Patents by Inventor Kirill Mendelev
Kirill Mendelev has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10699017Abstract: Example embodiments relate to assessing dynamic security scans using runtime analysis and static code analysis. In example embodiments, a system performs static code analysis of a web application to identify reachable code and/or data entry points, where the data entry points are used to determine an attack surface size for the web application. At this stage, the system may initiate runtime monitoring for a dynamic security scan of the web application, where the runtime monitoring detects invocation of a statement at one of the data entry points. The invocation is logged as an invocation entry that comprises invocation parameters and/or code units that were executed in response to the invocation. The system may then determine an attack surface coverage of the dynamic security scan using the invocation entry and the attack surface size and/or a reachable code coverage using the invocation entry and the reachable code.Type: GrantFiled: February 28, 2013Date of Patent: June 30, 2020Assignee: MICRO FOCUS LLCInventors: Kirill Mendelev, Lu Zhao, David John Babcock, Ronald Joseph Sechman
-
Patent number: 10623330Abstract: A distributed bandwidth allocation system a distributed bandwidth limiter, a first throttler, and a second throttler. The distributed bandwidth limiter receives first usage data for a first entity and usage data for a second entity. Based on the first usage data, second usage data, and a total bandwidth allocation, the distributed bandwidth limiter determines a first bandwidth allocation specifying bandwidth available for network traffic for the first entity and a second bandwidth allocation that specifies bandwidth available for network traffic for the second entity, wherein a sum of the first bandwidth allocation and the second bandwidth allocation does not exceed the total bandwidth allocation. The first bandwidth allocation and the second bandwidth allocation are provided to respective throttlers than manage traffic for the first and second entities.Type: GrantFiled: August 25, 2017Date of Patent: April 14, 2020Assignee: Google LLCInventors: Nandita Dukkipati, Vinh The Lam, Kirill Mendelev, Li Shi
-
Patent number: 10210335Abstract: Example embodiments disclosed herein relate to actively modify execution at runtime of an application under test (AUT). The AUT is executed using a real-time modifier. A security test is performed on the AUT. Execution of the AUT is modified at a decision point.Type: GrantFiled: July 26, 2012Date of Patent: February 19, 2019Assignee: Entit Software LLCInventors: Matias Madou, Kirill Mendelev, Sam Ng Ming Sum
-
Patent number: 10152552Abstract: Example embodiments disclosed herein relate to analyzing a web application. A web application is loaded. User actions are simulated on user interface elements of the web application. A structure of the web application is traversed based on rules to determine a set of actionable tokens. The respective actionable tokens include a portion of the web application that can change a user interface presented based on the web application.Type: GrantFiled: January 29, 2013Date of Patent: December 11, 2018Assignee: ENTIT SOFTWARE LLCInventors: Shawn Morgan Simpson, Kirill Mendelev, David Scott Tillery
-
Publication number: 20180091436Abstract: A distributed bandwidth allocation system a distributed bandwidth limiter, a first throttler, and a second throttler. The distributed bandwidth limiter receives first usage data for a first entity and usage data for a second entity. Based on the first usage data, second usage data, and a total bandwidth allocation, the distributed bandwidth limiter determines a first bandwidth allocation specifying bandwidth available for network traffic for the first entity and a second bandwidth allocation that specifies bandwidth available for network traffic for the second entity, wherein a sum of the first bandwidth allocation and the second bandwidth allocation does not exceed the total bandwidth allocation. The first bandwidth allocation and the second bandwidth allocation are provided to respective throttlers than manage traffic for the first and second entities.Type: ApplicationFiled: August 25, 2017Publication date: March 29, 2018Inventors: Nandita Dukkipati, Vinh The Lam, Kirill Mendelev, Li Shi
-
Patent number: 9910992Abstract: Example embodiments disclosed herein relate to present part of a web application with one or more user interface elements of the part highlighted based on updated rules. A web application is loaded in a browser layout engine. User actions are simulated on user interface elements of the web application to update the rules. The part of the web application is presented with one or more user interface elements highlighted.Type: GrantFiled: February 25, 2013Date of Patent: March 6, 2018Assignee: EntIT Software LLCInventors: Shawn Morgan Simpson, Kirill Mendelev, Philip Edward Hamer
-
