Patents by Inventor ALEXANDER LANDA
ALEXANDER LANDA has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11837389Abstract: In accordance with one aspect of the presently disclosed inventive concepts, a magnet includes a material having a chemical formula: YFe3(Ni1-xCox)2, where x is greater than 0 and x is less than 1.Type: GrantFiled: August 10, 2021Date of Patent: December 5, 2023Assignee: Lawrence Livermore National Security, LLCInventors: Alexander Landa, Per Soderlind, Emily Moore, Aurelien Perron
-
Publication number: 20210375511Abstract: In accordance with one aspect of the presently disclosed inventive concepts, a magnet includes a material having a chemical formula: YFe3(Ni1-xCox)2, where x is greater than 0 and x is less than 1.Type: ApplicationFiled: August 10, 2021Publication date: December 2, 2021Inventors: Alexander Landa, Per Soderlind, Emily Moore, Aurelien Perron
-
Publication number: 20200318222Abstract: In accordance with one aspect of the presently disclosed inventive concepts, a magnet includes a material having a chemical formula: SmFe3(Ni1?xCox)2, where x is greater than 0 and x is less than 1.Type: ApplicationFiled: January 17, 2018Publication date: October 8, 2020Inventors: Alexander Landa, Vincenzo Lordi, Per Soderlind, Patrice Erne A. Turchi
-
Patent number: 9882926Abstract: A system for detecting security vulnerabilities in web applications, the system including, a black-box tester configured to provide a payload to a web application during a first interaction with the web application at a computer server, where the payload includes a payload instruction and an identifier, and an execution engine configured to detect the identifier within the payload received during an interaction with the web application subsequent to the first interaction, and determine, responsive to detecting the identifier within the payload, whether the payload instruction underwent a security check prior to execution of the payload instruction.Type: GrantFiled: October 3, 2016Date of Patent: January 30, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Yair Amit, Alexander Landa, Omer Tripp
-
Patent number: 9876816Abstract: A system for detecting security vulnerabilities in web applications, the system including, a black-box tester configured to provide a payload to a web application during a first interaction with the web application at a computer server, where the payload includes a payload instruction and an identifier, and an execution engine configured to detect the identifier within the payload received during an interaction with the web application subsequent to the first interaction, and determine, responsive to detecting the identifier within the payload, whether the payload instruction underwent a security check prior to execution of the payload instruction.Type: GrantFiled: October 3, 2016Date of Patent: January 23, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Yair Amit, Alexander Landa, Omer Tripp
-
Publication number: 20170024567Abstract: A system for detecting security vulnerabilities in web applications, the system including, a black-box tester configured to provide a payload to a web application during a first interaction with the web application at a computer server, where the payload includes a payload instruction and an identifier, and an execution engine configured to detect the identifier within the payload received during an interaction with the web application subsequent to the first interaction, and determine, responsive to detecting the identifier within the payload, whether the payload instruction underwent a security check prior to execution of the payload instruction.Type: ApplicationFiled: October 3, 2016Publication date: January 26, 2017Inventors: YAIR AMIT, ALEXANDER LANDA, OMER TRIPP
-
Publication number: 20170026402Abstract: A system for detecting security vulnerabilities in web applications, the system including, a black-box tester configured to provide a payload to a web application during a first interaction with the web application at a computer server, where the payload includes a payload instruction and an identifier, and an execution engine configured to detect the identifier within the payload received during an interaction with the web application subsequent to the first interaction, and determine, responsive to detecting the identifier within the payload, whether the payload instruction underwent a security check prior to execution of the payload instruction.Type: ApplicationFiled: October 3, 2016Publication date: January 26, 2017Inventors: YAIR AMIT, ALEXANDER LANDA, OMER TRIPP
-
Patent number: 9471787Abstract: A system for detecting security vulnerabilities in web applications, the system including, a black-box tester configured to provide a payload to a web application during a first interaction with the web application at a computer server, where the payload includes a payload instruction and an identifier, and an execution engine configured to detect the identifier within the payload received during an interaction with the web application subsequent to the first interaction, and determine, responsive to detecting the identifier within the payload, whether the payload instruction underwent a security check prior to execution of the payload instruction.Type: GrantFiled: August 25, 2011Date of Patent: October 18, 2016Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Yair Amit, Alexander Landa, Omer Tripp
