Patents by Inventor Dimitrios Pendarakis

Dimitrios Pendarakis has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9846789
    Abstract: An apparatus includes a memory to store a secure object comprising at least one of code and data that is encrypted when stored in the memory and a central processing unit (CPU) that is capable of executing an EnterSecureMode (esm) instruction that enables the decryption of the secure object's information when the secure object information is retrieved from the memory into the CPU. The CPU further comprises a feature to protect the secure object from code received from other software.
    Type: Grant
    Filed: September 6, 2011
    Date of Patent: December 19, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Richard H. Boivie, Dimitrios Pendarakis
  • Patent number: 9842207
    Abstract: Included within a shared housing are at least one user interface element; a first isolated computational entity; a second isolated computational entity; and a switching arrangement. The switching arrangement is configured to, in a first mode, connect the first isolated computational entity to the at least one user interface element; and, in a second mode, connect the second isolated computational entity to the at least one user interface element.
    Type: Grant
    Filed: October 4, 2015
    Date of Patent: December 12, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: David L. Cohn, Guerney D. H. Hunt, James Randal Moulic, Dimitrios Pendarakis
  • Patent number: 9832217
    Abstract: A method includes collecting system calls and call parameters invoked by monitored applications for target computer systems. The system calls and call parameters are received from operating system kernels on the plurality of target computer systems. Sequences of systems calls and call parameters of the monitored applications are correlated among different target computer systems to deduce malicious activities. Remedial action(s) are performed in response to malicious activities being deduced as being malicious by the correlating. Another method includes determining that network activity at a specific time is deemed to be suspicious. Using IP addresses involved in the suspicious network activity, computer system(s) are determined that are sources of the suspicious network activity. Based on the specific time and the determined computer system(s), application(s) are determined that are executing on the determined computer system(s) that are causing the suspicious network activity.
    Type: Grant
    Filed: September 30, 2014
    Date of Patent: November 28, 2017
    Assignee: International Business Machines Corporation
    Inventors: Stefan Berger, Yangyi Chen, Xin Hu, Dimitrios Pendarakis, Josyula Rao, Reiner Sailer, Douglas Lee Schales, Marc Stoecklin
  • Publication number: 20170300309
    Abstract: Examples of techniques for deploying an application on a cloud environment satisfying integrity and geo-fencing constraints are disclosed herein. A computer implemented method may include: receiving a guest application for deployment on a cloud environment; receiving the integrity constraints on the integrity of each of the plurality of host where the application is to be deployed; receiving geo-fencing constraints identifying a geographic location where the guest application is to be deployed; determining for which of the plurality of hosts the integrity constraints and the geo-fencing constraints are satisfied; and deploying the guest application on at least one of the plurality of hosts that satisfy the integrity constraints and the geo-fencing constraints.
    Type: Application
    Filed: April 19, 2016
    Publication date: October 19, 2017
    Inventors: STEFAN BERGER, KENNETH A. GOLDMAN, SIMON J. KOFKIN-HANSEN, HUI LEI, VIJAY K. NAIK, DIMITRIOS PENDARAKIS, JAYARAM KALLAPALAYAM RADHAKRISHNAN, DAVID R. SAFFORD, SHU TAO
  • Publication number: 20170289137
    Abstract: A client seeking to establish a cryptographically-secure channel to a server has an associated public key acceptance policy. The policy specifies a required number of certificates that must be associated with the server's public key, as well as one or more conditions associated with those certificates, that must be met before the client “accepts” the server's public key. The one or more conditions typically comprise a trust function that must be satisfied before a threshold level of trust of the client is met. A representative public key acceptance policy would be that certificate chains for the public key are valid and non-overlapping with different root CAs, and that some configurable number of those chains be present. The technique may be implemented within the context of an existing client-server SSL/TLS handshake.
    Type: Application
    Filed: March 31, 2016
    Publication date: October 5, 2017
    Inventors: Dimitrios Pendarakis, Enriquillo Valdez
  • Publication number: 20170286690
    Abstract: Generating an attack graph is provided. A set of sensitive data corresponding to a regulated service is identified. A set of components corresponding to the regulated service that are authorized to perform activities associated with sensitive data is scanned for. Vulnerability and risk metrics corresponding to each component in the set of components of the regulated service is identified. The attack graph that includes nodes representing components in the set of components of the regulated service and edges between nodes representing relationships between related components in the set of components is generated based on the vulnerability and risk metrics corresponding to each component in the set of components.