Patent number: 9438617Abstract: Example embodiments disclosed herein relate to real-time modification of an application under test (AUT). A security rest is performed on the AUT. A real-time modifier determines that a portion of a function to be executed by the AUT is unsafe. The real-time modifier modifies execution of the AUT to not execute the portion.Type: GrantFiled: September 28, 2012Date of Patent: September 6, 2016Assignee: Hewlett Packard Enterprise Development LPInventors: Kirill Mendelev, Matias Madou, Sam Ng Ming Sum
-
Patent number: 9356949Abstract: In one implementation, a service interface analysis system defines a plurality of service templates based on a plurality of Uniform Resource Identifiers associated with a network service, and generates at least one utility measure of each service template from the plurality of service templates.Type: GrantFiled: February 29, 2012Date of Patent: May 31, 2016Assignee: Hewlett Packard Enterprise Development LPInventors: Zeev Messer, Kirill Mendelev, Ofer Shezaf
-
Publication number: 20160078146Abstract: Example embodiments disclosed herein relate to analyzing a web application. A web application is loaded. User actions are simulated on user interface elements of the web application. A structure of the web application is traversed based on rules to determine a set of actionable tokens. The respective actionable tokens include a portion of the web application that can change a user interface presented based on the web application.Type: ApplicationFiled: January 29, 2013Publication date: March 17, 2016Inventors: Shawn Morgan Simpson, Kirill Mendelev, David Scott Tillery
-
Publication number: 20150371047Abstract: Example embodiments relate to assessing dynamic security scans using runtime analysis and static code analysis. In example embodiments, a system performs static code analysis of a web application to identify reachable code and/or data entry points, where the data entry points are used to determine an attack surface size for the web application. At this stage, the system may initiate runtime monitoring for a dynamic security scan of the web application, where the runtime monitoring detects invocation of a statement at one of the data entry points. The invocation is logged as an invocation entry that comprises invocation parameters and/or code units that were executed in response to the invocation. The system may then determine an attack surface coverage of the dynamic security scan using the invocation entry and the attack surface size and/or a reachable code coverage using the invocation entry and the reachable code.Type: ApplicationFiled: February 28, 2013Publication date: December 24, 2015Inventors: Kirill Mendelev, Lu Zhao, David John Babcock, Ronald Joseph Sechman
-
Publication number: 20150356302Abstract: Example embodiments disclosed herein relate to present part of a web application with one or more user interface elements of the part highlighted based on updated rules. A web application is loaded in a browser layout engine. User actions are simulated on user interface elements of the web application to update the rules. The part of the web application is presented with one or more user interface elements highlighted.Type: ApplicationFiled: February 25, 2013Publication date: December 10, 2015Inventors: Shawn Morgan Simpson, Kirill Mendelev, Philip Edward Hamer
-
Publication number: 20150264074Abstract: Example embodiments disclosed herein relate to real-time modification of an application under test (AUT). A security rest is performed on the AUT. A real-time modifier determines that a portion of a function to be executed by the AUT is unsafe. The real-time modifier modifies execution of the AUT to not execute the portion.Type: ApplicationFiled: September 28, 2012Publication date: September 17, 2015Applicant: Hewlett-Packard Development Company, L.P.Inventors: Kirill Mendelev, Matias Madou, Sam Ng Ming Sum
-
Publication number: 20150248558Abstract: Example embodiments disclosed herein relate to actively modify execution at runtime of an application under test (AUT). The AUT is executed using a real-time modifier. A security test is performed on the AUT. Execution of the AUT is modified at a decision point.Type: ApplicationFiled: July 26, 2012Publication date: September 3, 2015Applicant: HEWLETT-PACKARD DEVELOPMENT COWMPANY, L.P.Inventors: Matias Madou, Kirill Mendelev, Sam Ng Ming Sum
-
Publication number: 20150128280Abstract: In one implementation, a service interface analysis system defines a plurality of service templates based on a plurality of Uniform Resource Identifiers associated with a network service, and generates at least one utility measure of each service template from the plurality of service templates.Type: ApplicationFiled: February 29, 2012Publication date: May 7, 2015Inventors: Zeev Messer, Kirill Mendelev, Ofer Shezaf
-
Publication number: 20130160130Abstract: In one implementation, an attack surface identification system defines an interface description of an application during execution of the application. The interface description is then provided to a scanner.Type: ApplicationFiled: December 20, 2011Publication date: June 20, 2013Inventors: Kirill Mendelev, Iftach Ragoler, Brian V. Chess, Spencer James Firestone, Yaron Kfir