Patents Assigned to Narf Industries, LLC
  • Patent number: 10805336
    Abstract: A system and method for identifying and preventing vulnerability exploitation is provided. The system comprises a processor and memory. The memory stores one or more programs comprising instructions to execute a method. The method first comprises comparing a first version of a software module with a second version of a software module. Second, the system determines one or more differences between the first version and the second version. Next, the system represents the one or more differences as symbolic constraints. Last, the system generates a firewall for identifying exploitative input using the symbolic constraints.
    Type: Grant
    Filed: December 5, 2018
    Date of Patent: October 13, 2020
    Assignee: Narf Industries, LLC
    Inventors: Paul Makowski, Benjamin Schmidt
  • Publication number: 20190116201
    Abstract: A system and method for identifying and preventing vulnerability exploitation is provided. The system comprises a processor and memory. The memory stores one or more programs comprising instructions to execute a method. The method first comprises comparing a first version of a software module with a second version of a software module. Second, the system determines one or more differences between the first version and the second version. Next, the system represents the one or more differences as symbolic constraints. Last, the system generates a firewall for identifying exploitative input using the symbolic constraints.
    Type: Application
    Filed: December 5, 2018
    Publication date: April 18, 2019
    Applicant: Narf Industries, LLC
    Inventors: PAUL MAKOWSKI, Benjamin Schmidt
  • Publication number: 20180181498
    Abstract: A system and method is provided for secure establishment of a trusted enclave among co-privileged executable code. The system comprises one or more processors; execute only memory; and one or more programs stored in the memory. The one or more programs comprise instructions to establish a trusted enclave and an untrusted enclave in kernel space code, wherein the trusted enclave and the untrusted enclave are co-privileged from the perspective of the processor. The trusted code has the ability to modify page tables and the untrusted code does not have the ability to modify page tables. Any changes to memory mappings involve the trusted code. Page tables are mapped as read-only during execution of the untrusted code and mapped as writeable only during execution of the trusted code.
    Type: Application
    Filed: December 28, 2017
    Publication date: June 28, 2018
    Applicant: Narf Industries, LLC
    Inventors: Paul E. Makowski, Benjamin L. Schmidt, Maxwell J. Koo
  • Publication number: 20170019422
    Abstract: A system and method for identifying and preventing vulnerability exploitation is provided. The system comprises a processor and memory. The memory stores one or more programs comprising instructions to execute a method. The method first comprises comparing a first version of a software module with a second version of a software module. Second, the system determines one or more differences between the first version and the second version. Next, the system represents the one or more differences as symbolic constraints. Last, the system generates a firewall for identifying exploitative input using the symbolic constraints.
    Type: Application
    Filed: July 13, 2016
    Publication date: January 19, 2017
    Applicant: Narf Industries, LLC
    Inventors: Paul Makowski, Benjamin Schmidt