    Type: Application
    Filed: March 31, 2016
    Publication date: October 5, 2017
    Inventors: Suresh N. Chari, Ashish Kundu, Ian M. Molloy, Dimitrios Pendarakis, Josyula R. Rao
  • Publication number: 20170206352
    Abstract: There is a method and system that includes establishing a security container that describes a workload and a set of resources that corresponds to the workload in a software-defined environment, determining a set of security criteria for the security container, monitoring the workload and the set of resources for security events based, at least in part, upon the set of security criteria, and responsive to identifying a security event, adjusting one or more security mechanisms. The steps of monitoring and adjusting are operated within the software-defined environment.
    Type: Application
    Filed: March 30, 2017
    Publication date: July 20, 2017
    Inventors: Brad L. Brech, Scott W. Crowder, Hubertus Franke, Nagui Halim, Matt R. Hogstrom, Chung-Sheng Li, Pratap C. Pattnaik, Dimitrios Pendarakis, Josyula R. Rao, Radha P. Ratnaparkhi, Michael D. Williams
  • Publication number: 20170193239
    Abstract: Log(s) of IT events are accessed in a distributed system that includes a distributed application. The distributed system includes multiple data objects. The distributed application uses, processes, or otherwise accesses one or more of data objects. The IT events concern the distributed application and concern accesses by the distributed application to the data object(s). The IT events are correlated with a selected set of the data objects. Risks are estimated to the selected set of data objects based on the information technology events. Estimating risks uses at least ranks of compliance rules as these rules apply to the data objects in the system, and vulnerability scores of systems corresponding to the set of data objects and information technology events. Information is output that allows a user to determine the estimated risks for the selected set of data objects. Techniques for determining ranks of compliance rules are also disclosed.
    Type: Application
    Filed: December 30, 2015
    Publication date: July 6, 2017
    Inventors: Suresh N. CHARI, Ted Augustus Habeck, Ashish Kundu, Ian Michael Molloy, Dimitrios Pendarakis, Josyula R. Rao, Marc Philippe Stoecklin
  • Patent number: 9652612
    Abstract: There is a method and system that includes establishing a security container that describes a workload and a set of resources that corresponds to the workload in a software-defined environment, determining a set of security criteria for the security container, monitoring the workload and the set of resources for security events based, at least in part, upon the set of security criteria, and responsive to identifying a security event, adjusting one or more security mechanisms. The steps of monitoring and adjusting are operated within the software-defined environment.
    Type: Grant
    Filed: March 25, 2015
    Date of Patent: May 16, 2017
    Assignee: International Business Machines Corporation
    Inventors: Brad L. Brech, Scott W. Crowder, Hubertus Franke, Nagui Halim, Matt R. Hogstrom, Chung-Sheng Li, Pratap C. Pattnaik, Dimitrios Pendarakis, Josyula R. Rao, Radha P. Ratnaparkhi, Michael D. Williams
  • Publication number: 20170123671
    Abstract: A processor-implemented method, system, and/or computer program product deletes data from a storage device. One or more processors identify a component sensitivity level of a component, an input sensitivity level of a data input to the component, and an output sensitivity level of a data output from the component, where the data output is stored in a storage device. The processor(s) average the component sensitivity level, the input sensitivity level, and the output sensitivity level to establish a composite sensitivity level, determine a deletion mode for deleting the output data from the storage device based on the composite sensitivity level, and delete the output data from the storage device by utilizing the deletion mode.
    Type: Application
    Filed: October 28, 2015
    Publication date: May 4, 2017
    Inventors: Ashish Kundu, Dimitrios Pendarakis
  • Patent number: 9621592
    Abstract: A method includes retrieving, from a memory accessible by a computer, a document comprising a workload definition document that defines an intended virtual configuration to include at least one virtual machine and at least one network appliance to be associated with at least one of the virtual machines in the intended virtual configuration, each network appliance respectively serving a role in the intended virtual configuration of transforming, inspecting, filtering, or otherwise manipulating all the network traffic, before it reaches an intended virtual machine, for purpose other than a data packet forwarding in a virtual configuration. The workload definition document is parsed to extract attributes of each of the network appliances, including one or more security policy to be applied to each network appliance. Configuration data is extracted from the parsed workload definition document that is related to any security policy of any of the network appliances to be deployed.
