Patents by Inventor Michael Vinov
Michael Vinov has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230186074Abstract: An example system includes a processor to receive a data set for training a machine learning model. The processor can train the machine learning model on the data set. The processor can also translate the machine learning model into constraint satisfaction problem (CSP) variables and constraints. The processor can generate fabricated data based on the CSP variables and constraints.Type: ApplicationFiled: December 15, 2021Publication date: June 15, 2023Inventors: Oleg BLINDER, Michael VINOV, Omer Yehuda BOEHM, Eyal BIN
-
Publication number: 20230025731Abstract: A computer-implemented method comprising, automatically: analyzing a machine learning dataset which comprises multiple datapoints, to deduce constraints on features of the datapoints; generating a first set of CSP (Constraint Satisfaction Problem) rules expressing the constraints; based on a machine learning model which was trained on the dataset, generating a second set of CSP rules that define one or more perturbation candidates among the features of one of the datapoints; formulating a CSP based on the first and second sets of CSP rules; solving the formulated CSP using a solver; and using the solution of the CSP as a counterfactual explanation of a prediction made by the machine learning model with respect to the one datapoint.Type: ApplicationFiled: July 19, 2021Publication date: January 26, 2023Inventors: Michael Vinov, Oleg Blinder, Diptikalyan Saha, Sandeep Hans, Aniya Aggarwal, Omer Yehuda Boehm, Eyal Bin
-
Patent number: 11201745Abstract: Embodiments of the present systems and methods may provide encrypted biometric information that can be stored and used for authentication with undegraded recognition performance. For example, in an embodiment, a method may comprise storing a plurality of encrypted trained weights of a neural network classifier, wherein the weights have been trained using biometric information representing at least one biometric feature of a person, receiving encrypted biometric information obtained by sampling at least one biometric feature of the person and encrypting the sampled biometric feature, obtaining an match-score using the encrypted trained neural network classifier, the match-score indicating a probability that the received encrypted biometric information matches the stored encrypted biometric information, and authenticating the person when the probability that received encrypted biometric information matches the stored encrypted biometric information exceeds a threshold.Type: GrantFiled: January 10, 2019Date of Patent: December 14, 2021Assignee: International Business Machines CorporationInventors: Muhammad Barham, Ariel Farkash, Ron Shmelkin, Omri Soceanu, Michael Vinov
-
Publication number: 20200228339Abstract: Embodiments of the present systems and methods may provide encrypted biometric information that can be stored and used for authentication with undegraded recognition performance. For example, in an embodiment, a method may comprise storing a plurality of encrypted trained weights of a neural network classifier, wherein the weights have been trained using biometric information representing at least one biometric feature of a person, receiving encrypted biometric information obtained by sampling at least one biometric feature of the person and encrypting the sampled biometric feature, obtaining an match-score using the encrypted trained neural network classifier, the match-score indicating a probability that the received encrypted biometric information matches the stored encrypted biometric information, and authenticating the person when the probability that received encrypted biometric information matches the stored encrypted biometric information exceeds a threshold.Type: ApplicationFiled: January 10, 2019Publication date: July 16, 2020Inventors: Muhammad Barham, Ariel Farkash, Ron Shmelkin, Omri Soceanu, Michael Vinov
-
Patent number: 9734329Abstract: Mitigating return-oriented programming attacks. From program code and associated components needed by the program code for execution, machine language instruction sequences that may be combined and executed as malicious code are selected. A predetermined number of additional copies of each of the selected machine language instruction sequences are made, and the additional copies are marked as non-executable. The machine language instruction sequences and the non-executable copies are distributed in memory. If a process attempts to execute a machine language instruction sequence that has been marked non-executable, the computer may initiate protective action.Type: GrantFiled: April 19, 2016Date of Patent: August 15, 2017Assignee: International Business Machines CorporationInventors: Omer Y. Boehm, Eitan D. Farchi, Oded Margalit, Yousef Shajrawi, Michael Vinov
-
Patent number: 9665717Abstract: Mitigating return-oriented programming (ROP) attacks. Program code and associated components are received and loaded into memory. From the program code and associated components, a predetermined number of sequences of machine language instructions that terminate in a return instruction are selected. The sequences of machine language instructions include: machine language instruction sequences that are equivalent to a conditional statement “if-then-else return,” sequences of machine language instructions corresponding to known malicious code sequences, and sequences of machine language instructions corresponding to machine language instructions in known toolkits for assembling malicious code sequences.Type: GrantFiled: September 13, 2016Date of Patent: May 30, 2017Assignee: International Business Machines CorporationInventors: Omer Y. Boehm, Eitan D. Farchi, Oded Margalit, Yousef Shajrawi, Michael Vinov
-
