Twistlock, Ltd.

Israel

Back to Profile

1-50 of 50 for Twistlock, Ltd. Sort by
Query
Patent
United States - USPTO
Aggregations Reset Report
Date
2023 December 1
2024 (YTD) 1
2023 4
2022 12
2021 5
See more
IPC Class
G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine 18
H04L 29/06 - Communication control; Communication processing characterised by a protocol 18
G06N 20/00 - Machine learning 15
G06F 21/54 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by adding security routines or objects to programs 13
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities 13
See more
Status
Pending 12
Registered / In Force 38
Found results for  patents

1.

DISTRIBUTED IDENTITY-BASED FIREWALL POLICY EVALUATION

      
Application Number 18489392
Status Pending
Filing Date 2023-10-18
First Publication Date 2024-02-29
Owner Twistlock Ltd. (Israel)
Inventor
  • Levin, Liron
  • Yanay, Eran
  • Stopel, Dima

Abstract

Methods and systems for identity-based firewall policy evaluation and for encoding entity identifiers for use in identity-based firewall policy evaluation. A packet from a sender entity to a recipient entity is intercepted. A determination is made whether the sender entity is permitted to communicate with the recipient entity according to a firewall policy, wherein the firewall policy indicates a plurality of entity identifiers, and each entity identifier is unique among the plurality of entity identifiers. Rules for communications among the plurality of entities include a list of pairs of entities which are permitted to communicate with each other. The packet is forwarded to the recipient entity when it is determined that the sender entity is permitted to communicate with the recipient entity. At least one mitigation action is performed when it is determined that the recipient entity is not permitted to communicate with the sender entity.

IPC Classes  ?

2.

CLOUD NATIVE VIRTUAL MACHINE RUNTIME PROTECTION

      
Application Number 18464799
Status Pending
Filing Date 2023-09-11
First Publication Date 2023-12-28
Owner Twistlock Ltd. (Israel)
Inventor
  • Levin, Liron
  • Morello, John
  • Stopel, Dima
  • Velbaum, Michael
  • Abramowsky, Itay
  • Schnitzer, Isaac

Abstract

A system and method for cloud native virtual machine (VM) runtime protection. The method includes creating a normal behavior model for a cloud native VM by training a machine learning model using a training data set including training activities performed by the cloud native VM, the cloud native VM being configured to provide at least one service, wherein the normal behavior model defines at least one capability of each service based on a set of capabilities for respective known services stored within a library of service-to-capability mappings, wherein each capability of a service indicates a plurality of discrete behaviors required by the service; and monitoring an execution of the cloud native VM to detect a deviation from the normal behavior model, wherein the deviation is caused by at least one abnormal behavior of one of the services that is not among the discrete behaviors defined in capabilities for the service.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • H04L 9/40 - Network security protocols
  • G06F 16/23 - Updating
  • G06N 20/00 - Machine learning
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 9/445 - Program loading or initiating
  • G06F 21/51 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
  • G06F 21/54 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by adding security routines or objects to programs
  • G06F 18/214 - Generating training patterns; Bootstrap methods, e.g. bagging or boosting

3.

EFFICIENT VIRTUAL MACHINE SCANNING

      
Application Number 18366239
Status Pending
Filing Date 2023-08-07
First Publication Date 2023-11-23
Owner Twistlock Ltd. (Israel)
Inventor
  • Levin, Liron
  • Yanay, Eran
  • Astrin, Gilad
  • Stopel, Dima

Abstract

A system and method for scanning of virtual machine images. The method includes creating a virtual machine instance of a virtual machine based on a virtual machine image of the virtual machine and an application programming interface (API) of an environment in which the virtual machine is to be deployed, wherein the virtual machine image has an entry point such that the virtual machine instance executes the entry point; and replacing the entry point of the virtual machine instance with a lightweight script, wherein the lightweight script is configured to retrieve a static scanner executable, to execute the static scanner executable, and to send results of the scanning.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 9/54 - Interprogram communication

4.

SECURING APPLICATION BEHAVIOR IN SERVERLESS COMPUTING

      
Application Number 18353238
Status Pending
Filing Date 2023-07-17
First Publication Date 2023-11-09
Owner Twistlock Ltd. (Israel)
Inventor
  • Segal, Ory
  • Shapira, Yuri
  • Shulman, Avraham
  • Nissimov, Benny
  • Zin, Shaked

Abstract

A method for securing a serverless application including: (a) receiving a list of components which make up the serverless application and one or more intended usage flows of the serverless application; (b) creating and applying a security policy for each component of the serverless application, the security policy denying all access requests except from authorized components, wherein the authorized components are selected based on access requirements dictated by the one or more intended usage flows.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06N 5/04 - Inference or reasoning models
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • G06N 20/00 - Machine learning

5.

PROFILING OF SPAWNED PROCESSES IN CONTAINER IMAGES AND ENFORCING SECURITY POLICIES RESPECTIVE THEREOF

      
Application Number 18296648
Status Pending
Filing Date 2023-04-06
First Publication Date 2023-08-10
Owner Twistlock Ltd. (Israel)
Inventor
  • Stopel, Dima
  • Levin, Liron

Abstract

Execution of software containers is secured using security profiles. A security profile is generated for a container image, wherein the container image includes resources utilized to execute a corresponding application container, wherein the generated security profile includes at least a spawned processes profile, wherein the spawned processes profile includes, for each spawned process executed at runtime by the application container, a signature of an executable file of the spawned process. The operation of a runtime execution of the application container is monitored. A violation of the spawned processes profile is detected based on the monitored operation.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine

6.

Securing application behavior in serverless computing

      
Application Number 17807812
Grant Number 11706220
Status In Force
Filing Date 2022-06-20
First Publication Date 2022-10-13
Grant Date 2023-07-18
Owner Twistlock Ltd. (Israel)
Inventor
  • Segal, Ory
  • Shapira, Yuri
  • Shulman, Avraham
  • Nissimov, Benny
  • Zin, Shaked

Abstract

A method for securing a serverless application including: (a) receiving a list of components which make up the serverless application and one or more intended usage flows of the serverless application; (b) creating and applying a security policy for each component of the serverless application, the security policy denying all access requests except from authorized components, wherein the authorized components are selected based on access requirements dictated by the one or more intended usage flows.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06N 5/04 - Inference or reasoning models
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • G06N 20/00 - Machine learning

7.

