Patents by Inventor Ronen Bachar

Ronen Bachar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9734336
    Abstract: Techniques for process security validation are described herein. In one example, a method includes determining, via a processor, that a process is in a first idle state based at least in part on system activity and process activity being below an activity threshold. The method can include detecting, via the processor, that the first idle state of the process transitions to an active state of the process based at least in part on the system activity or the process activity being above the activity threshold, and detecting, via the processor, that the active state of the process transitions to a second idle state based at least in part on the system activity and the process activity being below the activity threshold. Furthermore, the method can include generating, via the processor, the security validation data in response to detecting that the process has executed malicious content during the active state.
    Type: Grant
    Filed: December 19, 2016
    Date of Patent: August 15, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ronen Bachar, Roee Hay, Erez Rokah, Yoav Shany
  • Patent number: 9721094
    Abstract: Techniques for determining privacy leaks are described herein. The techniques may include (i) providing private data as input for an application, wherein the private data includes a signature identifying the private data; (ii) monitoring an output of the application for a presence of the signature; and (iii) determining that a private data leak has occurred in the application, wherein the determining is based, at least in part, on the presence of the signature in the output.
    Type: Grant
    Filed: May 20, 2015
    Date of Patent: August 1, 2017
    Assignee: International Business Machines Corporation
    Inventors: Ronen Bachar, Roee Hay, Yoav Shany, Omer Tripp
  • Publication number: 20170098075
    Abstract: Techniques for process security validation are described herein. In one example, a method includes determining, via a processor, that a process is in a first idle state based at least in part on system activity and process activity being below an activity threshold. The method can include detecting, via the processor, that the first idle state of the process transitions to an active state of the process based at least in part on the system activity or the process activity being above the activity threshold, and detecting, via the processor, that the active state of the process transitions to a second idle state based at least in part on the system activity and the process activity being below the activity threshold. Furthermore, the method can include generating, via the processor, the security validation data in response to detecting that the process has executed malicious content during the active state.
    Type: Application
    Filed: December 19, 2016
    Publication date: April 6, 2017
    Inventors: Ronen Bachar, Roee Hay, Erez Rokah, Yoav Shany
  • Patent number: 9537883
    Abstract: Techniques for process security validation are described herein. In one example, a method includes determining, via a processor, that a process is in a first idle state based at least in part on system activity and process activity being below an activity threshold. The method can include detecting, via the processor, that the first idle state of the process transitions to an active state of the process based at least in part on the system activity or the process activity being above the activity threshold, and detecting, via the processor, that the active state of the process transitions to a second idle state based at least in part on the system activity and the process activity being below the activity threshold. Furthermore, the method can include generating, via the processor, the security validation data in response to detecting that the process has executed malicious content during the active state.
    Type: Grant
    Filed: December 22, 2014
    Date of Patent: January 3, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ronen Bachar, Roee Hay, Erez Rokah, Yoav Shany
  • Publication number: 20160342792
    Abstract: Techniques for determining privacy leaks are described herein. The techniques may include (i) providing private data as input for an application, wherein the private data includes a signature identifying the private data; (ii) monitoring an output of the application for a presence of the signature; and (iii) determining that a private data leak has occurred in the application, wherein the determining is based, at least in part, on the presence of the signature in the output.
    Type: Application
    Filed: May 20, 2015
    Publication date: November 24, 2016
    Inventors: Ronen Bachar, Roee Hay, Yoav Shany, Omer Tripp
  • Publication number: 20160182549
    Abstract: Techniques for process security validation are described herein. In one example, a method includes determining, via a processor, that a process is in a first idle state based at least in part on system activity and process activity being below an activity threshold. The method can include detecting, via the processor, that the first idle state of the process transitions to an active state of the process based at least in part on the system activity or the process activity being above the activity threshold, and detecting, via the processor, that the active state of the process transitions to a second idle state based at least in part on the system activity and the process activity being below the activity threshold. Furthermore, the method can include generating, via the processor, the security validation data in response to detecting that the process has executed malicious content during the active state.
    Type: Application
    Filed: December 22, 2014
    Publication date: June 23, 2016
    Inventors: Ronen Bachar, Roee Hay, Erez Rokah, Yoav Shany
  • Patent number: 9213832
    Abstract: Collecting log file data from at least one log file. From the collected log file data, at least one HTTP request can be generated to exercise a web application to perform a security analysis of the web application. The HTTP request can be communicated to the web application. At least one HTTP response to the HTTP request can be received. The HTTP response can be analyzed to perform validation of the web application. Results of the validation can be output.
