Patents by Inventor Elad GABAY

Elad GABAY has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230300168
    Abstract: A system and method detect a malware infection path in a compute environment. The method includes detecting a malware object on a first workload in a computing environment including a plurality of workloads, wherein the first workload is represented by a resource node on a security graph, the security graph including an endpoint node representing a resource which is accessible to a public network; generating a potential infection path between the resource node and the endpoint node including at least a second resource node connected to the resource node; inspecting a second workload of the plurality of workloads represented by the second resource node; determining that the potential infection path is a confirmed infection path, in response to detecting the malware on the second workload; and determining that the potential infection path is not an infection path, in response to detecting that the second workload does not include the malware.
    Type: Application
    Filed: May 30, 2023
    Publication date: September 21, 2023
    Applicant: Wiz, Inc.
    Inventors: Elad GABAY, Yaniv SHAKED, Alon SCHINDEL, Roy REZNIK, Ami LUTTWAK
  • Patent number: 11706252
    Abstract: A system and method detect a malware infection path in a compute environment. The method includes detecting a malware object on a first workload in a computing environment including a plurality of workloads, wherein the first workload is represented by a resource node on a security graph, the security graph including an endpoint node representing a resource which is accessible to a public network; generating a potential infection path between the resource node and the endpoint node including at least a second resource node connected to the resource node; inspecting a second workload of the plurality of workloads represented by the second resource node; determining that the potential infection path is a confirmed infection path, in response to detecting the malware on the second workload; and determining that the potential infection path is not an infection path, in response to detecting that the second workload does not include the malware.
    Type: Grant
    Filed: December 23, 2022
    Date of Patent: July 18, 2023
    Assignee: WIZ, INC.
    Inventors: Elad Gabay, Yaniv Shaked, Alon Schindel, Roy Reznik, Ami Luttwak
  • Publication number: 20230208873
    Abstract: A system and method detect a malware infection path in a compute environment. The method includes detecting a malware object on a first workload in a computing environment including a plurality of workloads, wherein the first workload is represented by a resource node on a security graph, the security graph including an endpoint node representing a resource which is accessible to a public network; generating a potential infection path between the resource node and the endpoint node including at least a second resource node connected to the resource node; inspecting a second workload of the plurality of workloads represented by the second resource node; determining that the potential infection path is a confirmed infection path, in response to detecting the malware on the second workload; and determining that the potential infection path is not an infection path, in response to detecting that the second workload does not include the malware.
    Type: Application
    Filed: December 23, 2022
    Publication date: June 29, 2023
    Applicant: Wiz, Inc.
    Inventors: Elad GABAY, Yaniv SHAKED, Alon SCHINDEL, Roy REZNIK, Ami LUTTWAK
  • Publication number: 20230208862
    Abstract: A system and method provide detection of a malware attack path. The method includes detecting at a first time a malware object on a first workload deployed in the compute environment, wherein the first workload is represented by a first node in a security graph, the security graph including a representation of the compute environment; querying the security graph to detect a second node connected to the first node, wherein the connection indicates that the first workload represented by the first node can access a second workload represented by the second node; and generating an instruction to inspect the second workload represented by the second node at a second time, occurring after the first time.
    Type: Application
    Filed: December 23, 2022
    Publication date: June 29, 2023
    Applicant: Wiz, Inc.
    Inventors: Elad GABAY, Ami LUTTWAK, Roy REZNIK, Yaniv SHAKED, Alon SCHINDEL