Software package analysis for detection of malicious properties

      
Application Number 17664250
Grant Number 11893117
Status In Force
Filing Date 2022-05-20
First Publication Date 2022-09-01
Grant Date 2024-02-06
Owner Twistlock Ltd. (Israel)
Inventor
  • Segal, Ory
  • Shapira, Yuri
  • Shulman, Avraham
  • Nissimov, Benny
  • Zin, Shaked Yosef

Abstract

A system facilitates detection of malicious properties of software packages. A generic application which comprises known functionality into which a software package has been included is analyzed through a static analysis and/or dynamic analysis, which is performed based on executing the generic application in a controlled environment. The static analysis and/or dynamic analysis are performed to determine whether one or more properties associated with the software package comprise deviations from the known behavior of the generic application. Behavior deviations identified based on the static and/or dynamic analysis are associated with a score. An aggregate score is calculated for the software package based on the scores which have been assigned to the identified behavior deviations and may be adjusted based on a reputation multiplier determined based on metadata of the software package. If the aggregate score of the software package exceeds a score threshold, the software package is flagged as malicious.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine

8.

SYSTEM AND METHOD FOR SELECTION AND DISCOVERY OF VULNERABLE SOFTWARE PACKAGES

      
Application Number 17145893
Status Pending
Filing Date 2021-01-11
First Publication Date 2022-07-14
Owner Twistlock, Ltd. (Israel)
Inventor
  • Levin, Liron
  • Adler, Alon
  • Kletselman, Michael
  • Stopel, Dima

Abstract

A system and method for discovering vulnerabilities in software packages. A method includes identifying at least one potential source of vulnerability in at least one potentially vulnerable software package of a plurality of software packages, wherein each potential source of vulnerability is a change to one of the at least one potentially vulnerable software package; and identifying at least one vulnerability in the plurality of software packages by selecting and applying at least one vulnerability identification rule to data of each of the at least one potentially vulnerable software package, wherein the at least one vulnerability identification rule for each of the at least one potentially vulnerable software package is selected based on an availability of version identifiers for the potentially vulnerable software package.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 8/71 - Version control ; Configuration management

9.

TECHNIQUES FOR PROTECTING CLOUD NATIVE ENVIRONMENTS BASED ON CLOUD RESOURCE ACCESS

      
Application Number 17656627
Status Pending
Filing Date 2022-03-25
First Publication Date 2022-07-07
Owner Twistlock, Ltd. (Israel)
Inventor
  • Levin, Liron
  • Kletselman, Michael
  • Stopel, Dima
  • Morello, John

Abstract

A system and method for method for protecting cloud native environments based on cloud resource access. The method includes determining a mapping of a plurality of cloud assets to a plurality of cloud resources based on resource access data for a cloud native environment, wherein the plurality of cloud assets and the plurality of cloud resources are deployed in the cloud native environment, wherein each of the plurality of cloud assets is mapped to at least one associated cloud resource of the plurality of cloud resources; detecting at least one improper resource access based on the mapping and a cloud access security stream for the cloud native environment, wherein each of the at least one improper resource access deviates from the mapping; and performing at least one mitigation action with respect to the detected at least one improper resource access.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 21/60 - Protecting data
  • H04L 41/0654 - Management of faults, events, alarms or notifications using network fault recovery
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

10.

Cloud native virtual machine runtime protection

      
Application Number 17539658
Grant Number 11797322
Status In Force
Filing Date 2021-12-01
First Publication Date 2022-03-24
Grant Date 2023-10-24
Owner Twistlock Ltd. (Israel)
Inventor
  • Levin, Liron
  • Morello, John
  • Stopel, Dima
  • Velbaum, Michael
  • Abramowsky, Itay
  • Schnitzer, Isaac

Abstract

A system and method for cloud native virtual machine (VM) runtime protection. The method includes creating a normal behavior model for a cloud native VM by training a machine learning model using a training data set including training activities performed by the cloud native VM, the cloud native VM being configured to provide at least one service, wherein the normal behavior model defines at least one capability of each service based on a set of capabilities for respective known services stored within a library of service-to-capability mappings, wherein each capability of a service indicates a plurality of discrete behaviors required by the service; and monitoring an execution of the cloud native VM to detect a deviation from the normal behavior model, wherein the deviation is caused by at least one abnormal behavior of one of the services that is not among the discrete behaviors defined in capabilities for the service.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • H04L 9/40 - Network security protocols
  • G06F 16/23 - Updating
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/51 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
  • G06F 18/214 - Generating training patterns; Bootstrap methods, e.g. bagging or boosting
  • G06N 20/00 - Machine learning
  • G06F 9/445 - Program loading or initiating
  • G06F 21/54 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by adding security routines or objects to programs

11.

System and method for distributed security forensics

      
Application Number 17502633
Grant Number 11853779
Status In Force
Filing Date 2021-10-15
First Publication Date 2022-02-24
Grant Date 2023-12-26
Owner Twistlock, Ltd. (Israel)
Inventor
  • Levin, Liron
  • Stopel, Dima
  • Bizamcher, Ami
  • Kletselman, Michael
  • Morello, John

Abstract

A host device and methods for efficient distributed security forensics. The method includes creating, at a host device configured to run a virtualization entity, an event index for the virtualization entity; encoding a plurality of events related to the virtualization entity, wherein each event includes a process having a process path; and updating the event index based on the encoded plurality of events.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • H04L 9/40 - Network security protocols
  • G06F 16/23 - Updating
  • G06N 20/00 - Machine learning
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 9/445 - Program loading or initiating
  • G06F 21/51 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
  • G06F 21/54 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by adding security routines or objects to programs
  • G06F 18/214 - Generating training patterns; Bootstrap methods, e.g. bagging or boosting

12.

