Patents by Inventor Michael AMINOV

Michael AMINOV has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11899797
    Abstract: Systems and methods of detecting an exploit of a vulnerability of a computing device, including receiving an execution flow of at least one process running in a processor of the computing device, wherein the execution flow is received from a performance monitoring unit (PMU) of the processor, receiving memory pages from a memory of the computing device, reconstructing the execution flow of the process on another processor based on PMU data and the memory pages, running at least one exploit detection algorithm on the reconstructed process in order to identify an exploit attempt and issuing an alert.
    Type: Grant
    Filed: November 5, 2017
    Date of Patent: February 13, 2024
    Assignee: PERCEPTION POINT LTD
    Inventors: Shlomi Levin, Michael Aminov
  • Publication number: 20190258806
    Abstract: Systems and methods of detecting an exploit of a vulnerability of a computing device, including receiving an execution flow of at least one process running in a processor of the computing device, wherein the execution flow is received from a performance monitoring unit (PMU) of the processor, receiving memory pages from a memory of the computing device, reconstructing the execution flow of the process on another processor based on PMU data and the memory pages, running at least one exploit detection algorithm on the reconstructed process in order to identify an exploit attempt and issuing an alert.
    Type: Application
    Filed: November 5, 2017
    Publication date: August 22, 2019
    Applicant: PERCEPTION POINT LTD.
    Inventors: Shlomi LEVIN, Michael AMINOV
  • Publication number: 20170195364
    Abstract: A system and method for cyber security, the system including a digital minefield layer implemented in a computing environment, including multiple decoy resources in various layers of an operating system of the computing environment, and a detection module to detect interaction with at least one of the decoy resources. The method includes deploying, by a digital minefield layer implemented in a computing environment, multiple decoy resources in various layers of an operating system of the computing environment, and monitoring the decoy resources by a detection module to detect interaction with at least one of the decoy resources.
    Type: Application
    Filed: January 6, 2016
    Publication date: July 6, 2017
    Inventors: Shlomi LEVIN, Yevgeny PATS, Michael AMINOV