Patents by Inventor ALEXANDER LANDA

ALEXANDER LANDA has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11837389
    Abstract: In accordance with one aspect of the presently disclosed inventive concepts, a magnet includes a material having a chemical formula: YFe3(Ni1-xCox)2, where x is greater than 0 and x is less than 1.
    Type: Grant
    Filed: August 10, 2021
    Date of Patent: December 5, 2023
    Assignee: Lawrence Livermore National Security, LLC
    Inventors: Alexander Landa, Per Soderlind, Emily Moore, Aurelien Perron
  • Publication number: 20210375511
    Abstract: In accordance with one aspect of the presently disclosed inventive concepts, a magnet includes a material having a chemical formula: YFe3(Ni1-xCox)2, where x is greater than 0 and x is less than 1.
    Type: Application
    Filed: August 10, 2021
    Publication date: December 2, 2021
    Inventors: Alexander Landa, Per Soderlind, Emily Moore, Aurelien Perron
  • Publication number: 20200318222
    Abstract: In accordance with one aspect of the presently disclosed inventive concepts, a magnet includes a material having a chemical formula: SmFe3(Ni1?xCox)2, where x is greater than 0 and x is less than 1.
    Type: Application
    Filed: January 17, 2018
    Publication date: October 8, 2020
    Inventors: Alexander Landa, Vincenzo Lordi, Per Soderlind, Patrice Erne A. Turchi
  • Patent number: 9882926
    Abstract: A system for detecting security vulnerabilities in web applications, the system including, a black-box tester configured to provide a payload to a web application during a first interaction with the web application at a computer server, where the payload includes a payload instruction and an identifier, and an execution engine configured to detect the identifier within the payload received during an interaction with the web application subsequent to the first interaction, and determine, responsive to detecting the identifier within the payload, whether the payload instruction underwent a security check prior to execution of the payload instruction.
    Type: Grant
    Filed: October 3, 2016
    Date of Patent: January 30, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Yair Amit, Alexander Landa, Omer Tripp
  • Patent number: 9876816
    Abstract: A system for detecting security vulnerabilities in web applications, the system including, a black-box tester configured to provide a payload to a web application during a first interaction with the web application at a computer server, where the payload includes a payload instruction and an identifier, and an execution engine configured to detect the identifier within the payload received during an interaction with the web application subsequent to the first interaction, and determine, responsive to detecting the identifier within the payload, whether the payload instruction underwent a security check prior to execution of the payload instruction.
    Type: Grant
    Filed: October 3, 2016
    Date of Patent: January 23, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Yair Amit, Alexander Landa, Omer Tripp
  • Publication number: 20170024567
    Abstract: A system for detecting security vulnerabilities in web applications, the system including, a black-box tester configured to provide a payload to a web application during a first interaction with the web application at a computer server, where the payload includes a payload instruction and an identifier, and an execution engine configured to detect the identifier within the payload received during an interaction with the web application subsequent to the first interaction, and determine, responsive to detecting the identifier within the payload, whether the payload instruction underwent a security check prior to execution of the payload instruction.
    Type: Application
    Filed: October 3, 2016
    Publication date: January 26, 2017
    Inventors: YAIR AMIT, ALEXANDER LANDA, OMER TRIPP
  • Publication number: 20170026402
    Abstract: A system for detecting security vulnerabilities in web applications, the system including, a black-box tester configured to provide a payload to a web application during a first interaction with the web application at a computer server, where the payload includes a payload instruction and an identifier, and an execution engine configured to detect the identifier within the payload received during an interaction with the web application subsequent to the first interaction, and determine, responsive to detecting the identifier within the payload, whether the payload instruction underwent a security check prior to execution of the payload instruction.
    Type: Application
    Filed: October 3, 2016
    Publication date: January 26, 2017
    Inventors: YAIR AMIT, ALEXANDER LANDA, OMER TRIPP
  • Patent number: 9471787
    Abstract: A system for detecting security vulnerabilities in web applications, the system including, a black-box tester configured to provide a payload to a web application during a first interaction with the web application at a computer server, where the payload includes a payload instruction and an identifier, and an execution engine configured to detect the identifier within the payload received during an interaction with the web application subsequent to the first interaction, and determine, responsive to detecting the identifier within the payload, whether the payload instruction underwent a security check prior to execution of the payload instruction.