TECHNIQUES FOR PROTECTING APPLICATIONS FROM UNSECURE NETWORK EXPOSURE

      
Application Number 17505976
Status Pending
Filing Date 2021-10-20
First Publication Date 2022-02-10
Owner Twistlock, Ltd. (Israel)
Inventor
  • Stopel, Dima
  • Levin, Liron
  • Shapira, Daniel
  • Ben Nun, Nitsan
  • Morello, John

Abstract

A method and system for protecting an application from unsecure network exposure. The method includes identifying an at-risk application, wherein identifying the at-risk application further comprises determining that the application is configured incorrectly; identifying at least one port through which the at-risk application is accessible when the at-risk application is determined to be configured incorrectly; and determining, based on the identified at least one port through which the at-risk application is accessible, whether an exposure vulnerability exists, wherein the exposure vulnerability is an unapproved exposure of at least one of the at least one port to external resources.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 9/54 - Interprogram communication
  • H04L 12/24 - Arrangements for maintenance or administration
  • H04L 12/26 - Monitoring arrangements; Testing arrangements

13.

SYSTEM AND METHOD FOR APPLICATION TRAFFIC AND RUNTIME BEHAVIOR LEARNING AND ENFORCEMENT

      
Application Number 16940876
Status Pending
Filing Date 2020-07-28
First Publication Date 2022-02-03
Owner Twistlock, Ltd. (Israel)
Inventor
  • Levin, Liron
  • Schnitzer, Isaac
  • Segal, Ory
  • Stopel, Dima

Abstract

Systems and methods for learning behavioral activity correlations. A method includes intercepting a plurality of requests, wherein each of the plurality of requests is directed to a respective destination entity of a plurality of destination entities; creating a request queue by queueing the plurality of requests; inspecting contents of the plurality of requests; separately forwarding each intercepted request to its respective destination entity based on the request queue; monitoring runtime output of each of the plurality of destination entities, wherein the runtime output includes behavioral activities of the plurality of destination entities; and training a machine learning model based on the contents of the plurality of requests the runtime output of each of the plurality of destination entities, wherein the machine learning model is trained to output request-output correlations between groups of requests and subsequent behavioral activities.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06N 20/00 - Machine learning

14.

Providing zero trust network security without modification of network infrastructure

      
Application Number 16939589
Grant Number 11962584
Status In Force
Filing Date 2020-07-27
First Publication Date 2022-01-27
Grant Date 2024-04-16
Owner Twistlock, Ltd. (Israel)
Inventor
  • Levin, Liron
  • Yanay, Eran
  • Stopel, Dima

Abstract

Zero trust network security is provided without modifying the underlying network infrastructure. Unique intermediate certificates created based on a primary certificate are sent to each of a plurality of entities. Each entity of the plurality of entities is installed on a respective node of a plurality of nodes in a network environment of a cloud provider. An agent is deployed to each of the plurality of nodes, and the agent is configured to enforce at least one network firewall policy based on the intermediate certificate sent to the corresponding entity.

IPC Classes  ?

15.

Distributed identity-based firewall policy evaluation

      
Application Number 16930732
Grant Number 11838267
Status In Force
Filing Date 2020-07-16
First Publication Date 2022-01-20
Grant Date 2023-12-05
Owner Twistlock, Ltd. (Israel)
Inventor
  • Levin, Liron
  • Yanay, Eran
  • Stopel, Dima

Abstract

Methods and systems for identity-based firewall policy evaluation and for encoding entity identifiers for use in identity-based firewall policy evaluation. A packet from a sender entity to a recipient entity is intercepted. A determination is made whether the sender entity is permitted to communicate with the recipient entity according to a firewall policy, wherein the firewall policy indicates a plurality of entity identifiers, and each entity identifier is unique among the plurality of entity identifiers. Rules for communications among the plurality of entities include a list of pairs of entities which are permitted to communicate with each other. The packet is forwarded to the recipient entity when it is determined that the sender entity is permitted to communicate with the recipient entity. At least one mitigation action is performed when it is determined that the recipient entity is not permitted to communicate with the sender entity.

IPC Classes  ?

16.

Efficient virtual machine scanning

      
Application Number 16930778
Grant Number 11762678
Status In Force
Filing Date 2020-07-16
First Publication Date 2022-01-20
Grant Date 2023-09-19
Owner Twistlock, Ltd. (Israel)
Inventor
  • Levin, Liron
  • Yanay, Eran
  • Astrin, Gilad
  • Stopel, Dima

Abstract

A system and method for scanning of virtual machine images. The method includes creating a virtual machine instance of a virtual machine based on a virtual machine image of the virtual machine and an application programming interface (API) of an environment in which the virtual machine is to be deployed, wherein the virtual machine image has an entry point such that the virtual machine instance executes the entry point; and replacing the entry point of the virtual machine instance with a lightweight script, wherein the lightweight script is configured to retrieve a static scanner executable, to execute the static scanner executable, and to send results of the scanning.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 9/54 - Interprogram communication

17.

Cloud native discovery and protection

      
Application Number 17484707
Grant Number 11689576
Status In Force
Filing Date 2021-09-24
First Publication Date 2022-01-13
Grant Date 2023-06-27
Owner Twistlock, Ltd. (Israel)
Inventor
  • Levin, Liron
  • Kletselman, Michael
  • Stopel, Dima
  • Morello, John
  • Abramowsky, Itay
  • Bizamcher, Ami

Abstract

A system and method for cloud native discovery and protection. The method includes discovering instances of a plurality of cloud assets in a cloud native environment based on a plurality of application programming interface (API) endpoints in the cloud native environment, wherein the plurality of API endpoints is identified based on cloud credentials for each of the plurality of cloud assets; determining at least one cloud asset instance that lacks active security protection based on a configuration of at least one entity deployed in the cloud native environment; and reconfiguring at least a portion of the cloud native environment with respect to the at least one cloud asset instance that lacks active security protection.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 41/0813 - Configuration setting characterised by the conditions triggering a change of settings
  • H04L 41/0866 - Checking the configuration
  • H04L 41/12 - Discovery or management of network topologies

18.

On-the-fly creation of transient least privileged roles for serverless functions

      
Application Number 16852215
Grant Number 11489844
Status In Force
Filing Date 2020-04-17
First Publication Date 2021-10-21
Grant Date 2022-11-01
Owner Twistlock Ltd. (Israel)
Inventor
  • Segal, Ory
  • Shapira, Yuri
  • Shulman, Avraham
  • Nissimov, Benny
  • Zin, Shaked Yosef

Abstract

The disclosed serverless security access control system leverages static analysis information about application code and runtime information to create and assign on-the-fly transient serverless function roles. A default role can be initially assigned to serverless functions of the application. The default role allows the function to communicate with a security access broker. The access broker accesses least privilege information about an invoked serverless function and then creates and assigns a transient role to the serverless function based on that information. The short life of the role reduces and possibly eliminates the security risk of an over-permissive role. The access broker can update the least privilege information based on updated analysis of the application code and runtime information to allow flexibility and adaptation over executions.

