Patents by Inventor Vijay Seshadri

Vijay Seshadri has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11960602
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for analyzing hardware designs for vulnerabilities to side-channel attacks. One of the methods includes receiving a request to analyze a device hardware design for side-channel vulnerabilities in the device after being manufactured. Physical characteristics data is obtained representing one or more physical characteristics of the device based on the device hardware design. Information flow analysis is performed to identify one or more signals of interest corresponding to digital assets. From the physical characteristics data and the one or more signals of interest, data representing potentially vulnerable signals in the device hardware design is generated. A leakage model is generated for the potentially vulnerable signals that quantifies one or more leakage criteria for one or more structures of the device hardware design.
    Type: Grant
    Filed: July 28, 2021
    Date of Patent: April 16, 2024
    Assignee: Cycuity, Inc.
    Inventors: Kristoffer Wilkerson, Alric Althoff, Nicole Fern, Vijay Seshadri, Jason K. Oberg
  • Patent number: 11921907
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for identifying security vulnerabilities introduced by transformations to a hardware design. One of the methods includes obtaining a security model for an initial electronic hardware design and a modified electronic hardware design. An analysis process is performed on the initial representation and on the modified representation of the electronic hardware design according to the security model. If the modified electronic hardware design introduced a security vulnerability relative to the initial electronic hardware design, information representing the introduced security vulnerability is provided.
    Type: Grant
    Filed: October 30, 2020
    Date of Patent: March 5, 2024
    Assignee: Cycuity, Inc.
    Inventors: Jason K. Oberg, Kristoffer Wilkerson, Vijay Seshadri
  • Publication number: 20220138351
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for identifying security vulnerabilities introduced by transformations to a hardware design. One of the methods includes obtaining a security model for an initial electronic hardware design and a modified electronic hardware design. An analysis process is performed on the initial representation and on the modified representation of the electronic hardware design according to the security model. If the modified electronic hardware design introduced a security vulnerability relative to the initial electronic hardware design, information representing the introduced security vulnerability is provided.
    Type: Application
    Filed: October 30, 2020
    Publication date: May 5, 2022
    Inventors: Jason K. Oberg, Kristoffer Wilkerson, Vijay Seshadri
  • Publication number: 20220035912
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for analyzing hardware designs for vulnerabilities to side-channel attacks. One of the methods includes receiving a request to analyze a device hardware design for side-channel vulnerabilities in the device after being manufactured. Physical characteristics data is obtained representing one or more physical characteristics of the device based on the device hardware design. Information flow analysis is performed to identify one or more signals of interest corresponding to digital assets. From the physical characteristics data and the one or more signals of interest, data representing potentially vulnerable signals in the device hardware design is generated. A leakage model is generated for the potentially vulnerable signals that quantifies one or more leakage criteria for one or more structures of the device hardware design.
    Type: Application
    Filed: July 28, 2021
    Publication date: February 3, 2022
    Inventors: Kristoffer Wilkerson, Alric Althoff, Nicole Fern, Vijay Seshadri, Jason K. Oberg
  • Patent number: 8800030
    Abstract: An individualized time-to-live (TTL) is determined for a reputation score of a computer file. The TTL is determined based on the reputation score and the confidence in the reputation score. The confidence can be determined based on attributes such as the reputation score, an age of the file, and a prevalence of the file. The reputation score is used to determine whether the file is malicious during a validity period defined by the TTL, and discarded thereafter.
    Type: Grant
    Filed: September 15, 2009
    Date of Patent: August 5, 2014
    Assignee: Symantec Corporation
    Inventors: Vijay Seshadri, Zulfikar Ramzan, James Hoagland, Adam L. Glick, Adam Wright
  • Patent number: 8677346
    Abstract: Installer package information is presented to a user in response to an attempted installation of an application on an endpoint. The attempted installation is detected and the installer package is identified to an information server. The installer package may be identified using a hash key or other unique identifier. In response, the information server provides to the endpoint information associated with the identified installer package based on information received from a plurality of other endpoints. The endpoint may also provide installation and application information related to the installer package to the information server. In one embodiment, when the information server obtains more than the threshold amount of information for an installer package, the information server may analyze the information and provide the analysis to requesting endpoints. The analysis may include the risk or performance impact of the installer package, or the category or functionality of the application.
    Type: Grant
    Filed: September 27, 2011
    Date of Patent: March 18, 2014
    Assignee: Symantec Corporation
    Inventors: Kent Griffin, Sourabh Satish, Vijay Seshadri, Abubakar Wawda, Jing Zhou
  • Patent number: 8412952
    Abstract: A computer-implemented method for authenticating requests from a client running trialware through a proof of work protocol is described. A request received from a client running trialware is analyzed. A cryptographic puzzle is generated if an authentication token is not included with the request. The cryptographic puzzle is transmitted to the client. A solution to the cryptographic puzzle received from the client is analyzed. A response to the request is generated if the received solution to the puzzle is validated.