-
Patent number: 9460291Abstract: A method for detecting security vulnerabilities in web applications can include providing a payload to a web application during a first interaction with the web application at a computer server, where the payload includes a payload instruction and an identifier, detecting the identifier within the payload received during an interaction with the web application subsequent to the first interaction, and determining, responsive to detecting the identifier within the payload, whether the payload instruction underwent a security check prior to execution of the payload instruction.Type: GrantFiled: March 26, 2012Date of Patent: October 4, 2016Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Yair Amit, Alexander Landa, Omer Tripp
-
Patent number: 9390269Abstract: Optimized testing of vulnerabilities in an application implemented by a method includes generating a first probe directed to determine whether an application is vulnerable to a first type of attack; analyzing one or more responses from the application based on the application responding to the first probe; in response to determining that the one or more responses from the application validate a first hypothesis about one or more vulnerabilities associated with the application, and generating at least a second probe to further verify the first hypothesis. The second probe focuses on discovering additional details about the application's vulnerabilities to the first type of attack or a second type of attack.Type: GrantFiled: September 30, 2013Date of Patent: July 12, 2016Assignee: GLOBALFOUNDRIES INC.Inventors: Evgeny Beskrovny, Alexander Landa, Omer Tripp
-
Patent number: 9390270Abstract: Optimized testing of vulnerabilities in an application implemented by a method includes generating a first probe directed to determine whether an application is vulnerable to a first type of attack; analyzing one or more responses from the application based on the application responding to the first probe; in response to determining that the one or more responses from the application validate a first hypothesis about one or more vulnerabilities associated with the application, and generating at least a second probe to further verify the first hypothesis. The second probe focuses on discovering additional details about the application's vulnerabilities to the first type of attack or a second type of attack.Type: GrantFiled: June 3, 2014Date of Patent: July 12, 2016Assignee: GLOBALFOUNDRIES INC.Inventors: Evgeny Beskrovny, Alexander Landa, Omer Tripp
-
Patent number: 9350723Abstract: Techniques for determining classifications of defense measures as described herein. Security tokens are identified to be used to test defense measures of a web application. Combinations of security tokens are determined, wherein the combinations of security tokens are related to classifications of the defense measures. A combination is executed at an input point of the web application. Based on the output of the web application received in response to the executed combination, a classification for a defense measure of the web application is determined.Type: GrantFiled: September 5, 2014Date of Patent: May 24, 2016Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Alexander Landa, Omer Tripp
-
Patent number: 9231938Abstract: Techniques for determining classifications of defense measures as described herein. Security tokens are identified to be used to test defense measures of a web application. Combinations of security tokens are determined, wherein the combinations of security tokens are related to classifications of the defense measures. A combination is executed at an input point of the web application. Based on the output of the web application received in response to the executed combination, a classification for a defense measure of the web application is determined.Type: GrantFiled: January 15, 2014Date of Patent: January 5, 2016Assignee: International Business Machines CorporationInventors: Alexander Landa, Omer Tripp
-
Patent number: 9135153Abstract: Testing a computer software application by configuring a first computer to execute a copy of data-checking software used by a computer software application at a second computer, processing a first copy of a test data payload using the data-checking software at the first computer, where the test data payload is configured to test for an associated security vulnerability, determining that the first copy of the test data payload is endorsed by the data-checking software at the first computer for further processing, and sending a second copy of the test data payload via a computer network to the computer software application at the second computer for processing threat.Type: GrantFiled: March 18, 2014Date of Patent: September 15, 2015Assignee: International Business Machines CorporationInventors: Evgeny Beskrovny, Alexander Landa, Omer Tripp
