Patents by Inventor Allon Adir

Allon Adir has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9928378
    Abstract: Embodiments include method, systems and computer program products for protecting sensitive data. Aspects include accessing computer readable program instructions having one or more output commands. Aspects also include locating the one or more output commands in the computer readable program instructions. Aspects also include identifying target output variables and output constants in the one or more output commands. Aspects also include modifying the computer readable program instructions to append one or more obfuscate commands to the target output variables.
    Type: Grant
    Filed: October 12, 2016
    Date of Patent: March 27, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Allon Adir, Ehud Aharoni, Lev Greenberg, Roza Miroshnikov, Asaf Polakovski
  • Patent number: 9898395
    Abstract: According to one exemplary embodiment, a method for preparing a software component for verification is provided. The method may include receiving the software component and a design model. The method may also include generating a wrapper program based on the received software component and the received design model. The method may then include associating the received software component with the generated wrapper program. The method may further include determining a plurality of inputs for the received software component based on the received design model. The method may also include sending the determined plurality of inputs and the received software component with associated wrapper program to a verification tool.
    Type: Grant
    Filed: January 9, 2017
    Date of Patent: February 20, 2018
    Assignee: International Business Machines Corporation
    Inventors: Allon Adir, Fady Copty, Dmitry Pidan, Tamer Salman
  • Patent number: 9886369
    Abstract: A computer-implemented method and apparatus for fabricating data for database applications. The method comprises intercepting a command issued by an application, the command being addressed to a database; formulating a problem in accordance with the command; obtaining a solution for the problem, the solution comprising fabricated data; providing a second command for updating the database with the fabricated data; and providing the command to the database, whereby a response from the database based on the fabricated data is provided to the application.
    Type: Grant
    Filed: November 13, 2011
    Date of Patent: February 6, 2018
    Assignee: International Business Machines Corporation
    Inventors: Allon Adir, Ronen Levy, Tamer Salman
  • Patent number: 9875175
    Abstract: According to one exemplary embodiment, a method for preparing a software component for verification is provided. The method may include receiving the software component and a design model. The method may also include generating a wrapper program based on the received software component and the received design model. The method may then include associating the received software component with the generated wrapper program. The method may further include determining a plurality of inputs for the received software component based on the received design model. The method may also include sending the determined plurality of inputs and the received software component with associated wrapper program to a verification tool.
    Type: Grant
    Filed: September 25, 2015
    Date of Patent: January 23, 2018
    Assignee: International Business Machines Corporation
    Inventors: Allon Adir, Fady Copty, Dmitry Pidan, Tamer Salman
  • Patent number: 9870313
    Abstract: According to one exemplary embodiment, a method for preparing a software component for verification is provided. The method may include receiving the software component and a design model. The method may also include generating a wrapper program based on the received software component and the received design model. The method may then include associating the received software component with the generated wrapper program. The method may further include determining a plurality of inputs for the received software component based on the received design model. The method may also include sending the determined plurality of inputs and the received software component with associated wrapper program to a verification tool.
    Type: Grant
    Filed: January 9, 2017
    Date of Patent: January 16, 2018
    Assignee: International Business Machines Corporation
    Inventors: Allon Adir, Fady Copty, Dmitry Pidan, Tamer Salman
  • Publication number: 20170295189
    Abstract: Embodiments of the present invention may provide the capability to identify security breaches in computer systems from clustering properties of clusters generated based on monitored behavior of users of the computer systems by using techniques that provide improved performance and reduced resource requirements. For example, behavior of users or resources may be monitored and analyzed to generate clusters and train clustering models. Labeling information relating to some user or resource may be received. When users or resources are clustered and when a cluster contains some labeled users/resources then an anomaly score can be determined for a user/resource belonging to the cluster. A user or resource may be detected to be an outlier of at least one cluster to which the user or resource has been assigned, and an alert indicating detection of the outlier may be generated.
    Type: Application
    Filed: April 11, 2016
    Publication date: October 12, 2017
    Inventors: ALLON ADIR, Ehud Aharoni, Lev Greenberg, Oded Margalit, Rosa Miroshnikov, Oded Sofer, Boris Rozenberg
  • Publication number: 20170154280
    Abstract: Incremental generation of models with dynamic clustering. A first set of data is received. A first set of clusters based on the first set of data is generated. A respective first set of models for the first set of clusters is created. A second set of data is received. A second set of clusters, based on the second set of data and based on a subset of the first set of data, is generated. A respective second set of models for the second set of clusters, based on a subset of the first set of models and based on the second set of data, is created.
