Patents by Inventor MASSIMILIANO ALBANESE

MASSIMILIANO ALBANESE has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11930046
    Abstract: A system is provided for determining vulnerability metrics for graph-based configuration security. During operation, the system generates a multi-layer graph for a system with a plurality of interconnected components. The system determines, based on the multi-layer subgraph, a model for a multi-step attack on the system by: calculating, based on a first set of variables and a first set of tunable parameters, a likelihood of exploiting a vulnerability in the system; and calculating, based on a second set of variables and a second set of tunable parameters, an exposure factor indicating an impact of exploiting a vulnerability on the utility of an associated component. The system determines, based on the model, a set of attack paths that can be used in the multi-step attack and recommends a configuration change in the system, thereby facilitating optimization of system security to mitigate attacks on the system while preserving system functionality.
    Type: Grant
    Filed: June 17, 2021
    Date of Patent: March 12, 2024
    Assignee: Xerox Corporation
    Inventors: Massimiliano Albanese, Marc E. Mosko
  • Publication number: 20230344856
    Abstract: A system determines an on/off feature and vulnerability and dependency nodes in a graph which represents a system of components. The feature enables vulnerability nodes based on a probability that a vulnerability will be exploited, and a vulnerability degrades a utility of one or more components based on an exposure factor. The system calculates, for a path in the graph to a component, a loss of utility of a given dimension of multiple dimensions based on a combiner operator and a logic operator. The combiner operator takes inputs which represent a weighted probability that the given dimension is degraded, and the logic operator defines the inputs based on a probability and exposure factor. The system aggregates calculated losses of utility across the multiple dimensions for the system components. The system selects a combination of possible on/off feature values which results in a lowest loss of utility for the components.
    Type: Application
    Filed: November 29, 2022
    Publication date: October 26, 2023
    Applicant: Palo Alto Research Center Incorporated
    Inventors: Marc E. Mosko, Massimiliano Albanese, Ibifubara Iganibo
  • Publication number: 20230344855
    Abstract: A system determines, in a graph which represents a system of components: vulnerability nodes representing known vulnerabilities to the system, including exposed and non-exposed vulnerability nodes associated with an exploitation likelihood; and dependency nodes representing components in the system, including direct and indirect dependency nodes associated with an exposure factor indicating an amount of degradation based on exploitation of an associated vulnerability. The system calculates, across all non-exposed vulnerability nodes and all direct dependency nodes, a score which indicates an attack volume based on at least: a respective second likelihood associated with a non-exposed vulnerability node; an exposure factor associated with a dependency node which represents a component directly degraded based on exploitation of a vulnerability; and a loss of utility of the component.
    Type: Application
    Filed: June 3, 2022
    Publication date: October 26, 2023
    Applicant: Palo Alto Research Center Incorporated
    Inventors: Massimiliano Albanese, Ibifubara Iganibo, Marc E. Mosko, Alejandro E. Brito
  • Publication number: 20230262054
    Abstract: A method of authenticating a user that includes initializing the multi-factor authentication system based on an input; presenting a challenge requesting the user to enter a specific authenticator of a sequence of authenticators stored in the multi-factor authentication system, where the stored sequence of authenticators represents a combination of a plurality of authentication factors; receiving an authenticator from the user in response to the challenge; verifying identity of the user by determining whether the received authenticator matches the specific authenticator requested by the challenge; and granting the access based on a determination that the received authenticator matches the specific authenticator requested, or denying the access based on a determination that the received authenticator does not match the specific authenticator requested.
    Type: Application
    Filed: February 14, 2022
    Publication date: August 17, 2023
    Applicant: GEORGE MASON UNIVERSITY
    Inventors: EMANUELA MARASCO, MASSIMILIANO ALBANESE
  • Publication number: 20220407891
    Abstract: A system is provided for determining vulnerability metrics for graph-based configuration security. During operation, the system generates a multi-layer graph for a system with a plurality of interconnected components. The system determines, based on the multi-layer subgraph, a model for a multi-step attack on the system by: calculating, based on a first set of variables and a first set of tunable parameters, a likelihood of exploiting a vulnerability in the system; and calculating, based on a second set of variables and a second set of tunable parameters, an exposure factor indicating an impact of exploiting a vulnerability on the utility of an associated component. The system determines, based on the model, a set of attack paths that can be used in the multi-step attack and recommends a configuration change in the system, thereby facilitating optimization of system security to mitigate attacks on the system while preserving system functionality.
    Type: Application
    Filed: June 17, 2021
    Publication date: December 22, 2022
    Applicant: Palo Alto Research Center Incorporated
    Inventors: Massimiliano Albanese, Marc E. Mosko
  • Patent number: 9203861
    Abstract: A system and method for determining at least one hardening strategy to prevent at least one attack, comprising: performing processing associated with obtaining at least one attack graph, the at least one attack graph comprising at least one goal condition, at least one initial condition, and at least one exploit; performing processing associated with obtaining at least one allowable action that disables the at least one initial condition; performing processing associated with obtaining costs associated with the at least one allowable action; and performing processing associated with utilizing the at least one allowable action to determine at least one recommended strategy from the at least one allowable action taking into account the costs.
    Type: Grant
    Filed: June 21, 2013
    Date of Patent: December 1, 2015
    Assignee: GEORGE MASON UNIVERSITY
    Inventors: Massimiliano Albanese, Sushil Jajodia, Steven Noel
  • Publication number: 20140173740
    Abstract: A system and method for determining at least one hardening strategy to prevent at least one attack, comprising: performing processing associated with obtaining at least one attack graph, the at least one attack graph comprising at least one goal condition, at least one initial condition, and at least one exploit; performing processing associated with obtaining at least one allowable action that disables the at least one initial condition; performing processing associated with obtaining costs associated with the at least one allowable action; and performing processing associated with utilizing the at least one allowable action to determine at least one recommended strategy from the at least one allowable action taking into account the costs.
    Type: Application
    Filed: June 21, 2013
    Publication date: June 19, 2014
    Inventors: MASSIMILIANO ALBANESE, SUSHIL JAJODIA, STEVEN NOEL