Patents by Inventor Alessandro Paolo CERRUTI

Alessandro Paolo CERRUTI has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240134060
    Abstract: Disclosed herein are system, method, and computer program product embodiments for adapting to malware activity on a compromised computer system by detecting timing anomalies between timing signals. An embodiment operates by analyzing first timing data accessed from a validated source and second timing data accessed from an unvalidated receiver source in order to compute a threat detection value, which is utilized to determine if there is a discrepancy or anomaly in the timing or frequency of either the validated and unvalidated sources.
    Type: Application
    Filed: December 15, 2023
    Publication date: April 25, 2024
    Applicant: The MITRE Corporation
    Inventors: Darrow Paine LEIBNER, Alessandro Paolo CERRUTI
  • Patent number: 11892547
    Abstract: Disclosed herein are system, method, and computer program product embodiments for adapting to malware activity on a compromised computer system by detecting timing anomalies between timing signals. An embodiment operates by analyzing first timing data accessed from a validated source and second timing data accessed from an unvalidated receiver source in order to compute a threat detection value, which is utilized to determine if there is a discrepancy or anomaly in the timing or frequency of either the validated and unvalidated sources.
    Type: Grant
    Filed: October 12, 2021
    Date of Patent: February 6, 2024
    Assignee: THE MITRE CORPORATION
    Inventors: Darrow Paine Leibner, Alessandro Paolo Cerruti
  • Publication number: 20220206165
    Abstract: Disclosed herein are system, method, and computer program product embodiments for adapting to malware activity on a compromised computer system by detecting timing anomalies between timing signals. An embodiment operates by analyzing first timing data accessed from a validated source and second timing data accessed from an unvalidated receiver source in order to compute a threat detection value, which is utilized to determine if there is a discrepancy or anomaly in the timing or frequency of either the validated and unvalidated sources.
    Type: Application
    Filed: October 12, 2021
    Publication date: June 30, 2022
    Inventors: Darrow Paine LEIBNER, Alessandro Paolo CERRUTI
  • Patent number: 11143764
    Abstract: Disclosed herein are system, method, and computer program product embodiments for adapting to malware activity on a compromised computer system by detecting timing anomalies between timing signals. An embodiment operates by analyzing first timing data accessed from a validated source and second timing data accessed from an unvalidated receiver source in order to compute a threat detection value, which is utilized to determine if there is a discrepancy or anomaly in the timing or frequency of either the validated and unvalidated sources.
    Type: Grant
    Filed: October 15, 2019
    Date of Patent: October 12, 2021
    Assignee: The MITRE Corporation
    Inventors: Darrow Paine Leibner, Alessandro Paolo Cerruti
  • Publication number: 20200049834
    Abstract: Disclosed herein are system, method, and computer program product embodiments for adapting to malware activity on a compromised computer system by detecting timing anomalies between timing signals. An embodiment operates by analyzing first timing data accessed from a validated source and second timing data accessed from an unvalidated receiver source in order to compute a threat detection value, which is utilized to determine if there is a discrepancy or anomaly in the timing or frequency of either the validated and unvalidated sources.
    Type: Application
    Filed: October 15, 2019
    Publication date: February 13, 2020
    Inventors: Darrow Paine LEIBNER, Alessandro Paolo CERRUTI
  • Patent number: 10444372
    Abstract: Disclosed herein are system, method, and computer program product embodiments for adapting to malware activity on a compromised computer system by detecting timing anomalies between timing signals. An embodiment operates by analyzing first timing data accessed from a validated source and second timing data accessed from an unvalidated receiver source in order to compute a threat detection value, which is utilized to determine if there is a discrepancy or anomaly in the timing or frequency of either the validated and unvalidated sources.
    Type: Grant
    Filed: January 10, 2017
    Date of Patent: October 15, 2019
    Assignee: The MITRE Corporation
    Inventors: Darrow Paine Leibner, Alessandro Paolo Cerruti
  • Publication number: 20170146665
    Abstract: Disclosed herein are system, method, and computer program product embodiments for adapting to malware activity on a compromised computer system by detecting timing anomalies between timing signals. An embodiment operates by analyzing first timing data accessed from a validated source and second timing data accessed from an unvalidated receiver source in order to compute a threat detection value, which is utilized to determine if there is a discrepancy or anomaly in the timing or frequency of either the validated and unvalidated sources.
    Type: Application
    Filed: January 10, 2017
    Publication date: May 25, 2017
    Inventors: Darrow Paine LEIBNER, Alessandro Paolo CERRUTI
  • Patent number: 9541649
    Abstract: Disclosed herein are system, method, and computer program product embodiments for adapting to malware activity on a compromised computer system. An embodiment operates by detecting an active adversary operating malware on a compromised system. A stream of data traffic associated with active adversary is intercepted. The stream of data traffic includes a command and control channel of the active adversary. The stream of data traffic is accessed. An emulation of the command and control channel is provided. An analysis of the accessed stream of traffic is executed. A plurality of response mechanisms is provided. The plurality of response mechanisms is based in part on the analysis of the stream of data traffic and a custom policy language tailored for the malware.
    Type: Grant
    Filed: May 2, 2013
    Date of Patent: January 10, 2017
    Assignee: The Mitre Corporation
    Inventors: Darrow Paine Leibner, Alessandro Paolo Cerruti
  • Publication number: 20140327573
    Abstract: Disclosed herein are system, method, and computer program product embodiments for adapting to malware activity on a compromised computer system. An embodiment operates by detecting an active adversary operating malware on a compromised system. A stream of data traffic associated with active adversary is intercepted. The stream of data traffic includes a command and control channel of the active adversary. The stream of data traffic is accessed. An emulation of the command and control channel is provided. An analysis of the accessed stream of traffic is executed. A plurality of response mechanisms is provided. The plurality of response mechanisms is based in part on the analysis of the stream of data traffic and a custom policy language tailored for the malware.
    Type: Application
    Filed: May 2, 2013
    Publication date: November 6, 2014
    Applicant: The MITRE Corporation
    Inventors: Darrow Paine LEIBNER, Alessandro Paolo CERRUTI