Patents by Inventor Salvatore Stolfo

Salvatore Stolfo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240039941
    Abstract: Mechanisms for defending a computing system from attack are provided. The mechanisms include: maintaining a round counter that tracks a round number for a local host; determining a location in a graph for each of a plurality of hosts including the local host; determining monitor hosts of the plurality of hosts that are monitoring the local host; determining monitoree hosts of the plurality of hosts that are being monitored by the local host; sending a message to each of the monitor hosts identifying a value of the round counter; forwarding a first set of heartbeat messages from previous monitoree hosts to the monitor hosts; attempting to receive messages from the monitoree hosts; determining whether any messages were not received from the monitoree hosts; and in response to determining that one or more messages were not received from the monitoree hosts, generating an alert.
    Type: Application
    Filed: October 9, 2023
    Publication date: February 1, 2024
    Inventors: Yuan Jochen Kang, Salvatore Stolfo
  • Patent number: 11841966
    Abstract: Disclosed are devices, systems, apparatus, methods, products, and other implementations, including a method that includes determining whether an operation to access a memory location containing executable code comprises a general-purpose memory access operation, and changing content of the memory location in response to a determination that the operation to access the memory location containing the executable code comprises the general-purpose memory access operation to the memory location.
    Type: Grant
    Filed: December 14, 2021
    Date of Patent: December 12, 2023
    Assignee: The Trustees of Columbia University in the City of New York
    Inventors: Adrian Tang, Salvatore Stolfo, Lakshminarasimhan Sethumadhavan
  • Patent number: 11831418
    Abstract: Mechanisms for defending a computing system from attack are provided. The mechanisms include: maintaining a round counter that tracks a round number for a local host; determining a location in a graph for each of a plurality of hosts including the local host; determining monitor hosts of the plurality of hosts that are monitoring the local host; determining monitoree hosts of the plurality of hosts that are being monitored by the local host; sending a message to each of the monitor hosts identifying a value of the round counter; forwarding a first set of heartbeat messages from previous monitoree hosts to the monitor hosts; attempting to receive messages from the monitoree hosts; determining whether any messages were not received from the monitoree hosts; and in response to determining that one or more messages were not received from the monitoree hosts, generating an alert.
    Type: Grant
    Filed: March 18, 2022
    Date of Patent: November 28, 2023
    Assignee: The Trustees of Columbia University in the City of New York
    Inventors: Yuan Jochen Kang, Salvatore Stolfo
  • Publication number: 20230037596
    Abstract: Mechanisms for defending a computing system from attack, comprising: maintaining a round counter that tracks a round number for a local host; determining a location in a graph for each of a plurality of hosts including the local host; determining monitor hosts of the plurality of hosts that are monitoring the local host; determining monitoree hosts of the plurality of hosts that are being monitored by the local host; sending a message to each of the monitor hosts identifying a value of the round counter; forwarding a first set of heartbeat messages from previous monitoree hosts to the monitor hosts; attempting to receive messages from the monitoree hosts; determining whether any messages were not received from the monitoree hosts; and in response to determining that one or more messages were not received from the monitoree hosts, generating an alert.
    Type: Application
    Filed: March 18, 2022
    Publication date: February 9, 2023
    Inventors: Yuan Jochen Kang, Salvatore Stolfo
  • Publication number: 20220284115
    Abstract: Disclosed are devices, systems, apparatus, methods, products, and other implementations, including a method that includes determining whether an operation to access a memory location containing executable code comprises a general-purpose memory access operation, and changing content of the memory location in response to a determination that the operation to access the memory location containing the executable code comprises the general-purpose memory access operation to the memory location.
    Type: Application
    Filed: December 14, 2021
    Publication date: September 8, 2022
    Inventors: Adrian Tang, Salvatore Stolfo, Lakshminarasimhan Sethumadhavan
  • Patent number: 11310249
    Abstract: Mechanisms for defending a computing system from attack are presented. The mechanisms include: maintaining a round counter that tracks a round number for a local host; determining a location in a graph for each of a plurality of hosts including the local host; determining monitor hosts of the plurality of hosts that are monitoring the local host; determining monitoree hosts of the plurality of hosts that are being monitored by the local host; sending a message to each of the monitor hosts identifying a value of the round counter; forwarding a first set of heartbeat messages from previous monitoree hosts to the monitor hosts; attempting to receive messages from the monitoree hosts; determining whether any messages were not received from the monitoree hosts; and in response to determining that one or more messages were not received from the monitoree hosts, generating an alert.
    Type: Grant
    Filed: March 26, 2019
    Date of Patent: April 19, 2022
    Assignee: The Trustees of Columbia University in the City of New York
    Inventors: Yuan Jochen Kang, Salvatore Stolfo
  • Patent number: 11227056
    Abstract: Disclosed are devices, systems, apparatus, methods, products, and other implementations, including a method that includes determining whether an operation to access a memory location containing executable code comprises a general-purpose memory access operation, and changing content of the memory location in response to a determination that the operation to access the memory location containing the executable code comprises the general-purpose memory access operation to the memory location.