    Type: Application
    Filed: December 1, 2015
    Publication date: June 1, 2017
    Inventors: Allon Adir, Ehud Aharoni, Oded Margalit
  • Publication number: 20170147831
    Abstract: Embodiments include method, systems and computer program products for protecting sensitive data. Aspects include accessing computer readable program instructions having one or more output commands. Aspects also include locating the one or more output commands in the computer readable program instructions. Aspects also include identifying target output variables and output constants in the one or more output commands. Aspects also include modifying the computer readable program instructions to append one or more obfuscate commands to the target output variables.
    Type: Application
    Filed: October 12, 2016
    Publication date: May 25, 2017
    Inventors: Allon Adir, Ehud Aharoni, Lev Greenberg, Roza Miroshnikov, Asaf Polakovski
  • Publication number: 20170109254
    Abstract: According to one exemplary embodiment, a method for preparing a software component for verification is provided. The method may include receiving the software component and a design model. The method may also include generating a wrapper program based on the received software component and the received design model. The method may then include associating the received software component with the generated wrapper program. The method may further include determining a plurality of inputs for the received software component based on the received design model. The method may also include sending the determined plurality of inputs and the received software component with associated wrapper program to a verification tool.
    Type: Application
    Filed: January 9, 2017
    Publication date: April 20, 2017
    Inventors: Allon Adir, Fady Copty, Dmitry Pidan, Tamer Salman
  • Publication number: 20170109255
    Abstract: According to one exemplary embodiment, a method for preparing a software component for verification is provided. The method may include receiving the software component and a design model. The method may also include generating a wrapper program based on the received software component and the received design model. The method may then include associating the received software component with the generated wrapper program. The method may further include determining a plurality of inputs for the received software component based on the received design model. The method may also include sending the determined plurality of inputs and the received software component with associated wrapper program to a verification tool.
    Type: Application
    Filed: January 9, 2017
    Publication date: April 20, 2017
    Inventors: Allon Adir, Fady Copty, Dmitry Pidan, Tamer Salman
  • Publication number: 20170091081
    Abstract: According to one exemplary embodiment, a method for preparing a software component for verification is provided. The method may include receiving the software component and a design model. The method may also include generating a wrapper program based on the received software component and the received design model. The method may then include associating the received software component with the generated wrapper program. The method may further include determining a plurality of inputs for the received software component based on the received design model. The method may also include sending the determined plurality of inputs and the received software component with associated wrapper program to a verification tool.
    Type: Application
    Filed: March 8, 2016
    Publication date: March 30, 2017
    Inventors: Allon Adir, Fady Copty, Dmitry Pidan, Tamer Salman
  • Publication number: 20170091068
    Abstract: According to one exemplary embodiment, a method for preparing a software component for verification is provided. The method may include receiving the software component and a design model. The method may also include generating a wrapper program based on the received software component and the received design model. The method may then include associating the received software component with the generated wrapper program. The method may further include determining a plurality of inputs for the received software component based on the received design model. The method may also include sending the determined plurality of inputs and the received software component with associated wrapper program to a verification tool.
    Type: Application
    Filed: September 25, 2015
    Publication date: March 30, 2017
    Inventors: Allon Adir, Fady Copty, Dmitry Pidan, Tamer Salman
  • Patent number: 9588877
    Abstract: According to one exemplary embodiment, a method for preparing a software component for verification is provided. The method may include receiving the software component and a design model. The method may also include generating a wrapper program based on the received software component and the received design model. The method may then include associating the received software component with the generated wrapper program. The method may further include determining a plurality of inputs for the received software component based on the received design model. The method may also include sending the determined plurality of inputs and the received software component with associated wrapper program to a verification tool.
    Type: Grant
    Filed: March 8, 2016
    Date of Patent: March 7, 2017
    Assignee: International Business Machines Corporation
    Inventors: Allon Adir, Fady Copty, Dmitry Pidan, Tamer Salman
  • Patent number: 9501654
    Abstract: Embodiments include method, systems and computer program products for protecting sensitive data. Aspects include accessing computer readable program instructions having one or more output commands. Aspects also include locating the one or more output commands in the computer readable program instructions. Aspects also include identifying target output variables and output constants in the one or more output commands. Aspects also include modifying the computer readable program instructions to append one or more obfuscate commands to the target output variables.