-
Patent number: 9135152Abstract: Testing a computer software application by configuring a first computer to execute a copy of data-checking software used by a computer software application at a second computer, processing a first copy of a test data payload using the data-checking software at the first computer, where the test data payload is configured to test for an associated security vulnerability, determining that the first copy of the test data payload is endorsed by the data-checking software at the first computer for further processing, and sending a second copy of the test data payload via a computer network to the computer software application at the second computer for processing threat.Type: GrantFiled: May 29, 2013Date of Patent: September 15, 2015Assignee: International Business Machines CorporationInventors: Evgeny Beskrovny, Alexander Landa, Omer Tripp
-
Publication number: 20150200931Abstract: Techniques for determining classifications of defense measures as described herein. Security tokens are identified to be used to test defense measures of a web application. Combinations of security tokens are determined, wherein the combinations of security tokens are related to classifications of the defense measures. A combination is executed at an input point of the web application. Based on the output of the web application received in response to the executed combination, a classification for a defense measure of the web application is determined.Type: ApplicationFiled: January 15, 2014Publication date: July 16, 2015Applicant: International Business Machines CorporationInventors: Alexander Landa, Omer Tripp
-
Publication number: 20150200961Abstract: Techniques for determining classifications of defense measures as described herein. Security tokens are identified to be used to test defense measures of a web application. Combinations of security tokens are determined, wherein the combinations of security tokens are related to classifications of the defense measures. A combination is executed at an input point of the web application. Based on the output of the web application received in response to the executed combination, a classification for a defense measure of the web application is determined.Type: ApplicationFiled: September 5, 2014Publication date: July 16, 2015Inventors: Alexander Landa, Omer Tripp
-
Publication number: 20150096036Abstract: Optimized testing of vulnerabilities in an application implemented by a method includes generating a first probe directed to determine whether an application is vulnerable to a first type of attack; analyzing one or more responses from the application based on the application responding to the first probe; in response to determining that the one or more responses from the application validate a first hypothesis about one or more vulnerabilities associated with the application, and generating at least a second probe to further verify the first hypothesis. The second probe focuses on discovering additional details about the application's vulnerabilities to the first type of attack or a second type of attack.Type: ApplicationFiled: June 3, 2014Publication date: April 2, 2015Applicant: International Business Machines CorporationInventors: Evgeny Beskrovny, Alexander Landa, Omer Tripp
-
Publication number: 20150096033Abstract: Optimized testing of vulnerabilities in an application implemented by a method includes generating a first probe directed to determine whether an application is vulnerable to a first type of attack; analyzing one or more responses from the application based on the application responding to the first probe; in response to determining that the one or more responses from the application validate a first hypothesis about one or more vulnerabilities associated with the application, and generating at least a second probe to further verify the first hypothesis. The second probe focuses on discovering additional details about the application's vulnerabilities to the first type of attack or a second type of attack.Type: ApplicationFiled: September 30, 2013Publication date: April 2, 2015Applicant: International Business Machines CorporationInventors: Evgeny Beskrovny, Alexander Landa, Omer Tripp
-
Publication number: 20140359779Abstract: Testing a computer software application by configuring a first computer to execute a copy of data-checking software used by a computer software application at a second computer, processing a first copy of a test data payload using the data-checking software at the first computer, where the test data payload is configured to test for an associated security vulnerability, determining that the first copy of the test data payload is endorsed by the data-checking software at the first computer for further processing, and sending a second copy of the test data payload via a computer network to the computer software application at the second computer for processing threat.Type: ApplicationFiled: March 18, 2014Publication date: December 4, 2014Applicant: International Business Machines CorporationInventors: Evgeny Beskrovny, Alexander Landa, Omer Tripp