Patents by Inventor Hamed Soroush
Hamed Soroush has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12101357Abstract: Embodiments provide a system and method for constructing a graph-based model for optimizing the security posture of a composed system. During operation, the system constructs a multi-layer graph for a system with a plurality of components, wherein the multi-layer graph comprises a configuration subgraph, a vulnerability subgraph, and a dependency subgraph. The system constructs the multi-layer graph by the following. The system generates nodes in the configuration subgraph, including: nodes in a first class which encode information associated with a configuration parameter for a respective component, wherein the encoded information includes a name, a default value, a range of values, and a data type; and nodes in a second class which encode value assignments for configuration parameters and relationships between configuration parameters. The system generates nodes in the vulnerability subgraph based on known vulnerabilities associated with a component, bad security practices, and best security practices.Type: GrantFiled: July 1, 2020Date of Patent: September 24, 2024Assignee: Xerox CorporationInventors: Hamed Soroush, Milad Asgari Mehrabadi, Shantanu Rane, Massimiliano Albanese
-
Publication number: 20230272712Abstract: A tool (100) for measuring direct in-situ stress in rock (10) surrounding a borehole (12) includes: a slot cutting system (136), a flat-jack stress measurement device (134), a hydraulic system (124), and a sensor (514). The slot cutting system (136) cuts a slot (502) having an original width in the rock (10) surrounding the borehole (12). The flat-jack stress measurement device (134) fits into the slot (502). The hydraulic system (124) expands the flat jack stress measurement device (134) when it is in the slot to the original width of the slot (502). The sensor (514) measures pressure in the hydraulic system (124) when the flat-jack stress measurement device (134) has expanded to the original width of the slot (502).Type: ApplicationFiled: July 30, 2021Publication date: August 31, 2023Inventor: Hamed Soroush
-
Publication number: 20230266500Abstract: In a method of generating a geomechanical model of a wellbore, at least one vibration sensor (422) is affixed to a drill bit unit (420). Electronic drilling recorder data (412) regarding drilling of the wellbore is received. Bit vibration data is received from the vibration sensor (422). A transform is applied to the electronic drilling recorder data and to the bit vibration data so as to generate filterable data. At least one undesirable component is filtered from the filterable data, thereby generating clean data. The clean data is applied to an artificial intelligence model trained to associate data with a plurality of geomechanical model components, thereby generating geomechanical model corresponding to the electronic drilling recorder data and the bit vibration data.Type: ApplicationFiled: July 30, 2021Publication date: August 24, 2023Inventor: Hamed Soroush
-
Patent number: 11729222Abstract: Embodiments provide a system and method for extracting configuration-related information for reasoning about the security and functionality of a composed system. During operation, the system determines, by a computing device, information sources associated with hardware and software components of a system, wherein the information sources include at least specification sheets, standard operating procedures, user manuals, and vulnerability databases. The system selects a set of categories of vulnerabilities in a vulnerability database, and ingests the information sources to obtain data in a normalized format. The system extracts, from the ingested information sources, configuration information, vulnerability information, dependency information, and functionality requirements to create a model for the system.Type: GrantFiled: July 1, 2020Date of Patent: August 15, 2023Assignee: Palo Alto Research Center IncorporatedInventors: Hamed Soroush, Milad Asgari Mehrabadi, Shantanu Rane, Marc E. Mosko
-
Patent number: 11483354Abstract: Embodiments provide a system and method for reasoning about the optimality of a configuration parameter of a distributed system. During operation, the system obtains a multi-layer graph for a system with a plurality of components, wherein the multi-layer graph comprises a configuration subgraph, a vulnerability subgraph, and a dependency subgraph. The system determines, based on the multi-layer graph, constraint relationships associated with configuration parameters for the components, wherein the constraint relationships include security constraints and functionality constraints. The system computes an unsatisfiable core which comprises a set of mutually incompatible constraints.Type: GrantFiled: July 8, 2020Date of Patent: October 25, 2022Assignee: Palo Alto Research Center IncorporatedInventors: Hamed Soroush, Shantanu Rane
-
Publication number: 20220237443Abstract: One embodiment provides a system which facilitates reasoning about classifiers. During operation, the system determines a plurality of neural networks. The system derives, from a respective neural network, a linear model, wherein the linear model is constructed based on an output of a penultimate layer of the respective neural network. The system trains the linear model based on activations of the penultimate layer. The system maps parameters of the trained linear model into a version space.Type: ApplicationFiled: January 26, 2021Publication date: July 28, 2022Applicant: Palo Alto Research Center IncorporatedInventors: Shantanu Rane, Alejandro E. Brito, Hamed Soroush
-
Patent number: 11290498Abstract: The system generates evidence of a recommended configuration for a distributed system based on a plurality of configuration parameters. The system displays, on a screen of a user device, the evidence, which includes a list of configuration parameters, including a name, a current value, and a recommended value for a respective configuration parameter. The recommended value is obtained based on a strategy for optimizing security, functionality, or both. The system further displays interactive elements which allow the user to: view a resolution of a pair of mutually incompatible constraints resulting in the recommended value for the respective configuration parameter, wherein the resolution includes a name of the configuration parameter removed from the list and a reason for the removal; and view information associated with each of the pair of mutually incompatible constraints, wherein the information includes a name, a goal, a security impact, and a description of the constraint.Type: GrantFiled: July 9, 2020Date of Patent: March 29, 2022Assignee: Palo Alto Research Center IncorporatedInventors: Hamed Soroush, Shantanu Rane
-