IPC Classes  ?

19.

Software package analysis for detection of malicious properties

      
Application Number 16847374
Grant Number 11372978
Status In Force
Filing Date 2020-04-13
First Publication Date 2021-10-14
Grant Date 2022-06-28
Owner Twistlock Ltd. (Israel)
Inventor
  • Segal, Ory
  • Shapira, Yuri
  • Shulman, Avraham
  • Nissimov, Benny
  • Zin, Shaked Yosef

Abstract

A system facilitates detection of malicious properties of software packages. A generic application which comprises known functionality into which a software package has been included is analyzed through a static analysis and/or dynamic analysis, which is performed based on executing the generic application in a controlled environment. The static analysis and/or dynamic analysis are performed to determine whether one or more properties associated with the software package comprise deviations from the known behavior of the generic application. Behavior deviations identified based on the static and/or dynamic analysis are associated with a score. An aggregate score is calculated for the software package based on the scores which have been assigned to the identified behavior deviations and may be adjusted based on a reputation multiplier determined based on metadata of the software package. If the aggregate score of the software package exceeds a score threshold, the software package is flagged as malicious.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine

20.

SYSTEM AND METHOD FOR DEFENDING APPLICATIONS INVOKING ANONYMOUS FUNCTIONS

      
Application Number 17195038
Status Pending
Filing Date 2021-03-08
First Publication Date 2021-07-08
Owner Twistlock, Ltd. (Israel)
Inventor
  • Levin, Liron
  • Stopel, Dima
  • Morello, John

Abstract

A system and method for defending an application configured to invoke anonymous functions. The method includes analyzing the application to determine at least one branch of the application, wherein each branch is an instruction that deviates from a default behavior of the application; identifying a potential threat branch based on the at least one branch of the application and an anonymous function, the potential threat branch including a call to an anonymous function; and creating a secured instance of the application, wherein creating the secured instance of the application further comprises embedding a policy within the anonymous function of the identified potential threat branch.

IPC Classes  ?

  • G06F 21/54 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by adding security routines or objects to programs
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06N 20/00 - Machine learning
  • G06F 8/00 - Arrangements for software engineering

21.

Profiling of spawned processes in container images and enforcing security policies respective thereof

      
Application Number 17195069
Grant Number 11640472
Status In Force
Filing Date 2021-03-08
First Publication Date 2021-06-24
Grant Date 2023-05-02
Owner Twistlock, Ltd. (Israel)
Inventor
  • Stopel, Dima
  • Levin, Liron

Abstract

Execution of software containers is secured using security profiles. A security profile is generated for a container image, wherein the container image includes resources utilized to execute a corresponding application container, wherein the generated security profile includes at least a spawned processes profile, wherein the spawned processes profile includes, for each spawned process executed at runtime by the application container, a signature of an executable file of the spawned process. The operation of a runtime execution of the application container is monitored. A violation of the spawned processes profile is detected based on the monitored operation.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine

22.

Techniques for securing execution environments by quarantining software containers

      
Application Number 17174994
Grant Number 11625489
Status In Force
Filing Date 2021-02-12
First Publication Date 2021-06-03
Grant Date 2023-04-11
Owner Twistlock, Ltd. (Israel)
Inventor
  • Morello, John
  • Stopel, Dima
  • Levin, Liron

Abstract

A system and method for securing execution environments by quarantining software containers. A method includes: determining, based on configuration data for an application stored in the application software container, at least one intended behavior of the application when executed by the application software container; monitoring execution of the application software container in a first execution environment, wherein the monitoring further comprises comparing the execution of the application software container to the at least one intended behavior; detecting an unauthorized action by the application software container when the execution of the application software container is anomalous as compared to the at least one intended behavior; and quarantining the application software container by migrating the application software container from the first execution environment to a second execution environment when the unauthorized action is detected.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 9/445 - Program loading or initiating

23.

SYSTEM AND METHOD FOR PROVIDING CONTEXTUAL FORENSIC DATA FOR USER ACTIVITY-RELATED SECURITY INCIDENTS

      
Application Number 16425098
Status Pending
Filing Date 2019-05-29
First Publication Date 2020-12-03
Owner Twistlock, Ltd. (Israel)
Inventor
  • Levin, Liron
  • Kletselman, Michael
  • Bizamcher, Ami
  • Stopel, Dima
  • Morello, John

Abstract

Techniques for providing contextual forensic data based on user activities. A first method includes identifying a user action in user activity data, wherein the user action is a discrete event initiated by a user, wherein the user action is performed with respect to a portion of a system; and correlating the identified user action with at least one system change, wherein the at least one system change is related to the portion of the system, wherein the at least one system change occurred after the user action. A second method includes taking a first snapshot before a user action occurs, wherein the user action is a discrete event initiated by a user, wherein the first snapshot is taken of at least a portion of a system; and taking a second snapshot after the user action occurs, wherein the second snapshot is taken of the at least a portion of the system.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

24.

System and method for distributed security forensics using process path encoding

      
Application Number 16897951
Grant Number 11175945
Status In Force
Filing Date 2020-06-10
First Publication Date 2020-09-24
Grant Date 2021-11-16
Owner Twistlock, Ltd. (Israel)
Inventor
  • Levin, Liron
  • Stopel, Dima
  • Bizamcher, Ami
  • Kletselman, Michael
  • Morello, John

Abstract

A host device and methods for efficient distributed security forensics. The method includes creating, at a first host device configured to run a first virtualization entity, a first event index for the first virtualization entity; encoding at least one event related to the first virtualization entity, wherein each event includes a process having a process path, wherein encoding the at least one event includes replacing at least a portion of each event with at least one code representing at least the process path of the respective process; updating the first event index based on the encoded at least one event; and sending the first event index to a master console, wherein the master console is configured to receive a plurality of event indices created by a plurality of host devices with respect to a plurality of virtualization entities.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 16/23 - Updating
  • G06N 20/00 - Machine learning
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06K 9/62 - Methods or arrangements for recognition using electronic means
  • G06F 9/445 - Program loading or initiating
  • G06F 21/51 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
  • G06F 21/54 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by adding security routines or objects to programs

25.

