Patents by Inventor Joel G. Korb

Joel G. Korb has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10262143
    Abstract: A system and method for systematically undertaking model-based security analysis of a cyber physical system (CPS) is provided. In one example, a cyber model simulation and a control system simulation are mapped using various methods to determine which portions of the cyber-model simulation and the control system simulation are correlated with one another. Using the determined correlation, when a cyber-attack is generated on the cyber model simulation, a corresponding attack hook can be generated for the control system model. The attack hook is configured to be integrated into the control system model so as to mimic the effect on the control system that a cyber-attack can engender. Once one or more attack hooks are generated, the user can place the hooks into the control system simulation schemas and run a series of simulations to determine the effects of a cyber event on the control system in a CPS.
    Type: Grant
    Filed: September 13, 2016
    Date of Patent: April 16, 2019
    Assignee: The MITRE Corporation
    Inventors: Roshan K. Thomas, Mary C. Hatfield, Ivan Lozano, Edward Overly, Joel G. Korb, Jimmy Vu
  • Publication number: 20180075243
    Abstract: A system and method for systematically undertaking model-based security analysis of a cyber physical system (CPS) is provided. In one example, a cyber model simulation and a control system simulation are mapped using various methods to determine which portions of the cyber-model simulation and the control system simulation are correlated with one another. Using the determined correlation, when a cyber-attack is generated on the cyber model simulation, a corresponding attack hook can be generated for the control system model. The attack hook is configured to be integrated into the control system model so as to mimic the effect on the control system that a cyber-attack can engender. Once one or more attack hooks are generated, the user can place the hooks into the control system simulation schemas and run a series of simulations to determine the effects of a cyber event on the control system in a CPS.
    Type: Application
    Filed: September 13, 2016
    Publication date: March 15, 2018
    Applicant: The MITRE Corporation
    Inventors: Roshan K. THOMAS, Mary C. HATFIELD, Ivan LOZANO, Edward OVERLY, Joel G. KORB, Jimmy VU
  • Publication number: 20080021912
    Abstract: Tools and methods for schema matching that generate schema graphs, populate match matrices and display the schema graphs and the match matrices. These tools and methods characterize potential matches between disparate schemata in terms of both a strength of evidence indicating the potential match and an amount of evidence indicating the potential match. A number of match voters generate a set of match scores for each potential match, and these match scores are combined by a vote merger to form a single confidence value for each potential match. A number of filters display the confidence value for each potential match as a link on a graphical user interface. Machine-learning techniques may be employed to adaptively determine confidence values based on previously established matches.
    Type: Application
    Filed: July 24, 2006
    Publication date: January 24, 2008
    Inventors: Leonard J. Seligman, Peter D.S. Mork, Joel G. Korb, Kenneth B. Samuel, Christopher S. Wolf