    Type: Grant
    Filed: June 25, 2015
    Date of Patent: April 11, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Paul Anthony Ashley, Stefan Berger, Tian Cheng Liu, He Yuan Huang, Sreekanth Ramakrishna Iyer, Ashish Kundu, Nataraj Nagaratnam, Dimitrios Pendarakis, Ronald Becker Williams
  • Patent number: 9609023
    Abstract: A method includes retrieving, from a memory accessible by a computer, a document comprising a workload definition document that defines an intended virtual configuration to include at least one virtual machine and at least one network appliance to be associated with at least one of the virtual machines in the intended virtual configuration, each network appliance respectively serving a role in the intended virtual configuration of transforming, inspecting, filtering, or otherwise manipulating all the network traffic, before it reaches an intended virtual machine, for purpose other than a data packet forwarding in a virtual configuration. The workload definition document is parsed to extract attributes of each of the network appliances, including one or more security policy to be applied to each network appliance. Configuration data is extracted from the parsed workload definition document that is related to any security policy of any of the network appliances to be deployed.
    Type: Grant
    Filed: February 10, 2015
    Date of Patent: March 28, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Paul Anthony Ashley, Stefan Berger, Tian Cheng Liu, He Yuan Huang, Sreekanth Ramakrishna Iyer, Ashish Kundu, Nataraj Nagaratnam, Dimitrios Pendarakis, Ronald Becker Williams
  • Publication number: 20160283713
    Abstract: There is a method and system that includes establishing a security container that describes a workload and a set of resources that corresponds to the workload in a software-defined environment, determining a set of security criteria for the security container, monitoring the workload and the set of resources for security events based, at least in part, upon the set of security criteria, and responsive to identifying a security event, adjusting one or more security mechanisms. The steps of monitoring and adjusting are operated within the software-defined environment.
    Type: Application
    Filed: March 25, 2015
    Publication date: September 29, 2016
    Inventors: Brad L. Brech, Scott W. Crowder, Hubertus Franke, Nagui Halim, Matt R. Hogstrom, Chung-Sheng Li, Pratap C. Pattnaik, Dimitrios Pendarakis, Josyula R. Rao, Radha P. Ratnaparkhi, Michael D. Williams
  • Patent number: 9430653
    Abstract: A method of converting an original application into a cloud-hosted application includes splitting the original application into a plurality of application components along security relevant boundaries, mapping the application components to hosting infrastructure boundaries, and using a mechanism to enforce a privacy policy of a user. The mapping may include assigning each application component to a distinct virtual machine, which acts as a container for its assigned component.
    Type: Grant
    Filed: April 14, 2015
    Date of Patent: August 30, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mihai Christodorescu, Dimitrios Pendarakis, Kapil K. Singh
  • Publication number: 20160234250
    Abstract: A method includes retrieving, from a memory accessible by a computer, a document comprising a workload definition document that defines an intended virtual configuration to include at least one virtual machine and at least one network appliance to be associated with at least one of the virtual machines in the intended virtual configuration, each network appliance respectively serving a role in the intended virtual configuration of transforming, inspecting, filtering, or otherwise manipulating all the network traffic, before it reaches an intended virtual machine, for purpose other than a data packet forwarding in a virtual configuration. The workload definition document is parsed to extract attributes of each of the network appliances, including one or more security policy to be applied to each network appliance. Configuration data is extracted from the parsed workload definition document that is related to any security policy of any of the network appliances to be deployed.
