Patents by Inventor Tom Tsarfati

Tom Tsarfati has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7672814
    Abstract: The present invention provides a system for identifying exceptional behavior of a hardware or software component. According to one embodiment, the system comprises an operational metric calculator that is operative to sample a first behavior of an operational metric and a second behavior of the operational metric. The operational metric may be any metric that quantifies the operation of a hardware or software component, as well as combinations thereof. A baseline threshold calculator is operative to calculate a baseline threshold on the basis of the first sampled behavior of the operational metric. The baseline threshold is applied by a baseline threshold analyzer to the second operational metric to generate an alarm when the second sampled behavior of the operational metric deviates from the baseline threshold.
    Type: Grant
    Filed: June 13, 2005
    Date of Patent: March 2, 2010
    Assignee: EMC Corporation
    Inventors: Gili Raanan, Tom Tsarfati
  • Patent number: 7237265
    Abstract: A method for detecting security vulnerabilities in a web application includes analyzing the client requests and server responses resulting therefrom in order to discover pre-defined elements of the application's interface with external clients and the attributes of these elements. The client requests are then mutated based on a pre-defined set of mutation rules to thereby generate exploits unique to the application. The web application is attacked using the exploits and the results of the attack are evaluated for anomalous application activity.
    Type: Grant
    Filed: March 20, 2003
    Date of Patent: June 26, 2007
    Assignee: Watchfire Corporation
    Inventors: Eran Reshef, Yuval El-Hanany, Gil Raanan, Tom Tsarfati
  • Publication number: 20030233581
    Abstract: A method for detecting security vulnerabilities in a web application includes analyzing the client requests and server responses resulting therefrom in order to discover pre-defined elements of the application's interface with external clients and the attributes of these elements. The client requests are then mutated based on a pre-defined set of mutation rules to thereby generate exploits unique to the application. The web application is attacked using the exploits and the results of the attack are evaluated for anomalous application activity.
    Type: Application
    Filed: March 20, 2003
    Publication date: December 18, 2003
    Inventors: Eran Reshef, Yuval El-Hanany, Gil Raanan, Tom Tsarfati
  • Patent number: 6584569
    Abstract: A method for detecting security vulnerabilities in a web application includes analyzing the client requests and server responses resulting therefrom in order to discover pre-defined elements of the application's interface with external clients and the attributes of these elements. The client requests are then mutated based on a pre-defined set of mutation rules to thereby generate exploits unique to the application. The web application is attacked using the exploits and the results of the attack are evaluated for anomalous application activity.
    Type: Grant
    Filed: March 5, 2001
    Date of Patent: June 24, 2003
    Assignee: Sanctum Ltd.
    Inventors: Eran Reshef, Yuval El-Hanany, Gil Raanan, Tom Tsarfati
  • Publication number: 20020010855
    Abstract: A method for detecting security vulnerabilities in a web application includes analyzing the client requests and server responses resulting therefrom in order to discover pre-defined elements of the application's interface with external clients and the attributes of these elements. The client requests are then mutated based on a pre-defined set of mutation rules to thereby generate exploits unique to the application. The web application is attacked using the exploits and the results of the attack are evaluated for anomalous application activity.
    Type: Application
    Filed: March 5, 2001
    Publication date: January 24, 2002
    Inventors: Eran Reshef, Yuval El-Hanany, Gil Raanan, Tom Tsarfati