-
公开(公告)号:US11683333B1
公开(公告)日:2023-06-20
申请号:US17111988
申请日:2020-12-04
Applicant: Architecture Technology Corporation
Inventor: Christopher Dominessy , Scott Aloisio , Robert A. Joyce
IPC: H04L9/40 , H04L43/045 , H04L43/06
CPC classification number: H04L63/1433 , H04L43/045 , H04L43/06 , H04L63/1441
Abstract: An example network security and threat assessment system is configured to determine, based on one or more events that have occurred during execution of one or more applications, a potential security vulnerability of a target computing system, where the one or more events correspond to a node represented in the hierarchical risk model. The system is further configured to identify, based on a mapping of the node represented in the hierarchical risk model to a node represented in a hierarchical game tree model, one or more actions that are associated with the potential security vulnerability and that correspond to the node represented in the hierarchical game tree model, and to output, for display in a graphical user interface, a graphical representation of the potential security vulnerability and the one or more actions associated with the potential security vulnerability.
-
公开(公告)号:US20230142161A1
公开(公告)日:2023-05-11
申请号:US17930634
申请日:2022-09-08
Applicant: Architecture Technology Corporation
Inventor: Paul Nicotera , Scott Aloisio , Yuliy Tsank
CPC classification number: G06N3/0427 , H04L67/12
Abstract: A sensor platform includes a memory, a sensor interface communicatively coupled to the memory and one or more processors communicatively coupled to the memory. The memory stores instructions for generating event detection models used to detect events in captured sensor data. The sensor interface is configured to capture data received from sensors connected to the sensor interface and to store the captured sensor data in the memory. The one or more processors are configured to generate an event detection model from the instructions, the event detection model trained to detect an event from within the captured sensor data, to transmit notice of the detected event to a remote observer and to transmit the captured sensor data associated with the detected event in response to a request from the remote observer for sensor data corresponding to the detected event.
-
公开(公告)号:US11503064B1
公开(公告)日:2022-11-15
申请号:US16995458
申请日:2020-08-17
Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
Inventor: Scott Aloisio , Robert Joyce , Judson Powers
Abstract: Disclosed herein are embodiments of systems, methods, and products comprise an analytic server, which provides a SilverlineRT system that prioritizes and analyzes security alerts and events. The server builds an attack tree based on attack detection rules. The server monitors large-scale distributed systems and receives alerts from various devices. The server determines attacks using the attack tree while excluding false alarms. The server determines impact and risk metrics for attacks in real-time, and calculates an impact score for each attack. The server ranks and prioritizes the attacks based on the impact scores. The server also generates real-time reports. By consider the mission and system specific context in the analysis alert information, the server gives insight into the overall context of problems and potential solutions, improving decision-making. By showing the impacts of alters, the server allows security personnel to prioritize responses and focus on highest value defense activities.
-
公开(公告)号:US11461477B1
公开(公告)日:2022-10-04
申请号:US16838595
申请日:2020-04-02
Applicant: Architecture Technology Corporation
Inventor: Judson Powers , Robert A. Joyce , Scott Aloisio , Matthew A. Stillerman
Abstract: An example method includes initializing, by an obfuscation computing system, communications with nodes in a distributed computing platform, the nodes including one or more compute nodes and a controller node, and performing at least one of: (a) code-level obfuscation for the distributed computing platform to obfuscate interactions between an external user computing system and the nodes, wherein performing the code-level obfuscation comprises obfuscating data associated with one or more commands provided by the user computing system and sending one or more obfuscated commands to at least one of the nodes in the distributed computing platform; or (b) system-level obfuscation for the distributed computing platform, wherein performing the system-level obfuscation comprises at least one of obfuscating system management tasks that are performed to manage the nodes or obfuscating network traffic data that is exchanged between the nodes.
-
公开(公告)号:US12019756B1
公开(公告)日:2024-06-25
申请号:US17870575
申请日:2022-07-21
Applicant: Architecture Technology Corporation
Inventor: Matthew Donovan , Scott Aloisio , Judson Powers
CPC classification number: G06F21/577 , G06F8/53 , G06F9/54 , G06N20/00
Abstract: Embodiments disclosed herein describe systems and methods for assessing vulnerabilities of embedded non-IP devices. In an illustrative embodiment, a system of assessing the vulnerabilities of embedded non-IP devices may be within a portable device. The portable device may include a plurality of wired connectors for various wired communication/data transfer protocols. The portable device may include tools for analyzing the firmware binaries of the embedded non-IP devices, such as disassemblers and modules for concrete and symbolic (concolic) execution. Based upon the disassembly and the concolic execution, the portable device may identify vulnerabilities such as buffer overflows and programming flaws in the firmware binaries.