Radar visualization of cloud native environments

      
Application Number 16287488
Grant Number 11550050
Status In Force
Filing Date 2019-02-27
First Publication Date 2020-08-27
Grant Date 2023-01-10
Owner Twistlock Ltd. (Israel)
Inventor
  • Morello, John
  • Stopel, Dima
  • Levin, Liron
  • Agam, Nerya
  • Kravchook, Reut

Abstract

A plurality of connection patterns is determined based on connectivity data collected by a plurality of agents. Each agent of the plurality of agents is installed on a respective compute node of a plurality of compute nodes. The connectivity data collected by each agent of the plurality of agents includes node-local connectivity data indicating node-local connections for the respective compute node on which the agent is installed. The node-local connections include communications with at least one application entity hosted by the respective compute node. A graph representation that is organized with respect to the at least one application entity hosted by each of the plurality of compute nodes is generated based on the plurality of connection patterns.

IPC Classes  ?

  • G06F 15/173 - Interprocessor communication using an interconnection network, e.g. matrix, shuffle, pyramid, star or snowflake
  • G01S 13/89 - Radar or analogous systems, specially adapted for specific applications for mapping or imaging
  • H04L 41/12 - Discovery or management of network topologies
  • H04L 43/0811 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking connectivity
  • G06F 9/30 - Arrangements for executing machine instructions, e.g. instruction decode
  • H04L 41/14 - Network analysis or design

26.

Securing application behavior in serverless computing

      
Application Number 16795681
Grant Number 11425127
Status In Force
Filing Date 2020-02-20
First Publication Date 2020-08-20
Grant Date 2022-08-23
Owner TWISTLOCK LTD. (Israel)
Inventor
  • Segal, Ory
  • Shapira, Yuri
  • Shulman, Avraham
  • Nissimov, Benny
  • Zin, Shaked

Abstract

A method for securing a serverless application including: (a) receiving a list of components which make up the serverless application and one or more intended usage flows of the serverless application; (b) creating and applying a security policy for each component of the serverless application, the security policy denying all access requests except from authorized components, wherein the authorized components are selected based on access requirements dictated by the one or more intended usage flows.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06N 5/04 - Inference or reasoning models
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • G06N 20/00 - Machine learning

27.

Cloud native discovery and protection

      
Application Number 16232542
Grant Number 11159570
Status In Force
Filing Date 2018-12-26
First Publication Date 2020-07-02
Grant Date 2021-10-26
Owner Twistlock, Ltd. (Israel)
Inventor
  • Levin, Liron
  • Kletselman, Michael
  • Stopel, Dima
  • Morello, John
  • Abramowsky, Itay
  • Bizamcher, Ami

Abstract

A system and method for cloud native discovery and protection. The method includes identifying a plurality of cloud assets in a cloud native environment based on cloud credentials for each of the plurality of cloud assets; determining at least one cloud asset instance that lacks active security protection based on a configuration of at least one of: each of the at least one cloud asset, and at least one security solution deployed in the cloud native environment, wherein each cloud asset instance is an instance of one of the plurality of cloud assets; and reconfiguring at least a portion of the cloud native environment with respect to the at least one cloud asset instance that lacks active security protection.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 12/24 - Arrangements for maintenance or administration

28.

Techniques for protecting cloud native environments based on cloud resource access

      
Application Number 16232567
Grant Number 11290460
Status In Force
Filing Date 2018-12-26
First Publication Date 2020-07-02
Grant Date 2022-03-29
Owner Twistlock, Ltd. (Israel)
Inventor
  • Levin, Liron
  • Kletselman, Michael
  • Stopel, Dima
  • Morello, John

Abstract

A system and method for method for protecting cloud native environments based on cloud resource access. The method includes determining a mapping of a plurality of cloud assets to a plurality of cloud resources based on resource access data for a cloud native environment, wherein the plurality of cloud assets and the plurality of cloud resources are deployed in the cloud native environment, wherein each of the plurality of cloud assets is mapped to at least one associated cloud resource of the plurality of cloud resources; detecting at least one improper resource access based on the mapping and a cloud access security stream for the cloud native environment, wherein each of the at least one improper resource access deviates from the mapping; and performing at least one mitigation action with respect to the detected at least one improper resource access.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/60 - Protecting data
  • H04L 41/0654 - Management of faults, events, alarms or notifications using network fault recovery
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

29.

Filesystem action profiling of containers and security enforcement

      
Application Number 16796288
Grant Number 11068585
Status In Force
Filing Date 2020-02-20
First Publication Date 2020-06-18
Grant Date 2021-07-20
Owner TWISTLOCK, Ltd. (Israel)
Inventor
  • Levin, Liron
  • Stopel, Dima
  • Yanay, Eran

Abstract

A system and method for securing execution of software containers using security profiles. The method includes exporting a container image to a host device from a container image source, wherein the container image includes resources utilized to execute a corresponding application container; generating a security profile for the container image, wherein the generated security profile indicates at least a list of permissible filesystem actions, wherein each permissible filesystem action is an action performed with respect to at least one filesystem resource; monitoring an operation of a runtime execution of the application container; and detecting a violation of the security profile based on the monitored operation.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/52 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/54 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by adding security routines or objects to programs
  • G06N 20/00 - Machine learning

30.

Cloud native virtual machine runtime protection

      
Application Number 16108824
Grant Number 11366680
Status In Force
Filing Date 2018-08-22
First Publication Date 2020-01-23
Grant Date 2022-06-21
Owner Twistlock, Ltd. (Israel)
Inventor
  • Levin, Liron
  • Morello, John
  • Stopel, Dima
  • Velbaum, Michael
  • Abramowsky, Itay
  • Schnitzer, Isaac

Abstract

A system and method for cloud native virtual machine (VM) runtime protection. The method includes creating a normal behavior model for a cloud native VM by training a machine learning model using a training data set including a plurality of training activities performed by the cloud native VM, the cloud native VM being configured to provide at least one service, wherein the normal behavior model defines at least one capability of each of the at least one service, wherein each capability of a service indicates a plurality of discrete behaviors required by the service; and monitoring an execution of the cloud native VM to detect a deviation from the normal behavior model, wherein the deviation is caused by at least one abnormal behavior of one of the at least one service that is not among the discrete behaviors defined in the at least one capability for the service.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 16/23 - Updating
  • G06N 20/00 - Machine learning
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06K 9/62 - Methods or arrangements for recognition using electronic means
  • G06F 9/445 - Program loading or initiating
  • G06F 21/51 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
  • G06F 21/54 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by adding security routines or objects to programs

31.

