Patents by Inventor William Arbaugh

William Arbaugh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160232354
    Abstract: Disclosed herein is a system and method for monitoring structures of interest in a host system that is isolated and independent of the CPU and of the operating system. The system does not modify a monitored host's software and operates properly even when the host system has been compromised. The monitor of the present disclosure monitors the integrity of the examined structure by calculating values of the structure, comparing them with expected values, and sending error reports once the discrepancy between these values is detected.
    Type: Application
    Filed: February 10, 2015
    Publication date: August 11, 2016
    Inventors: Timothy Jon Fraser, Jesus Maria Molina-Terriza, Nick Louis Petroni, William A. Arbaugh
  • Patent number: 8955104
    Abstract: A host system integrity monitor for monitoring memory, operating systems, applications, domain manager, and other host system's structures of interest is isolated and independent of the CPU and operating system of commodity systems. The system requires no modifications to the protected (monitored) host's software, and operates correctly even when the host system is compromised. Either arranged as a stand-alone computer on the add-in card which communicates with the monitored host system through the PCI bus, or as the co-processor based monitor located on the motherboard of the host system, or residing on one of the virtual CPU while the monitored system resides on another virtual CPU, or residing within the domain manager of the host system, the monitor monitors the integrity of the examined structure by calculating hash values of the structure, comparing them with expected hash values, and sending error reports once the discrepancy between these values is detected.
    Type: Grant
    Filed: July 6, 2005
    Date of Patent: February 10, 2015
    Assignee: University of Maryland College Park
    Inventors: William A. Arbaugh, Nick Louis Petroni, Jr., Timothy Jon Fraser, Jesus Maria Molina-Terriza
  • Patent number: 8732824
    Abstract: Monitoring integrity of a running computer system is based on creating a Test Model which includes predicates descriptive of invariant properties of security relevant objects and their attributes in the monitored structure known-to-be “healthy”, acquiring memory image of a portion of the running monitored structure, decomposing the acquired memory image to retrieve representation of the security relevant objects of interest, by implementing the attributes of the Test Model, and verifying, by implementing the predicates, whether the invariant properties defined in the Test Model remain unchanged for the running host system. If a discrepancy is detected, a signal indicative of a detected discrepancy is transmitted to a management entity for analysis and formulating a course of action.
    Type: Grant
    Filed: January 23, 2007
    Date of Patent: May 20, 2014
    Assignee: Microsoft Corporation
    Inventors: William A. Arbaugh, Jeffrey D. Chung, Nick L. Petroni, Bryan Boot
  • Publication number: 20090217377
    Abstract: A host system integrity monitor for monitoring memory, operating systems, applications, domain manager, and other host system's structures of interest is isolated and independent of the CPU and operating system of commodity systems. The system requires no modifications to the protected (monitored) host's software, and operates correctly even when the host system is compromised. Either arranged as a stand-alone computer on the add-in card which communicates with the monitored host system through the PCI bus, or as the co-processor based monitor located on the motherboard of the host system, or residing on one of the virtual CPU while the monitored system resides on another virtual CPU, or residing within the domain manager of the host system, the monitor of the present invention monitors the integrity of the examined structure by calculating hash values of the structure, comparing them with expected hash values, and sending error reports once the discrepancy between these values is detected.
    Type: Application
    Filed: July 6, 2005
    Publication date: August 27, 2009
    Inventors: William A. Arbaugh, Nick Louis Petroni, Timothy Jon Fraser, Jesus Maria Molina-Terriza
  • Publication number: 20080051060
    Abstract: A roaming service method for a fast and secure wireless network is provided. In an embodiment of the present invention, an AP, which an STA associates with, transmits proactive keys needed for roaming to neighbor APs of the AP. When the STA moves to one of the neighbor APs, a reassociation is carried out between the STA and the neighbor AP using the already provided proactive key. In another embodiment of the present invention, an authentication server transmits proactive keys needed for roaming to neighbor APs to which the STA is likely to move, so that when the STA moves to one of the neighbor APs, a reassociation is carried out between the STA and the neighbor AP using the already provided proactive key.
    Type: Application
    Filed: May 24, 2007
    Publication date: February 28, 2008
    Applicant: SAMSUNG ELECTRONICS CO., LTD.
    Inventors: In-Sun LEE, Kyung-Hun Jang, Min-Ho Shin, William Arbaugh, Arunesh Mishra
  • Publication number: 20070261120
    Abstract: Monitoring integrity of a running computer system is based on creating a Test Model which includes predicates descriptive of invariant properties of security relevant objects and their attributes in the monitored structure known-to-be “healthy”, acquiring memory image of a portion of the running monitored structure, decomposing the acquired memory image to retrieve representation of the security relevant objects of interest, by implementing the attributes of the Test Model, and verifying, by implementing the predicates, whether the invariant properties defined in the Test Model remain unchanged for the running host system. If a discrepancy is detected, a signal indicative of a detected discrepancy is transmitted to a management entity for analysis and formulating a course of action.
    Type: Application
    Filed: January 23, 2007
    Publication date: November 8, 2007
    Inventors: William Arbaugh, Jeffrey Chung, Nick Petroni, Bryan Boot
  • Publication number: 20060276176
    Abstract: The present invention relates to an authentication method for wireless distribution system including at least one base station providing access service to mobile stations in a coverage of the base station. In the authentication method, an unregistered base station receives an authentication request from a mobile station, multicast an identity request for identifying the mobile station over the wireless distribution system, receives identity responses from at least one base station in response to the identity request, and performs authentication of the mobile station on the basis of the identity responses. The distributed authentication method of the present invention is performed without AAA server, when a new base station is installed or isolated base stations are joined, such that it is possible to extend the network in an easy manner without degradation of the security degree and additional labor burden of the operator.