    Type: Grant
    Filed: August 25, 2011
    Date of Patent: October 18, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Yair Amit, Alexander Landa, Omer Tripp
  • Patent number: 9460291
    Abstract: A method for detecting security vulnerabilities in web applications can include providing a payload to a web application during a first interaction with the web application at a computer server, where the payload includes a payload instruction and an identifier, detecting the identifier within the payload received during an interaction with the web application subsequent to the first interaction, and determining, responsive to detecting the identifier within the payload, whether the payload instruction underwent a security check prior to execution of the payload instruction.
    Type: Grant
    Filed: March 26, 2012
    Date of Patent: October 4, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Yair Amit, Alexander Landa, Omer Tripp
  • Patent number: 9390269
    Abstract: Optimized testing of vulnerabilities in an application implemented by a method includes generating a first probe directed to determine whether an application is vulnerable to a first type of attack; analyzing one or more responses from the application based on the application responding to the first probe; in response to determining that the one or more responses from the application validate a first hypothesis about one or more vulnerabilities associated with the application, and generating at least a second probe to further verify the first hypothesis. The second probe focuses on discovering additional details about the application's vulnerabilities to the first type of attack or a second type of attack.
    Type: Grant
    Filed: September 30, 2013
    Date of Patent: July 12, 2016
    Assignee: GLOBALFOUNDRIES INC.
    Inventors: Evgeny Beskrovny, Alexander Landa, Omer Tripp
  • Patent number: 9390270
    Abstract: Optimized testing of vulnerabilities in an application implemented by a method includes generating a first probe directed to determine whether an application is vulnerable to a first type of attack; analyzing one or more responses from the application based on the application responding to the first probe; in response to determining that the one or more responses from the application validate a first hypothesis about one or more vulnerabilities associated with the application, and generating at least a second probe to further verify the first hypothesis. The second probe focuses on discovering additional details about the application's vulnerabilities to the first type of attack or a second type of attack.
    Type: Grant
    Filed: June 3, 2014
    Date of Patent: July 12, 2016
    Assignee: GLOBALFOUNDRIES INC.
    Inventors: Evgeny Beskrovny, Alexander Landa, Omer Tripp
  • Patent number: 9350723
    Abstract: Techniques for determining classifications of defense measures as described herein. Security tokens are identified to be used to test defense measures of a web application. Combinations of security tokens are determined, wherein the combinations of security tokens are related to classifications of the defense measures. A combination is executed at an input point of the web application. Based on the output of the web application received in response to the executed combination, a classification for a defense measure of the web application is determined.
    Type: Grant
    Filed: September 5, 2014
    Date of Patent: May 24, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Alexander Landa, Omer Tripp
  • Patent number: 9231938
    Abstract: Techniques for determining classifications of defense measures as described herein. Security tokens are identified to be used to test defense measures of a web application. Combinations of security tokens are determined, wherein the combinations of security tokens are related to classifications of the defense measures. A combination is executed at an input point of the web application. Based on the output of the web application received in response to the executed combination, a classification for a defense measure of the web application is determined.
    Type: Grant
    Filed: January 15, 2014
    Date of Patent: January 5, 2016
    Assignee: International Business Machines Corporation
    Inventors: Alexander Landa, Omer Tripp
  • Patent number: 9135152
    Abstract: Testing a computer software application by configuring a first computer to execute a copy of data-checking software used by a computer software application at a second computer, processing a first copy of a test data payload using the data-checking software at the first computer, where the test data payload is configured to test for an associated security vulnerability, determining that the first copy of the test data payload is endorsed by the data-checking software at the first computer for further processing, and sending a second copy of the test data payload via a computer network to the computer software application at the second computer for processing threat.