    Type: Grant
    Filed: November 19, 2015
    Date of Patent: November 22, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Allon Adir, Ehud Aharoni, Lev Greenberg, Roza Miroshnikov, Asaf Polakovski
  • Publication number: 20150046138
    Abstract: A method comprising using at least one hardware processor for: providing a plurality of behavioral models of vehicular components; providing a plurality of simulated vehicular components; providing a model of interaction between at least some of said vehicular components; and generating a simulation test for said vehicular components by defining continuous behavioral functions for said plurality of behavioral models and for said plurality of simulated vehicular components, wherein each of said continuous behavioral functions comprises a superimposition of a finite number of continuous functions each having a finite number of parameters, and wherein at least some of said continuous behavioral functions interrelate in accordance with said model of interaction.
    Type: Application
    Filed: August 7, 2013
    Publication date: February 12, 2015
    Applicant: International Business Machines Corporation
    Inventors: Allon ADIR, Alex GORYACHEV, Tamer SALMAN, Gil SHUREK
  • Patent number: 8892386
    Abstract: An apparatus and a computer-implemented method performed by a computerized device, comprising: generating a collection of test data for testing one or more domains, wherein the test data is useful for post-silicon verification of hardware devices; selecting a subset of the collection of test data in accordance with a hardware device to be tested and at least one of the domains to be tested with respect to the hardware device; and indexing the subset of the collection of test data to obtain an indexed collection.
    Type: Grant
    Filed: July 10, 2011
    Date of Patent: November 18, 2014
    Assignee: International Business Machines Corporation
    Inventors: Allon Adir, Eyal Bin, Shady Copty, Anatoly Koyfman, Shimon Landa, Amir Nahir, Vitali Sokhin, Elena Tsanko
  • Patent number: 8806270
    Abstract: A computer-implemented method and apparatus, comprising: having a plurality of processing entities operating substantially concurrently in a computerized platform enabling transaction operations, wherein the plurality of processing entities comprise two or more entities adapted to store values, and one or more entity adapted to load values, wherein each writing entity is associated with a private memory location within a memory unit; storing symbols into an associated target memory location by each of the entities adapted to store values, wherein symbols are stored according to a predetermined order, wherein a symbol is stored using a transaction; loading a multiplicity of private memory locations by the at least one entity adapted to load values, to obtain loaded values; and analyzing the loaded values for at least one invariant.
    Type: Grant
    Filed: November 14, 2011
    Date of Patent: August 12, 2014
    Assignee: International Business Machines Corporation
    Inventors: Allon Adir, Dimtry Krestyashyn, Charles Meissner, Amir Nahir
  • Publication number: 20140214396
    Abstract: A method, system and computer program product for creation of specification properties for a visual model of a system. The specification properties are useful for verification of a verification model corresponding to the visual model. The computer-implemented method comprising automatically generating, by a processor, a specification property for a verification model based on a selection by a user of at least one element in a visual model, wherein the visual model defines a computerized system, wherein the verification model corresponds to the visual model.
    Type: Application
    Filed: January 28, 2013
    Publication date: July 31, 2014
    Applicant: International Business Machines Corporation
    Inventors: Allon Adir, Natalia Razinkov, Tamer Salman, Karen Yorav
  • Patent number: 8589734
    Abstract: An operation of a processor in respect to transactions is checked by simulating an execution of a test program, and updating a transaction order graph to identify a cycle. The graph is updated based on a value read during an execution of a first transaction and a second transaction that is the configured to set the memory with the read value. The test program comprises information useful for identifying the second transaction.
    Type: Grant
    Filed: August 26, 2010
    Date of Patent: November 19, 2013
    Assignee: International Business Machines Corporation
    Inventors: Allon Adir, John Martin Ludden, Avi Ziv
  • Patent number: 8516229
    Abstract: A test code generation technique that replaces instructions having a machine state dependent result with special redirection instructions provides generation of test code in which state dependent execution choices are made without a state model. Redirection instructions cause execution of a handler than examines the machine state and replaces the redirection instruction with a replacement instruction having a desired result resolved in accordance with the current machine state. The instructions that are replaced may be conditional branch instructions and the result a desired execution path. The examination of the machine state permits determination of a branch condition for the replacement instruction so that the next pass of the test code executes along the desired path. Alternatively, the handler can execute a jump to the branch instruction, causing immediate execution of the desired branch path.
    Type: Grant
    Filed: February 5, 2010
    Date of Patent: August 20, 2013
    Assignee: International Business Machines Corporation
    Inventors: Allon Adir, Brad Lee Herold, John Martin Ludden, Pedro Martin-de-Nicolas, Charles Leverett Meissner, Gil Eliezer Shurek