    Type: Application
    Filed: May 12, 2006
    Publication date: December 7, 2006
    Inventors: In-Sun Lee, Sang-Boh Yun, William Arbaugh, T. Clancy, Min-Ho Shin
  • Publication number: 20060092883
    Abstract: Provided is a probing method for handoff including constructing a group of neighbor access points of a current access point with which the station associated, generating subgroups of the neighbor access points by the channel assigned to the access points, probing the access points by subgroup in a subgroup selection order, and selecting the neighbor access point having best link quality as a target access point to handoff. The probing method of the present invention is implemented with a novel non-overlap graph for constructing the neighbor graph such that the probing latency is dramatically reduced, resulting in reduction of handoff delay.
    Type: Application
    Filed: May 31, 2005
    Publication date: May 4, 2006
    Applicants: SAMSUNG ELECTRONICS CO., LTD., THE UNIVERSITY OF MARYLAND COLLEGE PARK
    Inventors: In-Sun Lee, Kyung-Hun Jang, Min-Ho Shin, William Arbaugh, Arunesh Mishra
  • Publication number: 20050141457
    Abstract: A method for minimizing handoff latencies when a handoff is performed in a wireless network. An access point (AP) or base station associated to a current wireless station (STA) allows information required for a reassociation to the STA to be propagated to handoff-capable neighboring APs or base stations. When the STA moves, a neighboring AP or base station performs the reassociation to the STA on the basis of context. When a handoff procedure is performed, the time taken to receive context of a corresponding STA is reduced, such that a fast handoff can be implemented.
    Type: Application
    Filed: December 3, 2004
    Publication date: June 30, 2005
    Applicants: SAMSUNG ELECTRONICS CO., LTD., THE UNIVERSITY OF MARYLAND COLLEGE PARK
    Inventors: In-Sun Lee, Kyung-Hun Jang, Min-Ho Shin, William Arbaugh, Arunesh Mishra
  • Publication number: 20050143073
    Abstract: A method for minimizing handoff latencies when a handoff is performed in a wireless network. An access point (AP) or base station associated to a current wireless station (STA) allows information required for a reassociation to the STA to be propagated to handoff-capable neighboring APs or base stations. When the STA moves, a neighboring AP or base station performs the reassociation to the STA on the basis of context. When a handoff procedure is performed, the time taken to receive context of a corresponding STA is reduced, such that a fast handoff can be implemented.
    Type: Application
    Filed: December 3, 2004
    Publication date: June 30, 2005
    Applicants: SAMSUNG ELECTRONICS CO., LTD., THE UNIVERSITY OF MARYLAND COLLEGE PARK
    Inventors: In-Sun Lee, Kyung-Hun Jang, Min-Ho Shin, William Arbaugh, Arunesh Mishra
  • Publication number: 20050117524
    Abstract: A method for minimizing handoff latencies when a handoff is performed in a wireless network. An access point (AP) or base station associated to a current wireless station (STA) allows information required for a reassociation to the STA to be propagated to handoff-capable neighboring APs or base stations. When the STA moves, a neighboring AP or base station performs the reassociation to the STA on the basis of context. When a handoff procedure is performed, the time taken to receive context of a corresponding STA is reduced, such that a fast handoff can be implemented.
    Type: Application
    Filed: November 10, 2003
    Publication date: June 2, 2005
    Applicant: SAMSUNG ELECTRONICS CO., LTD.
    Inventors: In-Sun Lee, Kyung-Hun Jang, Min-So Shin, William Arbaugh, Arunesh Mishra
  • Publication number: 20050083887
    Abstract: A method for minimizing handoff latencies when a handoff is performed in a wireless network. An access point (AP) or base station associated to a current wireless station (STA) allows information required for a reassociation to the STA to be propagated to handoff-capable neighboring APs or base stations. When the STA moves, a neighboring AP or base station performs the reassociation to the STA on the basis of context. When a handoff procedure is performed, the time taken to receive context of a corresponding STA is reduced, such that a fast handoff can be implemented.
    Type: Application
    Filed: December 3, 2004
    Publication date: April 21, 2005
    Applicants: SAMSUNG ELECTRONICS CO., LTD., THE UNIVERSITY OF MARYLAND COLLEGE PARK
    Inventors: In-Sun Lee, Kyung-Hun Jang, Min-Ho Shin, William Arbaugh, Arunesh Mishra
  • Patent number: 6185678
    Abstract: Integrity is rarely a valid presupposition in many systems architectures, yet it is necessary to make any security guarantees. To address this problem, the present invention discloses a secure bootstrap process, which presumes a minimal amount of integrity. The basic principle is sequencing the bootstrap process as a chain of progressively higher levels of abstraction, and requiring each layer to check a digital signature of the next layer before control is passed to it. A major design decision is the consequence of a failed integrity check. A simplistic strategy is to simply halt the bootstrap process. However, the bootstrap process of the present invention can be augmented with automated recovery procedures which preserve the security properties of the bootstrap process of the present invention under the additional assumption of the availability of a trusted repository. A variety of means by which such a repository can be implemented are disclosed with attention focused on a network-accessible repository.
    Type: Grant
    Filed: October 2, 1998
    Date of Patent: February 6, 2001
    Assignee: Trustees of the University of Pennsylvania
    Inventors: William A. Arbaugh, David J. Farber, Angelos D. Keromytis, Jonathan M. Smith