Patents by Inventor Padmanabhan Krishnan
Padmanabhan Krishnan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11288397Abstract: Textual masking for multiparty computation is provided. The method comprises receiving masked input data from a number of contributors, wherein the input data from each contributor has a unique contributor mask value. A unique analyst mask factor is received for each contributor, computed by an analyst as a difference between a uniform analyst mask value and the contributor mask value. An API call is received from the analyst to aggregate the input data from the contributors. The respective analyst mask factors are added to the input data from the contributors, and the data is aggregated and shuffled. Computational results received from the analyst based on the aggregated input data are published. In response to API calls from the contributors, the analyst mask factors are removed from the computational results, wherein computational results received by each contributor are masked only by the respective contributor mask value.Type: GrantFiled: September 3, 2019Date of Patent: March 29, 2022Assignee: International Business Machines CorporationInventors: Padmanabhan Krishnan, Vaibhav Murlidhar Kulkarni, Gopikrishnan Varadarajulu, Rakhi S. Arora, Samir Katti
-
Publication number: 20220019677Abstract: A method may include determining that a source variable receives a source value from a source function, determining that a source statement writes, using the source variable, the source value to a column in a table, and obtaining, for a first sink statement, a first set of influenced variables influenced by the source variable. The method may further include obtaining, for a second sink statement, a second set of influenced variables influenced by the first set of influenced variables, and adding nodes to a trace graph. The method may further include determining that the first sink statement reads the source value into a sink variable including an identifier of the column, generating a modified set of influenced variables by adding the sink variable to the set of influenced variables, and reporting a defect at the first sink statement, and a defect trace using the trace graph.Type: ApplicationFiled: September 30, 2021Publication date: January 20, 2022Applicant: Oracle International CorporationInventors: Raghavendra Kagalavadi Ramesh, Padmanabhan Krishnan, Yi Lu
-
Patent number: 11210201Abstract: A method may include generating, by performing a full analysis of code and for each component of the code, summaries including: (i) a forward summary including a forward flow and (ii) a backward summary including a backward flow, obtaining a modification to a modified component, determining that one of the summaries for the modified component is invalid, and in response to determining that a summary for the modified component is invalid: obtaining the forward flow from the forward summary of the modified component, obtaining the backward flow from the backward summary of the modified component, generating a local flow by performing an incremental analysis of the modified component using the forward flow of the modified component and the backward flow of the modified component, and detecting a defect in the code using the forward flow of the modified component, the local flow, and the backward flow of the modified component.Type: GrantFiled: September 29, 2020Date of Patent: December 28, 2021Assignee: Oracle International CorporationInventors: Padmanabhan Krishnan, Rebecca Jane O'Donoghue, Nicholas John Allen, Yi Lu
-
Patent number: 11163888Abstract: A method may include determining that a source variable in code receives a source value from a source function specified by a target analysis, determining that a source statement in the code writes, using the source variable, the source value to a column in a table, obtaining, for a sink statement in the code, a set of influenced variables influenced by the source variable, determining that the sink statement reads the source value into a sink variable including an identifier of the column, generating a modified set of influenced variables by adding the sink variable to the set of influenced variables, and reporting a defect at the sink statement.Type: GrantFiled: February 15, 2019Date of Patent: November 2, 2021Assignee: Oracle International CorporationInventors: Raghavendra Kagalavadi Ramesh, Padmanabhan Krishnan, Yi Lu
-
Patent number: 11159381Abstract: A method may include receiving a network schema including switches, links connecting the switches, and a topology that maps the switches to the links. The switches may include ports. The method may further include receiving a software defined networking (SDN) policy including a function that modifies a state of a packet entering a switch, converting the topology to a graph including nodes corresponding to the switches, while searching the graph, determining, according to the function, whether a port of a switch corresponding to a node is reachable by the packet entering the switch, and in response to searching the graph, verifying a property of the SDN policy.Type: GrantFiled: July 30, 2019Date of Patent: October 26, 2021Assignee: Oracle International CorporationInventors: Henry John O'Brien, Padmanabhan Krishnan, Nathan Robert Albert Keynes, Marius Portmann
