Patents by Inventor Brian V. Chess
Brian V. Chess has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10701097Abstract: A non-transitory processor-readable medium stores code that represents instructions that, when executed at a processor, cause the processor to access an attack description; intercept a data set from an application via an application programming interface (API), where the intercepted data set is based on an attack data set and where the attack data set is used to test for a security vulnerability in the application; correlate, using a Hamming distance, the intercepted data set with the attack description using a correlation type identifier; and report the security vulnerability for the application in response to the intercepted data set based at least in part on a result of the correlation.Type: GrantFiled: December 20, 2011Date of Patent: June 30, 2020Assignee: MICRO FOCUS LLCInventors: Matias Madou, Brian V. Chess, Sean Patrick Fay
-
Patent number: 9501650Abstract: The present disclosure provides a system that includes a server hosting an application under test (AUT), an observer configured to monitor instructions executed by the AUT, and a computing device communicatively coupled to the AUT and the observer through a common communication channel. The computing device may be configured to send an application request to the AUT, wherein the application request is configured to expose a potential vulnerability of the AUT. The computing device may receive an application response from the AUT in accordance with the AUT's programming. The computing device may send a service request to the observer, and receive a service response from the observer that contains information corresponding to the instructions executed by the AUT due to the application request, information about the AUT, or information about a server hosting the AUT.Type: GrantFiled: September 4, 2015Date of Patent: November 22, 2016Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LPInventors: Brian V. Chess, Iftach Ragoler, Philip Edward Hamer, Russell Andrew Spitler, Sean Patrick Fay, Prajakta Subbash Jagdale
-
Publication number: 20150379273Abstract: The present disclosure provides a system that includes a server hosting an application under test (AUT), an observer configured to monitor instructions executed by the AUT, and a computing device communicatively coupled to the AUT and the observer through a common communication channel. The computing device may be configured to send an application request to the AUT, wherein the application request is configured to expose a potential vulnerability of the AUT. The computing device may receive an application response from the AUT in accordance with the AUT's programming. The computing device may send a service request to the observer, and receive a service response from the observer that contains information corresponding to the instructions executed by the AUT due to the application request, information about the AUT, or information about a server hosting the AUT.Type: ApplicationFiled: September 4, 2015Publication date: December 31, 2015Inventors: Brian V. Chess, Iftach Ragoler, Philip Edward Hamer, Russell Andrew Spitler, Sean Patrick Fay, Prajakta Subbash Jagdale
-
Patent number: 9215247Abstract: The present disclosure provides a system that includes a server hosting an application under test (AUT), an observer configured to monitor instructions executed by the AUT, and a computing device communicatively coupled to the AUT and the observer through a common communication channel. The computing device may be configured to send an application request to the AUT, wherein the application request is configured to expose a potential vulnerability of the AUT. The computing device may receive an application response from the AUT in accordance with the AUT's programming. The computing device may send a service request to the observer, and receive a service response from the observer that contains information corresponding to the instructions executed by the AUT due to the application request, information about the AUT, or information about a server hosting the AUT.Type: GrantFiled: May 31, 2011Date of Patent: December 15, 2015Assignee: Hewlett Packard Enterprise Development LPInventors: Brian V. Chess, Iftach Ragoler, Philip Edward Hamer, Russell Andrew Spitler, Sean Patrick Fay, Prajakta Subbash Jagdate
-
Patent number: 9053319Abstract: In one implementation, a tag is associated with a tainted value of an application and an output context of the application that is associated with output from the application that includes the tainted value is determined. A taint processing is a applied to the tainted value in response to the output of the tainted value, the taint processing is compatible with the output context.Type: GrantFiled: September 29, 2011Date of Patent: June 9, 2015Assignee: Hewlett-Packard Development Company, L.P.Inventors: Brian V Chess, Sean Patrick Fay
-
Patent number: 8739280Abstract: A taint processing applied to a tainted value of an application is identified and an output context of the application associated with output of the tainted value is determined. It is determined whether the taint processing is effective in mitigating a security vulnerability caused by the tainted value for the output context.Type: GrantFiled: September 29, 2011Date of Patent: May 27, 2014Assignee: Hewlett-Packard Development Company, L.P.Inventors: Brian V Chess, Sean Patrick Fay
-
Publication number: 20140082739Abstract: The present disclosure provides a system that includes a server hosting an application under test (AUT), an observer configured to monitor instructions executed by the AUT, and a computing device communicatively coupled to the AUT and the observer through a common communication channel. The computing device may be configured to send an application request to the AUT, wherein the application request is configured to expose a potential vulnerability of the AUT. The computing device may receive an application response from the AUT in accordance with the AUT's programming. The computing device may send a service request to the observer, and receive a service response from the observer that contains information corresponding to the instructions executed by the AUT due to the application request, information about the AUT, or information about a server hosting the AUT.Type: ApplicationFiled: May 31, 2011Publication date: March 20, 2014Inventors: Brian V. Chess, Iftach Ragoler, Philip Edward Hamer, Russell Andrew Spitler, Sean Patrick Fay, Prajakta Subbash Jagdate
-
Publication number: 20130160131Abstract: In one implementation, an application security system accesses an attack description and a data set from an application. The data set based on an attack data set. The application security system correlates the data set with the attack description, and reports a security vulnerability for the application if the data set satisfies the attack description.Type: ApplicationFiled: December 20, 2011Publication date: June 20, 2013Inventors: Matias Madou, Brian V. Chess, Sean Patrick Fay
-
Publication number: 20130160130Abstract: In one implementation, an attack surface identification system defines an interface description of an application during execution of the application. The interface description is then provided to a scanner.Type: ApplicationFiled: December 20, 2011Publication date: June 20, 2013Inventors: Kirill Mendelev, Iftach Ragoler, Brian V. Chess, Spencer James Firestone, Yaron Kfir
-
Publication number: 20130086687Abstract: In one implementation, a tag is associated with a tainted value of an application and an output context of the application that is associated with output from the application that includes the tainted value is determined. A taint processing is a applied to the tainted value in response to the output of the tainted value, the taint processing is compatible with the output context.Type: ApplicationFiled: September 29, 2011Publication date: April 4, 2013Inventors: Brian V. Chess, Sean Patrick Fay
-
Publication number: 20130086676Abstract: In one implementation, a taint processing applied to a tainted value of an application is identified and an output context of the application associated with output of the tainted value is determined. A notification is generated if the taint processing is incompatible with the output context.Type: ApplicationFiled: September 29, 2011Publication date: April 4, 2013Inventors: Brian V. Chess, Sean Patrick Fay