System and method for distributed security forensics

      
Application Number 16144320
Grant Number 10740135
Status In Force
Filing Date 2018-09-27
First Publication Date 2020-01-23
Grant Date 2020-08-11
Owner Twistlock, Ltd (Israel)
Inventor
  • Levin, Liron
  • Stopel, Dima
  • Bizamcher, Ami
  • Kletselman, Michael
  • Morello, John

Abstract

A host device and method for efficient distributed security forensics. The method includes creating, at a first host device configured to run a first virtualization entity, a first event index for the first virtualization entity; encoding at least one event related to the first virtualization entity; updating the first event index based on the encoded at least one event; and sending the first event index to a master console, wherein the master console is configured to receive a plurality of event indices created by a plurality of host devices with respect to a plurality of virtualization entities.

IPC Classes  ?

  • G06F 9/46 - Multiprogramming arrangements
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 16/23 - Updating
  • G06N 20/00 - Machine learning
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06K 9/62 - Methods or arrangements for recognition using electronic means
  • G06F 9/445 - Program loading or initiating
  • G06F 21/51 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
  • G06F 21/54 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by adding security routines or objects to programs

32.

Techniques for serverless runtime application self-protection

      
Application Number 16144347
Grant Number 11036534
Status In Force
Filing Date 2018-09-27
First Publication Date 2020-01-23
Grant Date 2021-06-15
Owner TWISTLOCK, Ltd. (Israel)
Inventor
  • Levin, Liron
  • Stopel, Dima
  • Velbaum, Michael
  • Adler, Alon
  • Kletselman, Michael
  • Morello, John

Abstract

A system and method for serverless runtime application self-protection. The method includes embedding a serverless defender function into a function serverless bundle containing an application deployment bundle of a serverless application, wherein the embedding further comprises modifying the function serverless bundle to include a serverless defender shared library and a security policy, wherein the serverless defender shared library is configured to install at least one hook into at least one system call of the serverless application when the serverless application is executed, wherein each hook only allows running of system calls and library functions that satisfy the security policy during execution of the serverless application, wherein the serverless defender function is loaded at a system when the serverless application is initiated by the system, wherein the serverless defender function is configured to perform at least one mitigation action when the security policy is violated during execution of the serverless application.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 16/23 - Updating
  • G06N 20/00 - Machine learning
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06K 9/62 - Methods or arrangements for recognition using electronic means
  • G06F 9/445 - Program loading or initiating
  • G06F 21/51 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
  • G06F 21/54 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by adding security routines or objects to programs

33.

Techniques for maintaining image integrity in containerized applications

      
Application Number 16026557
Grant Number 10796023
Status In Force
Filing Date 2018-07-03
First Publication Date 2020-01-09
Grant Date 2020-10-06
Owner Twistlock, Ltd (Israel)
Inventor
  • Levin, Liron
  • Morello, John
  • Stopel, Dima

Abstract

A system and method for maintaining image integrity in a containerized environment. Image layers of a software container are scanned for metadata. The metadata is indexed and contextual metadata is added. Execution of the containerized environment is monitored to detect new image layers being executed. Integrity of images in the environment is maintained based on integrity rules and the metadata of each image layer. The integrity rules ensure image integrity by ensuring that pulled images are composed from trusted images, image layers are pushed by trusted users, image layers do not include potential vulnerabilities, and image layers do not override specific file paths. Trusted image layers may be automatically detected using a machine learning model trained based on historical image layer metadata.

IPC Classes  ?

  • G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
  • G06T 7/00 - Image analysis
  • G06T 11/60 - Editing figures and text; Combining figures or text
  • G06F 16/51 - Indexing; Data structures therefor; Storage structures

34.

Protecting serverless applications

      
Application Number 16161110
Grant Number 11962606
Status In Force
Filing Date 2018-10-16
First Publication Date 2019-10-10
Grant Date 2024-04-16
Owner Twistlock Ltd. (Israel)
Inventor
  • Shulman, Avraham
  • Segal, Ory
  • Zin, Shaked Yosef

Abstract

A system and methods for protecting a serverless application, the system including: (a) a serverless application firewall configured to inspect input of the serverless function so as to ascertain whether the input contains malicious, suspicious or abnormal data; and (b) a behavioral protection engine configured to monitor behaviors and actions of the serverless functions during execution thereof.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/40 - Network security protocols

35.

Detection of botnets in containerized environments

      
Application Number 16214749
Grant Number 11102220
Status In Force
Filing Date 2018-12-10
First Publication Date 2019-06-20
Grant Date 2021-08-24
Owner Twistlock, Ltd. (Israel)
Inventor
  • Levin, Liron
  • Stopel, Dima
  • Morello, John

Abstract

A method and system for runtime detection of botnets in containerized environments. The method includes creating a domain name system (DNS) policy for a software container, wherein the DNS policy defines at least a plurality of allowed domain names for the software container, wherein the DNS policy is created based on historical DNS queries by the software container; detecting a botnet based on traffic to and from the software container, wherein the botnet is detected when at least a portion of the traffic does not comply with the DNS policy, wherein the botnet is implemented via communication with a bot executed in the software container; and blocking at least one DNS query in the at least a portion of traffic, wherein each blocked DNS query is to a domain having a domain name that does not match any of the plurality of allowed domain names for the software container.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/54 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by adding security routines or objects to programs
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04L 29/12 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups characterised by the data terminal

36.

Static detection of vulnerabilities in base images of software containers

      
Application Number 16222180
Grant Number 10719612
Status In Force
Filing Date 2018-12-17
First Publication Date 2019-04-25
Grant Date 2020-07-21
Owner Twistlock, Ltd. (Israel)
Inventor
  • Stopel, Dima
  • Bernstein, Ben

Abstract

A system and method for detecting vulnerabilities in be images of software containers are disclosed. The method includes receiving an event indicating that at least one base image should be scanned for vulnerabilities, each base image including at least one image layer, wherein the event designates at least one source of the at least one base image, wherein the least one base image includes resources utilized to execute at least a software container; extracting contents of each image layer of each base image; scanning the extracting contents to detect at least one vulnerability; and generating a detection event, when the at least one vulnerability is detected.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

37.