-
公开(公告)号:US11508253B1
公开(公告)日:2022-11-22
申请号:US16789262
申请日:2020-02-12
Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
Inventor: Scott Aloisio , Joseph Sirianni , Kenneth McVearry , Robert A. Joyce
IPC: G06F3/0481 , G06F3/0484 , G06F3/13 , G09B9/00 , G09B19/00 , G06F3/01 , G06F3/04815 , G09B5/00
Abstract: Disclosed herein are embodiments for managing a virtual reality (VR) training exercise via a management server. The management server outputs a graphical dashboard including one or more skill nodes, and selects one or more software agents associated with the skill nodes. The management server provides the software agents to at least one host computing system communicatively coupled to a near-to-eye display device. The near-to-eye display device is configured to display a virtual three dimensional (3D) training environment including a plurality of interactive 3D virtual objects. The software agents are configured to collect VR observables data while the trainee performs actions within the virtual 3D training environment. Based on the VR observables data collected, the management server determines that one or more skills have been demonstrated during the training exercise, and updates the one or more skill nodes to graphically indicate the one or more skills demonstrated by the trainee.
-
公开(公告)号:US11128654B1
公开(公告)日:2021-09-21
申请号:US16267304
申请日:2019-02-04
Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
Inventor: Robert Joyce , Scott Aloisio
IPC: H04L9/00 , H04L29/06 , G06F16/835 , G06F16/955
Abstract: Disclosed herein are embodiments of systems, methods, and products comprise an analytic server, which improves the cybersecurity of a unified system comprising a plurality of sub-systems. The analytic server may instantiate a sub attack tree for each network sub-system within the unified system of distributed network infrastructure. The analytic server may access the sub attack trees of the network sub-systems based on the corresponding identifiers. The analytic server may build a high-level attack tree of the unified system by aggregating the sub attack tree of each sub-system. The analytic server may determine how the interconnection of the plurality of network sub-systems may affect the unified system security. The analytic server may update one or more nodes of the attack tree to reflect the changes produced from the interconnection. The analytic server may build the attack tree based on a set of aggregation rules.
-
公开(公告)号:US10540502B1
公开(公告)日:2020-01-21
申请号:US15622434
申请日:2017-06-14
Applicant: Architecture Technology Corporation
Inventor: Robert A. Joyce , Scott Aloisio , Judson Powers , Christopher Dominessy
Abstract: A risk model for a distributed computing system comprises a plurality of tree nodes organized as a tree. For each tree node of the risk model, the tree node corresponds to a respective event that may befall a distributed computing system. An analysis computing system generates data associating a test agent with a target and also generates data associating the test agent with a tree node in the risk model. The test agent performs a data gathering routine that gathers data from the target associated with the test agent. The gathered data may indicate whether the event corresponding to the tree node is occurring. Furthermore, the analysis computing system may perform the data gathering routine according to a recurrence pattern of the data gathering routine. The analysis computing system may output a graphical representation of the data indicating whether the event corresponding to the tree node is occurring.
-
公开(公告)号:US11887505B1
公开(公告)日:2024-01-30
申请号:US16393276
申请日:2019-04-24
Applicant: Architecture Technology Corporation
Inventor: Scott Aloisio , Robert A. Joyce
CPC classification number: G09B5/12 , G02B27/017 , G06T19/003 , G06T19/006
Abstract: Techniques are described for implementing a system that deploys and monitors training simulations and exercises across a network, and that enables the development and execution of virtual training. An example system outputs, for display in a web browser of a trainee computing system, a graphical user interface that includes one or more training exercises, and initiates execution of software agent(s) associated with skill(s) to be demonstrated by a trainee. The example system outputs, at the trainee computing system, content corresponding to scene(s) of an at least partially virtual environment for a training exercise, where the content is rendered for display at least in the web browser of the trainee computing system. After receiving interaction data collected by the software agent(s) during the training exercise, the example system determines, based on the interaction data, that the skill(s) associated with the training exercise have been demonstrated.
-
10.
公开(公告)号:US11868519B2
公开(公告)日:2024-01-09
申请号:US17965654
申请日:2022-10-13
Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
Inventor: Scott Aloisio , Dahyun Hollister , Robert A. Joyce
CPC classification number: G06F3/012 , G02B27/017 , G06F3/017 , G06F11/3003 , G06N20/00 , G06T19/006
Abstract: Disclosed herein are embodiments for managing a task including one or more skills. A server stores a virtual environment, software agents configured to collect data generated when a user interacts with the virtual environment to perform the task, and a predictive machine learning model. The server generates virtual entities during the performance of the task, and executes the predictive machine learning model to configure the virtual entities based upon data generated when the user interacts with the virtual environment. The server generates the virtual environment and the virtual entities configured for interaction with the user during display by the client device, and receives the data collected by the software agents. The system displays a user interface at the client device to indicate a measurement of each of the skills during performance of the task. The server trains the predictive machine learning model using this measurement of skills during task performance.
-
-
-
-
-
-
-
-
-