    Type: Grant
    Filed: August 4, 2016
    Date of Patent: January 18, 2022
    Assignee: The Trustees of Columbia University in the City of New York
    Inventors: Adrian Tang, Salvatore Stolfo, Lakshminarasimhan Sethumadhavan
  • Publication number: 20190297104
    Abstract: Mechanisms for defending a computing system from attack, comprising: maintaining a round counter that tracks a round number for a local host; determining a location in a graph for each of a plurality of hosts including the local host; determining monitor hosts of the plurality of hosts that are monitoring the local host; determining monitoree hosts of the plurality of hosts that are being monitored by the local host; sending a message to each of the monitor hosts identifying a value of the round counter; forwarding a first set of heartbeat messages from previous monitoree hosts to the monitor hosts; attempting to receive messages from the monitoree hosts; determining whether any messages were not received from the monitoree hosts; and in response to determining that one or more messages were not received from the monitoree hosts, generating an alert.
    Type: Application
    Filed: March 26, 2019
    Publication date: September 26, 2019
    Inventors: Yuan Jochen Kang, Salvatore Stolfo
  • Publication number: 20180268142
    Abstract: Disclosed are devices, systems, apparatus, methods, products, media and other implementations, including a method that includes obtaining current hardware performance data, including hardware performance counter data, for a hardware device executing a first process associated with pre-recorded hardware performance data representative of the first process' normal behavior, and determining whether a malicious process is affecting performance of the first process based on a determination of an extent of deviation of the obtained current hardware performance data corresponding to the first process from the pre-recorded hardware performance data representative of the normal behavior of the first process.
    Type: Application
    Filed: May 17, 2018
    Publication date: September 20, 2018
    Inventors: Lakshminarasimhan Sethumadhavan, Adrian TANG, Salvatore STOLFO
  • Publication number: 20180247069
    Abstract: Disclosed are devices, systems, apparatus, methods, products, and other implementations, including a method that includes determining whether an operation to access a memory location containing executable code comprises a general-purpose memory access operation, and changing content of the memory location in response to a determination that the operation to access the memory location containing the executable code comprises the general-purpose memory access operation to the memory location.
    Type: Application
    Filed: August 4, 2016
    Publication date: August 30, 2018
    Inventors: Adrian Tang, Salvatore Stolfo, Lakshminarasimhan Sethumadhavan
  • Patent number: 9996694
    Abstract: Disclosed are devices, systems, apparatus, methods, products, media and other implementations, including a method that includes obtaining current hardware performance data, including hardware performance counter data, for a hardware device executing a first process associated with pre-recorded hardware performance data representative of the first process' normal behavior, and determining whether a malicious process is affecting performance of the first process based on a determination of an extent of deviation of the obtained current hardware performance data corresponding to the first process from the pre-recorded hardware performance data representative of the normal behavior of the first process.
    Type: Grant
    Filed: March 14, 2014
    Date of Patent: June 12, 2018
    Assignee: The Trustees of Columbia University in the City of New York
    Inventors: Lakshminarasimhan Sethumadhavan, Adrian Tang, Salvatore Stolfo
  • Publication number: 20160275289
    Abstract: Disclosed are devices, systems, apparatus, methods, products, media and other implementations, including a method that includes obtaining current hardware performance data, including hardware performance counter data, for a hardware device executing a first process associated with pre-recorded hardware performance data representative of the first process' normal behavior, and determining whether a malicious process is affecting performance of the first process based on a determination of an extent of deviation of the obtained current hardware performance data corresponding to the first process from the pre-recorded hardware performance data representative of the normal behavior of the first process.
    Type: Application
    Filed: March 14, 2014
    Publication date: September 22, 2016
    Applicant: The Trustees of Columbia University in the City of New York
    Inventors: Lakshminarasimhan SETHUMADHAVAN, Adrian TANG, Salvatore STOLFO
  • Publication number: 20070239999
    Abstract: A system and methods for detecting intrusions in the operation of a computer system comprises a sensor configured to gather information regarding the operation of the computer system, to format the information in a data record having a predetermined format, and to transmit the data in the predetermined data format. A data warehouse is configured to receive the data record from the sensor in the predetermined data format and to store the data in a SQL database. A detection model generator is configured to request data records from the data warehouse in the predetermined data format, to generate an intrusion detection model based on said data records, and to transmit the intrusion detection model to the data warehouse according to the predetermined data format. A detector is configured to receive a data record in the predetermined data format from the sensor and to classify the data record in real-time as one of normal operation and an attack based on said intrusion detection model.
    Type: Application
    Filed: May 25, 2007
    Publication date: October 11, 2007
    Inventors: Andrew Honig, Andrew Howard, Eleazar Eskin, Salvatore Stolfo
  • Publication number: 20070050708
    Abstract: Systems and methods are presented for content extraction from markup language text. The content extraction process may parse markup language text into a hierarchical data model and then apply one or more filters. Output filters may be used to make the process more versatile. The operation of the content extraction process and the one or more filters may be controlled by one or more settings set by a user, or automatically by a classifier. The classifier may automatically enter settings by classifying markup language text and entering settings based on this classification. Automatic classification may be performed by clustering unclassified markup language texts with previously classified markup language texts.