Techniques for protecting applications from unsecure network exposure

      
Application Number 16162897
Grant Number 11184382
Status In Force
Filing Date 2018-10-17
First Publication Date 2019-04-18
Grant Date 2021-11-23
Owner Twistlock, LTD. (Israel)
Inventor
  • Stopel, Dima
  • Levin, Liron
  • Shapira, Daniel
  • Ben Nun, Nitsan
  • Morello, John

Abstract

A method and system for protecting an application from unsecure network exposure. The method includes identifying at least one port through which the application is accessible when the application is not configured correctly, wherein the application is executed at a host device connected to at least one network, the host device having the at least one port; sending, to an external resource, connection data for connecting to the application via the at least one port, wherein the external resource is configured to attempt to connect to the application based on the connection data and to return results of the connection attempt; determining, based on the results of the connection attempt, whether an exposure vulnerability exists; and performing at least one mitigation action when an exposure vulnerability exists.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 9/54 - Interprogram communication
  • H04L 12/24 - Arrangements for maintenance or administration
  • H04L 12/26 - Monitoring arrangements; Testing arrangements

38.

System and method for defending applications invoking anonymous functions

      
Application Number 16134158
Grant Number 10943007
Status In Force
Filing Date 2018-09-18
First Publication Date 2019-03-21
Grant Date 2021-03-09
Owner Twistlock, Ltd (Israel)
Inventor
  • Levin, Liron
  • Stopel, Dima
  • Morello, John

Abstract

A system and method for defending an application configured to invoke anonymous functions. The method includes analyzing the application to determine at least one branch of the application, wherein each branch is an instruction that deviates from a default behavior of the application; identifying, based on the at least one branch of the application and at least one first anonymous function, at least one potential threat branch, each potential threat branch including a call to one of the at least one first anonymous function; and rewiring at least one first function call of the application to create a secured instance of the application, wherein each of the at least one first function call is to one of the at least one first anonymous function prior to rewiring.

IPC Classes  ?

  • G06F 21/54 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by adding security routines or objects to programs
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06N 20/00 - Machine learning
  • G06F 8/00 - Arrangements for software engineering
  • G06F 9/445 - Program loading or initiating

39.

Traffic enforcement in containerized environments

      
Application Number 16166781
Grant Number 10693899
Status In Force
Filing Date 2018-10-22
First Publication Date 2019-02-21
Grant Date 2020-06-23
Owner TWISTLOCK, LTD. (Israel)
Inventor
  • Levin, Liron
  • Stopel, Dima
  • Morello, John
  • Yanay, Eran

Abstract

A system and method for traffic enforcement in containerized environments. The method includes analyzing contents of a container image to determine a type of application to be executed by a first container, wherein the first container is a runtime instance of the container image; determining, based on the type of application to be executed by the first container, a filtering profile for the first container, wherein the filtering profile defines a configuration for inspecting and filtering traffic directed to the first container; and filtering, based on the filtering profile, malicious traffic directed to the first container.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04L 12/24 - Arrangements for maintenance or administration
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • G06F 8/60 - Software deployment
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • G06F 9/54 - Interprogram communication

40.

METHODS FOR SECURING SERVERLESS FUNCTIONS

      
Application Number 16024863
Status Pending
Filing Date 2018-07-01
First Publication Date 2019-01-03
Owner TWISTLOCK LTD. (Israel)
Inventor
  • Shulman, Avraham
  • Segal, Ory
  • Zin, Shaked Yosef

Abstract

A system and methods for protecting a serverless function including analyzing the serverless function to identify vulnerabilities or insecure configurations and a strict set of security permissions required by the serverless function in order to interact with a computing environment as intended.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

41.

Dynamically adapted traffic inspection and filtering in containerized environments

      
Application Number 15991528
Grant Number 10567411
Status In Force
Filing Date 2018-05-29
First Publication Date 2018-09-27
Grant Date 2020-02-18
Owner TWISTLOCK, LTD. (Israel)
Inventor
  • Bernstein, Ben
  • Morello, John
  • Stopel, Dima
  • Levin, Liron
  • Yanay, Eran

Abstract

A system and method for dynamically adapting traffic inspection and filtering in containerized environments. The method includes monitoring the containerized environment to identify deployment of a software container in the containerized environment; inspecting traffic redirected from the software container, wherein the inspecting includes detecting malicious activity of the software container; and filtering the traffic based on at least one filtering rule when the malicious activity is detected, wherein the at least one filtering rule is defined in a filtering profile for the software container, wherein the filtering profile is determined for the software container when a new container image of the software container is detected in the containerized environment.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

42.

Runtime detection and mitigation of vulnerabilities in application software containers

      
Application Number 15975383
Grant Number 10922418
Status In Force
Filing Date 2018-05-09
First Publication Date 2018-09-13
Grant Date 2021-02-16
Owner Twistlock, Ltd. (Israel)
Inventor
  • Morello, John
  • Stopel, Dima
  • Levin, Liron

Abstract

A system and method for runtime detection of vulnerabilities in an application software container that is configured to execute an application. The method includes detecting the application stored in an image of the application software container; identifying, based on at least one predetermined potential location for the application, configuration data stored in the application software container for the application; determining, based on the identified configuration data, at least one intended behavior of the application when executed in the application software container; monitoring execution of the application software container, wherein the monitoring includes comparing the execution of the application software container to the at least one intended behavior; detecting an unauthorized action by the application software container when the execution of the application software container is anomalous as compared to the at least one intended behavior; and generating a detection event when the unauthorized action by the software container is detected.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 9/445 - Program loading or initiating

43.

Networking-based profiling of containers and security enforcement

      
Application Number 15858336
Grant Number 10599833
Status In Force
Filing Date 2017-12-29
First Publication Date 2018-05-24
Grant Date 2020-03-24
Owner TWISTLOCK, LTD. (Israel)
Inventor
  • Levin, Liron
  • Stopel, Dima
  • Yanay, Eran

Abstract

A system and method for securing execution of software containers using security profiles. The method includes receiving an event indicating that a container image requires profiling, wherein the container image includes resources utilized to execute a corresponding application container; generating a security profile for the container image when the event is received, wherein the generated security profile indicates at least networking ports that are allowed for at least one of: access to the application container, and access by the application container; monitoring an operation of a runtime execution of the application container; and detecting a violation of the security profile based on the monitored operation.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/52 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

44.

