Patents by Inventor Mori Benech
Mori Benech has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12321456Abstract: A system and method of deployment of malware detection traps by at least one processor may include performing a first interrogation of a first Network Asset (NA) of a specific NA family; determining, based on the interrogation, a value of one or more first NA property data elements of the first NA; obtaining one or more second NA property data elements corresponding to the specific NA family; integrating the one or more first NA property data elements and the one or more second NA property data elements to generate a template data element, corresponding to the specific NA family; producing, from the template data element, a malware detection trap module; and deploying, on one or more computing devices of a computer network, one or more instantiations of the malware detection trap module as decoys of the first NA.Type: GrantFiled: June 6, 2024Date of Patent: June 3, 2025Assignee: Commvault Systems, Inc.Inventors: Oleg Goldshmidt, Mori Benech
-
Publication number: 20240320339Abstract: A system and method of deployment of malware detection traps by at least one processor may include performing a first interrogation of a first Network Asset (NA) of a specific NA family; determining, based on the interrogation, a value of one or more first NA property data elements of the first NA; obtaining one or more second NA property data elements corresponding to the specific NA family; integrating the one or more first NA property data elements and the one or more second NA property data elements to generate a template data element, corresponding to the specific NA family; producing, from the template data element, a malware detection trap module; and deploying, on one or more computing devices of a computer network, one or more instantiations of the malware detection trap module as decoys of the first NA.Type: ApplicationFiled: June 6, 2024Publication date: September 26, 2024Applicant: Commvault Systems, Inc.Inventors: Oleg GOLDSHMIDT, Mori BENECH
-
Patent number: 12039048Abstract: A system and method of deployment of malware detection traps by at least one processor may include performing a first interrogation of a first Network Asset (NA) of a specific NA family; determining, based on the interrogation, a value of one or more first NA property data elements of the first NA; obtaining one or more second NA property data elements corresponding to the specific NA family; integrating the one or more first NA property data elements and the one or more second NA property data elements to generate a template data element, corresponding to the specific NA family; producing, from the template data element, a malware detection trap module; and deploying, on one or more computing devices of a computer network, one or more instantiations of the malware detection trap module as decoys of the first NA.Type: GrantFiled: April 27, 2023Date of Patent: July 16, 2024Assignee: Commvault Systems, Inc.Inventors: Oleg Goldshmidt, Mori Benech
-
Publication number: 20240056481Abstract: A cyber threat detection and deception system interoperates synergistically with a data storage management system. As a proxy for identifying crown jewels among many and diverse data assets in a network, the illustrative cyber threat detection and deception system uses service level information obtained from the data storage management system, e.g., RPO, RTO, append-only secondary storage, synthetic-full frequency, etc. The cyber threat detection and deception system emulates proprietary protocols used by storage management technologies such as the data storage management system, etc. By creating emulation traps and an emulation lexicon of these storage-related protocols, the illustrative cyber threat detection and deception system can create and execute cyber deception plans for the proprietary storage management assets.Type: ApplicationFiled: September 1, 2022Publication date: February 15, 2024Inventors: Paul IGNATIUS, Arun Prasad AMARENDRAN, Steven Michael PRESTON, Mori BENECH, Irina CHEKAREV, Indu Sekhar PEDDIBHOTLA, Manoj NAIR
-
Publication number: 20230259626Abstract: A system and method of deployment of malware detection traps by at least one processor may include performing a first interrogation of a first Network Asset (NA) of a specific NA family; determining, based on the interrogation, a value of one or more first NA property data elements of the first NA; obtaining one or more second NA property data elements corresponding to the specific NA family; integrating the one or more first NA property data elements and the one or more second NA property data elements to generate a template data element, corresponding to the specific NA family; producing, from the template data element, a malware detection trap module; and deploying, on one or more computing devices of a computer network, one or more instantiations of the malware detection trap module as decoys of the first NA.Type: ApplicationFiled: April 27, 2023Publication date: August 17, 2023Inventors: Oleg Goldshmidt, Mori Benech
-
Patent number: 11681804Abstract: A system and method of deployment of malware detection traps by at least one processor may include performing a first interrogation of a first Network Asset (NA) of a specific NA family; determining, based on the interrogation, a value of one or more first NA property data elements of the first NA; obtaining one or more second NA property data elements corresponding to the specific NA family; integrating the one or more first NA property data elements and the one or more second NA property data elements to generate a template data element, corresponding to the specific NA family; producing, from the template data element, a malware detection trap module; and deploying, on one or more computing devices of a computer network, one or more instantiations of the malware detection trap module as decoys of the first NA.Type: GrantFiled: December 30, 2020Date of Patent: June 20, 2023Assignee: Commvault Systems, Inc.Inventors: Oleg Goldshmidt, Mori Benech
-
Publication number: 20210279332Abstract: A system and method of deployment of malware detection traps by at least one processor may include performing a first interrogation of a first Network Asset (NA) of a specific NA family; determining, based on the interrogation, a value of one or more first NA property data elements of the first NA; obtaining one or more second NA property data elements corresponding to the specific NA family; integrating the one or more first NA property data elements and the one or more second NA property data elements to generate a template data element, corresponding to the specific NA family; producing, from the template data element, a malware detection trap module; and deploying, on one or more computing devices of a computer network, one or more instantiations of the malware detection trap module as decoys of the first NA.Type: ApplicationFiled: December 30, 2020Publication date: September 9, 2021Applicant: Trap Data Security Ltd.Inventors: Oleg Goldshmidt, Mori Benech
-
Patent number: 10372908Abstract: A system and method may include a first unit configured to receive a stream of bytes, cause a second unit to execute the stream of bytes from a selected first offset, and monitor an execution of the stream of bytes by the second unit. A second unit may be configured to execute the stream of bytes from the selected offset. The first unit may be configured to determine, based on the execution of the stream of bytes, whether or not the stream of bytes includes a malware.Type: GrantFiled: July 25, 2016Date of Patent: August 6, 2019Assignee: Trap Data Security Ltd.Inventors: Yuval Malachi, Mori Benech
-
Patent number: 10275595Abstract: An embodiment may create a memory image including a representation of a thread environment block (TEB) and representation of a process environment block (PEB) according to specifications of an operating system. A memory image may be loaded into a memory and a shellcode may be caused to use the memory image when executed. An access to the memory image, made by the shellcode, may be monitored and controlled.Type: GrantFiled: September 29, 2016Date of Patent: April 30, 2019Assignee: Trap Data Security Ltd.Inventors: Yuval Malachi, Mori Benech
-
Publication number: 20180089432Abstract: An embodiment may create a memory image including a representation of a thread environment block (TEB) and representation of a process environment block (PEB) according to specifications of an operating system. A memory image may be loaded into a memory and a shellcode may be caused to use the memory image when executed. An access to the memory image, made by the shellcode, may be monitored and controlled.Type: ApplicationFiled: September 29, 2016Publication date: March 29, 2018Inventors: Yuval MALACHI, Mori Benech
-
Publication number: 20180025158Abstract: A system and method may include a first unit configured to receive a stream of bytes, cause a second unit to execute the stream of bytes from a selected first offset, and monitor an execution of the stream of bytes by the second unit. A second unit may be configured to execute the stream of bytes from the selected offset. The first unit may be configured to determine, based on the execution of the stream of bytes, whether or not the stream of bytes includes a malware.Type: ApplicationFiled: July 25, 2016Publication date: January 25, 2018Inventors: Yuval MALACHI, Moris BENECH