Patents by Inventor Fady Copty
Fady Copty has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240411867Abstract: Methods, systems, and computer storage media for providing data security posture management using an application discovery engine in a security management system. Application discovery supports identifying and mapping various applications within a computing environment. In particular, application discovery can be provided as part of security management operations to assess security posture of applications, identify vulnerabilities, and ensure compliance with regulations. In operation, application discovery data associated with a plurality computing resources of a computing environment is accessed. An annotated application discovery graph comprising a plurality of entities that represent the plurality of computing resources is generated. The annotated application discovery graph is deployed to support generating security postures for computing environments. A request is received for a security posture of the computing environment.Type: ApplicationFiled: June 7, 2023Publication date: December 12, 2024Inventors: Shay Chriba SAKAZI, Fady Copty, Tamer SALMAN, Ofir MONZA
-
Publication number: 20240378037Abstract: According to examples, an apparatus includes a processor that may obtain and parse a pipeline code to determine how variables of the pipeline code relate to each other, and replace the variables in the parsed pipeline code with values to which the variables respectively represent, in which the values correspond to pipeline run sources and pipeline run targets of API calls. The processor may also identify how the pipeline run targets interact with the pipeline run sources of the API calls and build a dependency graph that maps the pipeline run sources with the pipeline run targets. Runtime resources may thus be mapped to source code in a pipeline run to provide visibility into actions carried out by the pipeline. This visibility may be used to determine whether there are security vulnerabilities in the pipeline run sources and/or targets such that the vulnerabilities may be addressed/overcome.Type: ApplicationFiled: May 11, 2023Publication date: November 14, 2024Applicant: Microsoft Technology Licensing, LLCInventor: Fady COPTY
-
Patent number: 12132751Abstract: An approach to predicting the outcome of a computer security response. The approach can analyze an unlabeled set of network data and based on the analysis, create a language model of the network. The approach can process the language model to predict a reduction factor associated with network availability. The approach can further process the language model and a malicious sequence to predict an effectiveness factor associated with blocking the malicious sequence. The approach can output bot the reduction factor and the effectiveness factor to a network administrator for determining the applicability of the computer security response.Type: GrantFiled: September 25, 2023Date of Patent: October 29, 2024Assignee: International Business Machines CorporationInventor: Fady Copty
-
Patent number: 11947444Abstract: Embodiments may provide techniques that may provide more accurate and actionable alerts by cloud workload security systems so as to improve overall cloud workload security. For example, in an embodiment, a method may be implemented in a computer system comprising a processor, memory accessible by the processor, and computer program instructions stored in the memory and executable by the processor, and the method may comprise generating performance and security information relating to a software system during development of the software system, generating performance and security information relating to the software system during deployed operation of the software system, matching the performance and security information generated during development of the software system with the performance and security information generated during deployed operation of the software system to determine performance and security alerts to escalate, and reporting the escalated performance and security alerts.Type: GrantFiled: November 6, 2020Date of Patent: April 2, 2024Assignee: International Business Machines CorporationInventors: Fady Copty, Omri Soceanu, Gilad Ezov, Ronen Levy
-
Publication number: 20240015174Abstract: An approach to predicting the outcome of a computer security response. The approach can analyze an unlabeled set of network data and based on the analysis, create a language model of the network. The approach can process the language model to predict a reduction factor associated with network availability. The approach can further process the language model and a malicious sequence to predict an effectiveness factor associated with blocking the malicious sequence. The approach can output bot the reduction factor and the effectiveness factor to a network administrator for determining the applicability of the computer security response.Type: ApplicationFiled: September 25, 2023Publication date: January 11, 2024Inventor: Fady Copty
-
Patent number: 11805141Abstract: An approach to predicting the outcome of a computer security response. The approach can analyze an unlabeled set of network data and based on the analysis, create a language model of the network. The approach can process the language model to predict a reduction factor associated with network availability. The approach can further process the language model and a malicious sequence to predict an effectiveness factor associated with blocking the malicious sequence. The approach can output bot the reduction factor and the effectiveness factor to a network administrator for determining the applicability of the computer security response.Type: GrantFiled: March 30, 2021Date of Patent: October 31, 2023Assignee: International Business Machines CorporationInventor: Fady Copty
-
