Patents by Inventor Allon Adir
Allon Adir has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9928378Abstract: Embodiments include method, systems and computer program products for protecting sensitive data. Aspects include accessing computer readable program instructions having one or more output commands. Aspects also include locating the one or more output commands in the computer readable program instructions. Aspects also include identifying target output variables and output constants in the one or more output commands. Aspects also include modifying the computer readable program instructions to append one or more obfuscate commands to the target output variables.Type: GrantFiled: October 12, 2016Date of Patent: March 27, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Allon Adir, Ehud Aharoni, Lev Greenberg, Roza Miroshnikov, Asaf Polakovski
-
Patent number: 9898395Abstract: According to one exemplary embodiment, a method for preparing a software component for verification is provided. The method may include receiving the software component and a design model. The method may also include generating a wrapper program based on the received software component and the received design model. The method may then include associating the received software component with the generated wrapper program. The method may further include determining a plurality of inputs for the received software component based on the received design model. The method may also include sending the determined plurality of inputs and the received software component with associated wrapper program to a verification tool.Type: GrantFiled: January 9, 2017Date of Patent: February 20, 2018Assignee: International Business Machines CorporationInventors: Allon Adir, Fady Copty, Dmitry Pidan, Tamer Salman
-
Patent number: 9886369Abstract: A computer-implemented method and apparatus for fabricating data for database applications. The method comprises intercepting a command issued by an application, the command being addressed to a database; formulating a problem in accordance with the command; obtaining a solution for the problem, the solution comprising fabricated data; providing a second command for updating the database with the fabricated data; and providing the command to the database, whereby a response from the database based on the fabricated data is provided to the application.Type: GrantFiled: November 13, 2011Date of Patent: February 6, 2018Assignee: International Business Machines CorporationInventors: Allon Adir, Ronen Levy, Tamer Salman
-
Patent number: 9875175Abstract: According to one exemplary embodiment, a method for preparing a software component for verification is provided. The method may include receiving the software component and a design model. The method may also include generating a wrapper program based on the received software component and the received design model. The method may then include associating the received software component with the generated wrapper program. The method may further include determining a plurality of inputs for the received software component based on the received design model. The method may also include sending the determined plurality of inputs and the received software component with associated wrapper program to a verification tool.Type: GrantFiled: September 25, 2015Date of Patent: January 23, 2018Assignee: International Business Machines CorporationInventors: Allon Adir, Fady Copty, Dmitry Pidan, Tamer Salman
-
Patent number: 9870313Abstract: According to one exemplary embodiment, a method for preparing a software component for verification is provided. The method may include receiving the software component and a design model. The method may also include generating a wrapper program based on the received software component and the received design model. The method may then include associating the received software component with the generated wrapper program. The method may further include determining a plurality of inputs for the received software component based on the received design model. The method may also include sending the determined plurality of inputs and the received software component with associated wrapper program to a verification tool.Type: GrantFiled: January 9, 2017Date of Patent: January 16, 2018Assignee: International Business Machines CorporationInventors: Allon Adir, Fady Copty, Dmitry Pidan, Tamer Salman
-
Publication number: 20170295189Abstract: Embodiments of the present invention may provide the capability to identify security breaches in computer systems from clustering properties of clusters generated based on monitored behavior of users of the computer systems by using techniques that provide improved performance and reduced resource requirements. For example, behavior of users or resources may be monitored and analyzed to generate clusters and train clustering models. Labeling information relating to some user or resource may be received. When users or resources are clustered and when a cluster contains some labeled users/resources then an anomaly score can be determined for a user/resource belonging to the cluster. A user or resource may be detected to be an outlier of at least one cluster to which the user or resource has been assigned, and an alert indicating detection of the outlier may be generated.Type: ApplicationFiled: April 11, 2016Publication date: October 12, 2017Inventors: ALLON ADIR, Ehud Aharoni, Lev Greenberg, Oded Margalit, Rosa Miroshnikov, Oded Sofer, Boris Rozenberg
-
Publication number: 20170154280Abstract: Incremental generation of models with dynamic clustering. A first set of data is received. A first set of clusters based on the first set of data is generated. A respective first set of models for the first set of clusters is created. A second set of data is received. A second set of clusters, based on the second set of data and based on a subset of the first set of data, is generated. A respective second set of models for the second set of clusters, based on a subset of the first set of models and based on the second set of data, is created.Type: ApplicationFiled: December 1, 2015Publication date: June 1, 2017Inventors: Allon Adir, Ehud Aharoni, Oded Margalit