    Type: Grant
    Filed: May 6, 2009
    Date of Patent: April 2, 2013
    Assignee: Symantec Corporation
    Inventors: Zulfikar Ramzan, Walter Bogorad, Vijay Seshadri, Vadim Antonov, Pieter Viljoen
  • Patent number: 8015520
    Abstract: Methods and apparatuses to automatically determine conditions at hierarchical boundaries of a hierarchical circuit design and to use the determined conditions in hierarchical optimization and verification. In one embodiment, a hierarchical block is optimized and transformed during design synthesis using one or more lemmas at the boundary of the hierarchical block. For example, the lemmas are automatically generated to specify range information for input boundary nodes. The lemmas are also used for the equivalence checker to perform hierarchical equivalence checking. Equivalence of hierarchical blocks is individually checked, in view of the lemmas. Thus, based on the lemmas, optimizations across hierarchical boundaries can be performed, while the hierarchical structure of the design is preserved so that equivalence checking of hierarchical circuit designs can still be based on the equivalence of individual hierarchical blocks.
    Type: Grant
    Filed: May 16, 2008
    Date of Patent: September 6, 2011
    Assignee: Synopsys, Inc.
    Inventors: Kenneth S. McElvain, Vijay Seshadri
  • Publication number: 20110067101
    Abstract: An individualized time-to-live (TTL) is determined for a reputation score of a computer file. The TTL is determined based on the reputation score and the confidence in the reputation score. The confidence can be determined based on attributes such as the reputation score, an age of the file, and a prevalence of the file. The reputation score is used to determine whether the file is malicious during a validity period defined by the TTL, and discarded thereafter.
    Type: Application
    Filed: September 15, 2009
    Publication date: March 17, 2011
    Applicant: SYMANTEC CORPORATION
    Inventors: Vijay Seshadri, Zulfikar Ramzan, James Hoagland, Adam L. Glick, Adam Wright
  • Patent number: 7873046
    Abstract: Detecting anomalous network activity through transformation of a terrain is disclosed. A set of network properties is mapped into a multidimensional terrain. The terrain is transformed into an observation domain in which data events of interest are amplified relative to other data comprising the terrain. The transformed terrain is evaluated for anomalous network activity.
    Type: Grant
    Filed: February 24, 2005
    Date of Patent: January 18, 2011
    Assignee: Symantec Corporation
    Inventor: Vijay A. Seshadri
  • Publication number: 20080216032
    Abstract: Methods and apparatuses to automatically determine conditions at hierarchical boundaries of a hierarchical circuit design and to use the determined conditions in hierarchical optimization and verification. In one embodiment, a hierarchical block is optimized and transformed during design synthesis using one or more lemmas at the boundary of the hierarchical block. For example, the lemmas are automatically generated to specify range information for input boundary nodes. The lemmas are also used for the equivalence checker to perform hierarchical equivalence checking. Equivalence of hierarchical blocks is individually checked, in view of the lemmas. Thus, based on the lemmas, optimizations across hierarchical boundaries can be performed, while the hierarchical structure of the design is preserved so that equivalence checking of hierarchical circuit designs can still be based on the equivalence of individual hierarchical blocks.
    Type: Application
    Filed: May 16, 2008
    Publication date: September 4, 2008
    Inventors: Kenneth S. McElvain, Vijay Seshadri
  • Patent number: 7376919
    Abstract: Methods and apparatuses to automatically determine conditions at hierarchical boundaries of a hierarchical circuit design and to use the determined conditions in hierarchical optimization and verification. In one embodiment, a hierarchical block is optimized and transformed during design synthesis using one or more lemmas at the boundary of the hierarchical block. For example, the lemmas are automatically generated to specify range information for input boundary nodes. The lemmas are also used for the equivalence checker to perform hierarchical equivalence checking. Equivalence of hierarchical blocks is individually checked, in view of the lemmas. Thus, based on the lemmas, optimizations across hierarchical boundaries can be performed, while the hierarchical structure of the design is preserved so that equivalence checking of hierarchical circuit designs can still be based on the equivalence of individual hierarchical blocks.
    Type: Grant
    Filed: May 4, 2005
    Date of Patent: May 20, 2008
    Assignee: Synplicity, Inc.
    Inventors: Kenneth S. McElvain, Vijay Seshadri
  • Publication number: 20050254311
    Abstract: A resetable memory is described that includes a memory without reset capability having a data output coupled to a first input of a first multiplexer. A second input of the first multiplexer has a reset value input. A channel select for the first multiplexer is coupled to a resetable storage cell output that indicates whether a storage cell within the memory without reset capability has been written to after a reset or has not been written to after a reset.
    Type: Application
    Filed: July 18, 2005
    Publication date: November 17, 2005
    Inventors: Vijay Seshadri, Kenneth McElvain