Patents by Inventor Ron Bitton
Ron Bitton has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11909754Abstract: A security assessment system is configured to provide a duplicated environment which duplicates an assessment target system comprising a plurality of physical components. The security assessment system includes a duplicated environment design circuitry and a duplicated environment construction circuitry. The duplicated environment design circuitry is configured to select a duplication level based on constraints specified by a user in order to design the duplicated environment to produce a designed result indicative of a duplicated environment design. The duplication level is indicative of any one of a simulation sub-module, an emulation sub-module, and a physical sub-module which are for reproducing the physical components of the assessment target system. The duplicated environment construction circuitry is configured to construct the duplicated environment based on the designed result. The duplicated environment includes components which are duplicated by one of the duplication level.Type: GrantFiled: March 14, 2018Date of Patent: February 20, 2024Assignees: NEC CORPORATION, B.G. Negev Technologies and Applications Ltd., at Ben-Gurion UniversityInventors: Masaki Inokuchi, Yoshinobu Ohta, Ron Bitton, Orly Stan, Asaf Shabtai, Yuval Elovici
-
Patent number: 11783048Abstract: A security assessment system is configured to provide a duplicated environment which duplicates an assessment target system comprising a plurality of physical components. The security assessment system includes a duplicated environment design circuitry and a duplicated environment construction circuitry. The duplicated environment design circuitry is configured to select a duplication level based on constraints specified by a user and effects associated with the physical components in order to design the duplicated environment to produce a designed result indicative of a duplicated environment design. The duplication level is indicative of any one of a simulation sub-module, an emulation sub-module, and a physical sub-module which are for reproducing the physical components of the assessment target system. The duplicated environment construction circuitry is configured to construct the duplicated environment based on the designed result.Type: GrantFiled: March 14, 2018Date of Patent: October 10, 2023Assignees: NEC CORPORATION, B. G. Negev Technologies and Applications Ltd., at Ben-Gurion UniversityInventors: Masaki Inokuchi, Yoshinobu Ohta, Ron Bitton, Orly Stan, Tomer Gluck, Asaf Shabtai, Yuval Elovici
-
Publication number: 20230214496Abstract: The knowledge generation apparatus (2000) obtains a plural pieces of attack result information (100), which includes a configuration of an attack performed on the computer environment, a configuration of the computer environment attacked, and a result of the attack. By comparing the obtained attack result information (100), the knowledge generation apparatus (2000) detects environment conditions, which is regarding the configuration of the computer environment that are necessary for the success of the attack. The knowledge generation apparatus (2000) performs selection on the detected environment conditions based on a selection rule (200), and generates the knowledge information (300) that includes the selected environment conditions. The selection rule represents a rule for determining whether to include the environment condition in the knowledge information (300), with respect to a feature of a set of attacks that are affected by the environment condition.Type: ApplicationFiled: May 29, 2020Publication date: July 6, 2023Applicants: NEC Corporation, B. G. Negev Technologies and Applications Ltd., at Ben-Gurion UniversityInventors: Masaki INOKUCHI, Tomohiko YAGYU, Yuval ELOVICI, Asaf SHABTAI, Ron BITTON, Noam MOSCOVICH
-
Patent number: 11601452Abstract: Described embodiments include a system that includes a monitoring agent, configured to automatically monitor usage of a computing device by a user, and a processor. The processor is configured to compute, based on the monitoring, a score indicative of a cyber-security awareness of the user, and to generate an output indicative of the score.Type: GrantFiled: October 21, 2019Date of Patent: March 7, 2023Assignee: B.G. NEGEV TECHNOLOGIES AND APPLICATIONS LTD.Inventors: Asaf Shabtai, Rami Puzis, Lior Rokach, Liran Orevi, Genady Malinsky, Ziv Katzir, Ron Bitton
-
Publication number: 20230040982Abstract: An attack information processing apparatus (10) includes an extraction unit (11) configured to extract first and second attack knowledge pieces indicating conditions of a cyber attack from first and second attack information pieces including descriptions of the cyber attack, a determination unit (12) configured to determine similarity between the first and second attack information pieces, and a complementing unit (13) configured to complement the first attack knowledge piece with the second attack knowledge piece based on the determined similarity.Type: ApplicationFiled: January 17, 2020Publication date: February 9, 2023Applicants: NEC CORPORATION, B. G. Negev Technologies and Applications Ltd., at Ben-Gurion UniversityInventors: Masaki INOKUCHI, Tomohiko YAGYU, Asaf SHABTAI, Yuval ELOVICI, Ron BITTON, Hodaya BINYAMINI
-
Publication number: 20210250370Abstract: A security assessment system is configured to provide a duplicated environment which duplicates an assessment target system comprising a plurality of physical components. The security assessment system includes a duplicated environment design circuitry and a duplicated environment construction circuitry, The duplicated environment design circuitry is configured to select a duplication level based on constraints specified by a user in order to design the duplicated environment to produce a designed result indicative of a duplicated environment design. The duplication level is indicative of any one of a simulation sub-module, an emulation sub-module, and a physical sub-module which are for reproducing the physical components of the assessment target system. The duplicated environment construction circuitry is configured to construct the duplicated environment based on the designed result.Type: ApplicationFiled: March 14, 2018Publication date: August 12, 2021Applicants: NEC CORPORATION, B. G. Negev Technologies and Applications Ltd.,at Ben-Gurion University.Inventors: Masaki INOKUCHI, Yoshinobu OHTA, Ron BITTON, Orly STAN, Asaf SHABTAI, Yuval ELOVICI
-
Publication number: 20210243213Abstract: An information collection system includes: a side-channel information processing unit that derives load information to estimate an impact on the availability of a target machine for active scanning by using side-channel data; an allow list generation unit that generates an allow list including a scan timing and a scan range in which the availability is not affected, the allow list generation unit generating the allow list based on the load information; and an allow list storage unit that stores the allow list. An active scan of the target machine is executed by referencing the allow list stored in the allow list storage unit to collect asset information of the target machine.Type: ApplicationFiled: June 12, 2018Publication date: August 5, 2021Applicants: NEC CORPORATION, B.G. Negev Technologies and Applications Ltd., at Ben-Gurion UniversityInventors: Yoshiyuki YAMADA, Masaki INOKUCHI, Yoshinobu OHTA, Yuval ELOVICI, Asaf SHABTAI, Ron BITTON
-
Publication number: 20210042423Abstract: A security assessment system is configured to provide a duplicated environment which duplicates an assessment target system comprising a plurality of physical components. The security assessment system includes a duplicated environment design circuitry and a duplicated environment construction circuitry. The duplicated environment design circuitry is configured to select a duplication level based on constraints specified by a user and effects associated with the physical components in order to design the duplicated environment to produce a designed result indicative of a duplicated environment design. The duplication level is indicative of any one of a simulation sub-module, an emulation sub-module, and a physical sub-module which are for reproducing the physical components of the assessment target system. The duplicated environment construction circuitry is configured to construct the duplicated environment based on the designed result.Type: ApplicationFiled: March 14, 2018Publication date: February 11, 2021Applicants: NEC CORPORATION, B. G. Negev Technologies and Applications Ltd., at Ben-Gurion UniversityInventors: Masaki INOKUCHI, Yoshinobu OHTA, Ron BITTON, Orly STAN, Tomer GLUCK, Asaf SHABTAI, Yuval ELOVICI
-
Publication number: 20200053114Abstract: Described embodiments include a system that includes a monitoring agent, configured to automatically monitor usage of a computing device by a user, and a processor. The processor is configured to compute, based on the monitoring, a score indicative of a cyber-security awareness of the user, and to generate an output indicative of the score.Type: ApplicationFiled: October 21, 2019Publication date: February 13, 2020Inventors: Asaf Shabtai, Rami Puzis, Lior Rokach, Liran Orevi, Genady Malinsky, Ziv Katzir, Ron Bitton
-
Patent number: 10454958Abstract: Described embodiments include a system that includes a monitoring agent, configured to automatically monitor usage of a computing device by a user, and a processor. The processor is configured to compute, based on the monitoring, a score indicative of a cyber-security awareness of the user, and to generate an output indicative of the score.Type: GrantFiled: October 12, 2016Date of Patent: October 22, 2019Assignee: VERINT SYSTEMS LTD.Inventors: Asaf Shabtai, Rami Puzis, Lior Rokach, Liran Orevi, Genady Malinsky, Ziv Katzir, Ron Bitton
-
Publication number: 20170104778Abstract: Described embodiments include a system that includes a monitoring agent, configured to automatically monitor usage of a computing device by a user, and a processor. The processor is configured to compute, based on the monitoring, a score indicative of a cyber-security awareness of the user, and to generate an output indicative of the score.Type: ApplicationFiled: October 12, 2016Publication date: April 13, 2017Inventors: Asaf Shabtai, Rami Puzis, Lior Rokach, Liran Orevi, Genady Malinsky, Ziv Katzir, Ron Bitton