Filesystem action profiling of containers and security enforcement

      
Application Number 15865763
Grant Number 10664590
Status In Force
Filing Date 2018-01-09
First Publication Date 2018-05-10
Grant Date 2020-05-26
Owner TWISTLOCK, LTD. (Israel)
Inventor
  • Levin, Liron
  • Stopel, Dima
  • Yanay, Eran

Abstract

A system and method for securing execution of software containers using security profiles. The method includes receiving an event indicating that a container image requires profiling, wherein the container image includes resources utilized to execute a corresponding application container; generating a security profile for the container image when the event is received, wherein the generated security profile indicates at least a list of permissible filesystem actions, wherein each permissible filesystem action is an action performed with respect to at least one filesystem resource; monitoring an operation of a runtime execution of the application container; and detecting a violation of the security profile based on the monitored operation.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/52 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/54 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by adding security routines or objects to programs
  • G06N 20/00 - Machine learning

45.

Detection of vulnerable root certificates in software containers

      
Application Number 15434757
Grant Number 10778446
Status In Force
Filing Date 2017-02-16
First Publication Date 2017-06-29
Grant Date 2020-09-15
Owner Twistlock, Ltd. (Israel)
Inventor
  • Stopel, Dima
  • Morello, John
  • Levin, Liron

Abstract

A method and system for detecting vulnerable root certificates in container images are provided. The method includes receiving an event to scan at least one container image hosted in a host device, wherein the least one container image includes resources utilized to execute, by the host device, at least a respective software application container; extracting contents of layers of the at least one container image; scanning the extracted contents to generate a first list designating all root certificates included in the at least one container image; generating a second list designating all root certificates trusted by the host device; comparing the first list to the second list to detect at least one root certificate designated in the first list but not in the second; and determining the at least one detected root certificate as vulnerable.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 21/33 - User authentication using certificates
  • G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 8/61 - Installation
  • G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
  • G06F 21/51 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
  • G06F 21/60 - Protecting data
  • G06F 16/11 - File system administration, e.g. details of archiving or snapshots
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

46.

Profiling of spawned processes in container images and enforcing security policies respective thereof

      
Application Number 15397245
Grant Number 10943014
Status In Force
Filing Date 2017-01-03
First Publication Date 2017-04-27
Grant Date 2021-03-09
Owner Twistlock, Ltd (Israel)
Inventor
  • Stopel, Dima
  • Levin, Liron

Abstract

A method for securing execution of software containers using security profiles. The method comprises receiving an event indicating that a container image requires profiling, wherein the container image includes resources utilized to execute a corresponding application container; generating a security profile for the container image, wherein the generated security profile includes at least a spawned processes profile, wherein the security profile is of the container image corresponding to the application container; monitoring the operation of a runtime execution of the application container; and detecting a violation of the spawned processes profile based on the monitored operation.

IPC Classes  ?

  • G06F 21/54 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by adding security routines or objects to programs
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine

47.

Profiling of container images and enforcing security policies respective thereof

      
Application Number 15397230
Grant Number 10586042
Status In Force
Filing Date 2017-01-03
First Publication Date 2017-04-27
Grant Date 2020-03-10
Owner TWISTLOCK, LTD. (Israel)
Inventor
  • Stopel, Dima
  • Levin, Liron
  • Yankovich, Lior

Abstract

A method for securing execution of software containers using security profiles. The method comprises receiving an event indicating that a container image requires profiling, wherein the container image includes resources utilized to execute a corresponding application container; generating a security profile for the container image, wherein the generated security profile includes at least a system calls profile; monitoring the operation of a runtime execution of the application container; and detecting a violation of the security profile based on the monitored operation, wherein the security profile is of the container image corresponding to the application container.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/52 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine

48.

Static detection of vulnerabilities in base images of software containers

      
Application Number 15292915
Grant Number 10223534
Status In Force
Filing Date 2016-10-13
First Publication Date 2017-04-20
Grant Date 2019-03-05
Owner Twistlock, Ltd. (Israel)
Inventor
  • Stopel, Dima
  • Bernstein, Ben

Abstract

A system and method for detecting vulnerabilities in base images of software containers are disclosed. The method includes receiving an event indicating that at least one base image should be scanned for vulnerabilities, each base image including at least one image layer, wherein the event designates at least one source of the at least one base image, wherein the least one base image includes resources utilized to execute at least a software container; extracting contents of each image layer of each base image; scanning the extracting contents to detect at least one vulnerability; and generating a detection event, when the at least one vulnerability is detected.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

49.

Runtime detection of vulnerabilities in software containers

      
Application Number 15278681
Grant Number 10706145
Status In Force
Filing Date 2016-09-28
First Publication Date 2017-04-06
Grant Date 2020-07-07
Owner TWISTLOCK, LTD. (Israel)
Inventor
  • Stopel, Dima
  • Bernstein, Ben

Abstract

A system and method for detecting vulnerabilities in software containers at runtime are provided. This method includes intercepting a request to instantiate a new software container in a first execution environment; creating a second execution environment; migrating the new software container from the first execution environment to the second execution environment for execution therein; monitoring the operation of the new software container in the second execution environment to detect at least one unauthorized action; and upon detection of the at least one unauthorized action, generating a detection event identifying at least a type of vulnerability associated with the detected unauthorized action.

IPC Classes  ?

  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/51 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
  • G06F 21/52 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure

50.

Runtime detection of vulnerabilities in an application layer of software containers

      
Application Number 15278700
Grant Number 10915628
Status In Force
Filing Date 2016-09-28
First Publication Date 2017-04-06
Grant Date 2021-02-09
Owner Twistlock, Ltd. (Israel)
Inventor
  • Stopel, Dima
  • Bernstein, Ben

Abstract

A system and method for detecting vulnerabilities in software containers at runtime are provided. The method includes monitoring events triggered as a result of changes to an application layer of a software container; based on the monitored events, determining if at least one file has been changed; upon determination that at least one file has been changed, scanning the at least one file to detect at least one type of vulnerability; and upon determination of at least one type of known vulnerability, generating a detection event.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/51 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
  • G06F 21/52 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure