Patents by Inventor Mikhail Cherepov

Mikhail Cherepov has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8806629
    Abstract: A system and method for specification of a policy to trigger automatic signature generation, refinement, and confidence characterization is provided. The system monitors incoming payloads and identifies untrusted payloads based on specified characteristics of the process including process name, triggering action, prior actions and/or state and/or conditions. Signatures are automatically generated for untrusted payloads and stored. Additionally, the system enables denial-of-service (DoS) protection based on the number of signature-generation attempts that allows the server process to continue providing service on unaffected interfaces.
    Type: Grant
    Filed: January 2, 2008
    Date of Patent: August 12, 2014
    Assignee: Cisco Technology, Inc.
    Inventors: Mikhail Cherepov, Andrew Zawadowskiy, Jeffrey Albin Kraemer, Boris Ruchansky
  • Patent number: 8474044
    Abstract: Techniques are disclosed for verifying whether payload signatures correspond to a vulnerability or exploit. Generally a security system may be configured to detect an attack on a server while the server is processing a payload. The security system generates (or obtains) a provisional signature corresponding to the vulnerability. For example, a provisional signature may be generated for a vulnerability from a group of payloads determined to correspond to that vulnerability. The effects of subsequent payloads which match the provisional signature may be monitored. If the effects of a payload duplicate the attack symptoms, a confidence metric for provisional signature may be increased. Once the confidence metric exceeds a predetermined threshold, then the provisional signature may be made active and used to block traffic from reaching an intended destination.
    Type: Grant
    Filed: January 5, 2009
    Date of Patent: June 25, 2013
    Assignee: Cisco Technology, Inc
    Inventors: Andrew Zawadowskiy, Boris Ruchansky, Mikhail Cherepov
  • Publication number: 20100175132
    Abstract: Techniques are disclosed for verifying whether payload signatures correspond to a vulnerability or exploit. Generally a security system may be configured to detect an attack on a server while the server is processing a payload. The security system generates (or obtains) a provisional signature corresponding to the vulnerability. For example, a provisional signature may be generated for a vulnerability from a group of payloads determined to correspond to that vulnerability. The effects of subsequent payloads which match the provisional signature may be monitored. If the effects of a payload duplicate the attack symptoms, a confidence metric for provisional signature may be increased. Once the confidence metric exceeds a predetermined threshold, then the provisional signature may be made active and used to block traffic from reaching an intended destination.
    Type: Application
    Filed: January 5, 2009
    Publication date: July 8, 2010
    Inventors: ANDREW ZAWADOWSKIY, Boris Ruchansky, Mikhail Cherepov
  • Patent number: 7721281
    Abstract: A system detects an application attempting to invoke an administrative utility on a target application for installation of software. In response, the system identifies the administrative utility as an installer launcher. The system then detects the installer launcher invoking execution of the target application, and in response, identifies the target application as an installation application. The system allows classification of applications as installer launchers and installation applications and in response to detecting operation of such programs, enforces installation security profiles during their operations that apply varying levels of access to certain system resources that differ from a level of access normally applied during non-installation activities.
    Type: Grant
    Filed: July 1, 2005
    Date of Patent: May 18, 2010
    Assignee: Cisco Technology, Inc.
    Inventors: Mikhail Cherepov, Richard C. Gorton, Jr.
  • Patent number: 7716473
    Abstract: A computer-implemented system, method and apparatus for operating a reference monitor simulator is operable to recreate the operations performed by a reference monitor on a computer system. In one configuration, the system defines at least one security rule specifying whether to allow or deny a request to access at least one resource under a given set of circumstances and supplies at least one request to access a resource. The system further applies the at least one security rule in response to the at least one request to access a resource to determine whether to allow or prevent the at least one request.
    Type: Grant
    Filed: April 9, 2004
    Date of Patent: May 11, 2010
    Assignee: Cisco Technology, Inc.
    Inventors: Jeffrey A. Kraemer, Philip J. S. Gladstone, Alan J. Kirby, Mikhail Cherepov
  • Patent number: 7707620
    Abstract: A method and apparatus for securing executables and processes having setuid/gid permissions and privileges is presented. A mechanism is provided to track and control operations for files and processes having setuid/gid privileges. A policy rule is defined for controlling the operations on the files and processes. The policy rule is then used to control operations involving the files and processes.
    Type: Grant
    Filed: May 6, 2005
    Date of Patent: April 27, 2010
    Assignee: Cisco Technology, Inc.
    Inventor: Mikhail Cherepov
  • Patent number: 7644271
    Abstract: A method and computer program product for providing enforcement of security policies for kernel module loading is presented. File paths for shared library executable files opened by user processes are cached. When a request to load a kernel loadable module (KLM) is received, a previously cached file path for said KLM is retrieved, said file path mapping a location of an executable file from which said KLM was produced. A security policy is applied to said file path, wherein when said file path triggers a security policy rule then an action associated with a triggered rule is taken, and wherein when said file path does not trigger a security policy rule then said KLM request is allowed to proceed.
    Type: Grant
    Filed: November 7, 2005
    Date of Patent: January 5, 2010
    Assignee: Cisco Technology, Inc.
    Inventors: Mikhail Cherepov, Yan Chen
  • Publication number: 20060253909
    Abstract: A method and apparatus for securing executables and processes having setuid/gid permissions and privileges is presented. A mechanism is provided to track and control operations for files and processes having setuid/gid privileges. A policy rule is defined for controlling the operations on the files and processes. The policy rule is then used to control operations involving the files and processes.
    Type: Application
    Filed: May 6, 2005
    Publication date: November 9, 2006
    Inventor: Mikhail Cherepov