Patent number: 9665710Abstract: Mitigating return-oriented programming attacks. Program code and associated components are received and loaded into memory. From the program code and associated components, a predetermined number of sequences of machine language instructions that terminate in a return instruction are selected. The sequences of machine language instructions include: machine language instruction sequences that are equivalent to a conditional statement “if-then-else return,” sequences of machine language instructions corresponding to known malicious code sequences, and sequences of machine language instructions corresponding to machine language instructions in known toolkits for assembling malicious code sequences.Type: GrantFiled: September 14, 2016Date of Patent: May 30, 2017Assignee: International Business Machines CorporationInventors: Omer Y. Boehm, Eitan D. Farchi, Oded Margalit, Yousef Shajrawi, Michael Vinov
-
Publication number: 20170091449Abstract: Mitigating return-oriented programming attacks. From program code and associated components needed by the program code for execution, machine language instruction sequences that may be combined and executed as malicious code are selected. A predetermined number of additional copies of each of the selected machine language instruction sequences are made, and the additional copies are marked as non-executable. The machine language instruction sequences and the non-executable copies are distributed in memory. If a process attempts to execute a machine language instruction sequence that has been marked non-executable, the computer may initiate protective action.Type: ApplicationFiled: April 19, 2016Publication date: March 30, 2017Inventors: Omer Y. Boehm, Eitan D. Farchi, Oded Margalit, Yousef Shajrawi, Michael Vinov
-
Publication number: 20170091447Abstract: Mitigating return-oriented programming attacks. Program code and associated components are received and loaded into memory. From the program code and associated components, a predetermined number of sequences of machine language instructions that terminate in a return instruction are selected. The sequences of machine language instructions include: machine language instruction sequences that are equivalent to a conditional statement “if-then-else return,” sequences of machine language instructions corresponding to known malicious code sequences, and sequences of machine language instructions corresponding to machine language instructions in known toolkits for assembling malicious code sequences.Type: ApplicationFiled: September 14, 2016Publication date: March 30, 2017Inventors: Omer Y. Boehm, Eitan D. Farchi, Oded Margalit, Yousef Shajrawi, Michael Vinov
-
Publication number: 20170091456Abstract: Mitigating return-oriented programming (ROP) attacks. Program code and associated components are received and loaded into memory. From the program code and associated components, a predetermined number of sequences of machine language instructions that terminate in a return instruction are selected. The sequences of machine language instructions include: machine language instruction sequences that are equivalent to a conditional statement “if-then-else return,” sequences of machine language instructions corresponding to known malicious code sequences, and sequences of machine language instructions corresponding to machine language instructions in known toolkits for assembling malicious code sequences.Type: ApplicationFiled: September 13, 2016Publication date: March 30, 2017Inventors: Omer Y. Boehm, Eitan D. Farchi, Oded Margalit, Yousef Shajrawi, Michael Vinov
-
Patent number: 9576138Abstract: Mitigating return-oriented programming attacks. From program code and associated components needed by the program code for execution, machine language instruction sequences that may be combined and executed as malicious code are selected. A predetermined number of additional copies of each of the selected machine language instruction sequences are made, and the additional copies are marked as non-executable. The machine language instruction sequences and the non-executable copies are distributed in memory. If a process attempts to execute a machine language instruction sequence that has been marked non-executable, the computer may initiate protective action.Type: GrantFiled: September 30, 2015Date of Patent: February 21, 2017Assignee: International Business Machines CorporationInventors: Omer Y. Boehm, Eitan D. Farchi, Oded Margalit, Yousef Shajrawi, Michael Vinov
-
Patent number: 7370296Abstract: Methods and systems are disclosed that enhance the ability of a test generator to automatically deal with address translation in a processor design, and without need for creating specific code. A model of the address translation mechanism of a design-under-test is represented as a directed acyclic graph and then converted into a constraint satisfaction problem. The problem is solved by a CSP engine, and the solution used to generate test cases for execution. Using the model, testing knowledge can be propagated to models applicable to many different designs to produce extensive coverage of address translation mechanisms.Type: GrantFiled: May 25, 2004Date of Patent: May 6, 2008Assignee: International Business Machines CorporationInventors: Anatoly Koyfman, Allon Adir, Roy Emek, Yoav Katz, Michael Vinov
-
Publication number: 20050278702Abstract: Methods and systems are disclosed that enhance the ability of a test generator to automatically deal with address translation in a processor design, and without need for creating specific code. A model of the address translation mechanism of a design-under-test is represented as a directed acyclic graph and then converted into a constraint satisfaction problem. The problem is solved by a CSP engine, and the solution used to generate test cases for execution. Using the model, testing knowledge can be propagated to models applicable to many different designs to produce extensive coverage of address translation mechanisms.Type: ApplicationFiled: May 25, 2004Publication date: December 15, 2005Applicant: International Business Machines CorporationInventors: Anatoly Koyfman, Allon Adir, Roy Emek, Yoav Katz, Michael Vinov