-
Publication number: 20170147831Abstract: Embodiments include method, systems and computer program products for protecting sensitive data. Aspects include accessing computer readable program instructions having one or more output commands. Aspects also include locating the one or more output commands in the computer readable program instructions. Aspects also include identifying target output variables and output constants in the one or more output commands. Aspects also include modifying the computer readable program instructions to append one or more obfuscate commands to the target output variables.Type: ApplicationFiled: October 12, 2016Publication date: May 25, 2017Inventors: Allon Adir, Ehud Aharoni, Lev Greenberg, Roza Miroshnikov, Asaf Polakovski
-
Publication number: 20170109254Abstract: According to one exemplary embodiment, a method for preparing a software component for verification is provided. The method may include receiving the software component and a design model. The method may also include generating a wrapper program based on the received software component and the received design model. The method may then include associating the received software component with the generated wrapper program. The method may further include determining a plurality of inputs for the received software component based on the received design model. The method may also include sending the determined plurality of inputs and the received software component with associated wrapper program to a verification tool.Type: ApplicationFiled: January 9, 2017Publication date: April 20, 2017Inventors: Allon Adir, Fady Copty, Dmitry Pidan, Tamer Salman
-
Publication number: 20170109255Abstract: According to one exemplary embodiment, a method for preparing a software component for verification is provided. The method may include receiving the software component and a design model. The method may also include generating a wrapper program based on the received software component and the received design model. The method may then include associating the received software component with the generated wrapper program. The method may further include determining a plurality of inputs for the received software component based on the received design model. The method may also include sending the determined plurality of inputs and the received software component with associated wrapper program to a verification tool.Type: ApplicationFiled: January 9, 2017Publication date: April 20, 2017Inventors: Allon Adir, Fady Copty, Dmitry Pidan, Tamer Salman
-
Publication number: 20170091081Abstract: According to one exemplary embodiment, a method for preparing a software component for verification is provided. The method may include receiving the software component and a design model. The method may also include generating a wrapper program based on the received software component and the received design model. The method may then include associating the received software component with the generated wrapper program. The method may further include determining a plurality of inputs for the received software component based on the received design model. The method may also include sending the determined plurality of inputs and the received software component with associated wrapper program to a verification tool.Type: ApplicationFiled: March 8, 2016Publication date: March 30, 2017Inventors: Allon Adir, Fady Copty, Dmitry Pidan, Tamer Salman
-
Publication number: 20170091068Abstract: According to one exemplary embodiment, a method for preparing a software component for verification is provided. The method may include receiving the software component and a design model. The method may also include generating a wrapper program based on the received software component and the received design model. The method may then include associating the received software component with the generated wrapper program. The method may further include determining a plurality of inputs for the received software component based on the received design model. The method may also include sending the determined plurality of inputs and the received software component with associated wrapper program to a verification tool.Type: ApplicationFiled: September 25, 2015Publication date: March 30, 2017Inventors: Allon Adir, Fady Copty, Dmitry Pidan, Tamer Salman
-
Patent number: 9588877Abstract: According to one exemplary embodiment, a method for preparing a software component for verification is provided. The method may include receiving the software component and a design model. The method may also include generating a wrapper program based on the received software component and the received design model. The method may then include associating the received software component with the generated wrapper program. The method may further include determining a plurality of inputs for the received software component based on the received design model. The method may also include sending the determined plurality of inputs and the received software component with associated wrapper program to a verification tool.Type: GrantFiled: March 8, 2016Date of Patent: March 7, 2017Assignee: International Business Machines CorporationInventors: Allon Adir, Fady Copty, Dmitry Pidan, Tamer Salman
-
Patent number: 9501654Abstract: Embodiments include method, systems and computer program products for protecting sensitive data. Aspects include accessing computer readable program instructions having one or more output commands. Aspects also include locating the one or more output commands in the computer readable program instructions. Aspects also include identifying target output variables and output constants in the one or more output commands. Aspects also include modifying the computer readable program instructions to append one or more obfuscate commands to the target output variables.Type: GrantFiled: November 19, 2015Date of Patent: November 22, 2016Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Allon Adir, Ehud Aharoni, Lev Greenberg, Roza Miroshnikov, Asaf Polakovski
-
Publication number: 20150046138Abstract: A method comprising using at least one hardware processor for: providing a plurality of behavioral models of vehicular components; providing a plurality of simulated vehicular components; providing a model of interaction between at least some of said vehicular components; and generating a simulation test for said vehicular components by defining continuous behavioral functions for said plurality of behavioral models and for said plurality of simulated vehicular components, wherein each of said continuous behavioral functions comprises a superimposition of a finite number of continuous functions each having a finite number of parameters, and wherein at least some of said continuous behavioral functions interrelate in accordance with said model of interaction.Type: ApplicationFiled: August 7, 2013Publication date: February 12, 2015Applicant: International Business Machines CorporationInventors: Allon ADIR, Alex GORYACHEV, Tamer SALMAN, Gil SHUREK
-
Patent number: 8892386Abstract: An apparatus and a computer-implemented method performed by a computerized device, comprising: generating a collection of test data for testing one or more domains, wherein the test data is useful for post-silicon verification of hardware devices; selecting a subset of the collection of test data in accordance with a hardware device to be tested and at least one of the domains to be tested with respect to the hardware device; and indexing the subset of the collection of test data to obtain an indexed collection.Type: GrantFiled: July 10, 2011Date of Patent: November 18, 2014Assignee: International Business Machines CorporationInventors: Allon Adir, Eyal Bin, Shady Copty, Anatoly Koyfman, Shimon Landa, Amir Nahir, Vitali Sokhin, Elena Tsanko
-
Patent number: 8806270Abstract: A computer-implemented method and apparatus, comprising: having a plurality of processing entities operating substantially concurrently in a computerized platform enabling transaction operations, wherein the plurality of processing entities comprise two or more entities adapted to store values, and one or more entity adapted to load values, wherein each writing entity is associated with a private memory location within a memory unit; storing symbols into an associated target memory location by each of the entities adapted to store values, wherein symbols are stored according to a predetermined order, wherein a symbol is stored using a transaction; loading a multiplicity of private memory locations by the at least one entity adapted to load values, to obtain loaded values; and analyzing the loaded values for at least one invariant.Type: GrantFiled: November 14, 2011Date of Patent: August 12, 2014Assignee: International Business Machines CorporationInventors: Allon Adir, Dimtry Krestyashyn, Charles Meissner, Amir Nahir
-
Publication number: 20140214396Abstract: A method, system and computer program product for creation of specification properties for a visual model of a system. The specification properties are useful for verification of a verification model corresponding to the visual model. The computer-implemented method comprising automatically generating, by a processor, a specification property for a verification model based on a selection by a user of at least one element in a visual model, wherein the visual model defines a computerized system, wherein the verification model corresponds to the visual model.Type: ApplicationFiled: January 28, 2013Publication date: July 31, 2014Applicant: International Business Machines CorporationInventors: Allon Adir, Natalia Razinkov, Tamer Salman, Karen Yorav
-
Patent number: 8589734Abstract: An operation of a processor in respect to transactions is checked by simulating an execution of a test program, and updating a transaction order graph to identify a cycle. The graph is updated based on a value read during an execution of a first transaction and a second transaction that is the configured to set the memory with the read value. The test program comprises information useful for identifying the second transaction.Type: GrantFiled: August 26, 2010Date of Patent: November 19, 2013Assignee: International Business Machines CorporationInventors: Allon Adir, John Martin Ludden, Avi Ziv
-
Patent number: 8516229Abstract: A test code generation technique that replaces instructions having a machine state dependent result with special redirection instructions provides generation of test code in which state dependent execution choices are made without a state model. Redirection instructions cause execution of a handler than examines the machine state and replaces the redirection instruction with a replacement instruction having a desired result resolved in accordance with the current machine state. The instructions that are replaced may be conditional branch instructions and the result a desired execution path. The examination of the machine state permits determination of a branch condition for the replacement instruction so that the next pass of the test code executes along the desired path. Alternatively, the handler can execute a jump to the branch instruction, causing immediate execution of the desired branch path.Type: GrantFiled: February 5, 2010Date of Patent: August 20, 2013Assignee: International Business Machines CorporationInventors: Allon Adir, Brad Lee Herold, John Martin Ludden, Pedro Martin-de-Nicolas, Charles Leverett Meissner, Gil Eliezer Shurek