Patents by Inventor Ronny Chevalier
Ronny Chevalier has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11809559Abstract: In an example there is provided a method for receiving notification of an intrusion event in relation to an application from an intrusion detection system, accessing state data in relation to a state of the application prior to the intrusion event, the state data having been stored on the basis of a change of state of the application, accessing a policy to be applied to the state data in response to the intrusion event, modifying the state data on the basis of the policy, and restoring the application on the basis of the modified state data.Type: GrantFiled: July 30, 2019Date of Patent: November 7, 2023Assignee: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.Inventors: Ronny Chevalier, David Plaquin
-
Patent number: 11556645Abstract: A method for monitoring control-flow integrity in a low-level execution environment, the method comprising receiving, at a monitor, a message from the execution environment indicating that the execution environment has entered a controlled mode of operation, receiving, at the monitor, a data packet representing execution of a selected portion of a control-flow process at the execution environment, identifying, using the data packet, a pathway corresponding to the selected portion of the control-flow process from a set of permissible control-flow pathways and determining whether the identified pathway corresponds to an expected control-flow behaviour.Type: GrantFiled: June 6, 2018Date of Patent: January 17, 2023Assignee: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.Inventors: Ronny Chevalier, Guillaume Hiet, Maugan Villatel, David Plaquin
-
Patent number: 11449618Abstract: A method is provided, comprising actively testing the access control policy of a software target using a probing logic. The method further comprises determining whether an intrusion in the software target has occurred based on monitored side effects. According to the method, the probing logic is to execute at least one operation that is forbidden by the access control policy. The probing logic is further to create at least one predetermined observable side effect based on the successful execution of the operation.Type: GrantFiled: August 6, 2019Date of Patent: September 20, 2022Assignee: Hewlett-Packard Development Company, L.P.Inventors: David Plaquin, Christopher Ian Dalton, Ronny Chevalier
-
Patent number: 11308202Abstract: An intrusion detection system, comprising a monitor to receive messages from a target over a low-latency communication link comprising a controlled access memory structure logically positioned between the target and the monitor using point-to-point interconnects, the controlled access memory structure to receive a message from the target indicating that the target has entered a controlled mode of operation.Type: GrantFiled: June 7, 2018Date of Patent: April 19, 2022Assignee: Hewlett-Packard Development Company, L.P.Inventors: Ronny Chevalier, David Plaquin, Maugan Villatel, Guillaume Hiet
-
Publication number: 20210382991Abstract: The disclosure relates to a data processing apparatus. The data processing apparatus may comprise a memory storing a candidate service level response to an intrusion to an operating system having a plurality of operating system services. The data processing apparatus may comprise processing circuitry coupled to the memory. The data processing apparatus may comprise an output coupled to the processing circuitry. It may be that the processing circuitry is to, depending on an alert indicative of the intrusion: select from the memory, for an operating system service of the said plurality of operating systems, the said operating system service being related to the alert, the candidate service level response to the intrusion; and provide a signal to the output depending on the candidate service level response selected in respect of the said operating system service.Type: ApplicationFiled: September 27, 2019Publication date: December 9, 2021Applicant: Hewlett-Packard Development Company, L.P.Inventors: Ronny Chevalier, David Plaquin, Christopher Ian Dalton, Guillaume Hiet
-
Publication number: 20210192055Abstract: A method is provided, comprising actively testing the access control policy of a software target using a probing logic. The method further comprises determining whether an intrusion in the software target has occurred based on monitored side effects. According to the method, the probing logic is to execute at least one operation that is forbidden by the access control policy. The probing logic is further to create at least one predetermined observable side effect based on the successful execution of the operation.Type: ApplicationFiled: August 6, 2019Publication date: June 24, 2021Applicant: Hewlett-Packard Development Company, L.P.Inventors: David PLAQUIN, Christopher Ian DALTON, Ronny CHEVALIER
-
Publication number: 20210182393Abstract: A method for monitoring control-flow integrity in a low-level execution environment, the method comprising receiving, at a monitor, a message from the execution environment indicating that the execution environment has entered a controlled mode of operation, receiving, at the monitor, a data packet representing execution of a selected portion of a control-flow process at the execution environment, identifying, using the data packet, a pathway corresponding to the selected portion of the control-flow process from a set of permissible control-flow pathways and determining whether the identified pathway corresponds to an expected control-flow behaviour.Type: ApplicationFiled: June 6, 2018Publication date: June 17, 2021Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.Inventors: Ronny Chevalier, Guillaume HIET, Maugan VILLATEL, David Plaquin
-
Publication number: 20210157918Abstract: In an example there is provided a method for receiving notification of an intrusion event in relation to an application from an intrusion detection system, accessing state data in relation to a state of the application prior to the intrusion event, the state data having been stored on the basis of a change of state of the application, accessing a policy to be applied to the state data in response to the intrusion event, modifying the state data on the basis of the policy, and restoring the application on the basis of the modified state data.Type: ApplicationFiled: July 30, 2019Publication date: May 27, 2021Applicant: Hewlett-Packard Development Company, L.P.Inventors: Ronny Chevalier, David Plaquin
-
Patent number: 10896085Abstract: In an example there is provided a method of applying a mitigation action to a computing system. The method comprises receiving notification of an intrusion event on a computing system. The notification identifies one or more of data, and a process affected by the intrusion event. The method comprises accessing state data corresponding to a state of the computing system prior to the intrusion event, accessing a policy specifying one or more mitigation actions to be applied to the one or more of data, and a process in response to an intrusion event, restoring the one or more of data, and the process on the basis of the state data, and applying a mitigation action according to the policy.Type: GrantFiled: May 8, 2018Date of Patent: January 19, 2021Assignee: Hewlett-Packard Development Company, L.P.Inventors: Ronny Chevalier, David Plaquin, Guillaume Hiet, Adrian Baldwin
-
Publication number: 20200089870Abstract: An intrusion detection system, comprising a monitor to receive messages from a target over a low-latency communication link comprising a controlled access memory structure logically positioned between the target and the monitor using point-to-point interconnects, the controlled access memory structure to receive a message from the target indicating that the target has entered a controlled mode of operation.Type: ApplicationFiled: June 7, 2018Publication date: March 19, 2020Inventors: Ronny Chevalier, David Plaquin, Maugan Villatel, Guillaume Hiet
-
Publication number: 20190347155Abstract: In an example there is provided a method of applying a mitigation action to a computing system. The method comprises receiving notification of an intrusion event on a computing system. The notification identifies one or more of data, and a process affected by the intrusion event. The method comprises accessing state data corresponding to a state of the computing system prior to the intrusion event, accessing a policy specifying one or more mitigation actions to be applied to the one or more of data, and a process in response to an intrusion event, restoring the one or more of data, and the process on the basis of the state data, and applying a mitigation action according to the policy.Type: ApplicationFiled: May 8, 2018Publication date: November 14, 2019Inventors: Ronny Chevalier, David Plaquin, Guillaume Hiet, Adrian Baldwin