Patents by Inventor Sudhakar Govindavajhala

Sudhakar Govindavajhala has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20090282457
    Abstract: A method of representing security information of a host in a universal format, in a manner that is independent of the semantics and implementation details of the underlying operating system is disclosed. The method comprises of the steps of having a security information representation layer to represent security information, the security information representation layer further comprising of representing entity and user privilege security information; representing object security information; representing object dependencies; and representing vulnerability information.
    Type: Application
    Filed: May 6, 2008
    Publication date: November 12, 2009
    Inventor: Sudhakar Govindavajhala
  • Publication number: 20090276853
    Abstract: Embodiments disclosed herein describe a method to determine consequences of a privilege escalation alert from an intrusion detection system, the method comprising the steps of obtaining privilege escalation alert from the intrusion detection system and analyzing said privilege escalation alert information. The analysis further comprises of identifying the program affected by said privilege escalation alert and determining if it can be circumvented. The users affected by said privilege escalation alert and the transitive effects of said privilege escalation alert are identified.
    Type: Application
    Filed: May 2, 2008
    Publication date: November 5, 2009
    Applicant: MULVAL TECHNOLOGIES, INC.
    Inventor: Sudhakar GOVINDAVAJHALA
  • Publication number: 20090271863
    Abstract: Disclosed herein is a method and system of determining and/or managing potential privilege escalation attacks in a system or network comprising one or more potentially heterogeneous hosts. The step of configuration scanning optionally includes making a list of operating system specific protection mechanism on each host. Vulnerability scanning optionally includes the step of identifying the vulnerability position of each identified program. Transitive closure of all security attacks on the network and potential privilege escalations can be determined. A user interface optionally renders the potential privilege escalations as an appropriate representation. The method may include none or one or more of several pre-emptive mechanisms and reactive mechanisms. Further, the method may optionally include a mechanism for a periodic safety check on the system ensuring continued security on the network.
    Type: Application
    Filed: January 30, 2007
    Publication date: October 29, 2009
    Inventors: Sudhakar Govindavajhala, Andrew W.s Appel