    Type: Application
    Filed: February 10, 2015
    Publication date: August 11, 2016
    Inventors: Paul Anthony ASHLEY, Stefan Berger, Tian Cheng Liu, He Yuan Huang, Sreekanth Ramakrishna Iyer, Ashish Kundu, Nataraj Nagaratnam, Dimitrios Pendarakis, Ronald Becker Williams
  • Publication number: 20160234224
    Abstract: A method includes retrieving, from a memory accessible by a computer, a document comprising a workload definition document that defines an intended virtual configuration to include at least one virtual machine and at least one network appliance to be associated with at least one of the virtual machines in the intended virtual configuration, each network appliance respectively serving a role in the intended virtual configuration of transforming, inspecting, filtering, or otherwise manipulating all the network traffic, before it reaches an intended virtual machine, for purpose other than a data packet forwarding in a virtual configuration. The workload definition document is parsed to extract attributes of each of the network appliances, including one or more security policy to be applied to each network appliance. Configuration data is extracted from the parsed workload definition document that is related to any security policy of any of the network appliances to be deployed.
    Type: Application
    Filed: June 25, 2015
    Publication date: August 11, 2016
    Inventors: Paul Anthony ASHLEY, Stefan BERGER, Tian Cheng LIU, He Yuan HUANG, Sreekanth Ramakrishna IYER, Ashish KUNDU, Nataraj NAGARATNAM, Dimitrios PENDARAKIS, Ronald Becker WILLIAMS
  • Patent number: 9374228
    Abstract: A method to verify a geographic location of a virtual disk image executing at a data center server within a data center. One embodiment includes a cryptoprocessor proximate the data center server, a hypervisor configured to send a disk image hash value of the virtual disk image, a digital certificate issued to the cryptoprocessor, an endorsement key to a data center tenant and a location provider. The method includes sending a disk image hash value of the virtual disk image, an endorsement key unique to a cryptoprocessor proximate the data center server to a data center tenant, and a digital certificate to a data center tenant. Next, the location provider sends the geographic location of the cryptoprocessor matching the endorsement key to the data center tenant.
    Type: Grant
    Filed: October 12, 2012
    Date of Patent: June 21, 2016
    Assignee: International Business Machines Corporation
    Inventors: Dimitrios Pendarakis, Arvind Seshadri
  • Publication number: 20160171250
    Abstract: A processor in a computer system, the processor including a mechanism supporting a Secure Object that comprises information that is protected so that other software on said computer system cannot access or undetectably tamper with said information, thereby protecting both a confidentiality and an integrity of the Secure Object information while making the Secure Object information available to the Secure Object itself during execution of the Secure Object. The mechanism includes a crypto mechanism that decrypts and integrity-checks Secure Object information as said Secure Object information moves into the computer system from an external storage system, and encrypts and updates an integrity value for Secure Object information as said Secure Object information moves out of the computer system to the external storage system, and a memory protection mechanism that protects the confidentiality and integrity of Secure Object information when that information is in the memory of the computer system.
    Type: Application
    Filed: August 28, 2015
    Publication date: June 16, 2016
    Inventors: Richard Harold Boivie, Kattamuri Ekanadham, Kenneth Alan Goldman, William Eric Hall, Guerney D. Hunt, Bhushan Pradip Jain, Mohit Kapur, Dimitrios Pendarakis, David Robert Safford, Peter Anthony Sandon, Enriquillo Valdez
  • Publication number: 20160026790
    Abstract: Included within a shared housing are at least one user interface element; a first isolated computational entity; a second isolated computational entity; and a switching arrangement. The switching arrangement is configured to, in a first mode, connect the first isolated computational entity to the at least one user interface element; and, in a second mode, connect the second isolated computational entity to the at least one user interface element.
    Type: Application
    Filed: October 4, 2015
    Publication date: January 28, 2016
    Inventors: David L. Cohn, Guerney D.H. Hunt, James Randal Moulic, Dimitrios Pendarakis
  • Patent number: 9245126
    Abstract: A method of converting an original application into a cloud-hosted application includes splitting the original application into a plurality of application components along security relevant boundaries, mapping the application components to hosting infrastructure boundaries, and using a mechanism to enforce a privacy policy of a user. The mapping may include assigning each application component to a distinct virtual machine, which acts as a container for its assigned component.
    Type: Grant
    Filed: November 15, 2012
    Date of Patent: January 26, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mihai Christodorescu, Dimitrios Pendarakis, Kapil K. Singh