Patent number: 11025661Abstract: One embodiment provides a method for facilitating security in a system of networked components. During operation, the system constructs a configuration graph that stores a first set of relationships between configuration parameters within a component and a second set of relationships between configuration parameters across different components. A relationship corresponds to a constraint and is indicated by one or more of: a range for a configuration parameter; and a conjunction or a disjunction of logical relationships between two or more configuration parameters. The system generates a set of candidate configuration parameter values that satisfy the constraints of the relationships in the configuration graph. The system selects, from the set of candidate configuration parameter values, a first set of configuration parameter values that optimizes a security objective function.Type: GrantFiled: December 13, 2018Date of Patent: June 1, 2021Assignee: Palo Alto Research Center IncorporatedInventors: Hamed Soroush, Shantanu Rane
-
Publication number: 20210012012Abstract: Embodiments provide a system and method for constructing a graph-based model for optimizing the security posture of a composed system. During operation, the system constructs a multi-layer graph for a system with a plurality of components, wherein the multi-layer graph comprises a configuration subgraph, a vulnerability subgraph, and a dependency subgraph. The system constructs the multi-layer graph by the following. The system generates nodes in the configuration subgraph, including: nodes in a first class which encode information associated with a configuration parameter for a respective component, wherein the encoded information includes a name, a default value, a range of values, and a data type; and nodes in a second class which encode value assignments for configuration parameters and relationships between configuration parameters. The system generates nodes in the vulnerability subgraph based on known vulnerabilities associated with a component, bad security practices, and best security practices.Type: ApplicationFiled: July 1, 2020Publication date: January 14, 2021Applicant: Palo Alto Research Center IncorporatedInventors: Hamed Soroush, Milad Asgari Mehrabadi, Shantanu Rane
-
Publication number: 20210014263Abstract: Embodiments provide a system and method for extracting configuration-related information for reasoning about the security and functionality of a composed system. During operation, the system determines, by a computing device, information sources associated with hardware and software components of a system, wherein the information sources include at least specification sheets, standard operating procedures, user manuals, and vulnerability databases. The system selects a set of categories of vulnerabilities in a vulnerability database, and ingests the information sources to obtain data in a normalized format. The system extracts, from the ingested information sources, configuration information, vulnerability information, dependency information, and functionality requirements to create a model for the system.Type: ApplicationFiled: July 1, 2020Publication date: January 14, 2021Applicant: Palo Alto Research Center IncorporatedInventors: Hamed Soroush, Milad Asgari Mehrabadi, Shantanu Rane, Marc E. Mosko
-
Publication number: 20210014264Abstract: Embodiments provide a system and method for reasoning about the optimality of a configuration parameter of a distributed system. During operation, the system obtains a multi-layer graph for a system with a plurality of components, wherein the multi-layer graph comprises a configuration subgraph, a vulnerability subgraph, and a dependency subgraph. The system determines, based on the multi-layer graph, constraint relationships associated with configuration parameters for the components, wherein the constraint relationships include security constraints and functionality constraints. The system computes an unsatisfiable core which comprises a set of mutually incompatible constraints.Type: ApplicationFiled: July 8, 2020Publication date: January 14, 2021Applicant: Palo Alto Research Center IncorporatedInventors: Hamed Soroush, Shantanu Rane
-
Publication number: 20210014283Abstract: The system generates evidence of a recommended configuration for a distributed system based on a plurality of configuration parameters. The system displays, on a screen of a user device, the evidence, which includes a list of configuration parameters, including a name, a current value, and a recommended value for a respective configuration parameter. The recommended value is obtained based on a strategy for optimizing security, functionality, or both. The system further displays interactive elements which allow the user to: view a resolution of a pair of mutually incompatible constraints resulting in the recommended value for the respective configuration parameter, wherein the resolution includes a name of the configuration parameter removed from the list and a reason for the removal; and view information associated with each of the pair of mutually incompatible constraints, wherein the information includes a name, a goal, a security impact, and a description of the constraint.Type: ApplicationFiled: July 9, 2020Publication date: January 14, 2021Applicant: Palo Alto Research Center IncorporatedInventors: Hamed Soroush, Shantanu Rane
-
Patent number: 10855578Abstract: A network is organized into a plurality of broadcast domains. Each broadcast domain includes a plurality of nodes each configured to cause messages to be sent to two or more other of the nodes within the broadcast domain. The broadcast domains are coupled via bridging connections. Each bridging connection couples at least one of the nodes from a first of the broadcast domains to at least one of the nodes of a second of the broadcast domains. The messages are caused to be sent through the plurality of broadcast domains via a subset of the bridging connections. The subset of the bridging connections is selected non-deterministically via the plurality of broadcast domains.Type: GrantFiled: June 25, 2019Date of Patent: December 1, 2020Assignee: Palo Alto Research Center IncorporatedInventors: Marc E. Mosko, Alejandro E. Brito, Hamed Soroush, Shantanu Rane
-
Publication number: 20200053116Abstract: One embodiment provides a method for facilitating security in a system of networked components. During operation, the system constructs a configuration graph that stores a first set of relationships between configuration parameters within a component and a second set of relationships between configuration parameters across different components. A relationship corresponds to a constraint and is indicated by one or more of: a range for a configuration parameter; and a conjunction or a disjunction of logical relationships between two or more configuration parameters. The system generates a set of candidate configuration parameter values that satisfy the constraints of the relationships in the configuration graph. The system selects, from the set of candidate configuration parameter values, a first set of configuration parameter values that optimizes a security objective function.Type: ApplicationFiled: December 13, 2018Publication date: February 13, 2020Applicant: Palo Alto Research Center IncorporatedInventors: Hamed Soroush, Shantanu Rane