Patent number: 11720802Abstract: Embodiments may provide techniques that that may automatically generate a customized SOC rule set for an organization. For example, in an embodiment, a method may be implemented in a computer comprising a processor, memory accessible by the processor, and computer program instructions stored in the memory and executable by the processor, the method may comprise simulating operation of a security incident and event management system by running a plurality of rules of the system on labeled data, determining fitness metrics of the plurality of rules, selecting at least one rule of the plurality of rules based on the determined fitness metrics; modifying the selected rule to form an updated rule, and repeating running the updated rule on the labeled data, determining fitness metrics of the updated rule, and mutating the updated rule.Type: GrantFiled: February 26, 2020Date of Patent: August 8, 2023Inventors: Fady Copty, Benjamin Zeltser
-
Patent number: 11704119Abstract: A method for automatically migrating infrastructure as code (IaC) from a first cloud infrastructure platform to a second cloud infrastructure platform is provided. The method may include receiving an original IaC comprising a first type of coding language. The method may further include using natural language processing to map a connection between the first type of coding language and a second type of coding language. The method may further include based on the mapped connection, using the NLP to automatically generate a partial translation of the first type of coding language to the second type of coding language. The method may further include using a machine learning algorithm to correct at least one inaccuracy in the partial translation. The method may further include generating a complete translation and implementing a second IaC on the second cloud infrastructure platform based on the complete translation.Type: GrantFiled: August 26, 2021Date of Patent: July 18, 2023Assignee: International Business Machines CorporationInventors: Fady Copty, Lev Greenberg, Dov Murik, Omer Yehuda Boehm, Omri Soceanu
-
Publication number: 20230075183Abstract: A method for automatically migrating infrastructure as code (IaC) from a first cloud infrastructure platform to a second cloud infrastructure platform is provided. The method may include receiving an original IaC comprising a first type of coding language. The method may further include using natural language processing to map a connection between the first type of coding language and a second type of coding language. The method may further include based on the mapped connection, using the NLP to automatically generate a partial translation of the first type of coding language to the second type of coding language. The method may further include using a machine learning algorithm to correct at least one inaccuracy in the partial translation. The method may further include generating a complete translation and implementing a second IaC on the second cloud infrastructure platform based on the complete translation.Type: ApplicationFiled: August 26, 2021Publication date: March 9, 2023Inventors: FADY COPTY, LEV GREENBERG, Dov Murik, Omer Yehuda Boehm, OMRI SOCEANU
-
Patent number: 11573785Abstract: An example system includes a processor to receive a source code sample to be classified. The processor can execute a hybrid code analysis to generate an internal analysis state. The processor can extract features from the internal analysis state via a trained machine learning model modified using transfer learning. The processor can generate a label based on the extracted features via a machine learning classifier model trained on internal analysis states of hybrid code analyses.Type: GrantFiled: May 14, 2020Date of Patent: February 7, 2023Assignee: International Business Machines CorporationInventors: Fady Copty, Shai Doron, Reda Igbaria
-
Patent number: 11550567Abstract: The present invention relates to novel techniques for monitoring changes to source code of Infrastructure as Code systems to detect attempted anomalous changes and block such changes from the code. For example, a method may comprise learning a security architecture and history of an infrastructure as code system to be deployed in at least one cloud account, monitoring changes to source code of the infrastructure as code system that are made before deployment of the infrastructure as code system to detect an anomaly, determining whether the detected anomaly affects regulated resources of the infrastructure as code system, and blocking changes to the source code of the infrastructure as code system that produce the detected anomaly that affects regulated resources of the infrastructure as code system.Type: GrantFiled: April 4, 2021Date of Patent: January 10, 2023Assignee: International Business Machines CorporationInventors: Fady Copty, Omri Soceanu, Lev Greenberg, Dov Murik
-
Publication number: 20220321584Abstract: An approach to predicting the outcome of a computer security response. The approach can analyze an unlabeled set of network data and based on the analysis, create a language model of the network. The approach can process the language model to predict a reduction factor associated with network availability. The approach can further process the language model and a malicious sequence to predict an effectiveness factor associated with blocking the malicious sequence. The approach can output bot the reduction factor and the effectiveness factor to a network administrator for determining the applicability of the computer security response.Type: ApplicationFiled: March 30, 2021Publication date: October 6, 2022Inventor: FADY COPTY
-
Publication number: 20220318002Abstract: The present invention relates to novel techniques for monitoring changes to source code of Infrastructure as Code systems to detect attempted anomalous changes and block such changes from the code. For example, a method may comprise learning a security architecture and history of an infrastructure as code system to be deployed in at least one cloud account, monitoring changes to source code of the infrastructure as code system that are made before deployment of the infrastructure as code system to detect an anomaly, determining whether the detected anomaly affects regulated resources of the infrastructure as code system, and blocking changes to the source code of the infrastructure as code system that produce the detected anomaly that affects regulated resources of the infrastructure as code system.Type: ApplicationFiled: April 4, 2021Publication date: October 6, 2022Inventors: FADY COPTY, OMRI SOCEANU, LEV GREENBERG, Dov Murik
-