-
Publication number: 20210194848Abstract: A source host device masks the hardware address of a hosted container from a network device to mitigate the use of resources in the network device. A virtual switch on the source host receives a frame from a hosted container. The frame includes a source hardware address of the hardware address corresponding to the hosted container. The frame also includes a source network address of the network address corresponding to the hosted container. The virtual switch replaces the source hardware address of the frame with the hardware address associated with the source host, and send the frame to the network device. The frame sent to the network device includes the host hardware address as the source hardware address and the container network address as the source network address.Type: ApplicationFiled: March 4, 2021Publication date: June 24, 2021Inventors: Shyam N. Kapadia, Padmanabhan Krishnan, Naoshad Mehta, Rajesh B. Nataraja, Nilesh Shah
-
Patent number: 11030304Abstract: A method for buffer overflow detection involves obtaining a program code configured to access memory locations in a loop using a buffer index variable, obtaining an assertion template configured to capture a dependency between the buffer index variable and a loop index variable of the loop in the program code, generating an assertion using the assertion template, verifying that the assertion holds using a k-induction; and determining whether a buffer overflow exists using the assertion.Type: GrantFiled: July 31, 2018Date of Patent: June 8, 2021Assignee: Oracle International CorporationInventors: Francois Gauthier, Nathan Keynes, Padmanabhan Krishnan, Cristina Cifuentes, Trung Quang Ta
-
Publication number: 20210157924Abstract: A method for detecting a defect may include extracting, from application code and using a framework support specification corresponding to a framework, a framework interaction between the application code and the framework. The framework interaction specifies an object used by the application code and managed by the framework. The method may further include performing, using the framework interaction, a dynamic analysis of the application code to obtain a heap snapshot, performing, using the heap snapshot and the framework interaction, a static analysis of the application code, and detecting, by the static analysis, the defect.Type: ApplicationFiled: November 22, 2019Publication date: May 27, 2021Applicant: Oracle International CorporationInventors: Anastasios Antoniadis, Raghavendra Ramesh, Padmanabhan Krishnan, Nicholas John Allen
-
Patent number: 10992636Abstract: A source host device masks the hardware address of a hosted container from a network device to mitigate the use of resources in the network device. A virtual switch on the source host receives a frame from a hosted container. The frame includes a source hardware address of the hardware address corresponding to the hosted container. The frame also includes a source network address of the network address corresponding to the hosted container. The virtual switch replaces the source hardware address of the frame with the hardware address associated with the source host, and send the frame to the network device. The frame sent to the network device includes the host hardware address as the source hardware address and the container network address as the source network address.Type: GrantFiled: September 29, 2017Date of Patent: April 27, 2021Assignee: CISCO TECHNOLOGY, INC.Inventors: Shyam N. Kapadia, Padmanabhan Krishnan, Naoshad Mehta, Rajesh B. Nataraja, Nilesh Shah
-
Publication number: 20210064779Abstract: Textual masking for multiparty computation is provided. The method comprises receiving masked input data from a number of contributors, wherein the input data from each contributor has a unique contributor mask value. A unique analyst mask factor is received for each contributor, computed by an analyst as a difference between a uniform analyst mask value and the contributor mask value. An API call is received from the analyst to aggregate the input data from the contributors. The respective analyst mask factors are added to the input data from the contributors, and the data is aggregated and shuffled. Computational results received from the analyst based on the aggregated input data are published. In response to API calls from the contributors, the analyst mask factors are removed from the computational results, wherein computational results received by each contributor are masked only by the respective contributor mask value.Type: ApplicationFiled: September 3, 2019Publication date: March 4, 2021Inventors: Padmanabhan Krishnan, Vaibhav Murlidhar Kulkarni, Gopikrishnan Varadarajulu, Rakhi S. Arora, Samir Katti