    Type: Application
    Filed: March 30, 2006
    Publication date: March 1, 2007
    Inventors: Suhit Gupta, Gail Kaiser, Salvatore Stolfo
  • Publication number: 20060247982
    Abstract: E-commerce which secures private and personal information of purchaser/users. E-commerce which may include delivery of a good ordered or purchased over a network (e.g., the Internet) to a purchaser/user, and/or arranging for electronic payment of the good is accomplished while securing private and personal information of purchaser/users, which may include the user's identity and address (and those of the user's computer), and financial information. E-commerce transactions include the purchasing or otherwise ordering of goods electronically by user, who may be a consumer or retail customer, and for delivery of goods to a shipping or electronic address designated by the user or to a physical or virtual depot for pick-up by the user, while providing complete anonymity of the user with respect to an electronic vendor, who may be a merchant or retailer.
    Type: Application
    Filed: June 27, 2006
    Publication date: November 2, 2006
    Inventors: Salvatore Stolfo, Yechiam Yemini, Leonard Shaykin
  • Publication number: 20060178994
    Abstract: A method and system for private shipping to anonymous users purchasing goods on a computer or communications network linking users with merchant web-sites for electronic commerce. In a preferred embodiment, a user is issued a proxy identity and the user's mailing address is received and encrypted. The proxy identity and encrypted mailing address are transmitted to a merchant, and decryption information is provided to a shipper. Upon receipt of the encrypted shipping address from the merchant, the shipper can use the decryption information to decrypt the address and generate a package label bearing the true shipping address of the user so that the merchant is prevented from electronically capturing the true identity of the user. The present invention provides for anonymity of a user when browsing and shopping, and integrates easily and simply with existing online infrastructures of banks or credit card issuers, and delivery companies.
    Type: Application
    Filed: September 21, 2005
    Publication date: August 10, 2006
    Inventors: Salvatore Stolfo, Jonathan Smith, Jeffrey Chung
  • Publication number: 20060015630
    Abstract: A method, apparatus, and medium are provided for identifying files. Files are received from various sources, and a statistical distribution is generated for data contained in each file. The statistical distribution is compared to model distributions that are representative of known files or file types. Based on the comparison, file types can be verified or detected. Known file types can also be used to generate representative statistical distributions for the type. The invention can also detect malicious programs such as viruses or worms, and generate signatures that can be used to filter such programs.
    Type: Application
    Filed: November 12, 2004
    Publication date: January 19, 2006
    Applicant: The Trustees of Columbia University in the City of New York
    Inventors: Salvatore Stolfo, Benjamin Herzog
  • Publication number: 20050281291
    Abstract: A method, apparatus and medium are provided for detecting anomalous payloads transmitted through a network. The system receives payloads within the network and determines a length for data contained in each payload. A statistical distribution is generated for data contained in each payload received within the network, and compared to a selected model distribution representative of normal payloads transmitted through the network. The model payload can be selected such that it has a predetermined length range that encompasses the length for data contained in the received payload. Anomalous payloads are then identified based on differences detected between the statistical distribution of received payloads and the model distribution. The system can also provide for automatic training and incremental updating of models.
    Type: Application
    Filed: November 12, 2004
    Publication date: December 22, 2005
    Applicant: The Trustees of Columbia University in the City of New York
    Inventors: Salvatore Stolfo, Ke Wang
  • Publication number: 20050265331
    Abstract: A method, apparatus, and medium are provided for tracing the origin of network transmissions. Connection records are maintained at computer system for storing source and destination addresses. The connection records also maintain a statistical distribution of data corresponding to the data payload being transmitted. The statistical distribution can be compared to that of the connection records in order to identify the sender. The location of the sender can subsequently be determined from the source address stored in the connection record. The process can be repeated multiple times until the location of the original sender has been traced.
    Type: Application
    Filed: November 12, 2004
    Publication date: December 1, 2005
    Applicant: The Trustees of Columbia University in the City of New York
    Inventor: Salvatore Stolfo
  • Publication number: 20050257264
    Abstract: Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems are provided. These systems and methods provide an alert correlator and an alert distributor that enable early signs of an attack to be detected and rapidly disseminated to collaborating systems. The alert correlator utilizes data structures to correlate alert detections and provide a mechanism through which threat information can be revealed to other collaborating systems. The alert distributor uses an efficient technique to group collaborating systems and then pass data between certain members of those groups according to a schedule. In this way data can be routinely distributed without generating excess traffic loads.
    Type: Application
    Filed: June 9, 2004
    Publication date: November 17, 2005
    Inventors: Salvatore Stolfo, Tal Malkin, Angelos Keromytis, Vishal Misra, Michael Locasto, Janak Parekh