Using static analysis for vulnerability detection
PW O'hearn, TM Reed, Y Chen… - US Patent 12,034,754, 2024 - Google Patents
Using static analysis for vulnerability detection, including: inspecting, using an
underapproximate static code analysis, a non-executable representation of an application to …
underapproximate static code analysis, a non-executable representation of an application to …
Executing enterprise process abstraction using process aware analytical attack graphs
Methods, systems, and computer-readable storage media for receiving a process aware
AAG from computer-readable memory, the process aware AAG having been generated from …
AAG from computer-readable memory, the process aware AAG having been generated from …
Extracting process aware analytical attack graphs through logical network analysis
Methods, systems, and computer-readable storage media for receiving a AAG from
computer-readable memory, generating from logical network ontology data, asset inventory …
computer-readable memory, generating from logical network ontology data, asset inventory …
Evaluating effectiveness of security controls in enterprise networks using graph values
E Hadar, D Grabois - US Patent 11,695,795, 2023 - Google Patents
Implementations are directed to an agile security platform for enterprise-wide cyber-security
and performing actions of receiving, from an agile security platform, analytical attack graph …
and performing actions of receiving, from an agile security platform, analytical attack graph …
Process risk calculation based on hardness of attack paths
A Hassanzadeh, A Nayak, MDS Ullah - US Patent 11,831,675, 2023 - Google Patents
Implementations are directed to receiving analytical attack graph (AAG) data representative
of one or more AAGs, each AAG representing one or more lateral paths between …
of one or more AAGs, each AAG representing one or more lateral paths between …
Resource-efficient generation of analytical attack graphs
A Basovskiy, D Kravchenko, A Dayan… - US Patent …, 2022 - Google Patents
Implementations include evaluating a first sub-set of rules based on a first sub-set of facts to
provide a first set of impacts, evaluating including applying the first sub-set of facts to each …
provide a first set of impacts, evaluating including applying the first sub-set of facts to each …
Leveraging attack graphs of agile security platform
D Grabois, E Hadar, A Genachowski - US Patent 11,757,921, 2023 - Google Patents
Implementations of the present disclosure include receiving, from an agile security platform,
attack graph (AG) data representative of one or more AGs, each AG representing one or …
attack graph (AG) data representative of one or more AGs, each AG representing one or …
Analytical attack graph differencing
Methods, systems, and computer-readable storage media for receiving data representative
of two or more AAGs, providing an identifier for each element of each of the two or more …
of two or more AAGs, providing an identifier for each element of each of the two or more …
Cyber digital twin simulator for automotive security assessment based on attack graphs
D Klein, E Segev - US Patent 11,973,790, 2024 - Google Patents
Implementations include determining a set of components within the connected vehicle
ecosystem, components within the set of components representing at least one layer within …
ecosystem, components within the set of components representing at least one layer within …
Generating attack graphs in agile security platforms
E Hadar, A Hassanzadeh, A Nayak - US Patent 11,907,407, 2024 - Google Patents
Implementations of the present disclosure include providing a graph representative of a
network, a set of nodes representing respective assets, each edge representing one or more …
network, a set of nodes representing respective assets, each edge representing one or more …