-
Publication number: 20210064510Abstract: A method may include generating, by performing a full analysis of code and for each component of the code, summaries including: (i) a forward summary including a forward flow and (ii) a backward summary including a backward flow, obtaining a modification to a modified component, determining that one of the summaries for the modified component is invalid, and in response to determining that a summary for the modified component is invalid: obtaining the forward flow from the forward summary of the modified component, obtaining the backward flow from the backward summary of the modified component, generating a local flow by performing an incremental analysis of the modified component using the forward flow of the modified component and the backward flow of the modified component, and detecting a defect in the code using the forward flow of the modified component, the local flow, and the backward flow of the modified component.Type: ApplicationFiled: September 29, 2020Publication date: March 4, 2021Applicant: Oracle International CorporationInventors: Padmanabhan Krishnan, Rebecca Jane O'Donoghue, Nicholas John Allen, Yi Lu
-
Publication number: 20210036926Abstract: A method may include receiving a network schema including switches, links connecting the switches, and a topology that maps the switches to the links. The switches may include ports. The method may further include receiving a software defined networking (SDN) policy including a function that modifies a state of a packet entering a switch, converting the topology to a graph including nodes corresponding to the switches, while searching the graph, determining, according to the function, whether a port of a switch corresponding to a node is reachable by the packet entering the switch, and in response to searching the graph, verifying a property of the SDN policy.Type: ApplicationFiled: July 30, 2019Publication date: February 4, 2021Inventors: Henry John O'Brien, Padmanabhan Krishnan, Nathan Robert Albert Keynes, Marius Portmann
-
Publication number: 20200372394Abstract: In a secure multi-party computation (sMPC) system, a super mask is constructed using a set of masks corresponding to a set of data contributors. Each data contributor uses a corresponding different mask to obfuscate the data of the data contributor. a first scaled masked data is formed by applying a first scale factor to first masked data of the first data contributor, the scale factor being computed specifically for the first data contributor from the super mask. A union is constructed of all scaled masked data from all data contributors, including the first scaled masked data. A machine learning (ML) model is trained using the union as training data, where the union continues to keep obfuscated the differently masked data from the different data contributors. The training produces a trained ML model usable in the sMPC with the set of data contributors.Type: ApplicationFiled: May 20, 2019Publication date: November 26, 2020Applicant: International Business Machines CorporationInventors: Vaibhav Murlidhar Kulkarni, Rakhi S. Arora, Padmanabhan Krishnan, Gopikrishnan Varadarajulu
-
Patent number: 10824538Abstract: A method may include generating, by performing a full analysis of code and for each component of the code, summaries including: a forward summary including a forward flow, and a backward summary including a backward flow, obtaining a modification to a modified component, determining that one of the summaries for the modified component is invalid, and in response to determining that a summary for the modified component is invalid: obtaining the forward flow from the forward summary of the modified component, obtaining the backward flow from the backward summary of the modified component, generating a local flow by performing an incremental analysis of the modified component using the forward flow of the modified component and the backward flow of the modified component, and detecting a defect in the code using the forward flow of the modified component, the local flow, and the backward flow of the modified component.Type: GrantFiled: January 22, 2019Date of Patent: November 3, 2020Assignee: Oracle International CorporationInventors: Padmanabhan Krishnan, Rebecca Jane O'Donoghue, Nicholas John Allen, Yi Lu
-
