Patents by Inventor Fabian Monrose

Fabian Monrose has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10560471
    Abstract: A method includes receiving, at an input port of a computer, indication of HTTP (Hypertext Transfer Protocol) traffic and clustering, using a processor on the computer, the HTTP traffic according to a client IP (Internet Protocol) into a web session tree. A client tree structure of the web session tree is generated and the client tree structure is compared with tree structures of exploit kit samples.
    Type: Grant
    Filed: November 7, 2016
    Date of Patent: February 11, 2020
    Assignee: HCL Technologies Limited
    Inventors: Xin Hu, Jiyong Jang, Fabian Monrose, Marc Philippe Stoecklin, Teryl Taylor, Ting Wang
  • Patent number: 9973473
    Abstract: Methods, systems, and computer readable media for rapid filtering of opaque data traffic are disclosed. According to one method, the method includes receiving a packet containing a payload. The method also includes analyzing a portion of the payload for determining whether the packet contains compressed or encrypted data. The method further includes performing, if the packet contains compressed or encrypted data, at least one of sending the packet to an opaque traffic analysis engine for analysis, discarding the packet, logging the packet, or marking the packet.
    Type: Grant
    Filed: March 13, 2013
    Date of Patent: May 15, 2018
    Assignee: THE UNIVERSITY OF NORTH CAROLINA AT CHAPEL HILL
    Inventors: Andrew Maxwell White, Fabian Monrose, Srinivas Krishnan, Phillip Andrew Porras, Michael Donald Bailey
  • Patent number: 9934379
    Abstract: Methods, systems, and computer readable media for detecting a compromised computing host are disclosed. According to one method, the method includes receiving one or more domain name system (DNS) non-existent domain (NX) messages associated with a computing host. The method also includes determining, using a host score associated with one or more unique DNS zones or domain names included in the one or more DNS NX messages, whether the computing host is compromised. The method further includes performing, in response to determining that the computing host is compromised, a mitigation action.
    Type: Grant
    Filed: March 5, 2014
    Date of Patent: April 3, 2018
    Assignee: The University of North Carolina at Chapel Hill
    Inventors: Fabian Monrose, Teryl Taylor, Srinivas Krishnan, John McHugh
  • Patent number: 9721089
    Abstract: According to one aspect, the subject matter described herein includes a method for efficient computer forensic analysis and data access control. The method includes steps occurring from within a virtualization layer separate from a guest operating system. The steps include monitoring disk accesses by the guest operating system to a region of interest on a disk from which data is copied into memory. The steps also include tracking subsequent accesses to the memory resident data where the memory resident data is copied from its initial location to other memory locations or over a network. The steps further include linking operations made by the guest operating system associated with the disk accesses with operations made by the guest operating system associated with the memory accessed.
    Type: Grant
    Filed: May 7, 2012
    Date of Patent: August 1, 2017
    Assignee: The University of North Carolina at Chapel Hill
    Inventors: Srinivas Krishnan, Fabian Monrose, Kevin Snow
  • Patent number: 9723016
    Abstract: A method of detecting exploit kits includes receiving, at an input port of a computer, indication of HTTP (Hypertext Transfer Protocol) traffic. The HTTP traffic is clustered into a web session tree according to a client IP (Internet Protocol. A client tree structure of the web session tree is generated. The client tree structure is compared with tree structures of exploit kit samples.
    Type: Grant
    Filed: May 14, 2015
    Date of Patent: August 1, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Xin Hu, Jiyong Jang, Fabian Monrose, Marc Philippe Stoecklin, Teryl Taylor, Ting Wang
  • Publication number: 20170054749
    Abstract: A method includes receiving, at an input port of a computer, indication of HTTP (Hypertext Transfer Protocol) traffic and clustering, using a processor on the computer, the HTTP traffic according to a client IP (Internet Protocol) into a web session tree.
    Type: Application
    Filed: November 7, 2016
    Publication date: February 23, 2017
    Inventors: Xin Hu, Jiyong Jang, Fabian Monrose, Marc Philippe Stoecklin, Teryl Taylor, Ting Wang
  • Patent number: 9516051
    Abstract: A method of detecting exploit kits includes receiving, at an input port of a computer, indication of HTTP (Hypertext Transfer Protocol) traffic. The HTTP traffic is clustered into a web session tree according to a client IP (Internet Protocol. A client tree structure of the web session tree is generated. The client tree structure is compared with tree structures of exploit kit samples.
    Type: Grant
    Filed: June 25, 2015
    Date of Patent: December 6, 2016
    Assignee: International Business Machines Corporation
    Inventors: Xin Hu, Jiyong Jang, Fabian Monrose, Marc Philippe Stoecklin, Teryl Taylor, Ting Wang
  • Publication number: 20160337388
    Abstract: A method of detecting exploit kits includes receiving, at an input port of a computer, indication of HTTP (Hypertext Transfer Protocol) traffic. The HTTP traffic is clustered into a web session tree according to a client IP (Internet Protocol. A client tree structure of the web session tree is generated. The client tree structure is compared with tree structures of exploit kit samples.
    Type: Application
    Filed: June 25, 2015
    Publication date: November 17, 2016
    Inventors: Xin HU, Jiyong JANG, Fabian MONROSE, Marc Philippe STOECKLIN, Teryl TAYLOR, Ting WANG
  • Publication number: 20160337387
    Abstract: A method of detecting exploit kits includes receiving, at an input port of a computer, indication of HTTP (Hypertext Transfer Protocol) traffic. The HTTP traffic is clustered into a web session tree according to a client IP (Internet Protocol. A client tree structure of the web session tree is generated. The client tree structure is compared with tree structures of exploit kit samples.
    Type: Application
    Filed: May 14, 2015
    Publication date: November 17, 2016
    Inventors: Xin Hu, Jiyong JANG, Fabian MONROSE, Marc Philippe STOECKLIN, Teryl TAYLOR, Ting WANG
  • Patent number: 9305165
    Abstract: According to one aspect, the subject matter described herein includes a method for detecting injected machine code. The method includes extracting data content from a buffer. The method also includes providing an operating system kernel configured to detect injected machine code. The method further includes executing, using the operating system kernel, the data content on a physical processor. The method further includes monitoring, using the operating system kernel, the execution of the data content to determine whether the data content contains injected machine code indicative of a code injection attack.
    Type: Grant
    Filed: May 7, 2012
    Date of Patent: April 5, 2016
    Assignee: The University of North Carolina at Chapel Hill
    Inventors: Kevin Snow, Fabian Monrose, Srinivas Krishnan
  • Publication number: 20160026796
    Abstract: Methods, systems, and computer readable media for detecting a compromised computing host are disclosed. According to one method, the method includes receiving one or more domain name system (DNS) non-existent domain (NX) messages associated with a computing host. The method also includes determining, using a host score associated with one or more unique DNS zones or domain names included in the one or more DNS NX messages, whether the computing host is compromised. The method further includes performing, in response to determining that the computing host is compromised, a mitigation action.
    Type: Application
    Filed: March 5, 2014
    Publication date: January 28, 2016
    Inventors: Fabian Monrose, Teryl Taylor, Srinivas Krishnan, John McHugh
  • Publication number: 20150052601
    Abstract: Methods, systems, and computer readable media for rapid filtering of opaque data traffic are disclosed. According to one method, the method includes receiving a packet containing a payload. The method also includes analyzing a portion of the payload for determining whether the packet contains compressed or encrypted data. The method further includes performing, if the packet contains compressed or encrypted data, at least one of sending the packet to an opaque traffic analysis engine for analysis, discarding the packet, logging the packet, or marking the packet.
    Type: Application
    Filed: March 13, 2013
    Publication date: February 19, 2015
    Inventors: Andrew Maxwell White, Fabian Monrose, Srinivas Krishnan, Phillip Andrew Porras, Michael Donald Bailey
  • Publication number: 20140181976
    Abstract: According to one aspect, the subject matter described herein includes a method for detecting injected machine code. The method includes extracting data content from a buffer. The method also includes providing an operating system kernel configured to detect injected machine code. The method further includes executing, using the operating system kernel, the data content on a physical processor. The method further includes monitoring, using the operating system kernel, the execution of the data content to determine whether the data content contains injected machine code indicative of a code injection attack.
    Type: Application
    Filed: May 7, 2012
    Publication date: June 26, 2014
    Applicant: THE UNIVERSITY OF NORTH CAROLINA AT CHAPEL HILL
    Inventors: Kevin Snow, Fabian Monrose, Srinivas Krishnan
  • Publication number: 20140157407
    Abstract: According to one aspect, the subject matter described herein includes a method for efficient computer forensic analysis and data access control. The method includes steps occurring from within a virtualization layer separate from a guest operating system. The steps include monitoring disk accesses by the guest operating system to a region of interest on a disk from which data is copied into memory. The steps also include tracking subsequent accesses to the memory resident data where the memory resident data is copied from its initial location to other memory locations or over a network. The steps further include linking operations made by the guest operating system associated with the disk accesses with operations made by the guest operating system associated with the memory accessed.
