Patents by Inventor Javier Burroni
Javier Burroni has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9923917Abstract: A system for calculating cyber-risk in a software application includes a cyber-risk calculator. The cyber-risk calculator receives a security assessment result sample having a list of security modules, each security module listing including a respective result of a security assessment of the application identifying a vulnerability and/or misconfiguration capable of being exploited and/or abused. When run in a risk calculation mode, the cyber-risk calculator determines a world partition of the application in the security assessment result sample belongs to, references a set of parameters from a parametrization database according to the world partition corresponding to the application, determines a cyber-risk exposure level for the application based upon the security assessment result sample and the set of parameters, and reports results of the cyber-risk calculation.Type: GrantFiled: October 27, 2015Date of Patent: March 20, 2018Assignee: Onapsis, Inc.Inventors: Emiliano José Fausto, Ezequiel David Gutesman, Javier Burroni, Pablo Müller
-
Publication number: 20160119373Abstract: A system for calculating cyber-risk in a software application includes a cyber-risk calculator. The cyber-risk calculator receives a security assessment result sample having a list of security modules, each security module listing including a respective result of a security assessment of the application identifying a vulnerability and/or misconfiguration capable of being exploited and/or abused. When run in a risk calculation mode, the cyber-risk calculator determines a world partition of the application in the security assessment result sample belongs to, references a set of parameters from a parametrization database according to the world partition corresponding to the application, determines a cyber-risk exposure level for the application based upon the security assessment result sample and the set of parameters, and reports results of the cyber-risk calculation.Type: ApplicationFiled: October 27, 2015Publication date: April 28, 2016Inventors: Emiliano José Fausto, Ezequiel David Gutesman, Javier Burroni, Pablo Müller
-
Patent number: 7757293Abstract: A system is provided for performing penetration testing of a target computer network by installing a remote agent in the target computer network. The system includes a local agent provided in a computer console and configured to receive and execute commands. A user interface is provided in the console and configured to send commands to and receive information from the local agent, process the information, and present the processed information. A database is configured to store the information received from the local agent. A network interface is connected to the local agent and configured to communicate with the remote agent installed in the target computer network via a network. Security vulnerability exploitation modules are provided for execution by the local agent and/or the remote agent.Type: GrantFiled: April 16, 2007Date of Patent: July 13, 2010Assignee: Core SDI, IncorporatedInventors: Maximiliano Gerardo Caceres, Gerardo Gabriel Richarte, Agustin Azubel Friedman, Ricardo Quesada, Luciano Notarfrancesco, Oliver Friederichs, Javier Burroni, Gustavo Ajzenman, Gabriel Becedillas, Bruce Leidl
-
Patent number: 7277937Abstract: A system is provided for executing a system call originating in a local computer on a first remote computer connected to the local computer via a network. Communication is established between the local computer and the first remote computer via the network. A syscall server is installed in the first remote computer. A reference address is sent from the first remote computer to the local computer via the network through execution of code by the syscall server. A syscall request is built in the local computer with arguments determined using the reference address received from the first remote computer. The syscall request is sent from the local computer to the first remote computer via the network. The syscall request is copied into a stack of the first remote computer through execution of code by the syscall server. Registers are popped from the syscall request in the stack. Execution of a syscall request is initiated on the first remote computer. The result of the syscall request is pushed onto the stack.Type: GrantFiled: July 16, 2003Date of Patent: October 2, 2007Assignee: Core SDI, IncorporatedInventors: Maximiliano Gabriel Caceres, Javier Burroni, Gustavo Ajzenman, Ricardo Quesada, Gerardo Gabriel Richarte, Luciano Notarfrancesco, Bruce Robert Leidl, Agustin Azubel Friedman, Gabriel Martin Becedillas Ruiz
-
Publication number: 20070204347Abstract: A system is provided for performing penetration testing of a target computer network by installing a remote agent in the target computer network. The system includes a local agent provided in a computer console and configured to receive and execute commands. A user interface is provided in the console and configured to send commands to and receive information from the local agent, process the information, and present the processed information. A database is configured to store the information received from the local agent. A network interface is connected to the local agent and configured to communicate with the remote agent installed in the target computer network via a network. Security vulnerability exploitation modules are provided for execution by the local agent and/or the remote agent.Type: ApplicationFiled: April 16, 2007Publication date: August 30, 2007Applicant: Core SDI, Inc.Inventors: Maximiliano Caceres, Gerardo Richarte, Agustin Friedman, Ricardo Quesada, Luciano Notarfrancesco, Oliver Friedrichs, Javier Burroni, Gustavo Ajzenman, Gabriel Becedillas, Bruce Leidl
-
Patent number: 7228566Abstract: A system is provided for performing penetration testing of a target computer network by installing a remote agent in the target computer network. The system includes a local agent provided in a computer console and configured to receive and execute commands. A user interface is provided in the console and configured to send commands to and receive information from the local agent, process the information, and present the processed information. A database is configured to store the information received from the local agent. A network interface is connected to the local agent and configured to communicate with the remote agent installed in the target computer network via a network. Security vulnerability exploitation modules are provided for execution by the local agent and/or the remote agent.Type: GrantFiled: January 22, 2002Date of Patent: June 5, 2007Assignee: Core SDI, IncorporatedInventors: Maximiliano Gerardo Caceres, Gerardo Gabriel Richarte, Agustin Azubel Friedman, Ricardo Quesada, Luciano Notarfrancesco, Oliver Friederichs, Javier Burroni, Gustavo Ajzenman, Gabriel Becedillas, Bruce Leidl
-
Publication number: 20040128667Abstract: A system is provided for executing a system call originating in a local computer on a first remote computer connected to the local computer via a network. Communication is established between the local computer and the first remote computer via the network. A syscall server is installed in the first remote computer. A reference address is sent from the first remote computer to the local computer via the network through execution of code by the syscall server. A syscall request is built in the local computer with arguments determined using the reference address received from the first remote computer. The syscall request is sent from the local computer to the first remote computer via the network. The syscall request is copied into a stack of the first remote computer through execution of code by the syscall server. Registers are popped from the syscall request in the stack. Execution of a syscall request is initiated on the first remote computer. The result of the syscall request is pushed onto the stack.Type: ApplicationFiled: July 16, 2003Publication date: July 1, 2004Applicant: Core SDI, IncorporatedInventors: Maximiliano Gerardo Caceres, Javier Burroni, Gustavo Ajzenman, Ricardo Quesada, Gerardo Gabriel Richarte, Luciano Notarfrancesco, Bruce Robert Leidl, Agustin Azubel Friedman, Gabriel Martin Becedillas Ruiz
-
Publication number: 20030014669Abstract: A system is provided for performing penetration testing of a target computer network by installing a remote agent in the target computer network. The system includes a local agent provided in a computer console and configured to receive and execute commands. A user interface is provided in the console and configured to send commands to and receive information from the local agent, process the information, and present the processed information. A database is configured to store the information received from the local agent. A network interface is connected to the local agent and configured to communicate with the remote agent installed in the target computer network via a network. Security vulnerability exploitation modules are provided for execution by the local agent and/or the remote agent.Type: ApplicationFiled: January 22, 2002Publication date: January 16, 2003Inventors: Maximiliano Gerardo Caceres, Gerardo Gabriel Richarte, Agustin Azubel Friedman, Ricardo Quesada, Luciano Notarfrancesco, Oliver Friederichs, Javier Burroni, Gustavo Ajzenman, Gabriel Becedillas, Bruce Leidl