Patents by Inventor Kasif DEKEL

Kasif DEKEL has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10380350
    Abstract: Disclosed embodiments relate to exposing potential vulnerabilities in software programs. Techniques include referencing a software vulnerability assessment program, and modifying source code of a tested software program with native language commands. Techniques also include testing the modified software program, analyzing tracked executed code sections of output data to identify one or more current barriers in the tested software program, generating new input data for the tested software program configured to cross one or more current barriers, and merging the new generated input data with a dataset that is being tested by the software vulnerability assessment program.
    Type: Grant
    Filed: January 15, 2019
    Date of Patent: August 13, 2019
    Assignee: CYBERARK SOFTWARE LTD.
    Inventors: Ze'ev Ben Porath, Kasif Dekel
  • Patent number: 9888032
    Abstract: Computerized methods and systems mitigate the effect of a ransomware attack on an endpoint by detecting access events associated with requests by processes, including ransomware processes, to access data items on the endpoint. The data items are hidden from the operating system processes executed on the endpoint. In response to detecting an access event, an action is taken against the process associated with the access event.
    Type: Grant
    Filed: May 3, 2016
    Date of Patent: February 6, 2018
    Assignee: CHECK POINT SOFTWARE TECHNOLOGIES LTD.
    Inventors: Kasif Dekel, Liad Mizrachi, Roman Zaikin, Oded Vanunu
  • Publication number: 20170324755
    Abstract: Computerized methods and systems mitigate the effect of a ransomware attack on an endpoint by detecting access events associated with requests by processes, including ransomware processes, to access data items on the endpoint. The data items are hidden from the operating system processes executed on the endpoint. In response to detecting an access event, an action is taken against the process associated with the access event.
    Type: Application
    Filed: May 3, 2016
    Publication date: November 9, 2017
    Inventors: Kasif DEKEL, Liad MIZRACHI, Roman ZAIKIN, Oded VANUNU