    Type: Grant
    Filed: May 29, 2013
    Date of Patent: September 15, 2015
    Assignee: International Business Machines Corporation
    Inventors: Evgeny Beskrovny, Alexander Landa, Omer Tripp
  • Patent number: 9135153
    Abstract: Testing a computer software application by configuring a first computer to execute a copy of data-checking software used by a computer software application at a second computer, processing a first copy of a test data payload using the data-checking software at the first computer, where the test data payload is configured to test for an associated security vulnerability, determining that the first copy of the test data payload is endorsed by the data-checking software at the first computer for further processing, and sending a second copy of the test data payload via a computer network to the computer software application at the second computer for processing threat.
    Type: Grant
    Filed: March 18, 2014
    Date of Patent: September 15, 2015
    Assignee: International Business Machines Corporation
    Inventors: Evgeny Beskrovny, Alexander Landa, Omer Tripp
  • Publication number: 20150200931
    Abstract: Techniques for determining classifications of defense measures as described herein. Security tokens are identified to be used to test defense measures of a web application. Combinations of security tokens are determined, wherein the combinations of security tokens are related to classifications of the defense measures. A combination is executed at an input point of the web application. Based on the output of the web application received in response to the executed combination, a classification for a defense measure of the web application is determined.
    Type: Application
    Filed: January 15, 2014
    Publication date: July 16, 2015
    Applicant: International Business Machines Corporation
    Inventors: Alexander Landa, Omer Tripp
  • Publication number: 20150200961
    Abstract: Techniques for determining classifications of defense measures as described herein. Security tokens are identified to be used to test defense measures of a web application. Combinations of security tokens are determined, wherein the combinations of security tokens are related to classifications of the defense measures. A combination is executed at an input point of the web application. Based on the output of the web application received in response to the executed combination, a classification for a defense measure of the web application is determined.
    Type: Application
    Filed: September 5, 2014
    Publication date: July 16, 2015
    Inventors: Alexander Landa, Omer Tripp
  • Publication number: 20150096036
    Abstract: Optimized testing of vulnerabilities in an application implemented by a method includes generating a first probe directed to determine whether an application is vulnerable to a first type of attack; analyzing one or more responses from the application based on the application responding to the first probe; in response to determining that the one or more responses from the application validate a first hypothesis about one or more vulnerabilities associated with the application, and generating at least a second probe to further verify the first hypothesis. The second probe focuses on discovering additional details about the application's vulnerabilities to the first type of attack or a second type of attack.
    Type: Application
    Filed: June 3, 2014
    Publication date: April 2, 2015
    Applicant: International Business Machines Corporation
    Inventors: Evgeny Beskrovny, Alexander Landa, Omer Tripp
  • Publication number: 20150096033
    Abstract: Optimized testing of vulnerabilities in an application implemented by a method includes generating a first probe directed to determine whether an application is vulnerable to a first type of attack; analyzing one or more responses from the application based on the application responding to the first probe; in response to determining that the one or more responses from the application validate a first hypothesis about one or more vulnerabilities associated with the application, and generating at least a second probe to further verify the first hypothesis. The second probe focuses on discovering additional details about the application's vulnerabilities to the first type of attack or a second type of attack.
    Type: Application
    Filed: September 30, 2013
    Publication date: April 2, 2015
    Applicant: International Business Machines Corporation
    Inventors: Evgeny Beskrovny, Alexander Landa, Omer Tripp
  • Publication number: 20140359370
    Abstract: Testing a computer software application by configuring a first computer to execute a copy of data-checking software used by a computer software application at a second computer, processing a first copy of a test data payload using the data-checking software at the first computer, where the test data payload is configured to test for an associated security vulnerability, determining that the first copy of the test data payload is endorsed by the data-checking software at the first computer for further processing, and sending a second copy of the test data payload via a computer network to the computer software application at the second computer for processing threat.
    Type: Application
    Filed: May 29, 2013
    Publication date: December 4, 2014
    Inventors: Evgeny Beskrovny, Alexander Landa, Omer Tripp