Patent number: 10754698Abstract: Techniques for virtual workload deployment based on computing resource hardware load and associated network hardware load. For each of a plurality of computing resources within one or more data centers onto which a virtual workload can be deployed, a computing resource hardware load of the respective computing resource is determined. Network topology information is maintained for at least one network fabric of the one or more data centers, and an associated network hardware load of a network device communicatively connected to the respective computing resource is determined. Embodiments automatically select one or more computing resources. The virtual workload is deployed onto the automatically selected one or more computing resources.Type: GrantFiled: September 14, 2018Date of Patent: August 25, 2020Assignee: Cisco Technology, Inc.Inventors: Padmanabhan Krishnan, Rajesh Babu Nataraja, Shyam Kapadia, Nader Lahouti, Viral Rajeshbhai Barot, Jay Ajaykumar Gheewala
-
Publication number: 20200265143Abstract: A method may include determining that a source variable in code receives a source value from a source function specified by a target analysis, determining that a source statement in the code writes, using the source variable, the source value to a column in a table, obtaining, for a sink statement in the code, a set of influenced variables influenced by the source variable, determining that the sink statement reads the source value into a sink variable including an identifier of the column, generating a modified set of influenced variables by adding the sink variable to the set of influenced variables, and reporting a defect at the sink statement.Type: ApplicationFiled: February 15, 2019Publication date: August 20, 2020Applicant: Oracle International CorporationInventors: Raghavendra Kagalavadi Ramesh, Padmanabhan Krishnan, Yi Lu
-
Publication number: 20200233777Abstract: A method may include generating, by performing a full analysis of code and for each component of the code, summaries including: (i) a forward summary including a forward flow and (ii) a backward summary including a backward flow, obtaining a modification to a modified component, determining that one of the summaries for the modified component is invalid, and in response to determining that a summary for the modified component is invalid: obtaining the forward flow from the forward summary of the modified component, obtaining the backward flow from the backward summary of the modified component, generating a local flow by performing an incremental analysis of the modified component using the forward flow of the modified component and the backward flow of the modified component, and detecting a defect in the code using the forward flow of the modified component, the local flow, and the backward flow of the modified component.Type: ApplicationFiled: January 22, 2019Publication date: July 23, 2020Inventors: Padmanabhan Krishnan, Rebecca Jane O'Donoghue, Nicholas John Allen, Yi Lu
-
Patent number: 10719424Abstract: A method for performing a static analysis may include extracting, from a caller function in code, a context-free inter-procedural rule including a callsite and a return value of a callee function. The callsite may invoke the callee function. The method may further include extracting, from the caller function, a context-sensitive parameter mapping rule that maps an input parameter of the callee function to an invocation value provided by the caller function at the callsite, deriving a derived value for the callsite using the context-free inter-procedural rule and the context-sensitive parameter mapping rule, and identifying a defect in the code by performing the static analysis using the derived value for the callsite.Type: GrantFiled: March 18, 2019Date of Patent: July 21, 2020Assignee: Oracle International CorporationInventors: Padmanabhan Krishnan, Raghavendra Kagalavadi Ramesh, Yang Zhao
-
Patent number: 10705949Abstract: A method for evaluating a test suite for a software library includes generating a mutated software library by adding a fault to the software library, while the software library is used by a testing tool to evaluate a test suite. The method further includes loading the mutated software library, then executing a test in the test suite on the mutated software library to obtain a test result. The method further includes analyzing the test result.Type: GrantFiled: November 3, 2017Date of Patent: July 7, 2020Assignee: Oracle International CorporationInventors: Padmanabhan Krishnan, Rebecca O'Donoghue, Jerome Loh
-
Publication number: 20200042697Abstract: A method for buffer overflow detection involves obtaining a program code configured to access memory locations in a loop using a buffer index variable, obtaining an assertion template configured to capture a dependency between the buffer index variable and a loop index variable of the loop in the program code, generating an assertion using the assertion template, verifying that the assertion holds using a k-induction; and determining whether a buffer overflow exists using the assertion.Type: ApplicationFiled: July 31, 2018Publication date: February 6, 2020Applicant: Oracle International CorporationInventors: Francois Gauthier, Nathan Keynes, Padmanabhan Krishnan, Cristina Cifuentes, Trung Quang Ta