    Type: Grant
    Filed: January 24, 2012
    Date of Patent: December 15, 2015
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Yair Amit, Ronen Bachar, Lotem Guy, Igal Kreichman, Ron Nordan, Roi Saltzman, Ori Segal
  • Patent number: 9208309
    Abstract: Collecting log file data from at least one log file. From the collected log file data, at least one HTTP request can be generated to exercise a web application to perform a security analysis of the web application. The HTTP request can be communicated to the web application. At least one HTTP response to the HTTP request can be received. The HTTP response can be analyzed to perform validation of the web application. Results of the validation can be output.
    Type: Grant
    Filed: July 31, 2012
    Date of Patent: December 8, 2015
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Yair Amit, Ronen Bachar, Lotem Guy, Igal Kreichman, Ron Nordan, Roi Saltzman, Ori Segal
  • Patent number: 8756214
    Abstract: Crawling a browser-accessible application by causing a target application and a bridge application to run concurrently in a browser-controllable player, and iteratively receiving from the bridge application current state information of the target application, storing the state information on a data storage device if the state information is not found on the data storage device, where the state information is stored as a descendant state of an initial state of the target application, and interacting with the target application in accordance with a predefined simulation algorithm, thereby effecting a new state of the target application, until a predefined termination condition is reached.
    Type: Grant
    Filed: June 18, 2012
    Date of Patent: June 17, 2014
    Assignee: International Business Machines Corporation
    Inventors: Asaf Ashkanazi, Ronen Bachar, Tamar Gelles, Adi Sharabani, Ayal Yogev
  • Publication number: 20130191913
    Abstract: Collecting log file data from at least one log file. From the collected log file data, at least one HTTP request can be generated to exercise a web application to perform a security analysis of the web application. The HTTP request can be communicated to the web application. At least one HTTP response to the HTTP request can be received. The HTTP response can be analyzed to perform validation of the web application. Results of the validation can be output.
    Type: Application
    Filed: July 31, 2012
    Publication date: July 25, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: YAIR AMIT, RONEN BACHAR, LOTEM GUY, IGAL KREICHMAN, RON NORDAN, ROI SALTZMAN, ORI SEGAL
  • Publication number: 20130191920
    Abstract: Collecting log file data from at least one log file. From the collected log file data, at least one HTTP request can be generated to exercise a web application to perform a security analysis of the web application. The HTTP request can be communicated to the web application. At least one HTTP response to the HTTP request can be received. The HTTP response can be analyzed to perform validation of the web application. Results of the validation can be output.
    Type: Application
    Filed: January 24, 2012
    Publication date: July 25, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Yair AMIT, Ronen BACHAR, Lotem GUY, Igal KREICHMAN, Ron NORDAN, Roi SALTZMAN, Ori SEGAL
  • Publication number: 20120253778
    Abstract: Crawling a browser-accessible application by causing a target application and a bridge application to run concurrently in a browser-controllable player, and iteratively receiving from the bridge application current state information of the target application, storing the state information on a data storage device if the state information is not found on the data storage device, where the state information is stored as a descendant state of an initial state of the target application, and interacting with the target application in accordance with a predefined simulation algorithm, thereby effecting a new state of the target application, until a predefined termination condition is reached.
    Type: Application
    Filed: June 18, 2012
    Publication date: October 4, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Asaf ASHKANAZI, Ronen BACHAR, Tamar GELLES, Adi SHARABANI, Ayal YOGEV
  • Patent number: 8250059
    Abstract: Crawling a browser-accessible application by causing a target application and a bridge application to run concurrently in a browser-controllable player, and iteratively receiving from the bridge application current state information of the target application, storing the state information on a data storage device if the state information is not found on the data storage device, where the state information is stored as a descendant state of an initial state of the target application, and interacting with the target application in accordance with a predefined simulation algorithm, thereby effecting a new state of the target application, until a predefined termination condition is reached.
    Type: Grant
    Filed: September 14, 2009
    Date of Patent: August 21, 2012
    Assignee: International Business Machines Corporation
    Inventors: Asaf Ashkenazi, Ronen Bachar, Tamar Gelles, Adi Sharabani, Ayal Yogev
  • Publication number: 20110066609
    Abstract: Crawling a browser-accessible application by causing a target application and a bridge application to run concurrently in a browser-controllable player, and iteratively receiving from the bridge application current state information of the target application, storing the state information on a data storage device if the state information is not found on the data storage device, where the state information is stored as a descendant state of an initial state of the target application, and interacting with the target application in accordance with a predefined simulation algorithm, thereby effecting a new state of the target application, until a predefined termination condition is reached.
    Type: Application
    Filed: September 14, 2009
    Publication date: March 17, 2011
    Applicant: International Business Machines Corporation
    Inventors: Asaf ASHKENAZI, Ronen BACHAR, Tamar GELLES, Adi SHARABANI, Ayal YOGEV