Publication number: 20220309337Abstract: In an approach for policy security shifting left of infrastructure as code compliance, a processor trains a neural network model to classify a code per policy and provide a policy vector score for the code associated with one or more policies. A processor enables the neural network model to scan and score a new code during a continuous integration and continuous deployment pipeline. A processor outputs a scanned score of the new code to a user. A processor retrains the neural network model by capturing a continuous integration and continuous deployment change and run-time compliance posture that occurs as a response by the user.Type: ApplicationFiled: March 29, 2021Publication date: September 29, 2022Inventor: Fady Copty
-
Patent number: 11409501Abstract: An approach for detecting non-compliant methodologies in a repository. The approach can generate an abstract model of an Infrastructure as Code (IaC) repository based on security requirements of an IaC. The approach can compare the abstract model to one or more validated abstract models associated with other repositories of a hybrid multi-cloud system. The approach can generate an alert notifying the IaC repository of one or more non-compliant methodology measures. The approach can send the alert to the IaC repository.Type: GrantFiled: June 30, 2021Date of Patent: August 9, 2022Assignee: International Business Machines CorporationInventors: Fady Copty, Shripad Nadgowda
-
Publication number: 20220147635Abstract: Embodiments may provide techniques that may provide more accurate and actionable alerts by cloud workload security systems so as to improve overall cloud workload security. For example, in an embodiment, a method may be implemented in a computer system comprising a processor, memory accessible by the processor, and computer program instructions stored in the memory and executable by the processor, and the method may comprise generating performance and security information relating to a software system during development of the software system, generating performance and security information relating to the software system during deployed operation of the software system, matching the performance and security information generated during development of the software system with the performance and security information generated during deployed operation of the software system to determine performance and security alerts to escalate, and reporting the escalated performance and security alerts.Type: ApplicationFiled: November 6, 2020Publication date: May 12, 2022Inventors: FADY COPTY, OMRI SOCEANU, GILAD EZOV, Ronen Levy
-
Patent number: 11308210Abstract: Deriving malware signatures by training a binary decision tree using known malware and benign software samples, each tree node representing a different software feature set and having one descending edge representing samples that are characterized by the node's software feature set and another descending edge representing samples that are not characterized thusly, selecting multiple continuous descending paths for multiple subsets of nodes, each path traversing a selected one of the edges descending from each of the nodes in its corresponding subset, deriving, based on the nodes and edges in any of the paths, a malware-associated software feature signature where the malware samples represented by leaves that directly or indirectly descend from an end of the continuous descending path meets a minimum percentage of the total number of samples represented by the leaves, and providing the malware signatures for use by a computer-based security tool configured to identify malware.Type: GrantFiled: January 22, 2019Date of Patent: April 19, 2022Assignee: International Business Machines CorporationInventors: Fady Copty, Matan Danos, Orit Edelstein, Dov Murik, Benjamin Zeltser
-
Patent number: 11295013Abstract: An apparatus, a computer program product and a method for dimensionality reduction comprising: obtaining a set of Application Programming Interface (API) functions of a system invocable by a program, and a set of artifacts. Each artifact is associated with at least one API function and indicative of a functionality thereof. The method further comprising: clustering the API functions based on an analysis of the artifacts to create a set of clusters smaller than the set of API functions, such that each cluster comprises API functions having a similar functionality; and performing a dimensionality reduction to a feature vector using the set of clusters.Type: GrantFiled: December 11, 2017Date of Patent: April 5, 2022Assignee: International Business Machines CorporationInventors: Fady Copty, Ayman Jarrous, Tamer Salman, Maksim Shudrak
-
Publication number: 20210357207Abstract: An example system includes a processor to receive a source code sample to be classified. The processor can execute a hybrid code analysis to generate an internal analysis state. The processor can extract features from the internal analysis state via a trained machine learning model modified using transfer learning. The processor can generate a label based on the extracted features via a machine learning classifier model trained on internal analysis states of hybrid code analyses.Type: ApplicationFiled: May 14, 2020Publication date: November 18, 2021Inventors: Fady Copty, Shai Doron, Reda Igbaria
-
Publication number: 20210264286Abstract: Embodiments may provide techniques that that may automatically generate a customized SOC rule set for an organization. For example, in an embodiment, a method may be implemented in a computer comprising a processor, memory accessible by the processor, and computer program instructions stored in the memory and executable by the processor, the method may comprise simulating operation of a security incident and event management system by running a plurality of rules of the system on labeled data, determining fitness metrics of the plurality of rules, selecting at least one rule of the plurality of rules based on the determined fitness metrics; modifying the selected rule to form an updated rule, and repeating running the updated rule on the labeled data, determining fitness metrics of the updated rule, and mutating the updated rule.Type: ApplicationFiled: February 26, 2020Publication date: August 26, 2021Inventors: FADY COPTY, Benjamin Zeltser