Patents by Inventor Brahadambal Srinivasan
Brahadambal Srinivasan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11182482Abstract: A way to track data from an untrusted source as it moves through memory in original or modified form. A probe is placed on a data reception call of a program. When the probe is triggered by execution of the data reception call for a piece of data, a location where the piece of data is to be stored is marked. When a program instruction requests access to the marked location, instrumentation code is injected subsequent to the program instruction to track the flow of the piece of data. When the instrumentation code is executed, the next location where the piece of data will be stored is determined and marked as well. A threat analyzer is invoked to analyze the marked locations for threats.Type: GrantFiled: July 18, 2019Date of Patent: November 23, 2021Assignee: International Business Machines CorporationInventors: Prateek Goel, Brahadambal Srinivasan
-
Patent number: 10817320Abstract: A method for improving accuracy of high resolution timers in a live partition migration comprises determining a status of each page of a plurality of pages to be copied from a source partition to a target partition during the live partition migration. One or more pages of the plurality of pages correspond to a respective high resolution timer. The method comprises determining that each of the one or more pages corresponding to a respective high resolution timer has a clean status. A clean status indicates that the corresponding page has been copied to the target partition and has not been modified subsequent to being copied to the target partition. The method also comprises halting operation of the source partition and initiating operation of the target partition in response to determining that each of the one or more pages corresponding to a respective high resolution timer has a clean status.Type: GrantFiled: December 11, 2015Date of Patent: October 27, 2020Assignee: International Business Machines CorporationInventors: Keerthi B. Kumar, Brahadambal Srinivasan
-
Publication number: 20190340358Abstract: A way to track data from an untrusted source as it moves through memory in original or modified form. A probe is placed on a data reception call of a program. When the probe is triggered by execution of the data reception call for a piece of data, a location where the piece of data is to be stored is marked. When a program instruction requests access to the marked location, instrumentation code is injected subsequent to the program instruction to track the flow of the piece of data. When the instrumentation code is executed, the next location where the piece of data will be stored is determined and marked as well. A threat analyzer is invoked to analyze the marked locations for threats.Type: ApplicationFiled: July 18, 2019Publication date: November 7, 2019Inventors: Prateek Goel, Brahadambal Srinivasan
-
Patent number: 10395034Abstract: A way to track data from an untrusted source as it moves through memory in original or modified form. A probe is placed on a data reception call of a program. When the probe is triggered by execution of the data reception call for a piece of data, a location where the piece of data is to be stored is marked. When a program instruction requests access to the marked location, instrumentation code is injected subsequent to the program instruction to track the flow of the piece of data. When the instrumentation code is executed, the next location where the piece of data will be stored is determined and marked as well. A threat analyzer is invoked to analyze the marked locations for threats.Type: GrantFiled: June 13, 2017Date of Patent: August 27, 2019Assignee: International Business Machines CorporationInventors: Prateek Goel, Brahadambal Srinivasan
-
Publication number: 20170277893Abstract: A way to track data from an untrusted source as it moves through memory in original or modified form. A probe is placed on a data reception call of a program. When the probe is triggered by execution of the data reception call for a piece of data, a location where the piece of data is to be stored is marked. When a program instruction requests access to the marked location, instrumentation code is injected subsequent to the program instruction to track the flow of the piece of data. When the instrumentation code is executed, the next location where the piece of data will be stored is determined and marked as well. A threat analyzer is invoked to analyze the marked locations for threats.Type: ApplicationFiled: June 13, 2017Publication date: September 28, 2017Inventors: Prateek Goel, Brahadambal Srinivasan
-
Patent number: 9734335Abstract: A way to track data from an untrusted source as it moves through memory in original or modified form. A probe is placed on a data reception call of a program. When the probe is triggered by execution of the data reception call for a piece of data, a location where the piece of data is to be stored is marked. When a program instruction requests access to the marked location, instrumentation code is injected subsequent to the program instruction to track the flow of the piece of data. When the instrumentation code is executed, the next location where the piece of data will be stored is determined and marked as well. A threat analyzer is invoked to analyze the marked locations for threats.Type: GrantFiled: October 13, 2014Date of Patent: August 15, 2017Assignee: International Business Machines CorporationInventors: Prateek Goel, Brahadambal Srinivasan
-
Patent number: 9734334Abstract: A way to track data from an untrusted source as it moves through memory in original or modified form. A probe is placed on a data reception call of a program. When the probe is triggered by execution of the data reception call for a piece of data, a location where the piece of data is to be stored is marked. When a program instruction requests access to the marked location, instrumentation code is injected subsequent to the program instruction to track the flow of the piece of data. When the instrumentation code is executed, the next location where the piece of data will be stored is determined and marked as well. A threat analyzer is invoked to analyze the marked locations for threats.Type: GrantFiled: September 10, 2014Date of Patent: August 15, 2017Assignee: International Business Machines CorporationInventors: Prateek Goel, Brahadambal Srinivasan
-
Publication number: 20170168737Abstract: A method for improving accuracy of high resolution timers in a live partition migration comprises determining a status of each page of a plurality of pages to be copied from a source partition to a target partition during the live partition migration. One or more pages of the plurality of pages correspond to a respective high resolution timer. The method comprises determining that each of the one or more pages corresponding to a respective high resolution timer has a clean status. A clean status indicates that the corresponding page has been copied to the target partition and has not been modified subsequent to being copied to the target partition. The method also comprises halting operation of the source partition and initiating operation of the target partition in response to determining that each of the one or more pages corresponding to a respective high resolution timer has a clean status.Type: ApplicationFiled: December 11, 2015Publication date: June 15, 2017Inventors: Keerthi B. Kumar, Brahadambal Srinivasan
-
Publication number: 20160072830Abstract: A way to track data from an untrusted source as it moves through memory in original or modified form. A probe is placed on a data reception call of a program. When the probe is triggered by execution of the data reception call for a piece of data, a location where the piece of data is to be stored is marked. When a program instruction requests access to the marked location, instrumentation code is injected subsequent to the program instruction to track the flow of the piece of data. When the instrumentation code is executed, the next location where the piece of data will be stored is determined and marked as well. A threat analyzer is invoked to analyze the marked locations for threats.Type: ApplicationFiled: October 13, 2014Publication date: March 10, 2016Inventors: Prateek Goel, Brahadambal Srinivasan
-
Publication number: 20160070912Abstract: A way to track data from an untrusted source as it moves through memory in original or modified form. A probe is placed on a data reception call of a program. When the probe is triggered by execution of the data reception call for a piece of data, a location where the piece of data is to be stored is marked. When a program instruction requests access to the marked location, instrumentation code is injected subsequent to the program instruction to track the flow of the piece of data. When the instrumentation code is executed, the next location where the piece of data will be stored is determined and marked as well. A threat analyzer is invoked to analyze the marked locations for threats.Type: ApplicationFiled: September 10, 2014Publication date: March 10, 2016Inventors: Prateek Goel, Brahadambal Srinivasan