the call is then gathered. Further, sequence state information is updated, and it is determined whether a process is unwanted based, at least in part, on such sequence state information. If it is determined that the process is unwanted, a reaction may be made to the unwanted process. If it is not determined that the process is unwanted, a next call may be intercepted, and so on.
    Type: Application
    Filed: February 10, 2005
    Publication date: August 11, 2005
    Inventors: Yona Hollander, Oded Horovitz
  • Publication number: 20040237071
    Abstract: A method of intercepting application program interface, including dynamic installation of associated software, within the user portion of an operating system. An API interception control server in conjunction with a system call interception module loads into all active process spaces an API interception module. An initializer module within the API interception module hooks and patches all API modules in the active process address space. When called by the application programs, the API routines' flow of execution, by virtue of their patched code, is re-directed into a user-supplied code in a pre-entry routine of the API interception module. The API routine might be completely by-passed or its input parameters might be filtered and changed by the user code. During the operation, the API routine is double-patched by the API interception module to ensure that all simultaneous calls to the API routine will re-direct its flow of control into the API interception module.
    Type: Application
    Filed: June 22, 2004
    Publication date: November 25, 2004
    Inventors: Yona Hollander, Ophir Rachman, Oded Horovitz
  • Patent number: 6823460
    Abstract: A method of intercepting application program interface, including dynamic installation of associated software, within the user portion of an operating system. An API interception control server in conjunction with a system call interception module loads into all active process spaces an API interception module. An initializer module within the API interception module hooks and patches all API modules in the active process address space. When called by the application programs, the API routines' flow of execution, by virtue of their patched code, is re-directed into a user-supplied code in a pre-entry routine of the API interception module. The API routine might be completely by-passed or its input parameters might be filtered and changed by the user code. During the operation, the API routine is double-patched by the API interception module to ensure that all simultaneous calls to the API routine will re-direct its flow of control into the API interception module.
    Type: Grant
    Filed: April 28, 2000
    Date of Patent: November 23, 2004
    Assignee: Networks Associates Technology, Inc.
    Inventors: Yona Hollander, Ophir Rachman, Oded Horovitz
  • Patent number: 6412071
    Abstract: A method for detecting and preventing unauthorized or illegal attempts to gain enhanced privileges within a computing environment by exploiting the buffer overflow-related weakness of the computer system.
    Type: Grant
    Filed: April 28, 2000
    Date of Patent: June 25, 2002
    Inventors: Yona Hollander, Ophir Rachman, Oded Horovitz
  • Patent number: 6301699
    Abstract: Method for detecting buffer overflow weakness exploitation, including the steps of determining a plurality of threshold parameters, each respective to a buffer overflow weakness exploitation event, analyzing a code to be executed, thereby producing a plurality of validation values, comparing said validation values to the respective ones of the threshold parameters, and determining a buffer overflow weakness exploitation attempt, when at least one of the validation values exceeds the respective one of the threshold parameters.
    Type: Grant
    Filed: March 18, 1999
    Date of Patent: October 9, 2001
    Assignee: Corekt Security Systems, Inc.
    Inventors: Yona Hollander, Ophir Rahman, Shmuel Sagiv, Ury Segal
  • Patent number: 5490269
    Abstract: A computer implemented method for speeding up the recursive most significant digit radix sorting of a set of record keys in which the keys are scanned for a shared or common prefix, coded according to the point in the key where they differ and the value of the differing digit, and processed such that during each dispersion phase the code words are used to speed processing by avoiding comparison matching of the prefixes, the recursive dispersion and collection phases continuing until singletons are reached. In the absence of shared prefixes the keys are normally recursively radix sorted.
    Type: Grant
    Filed: January 13, 1993
    Date of Patent: February 6, 1996
    Assignee: International Business Machines Corporation
    Inventors: Oded Cohn, Shmuel Gal, Yona Hollander, Dafna Sheinwald