Patents by Inventor Michael Artz

Michael Artz has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7194769
    Abstract: Described are techniques used for assessing the security of a network. Pruned attack trees are generated using a forward chaining, breadth-first technique representing the attack paths of a possible attacker in the network. A vulnerability score is determined for each network and attacker starting point using attack loss values assigned to each host and information extracted from the attack tree(s) concerning compromised hosts. Different hypothetical alternatives may be evaluated to improve security of the network and each alternative may be evaluated by recomputing the network vulnerability score and comparing the recomputed score to the original network vulnerability score. Also disclosed is a method for determining end-to-end connectivity of a network. The resulting end-to-end connectivity information is used in generating the pruned attack tree.
    Type: Grant
    Filed: December 11, 2003
    Date of Patent: March 20, 2007
    Assignee: Massachusetts Institute of Technology
    Inventors: Richard Lippmann, Chris Scott, Kendra Kratkiewicz, Michael Artz, Kyle W. Ingols
  • Publication number: 20050138413
    Abstract: Described are techniques used for assessing the security of a network. Pruned attack trees are generated using a forward chaining, breadth-first technique representing the attack paths of a possible attacker in the network. A vulnerability score is determined for each network and attacker starting point using attack loss values assigned to each host and information extracted from the attack tree(s) concerning compromised hosts. Different hypothetical alternatives may be evaluated to improve security of the network and each alternative may be evaluated by recomputing the network vulnerability score and comparing the recomputed score to the original network vulnerability score. Also disclosed is a method for determining end-to-end connectivity of a network. The resulting end-to-end connectivity information is used in generating the pruned attack tree.
    Type: Application
    Filed: December 11, 2003
    Publication date: June 23, 2005
    Inventors: Richard Lippmann, Chris Scott, Kendra Kratkiewicz, Michael Artz, Kyle Ingols