    Type: Application
    Filed: May 7, 2012
    Publication date: June 5, 2014
    Inventors: Srinivas Krishnan, Fabian Monrose, Kevin Snow
  • Patent number: 7107269
    Abstract: Techniques and infrastructure are provided for supporting global customization. The invention enables persona profiles of user information to be maintained, and such persona profiles to be accessed by merchants. Via the persona abstraction, users control what information is grouped into a persona profile, and can selectively enable a merchant to read one of these profiles. The infrastructure of the invention employs a persona server that assists users in managing their personae. The infrastructure of the invention separates this from the profile databases at which persona profile information is stored, to eliminate any single point at which different persona profiles can be tied to the same user. Since merchants also have privacy concerns, the infrastructure of the invention provides a data protection model based on tainting, by which merchants can limit how the information they contribute can be exposed.
    Type: Grant
    Filed: June 12, 2001
    Date of Patent: September 12, 2006
    Assignee: Lucent Technologies Inc.
    Inventors: Robert M. Arlein, Ben Jai, Bjorn Markus Jakobsson, Fabian Monrose, Michael Kendrick Reiter
  • Patent number: 6901145
    Abstract: A repeatable cryptographic key is generated based on varying parameters which represent physical measurements. Locations within a share table, which locations store valid and invalid cryptographic shares, are identified as a function of received varying parameters. The share table is configured such that locations which are expected to be identified by legitimate access attempts contain valid cryptographic shares, and locations which are not expected to be identified by legitimate access attempts contain invalid cryptographic shares. The share table configuration may be modified based on prior history of legitimate access attempts. In various embodiments, the stored shares may be encrypted or compressed. A keystroke feature authentication embodiment uses the inventive techniques to implement an authentication system which authenticates based on an entered password and the manner in which (e.g. keystroke dynamics) the keystroke is entered.
    Type: Grant
    Filed: February 10, 2000
    Date of Patent: May 31, 2005
    Assignee: Lucent Technologies Inc.
    Inventors: Philip L. Bohannon, Bjorn Markus Jakobsson, Fabian Monrose, Michael Kendrick Reiter, Susanne Gudrun Wetzel
  • Patent number: 6873424
    Abstract: For use in a printer (such as a computer printer, a facsimile machine or other device suited to place data on a tangible medium), a system for, and method of, incorporating an advertisement into a printout and a printer having the system or method contained or carried out therein. In one embodiment, the system includes: (1) a memory, located in the printer, that receives and stores user content, the advertisement and verification data regarding the advertisement and (2) a processor, associated with the memory, that employs the verification data to make a verification of the advertisement and, if the verification is positive, cause the printer to continue operation.
    Type: Grant
    Filed: March 7, 2001
    Date of Patent: March 29, 2005
    Assignee: Lucent Technologies Inc.
    Inventors: Bjorn M. Jakobsson, Fabian Monrose
  • Publication number: 20020133500
    Abstract: Techniques and infrastructure are provided for supporting global customization. The invention enables persona profiles of user information to be maintained, and such persona profiles to be accessed by merchants. Via the persona abstraction, users control what information is grouped into a persona profile, and can selectively enable a merchant to read one of these profiles. The infrastructure of the invention employs a persona server that assists users in managing their personae. The infrastructure of the invention separates this from the profile databases at which persona profile information is stored, to eliminate any single point at which different persona profiles can be tied to the same user. Since merchants also have privacy concerns, the infrastructure of the invention provides a data protection model based on tainting, by which merchants can limit how the information they contribute can be exposed.
    Type: Application
    Filed: January 23, 2002
    Publication date: September 19, 2002
    Inventors: Robert M. Arlein, Ben Jai, Bjorn Markus Jakobsson, Fabian Monrose, Michael Kendrick Reiter
  • Publication number: 20020126304
    Abstract: For use in a printer (such as a computer printer, a facsimile machine or other device suited to place data on a tangible medium), a system for, and method of, incorporating an advertisement into a printout and a printer having the system or method contained or carried out therein. In one embodiment, the system includes: (1) a memory, located in the printer, that receives and stores user content, the advertisement and verification data regarding the advertisement and (2) a processor, associated with the memory, that employs the verification data to make a verification of the advertisement and, if the verification is positive, cause the printer to continue operation.
    Type: Application
    Filed: March 7, 2001
    Publication date: September 12, 2002
    Inventors: Bjorn M. Jakobsson, Fabian Monrose