Patents by Inventor Brian V. Chess

Brian V. Chess has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10701097
    Abstract: A non-transitory processor-readable medium stores code that represents instructions that, when executed at a processor, cause the processor to access an attack description; intercept a data set from an application via an application programming interface (API), where the intercepted data set is based on an attack data set and where the attack data set is used to test for a security vulnerability in the application; correlate, using a Hamming distance, the intercepted data set with the attack description using a correlation type identifier; and report the security vulnerability for the application in response to the intercepted data set based at least in part on a result of the correlation.
    Type: Grant
    Filed: December 20, 2011
    Date of Patent: June 30, 2020
    Assignee: MICRO FOCUS LLC
    Inventors: Matias Madou, Brian V. Chess, Sean Patrick Fay
  • Patent number: 9501650
    Abstract: The present disclosure provides a system that includes a server hosting an application under test (AUT), an observer configured to monitor instructions executed by the AUT, and a computing device communicatively coupled to the AUT and the observer through a common communication channel. The computing device may be configured to send an application request to the AUT, wherein the application request is configured to expose a potential vulnerability of the AUT. The computing device may receive an application response from the AUT in accordance with the AUT's programming. The computing device may send a service request to the observer, and receive a service response from the observer that contains information corresponding to the instructions executed by the AUT due to the application request, information about the AUT, or information about a server hosting the AUT.
    Type: Grant
    Filed: September 4, 2015
    Date of Patent: November 22, 2016
    Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
    Inventors: Brian V. Chess, Iftach Ragoler, Philip Edward Hamer, Russell Andrew Spitler, Sean Patrick Fay, Prajakta Subbash Jagdale
  • Publication number: 20150379273
    Abstract: The present disclosure provides a system that includes a server hosting an application under test (AUT), an observer configured to monitor instructions executed by the AUT, and a computing device communicatively coupled to the AUT and the observer through a common communication channel. The computing device may be configured to send an application request to the AUT, wherein the application request is configured to expose a potential vulnerability of the AUT. The computing device may receive an application response from the AUT in accordance with the AUT's programming. The computing device may send a service request to the observer, and receive a service response from the observer that contains information corresponding to the instructions executed by the AUT due to the application request, information about the AUT, or information about a server hosting the AUT.
    Type: Application
    Filed: September 4, 2015
    Publication date: December 31, 2015
    Inventors: Brian V. Chess, Iftach Ragoler, Philip Edward Hamer, Russell Andrew Spitler, Sean Patrick Fay, Prajakta Subbash Jagdale
  • Patent number: 9215247
    Abstract: The present disclosure provides a system that includes a server hosting an application under test (AUT), an observer configured to monitor instructions executed by the AUT, and a computing device communicatively coupled to the AUT and the observer through a common communication channel. The computing device may be configured to send an application request to the AUT, wherein the application request is configured to expose a potential vulnerability of the AUT. The computing device may receive an application response from the AUT in accordance with the AUT's programming. The computing device may send a service request to the observer, and receive a service response from the observer that contains information corresponding to the instructions executed by the AUT due to the application request, information about the AUT, or information about a server hosting the AUT.
    Type: Grant
    Filed: May 31, 2011
    Date of Patent: December 15, 2015
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Brian V. Chess, Iftach Ragoler, Philip Edward Hamer, Russell Andrew Spitler, Sean Patrick Fay, Prajakta Subbash Jagdate
  • Patent number: 9053319
    Abstract: In one implementation, a tag is associated with a tainted value of an application and an output context of the application that is associated with output from the application that includes the tainted value is determined. A taint processing is a applied to the tainted value in response to the output of the tainted value, the taint processing is compatible with the output context.
    Type: Grant
    Filed: September 29, 2011
    Date of Patent: June 9, 2015
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Brian V Chess, Sean Patrick Fay
  • Patent number: 8739280
    Abstract: A taint processing applied to a tainted value of an application is identified and an output context of the application associated with output of the tainted value is determined. It is determined whether the taint processing is effective in mitigating a security vulnerability caused by the tainted value for the output context.
    Type: Grant
    Filed: September 29, 2011
    Date of Patent: May 27, 2014
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Brian V Chess, Sean Patrick Fay
  • Publication number: 20140082739
    Abstract: The present disclosure provides a system that includes a server hosting an application under test (AUT), an observer configured to monitor instructions executed by the AUT, and a computing device communicatively coupled to the AUT and the observer through a common communication channel. The computing device may be configured to send an application request to the AUT, wherein the application request is configured to expose a potential vulnerability of the AUT. The computing device may receive an application response from the AUT in accordance with the AUT's programming. The computing device may send a service request to the observer, and receive a service response from the observer that contains information corresponding to the instructions executed by the AUT due to the application request, information about the AUT, or information about a server hosting the AUT.
    Type: Application
    Filed: May 31, 2011
    Publication date: March 20, 2014
    Inventors: Brian V. Chess, Iftach Ragoler, Philip Edward Hamer, Russell Andrew Spitler, Sean Patrick Fay, Prajakta Subbash Jagdate
  • Publication number: 20130160131
    Abstract: In one implementation, an application security system accesses an attack description and a data set from an application. The data set based on an attack data set. The application security system correlates the data set with the attack description, and reports a security vulnerability for the application if the data set satisfies the attack description.
    Type: Application
    Filed: December 20, 2011
    Publication date: June 20, 2013
    Inventors: Matias Madou, Brian V. Chess, Sean Patrick Fay
  • Publication number: 20130160130
    Abstract: In one implementation, an attack surface identification system defines an interface description of an application during execution of the application. The interface description is then provided to a scanner.
    Type: Application
    Filed: December 20, 2011
    Publication date: June 20, 2013
    Inventors: Kirill Mendelev, Iftach Ragoler, Brian V. Chess, Spencer James Firestone, Yaron Kfir
  • Publication number: 20130086687
    Abstract: In one implementation, a tag is associated with a tainted value of an application and an output context of the application that is associated with output from the application that includes the tainted value is determined. A taint processing is a applied to the tainted value in response to the output of the tainted value, the taint processing is compatible with the output context.
    Type: Application
    Filed: September 29, 2011
    Publication date: April 4, 2013
    Inventors: Brian V. Chess, Sean Patrick Fay
  • Publication number: 20130086676
    Abstract: In one implementation, a taint processing applied to a tainted value of an application is identified and an output context of the application associated with output of the tainted value is determined. A notification is generated if the taint processing is incompatible with the output context.
    Type: Application
    Filed: September 29, 2011
    Publication date: April 4, 2013
    Inventors: Brian V. Chess, Sean Patrick Fay