Patents by Inventor Vinod Yegneswaran

Vinod Yegneswaran has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230289460
    Abstract: Systems and methods for providing sensitive dataflow tracking for containerized applications is provided herein. In some embodiments, a taint tracking system for providing sensitive dataflow tracking may include an audit reporter configured to create a provenance graph; a taint tracking kernel configured to (1) create a screened provenance graph that includes data deemed sensitive, and (2) create one or more final taints set of sensitive data to be tracked at a container level that includes vertices and edges that are descended from a particular sensitive source using one or more dependency checkers; and a taint storage configured to store the taint sets of sensitive data to be tracked at the container level.
    Type: Application
    Filed: April 30, 2021
    Publication date: September 14, 2023
    Inventors: Ashish Gehani, Phillip A. Porras, Vinod Yegneswaran, Hassaan Irshad
  • Patent number: 11314614
    Abstract: A method, apparatus and system for providing security for a container network having a plurality of containers includes establishing a network stack for each of the plurality of containers of the container network, determining network and policy information from active containers, based on a set of pre-determined inter-container dependencies for the plurality of containers learned from the determined network and policy information, configuring container access in the container network to be limited to only containers of the plurality of containers that are relevant to a respective communication, and configuring inter-container traffic in the container network to be directed only from a source container into a destination container in a point-to-point manner such that exposure of the inter-container traffic to peer containers is prevented.
    Type: Grant
    Filed: December 17, 2020
    Date of Patent: April 26, 2022
    Assignee: SRI International
    Inventors: Phillip A. Porras, Vinod Yegneswaran, Jaehyun Nam, Seungwon Shin
  • Publication number: 20220121461
    Abstract: Embodiments consistent with the present disclosure provide systems and methods for providing namespace-aware provenance tracking in a containerized environment.
    Type: Application
    Filed: October 19, 2021
    Publication date: April 21, 2022
    Inventors: Vinod YEGNESWARAN, Ashish GEHANI, Hassaan IRSHAD, Xutong CHEN, Yan CHEN
  • Publication number: 20210211408
    Abstract: A method, apparatus and system for providing security for a container network having a plurality of containers includes establishing a network stack for each of the plurality of containers of the container network, determining network and policy information from active containers, based on a set of pre-determined inter-container dependencies for the plurality of containers learned from the determined network and policy information, configuring container access in the container network to be limited to only containers of the plurality of containers that are relevant to a respective communication, and configuring inter-container traffic in the container network to be directed only from a source container into a destination container in a point-to-point manner such that exposure of the inter-container traffic to peer containers is prevented.
    Type: Application
    Filed: December 17, 2020
    Publication date: July 8, 2021
    Inventors: Phillip A. Porras, Vinod Yegneswaran, Jaehyun Nam, Seungwon Shin
  • Publication number: 20190281088
    Abstract: A network security policy may be implemented at network switches as a set of active packet disposition directives. In a dynamically programmable network, the network switches can be dynamically reprogrammed with new packet disposition directives. A security mediation service permits such dynamic reprogramming as long as the new directives are consistent with the then-current network security policy. The security mediation service evaluates candidate packet disposition directives for conflicts with the currently active security policy, before instantiating the candidate packet disposition directives at the network switches.
    Type: Application
    Filed: May 20, 2019
    Publication date: September 12, 2019
    Inventors: Phillip A. Porras, Martin W. Fong, Vinod Yegneswaran
  • Patent number: 10333988
    Abstract: A network security policy may be implemented at network switches as a set of active packet disposition directives. In a dynamically programmable network, the network switches can be dynamically reprogrammed with new packet disposition directives. A security mediation service permits such dynamic reprogramming as long as the new directives are consistent with the then-current network security policy. The security mediation service evaluates candidate packet disposition directives for conflicts with the currently active security policy, before instantiating the candidate packet disposition directives at the network switches.
    Type: Grant
    Filed: June 13, 2017
    Date of Patent: June 25, 2019
    Assignee: SRI International
    Inventors: Phillip A. Porras, Martin W. Fong, Vinod Yegneswaran
  • Publication number: 20170346857
    Abstract: A network security policy may be implemented at network switches as a set of active packet disposition directives. In a dynamically programmable network, the network switches can be dynamically reprogrammed with new packet disposition directives. A security mediation service permits such dynamic reprogramming as long as the new directives are consistent with the then-current network security policy. The security mediation service evaluates candidate packet disposition directives for conflicts with the currently active security policy, before instantiating the candidate packet disposition directives at the network switches.
    Type: Application
    Filed: June 13, 2017
    Publication date: November 30, 2017
    Applicant: SRI International
    Inventors: Phillip A. Porras, Martin W. Fong, Vinod Yegneswaran
  • Patent number: 9705918
    Abstract: A network security policy may be implemented at network switches as a set of active packet disposition directives. In a dynamically programmable network, the network switches can be dynamically reprogrammed with new packet disposition directives. A security mediation service permits such dynamic reprogramming as long as the new directives are consistent with the then-current network security policy. The security mediation service evaluates candidate packet disposition directives for conflicts with the currently active security policy, before instantiating the candidate packet disposition directives at the network switches.
    Type: Grant
    Filed: March 13, 2013
    Date of Patent: July 11, 2017
    Assignee: SRI International
    Inventors: Phillip A. Porras, Martin W. Fong, Vinod Yegneswaran
  • Patent number: 9444842
    Abstract: A network security policy may be implemented at network switches as a set of active packet disposition directives. In a dynamically programmable network, the network switches can be dynamically reprogrammed with new packet disposition directives. A security mediation service permits such dynamic reprogramming as long as the new directives are consistent with the then-current network security policy. The security mediation service evaluates candidate packet disposition directives for conflicts with the currently active security policy, before instantiating the candidate packet disposition directives at the network switches.
    Type: Grant
    Filed: March 13, 2013
    Date of Patent: September 13, 2016
    Assignee: SRI INTERNATIONAL
    Inventors: Phillip A. Porras, Martin W. Fong, Vinod Yegneswaran
  • Publication number: 20120030760
    Abstract: The present invention relates to a method and apparatus for combating web-based surreptitious binary installations. One embodiment of a method combating web-based surreptitious binary installations on a computing device includes intercepting a download of a file to a local file system of the computing device, storing the file in the local file system when the file is correlated with a user consent, and storing the file in a secure zone of the computing device when the file is not correlated with a user consent, wherein files stored in the secure zone cannot be executed or propagated.
    Type: Application
    Filed: August 2, 2010
    Publication date: February 2, 2012
    Inventors: Long Lu, Phillip Porras, Vinod Yegneswaran
  • Publication number: 20070067841
    Abstract: A monitor of malicious network traffic attaches to unused addresses and monitors communications with an active responder that has constrained-state awareness to be highly scalable. In a preferred embodiment, the active responder provides a response based only on the previous statement from the malicious source, which in most cases is sufficient to promote additional communication with the malicious source, presenting a complete record of the transaction for analysis and possible signature extraction.
    Type: Application
    Filed: August 29, 2005
    Publication date: March 22, 2007
    Inventors: Vinod Yegneswaran, Paul Barford, David Plonka
  • Publication number: 20060212942
    Abstract: An automatic technique for generating signatures for malicious network traffic performs a cluster analysis of known malicious traffic to create a signature in the form of a state machine. The cluster analysis may operate on semantically tagged data collected by connection or session and normalized to eliminate protocol specific features. The signature extractor may generalize the finite-state machine signatures to match network traffic not previously observed.
    Type: Application
    Filed: March 21, 2005
    Publication date: September 21, 2006
    Inventors: Paul Barford, Jonathon Giffin, Somesh Jha, Vinod Yegneswaran