-
公开(公告)号:US11451577B2
公开(公告)日:2022-09-20
申请号:US16996148
申请日:2020-08-18
Applicant: Architecture Technology Corporation
Inventor: Judson Powers , Matthew Donovan
Abstract: A method for improving efficiency of a training program begins with a processor monitoring and adapting execution of a training exercise of the training program. The processor determines a training program effectiveness measure including determining trainee skill improvement demonstrated during the training exercise, and monitoring and determining correctness and timeliness of trainee actions during the training exercise. The processor then determines a training program cost measure by determining a first monetary cost for the execution of the at least one training exercise, determining a second monetary cost associated with trainee manhours for the training exercise, and generating the training program cost measure based on the first and second monetary costs. The processor then computes a ratio of the training program effectiveness measure to the training program cost measure.
-
公开(公告)号:US10817604B1
公开(公告)日:2020-10-27
申请号:US16012695
申请日:2018-06-19
Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
Inventor: Colleen Kimball , Robert Joyce , Judson Powers , Matthew Donovan
Abstract: Disclosed herein are embodiments of systems, methods, and products that execute tools to identify non-malicious faults in source codes introduced by engineers and programmers. The tools may execute a machine learning model on the source codes to perform sentiment analysis and pattern analysis on information associated with the source codes to generate annotated source code files identifying anomalies based on the sentiment analysis and the pattern analysis. One or more threat levels are then identified and ranked based on the one or more anomalies and a ranked list of the one or more threat levels is displayed on a graphical user interface of a computer.
-
公开(公告)号:US10600335B1
公开(公告)日:2020-03-24
申请号:US15707720
申请日:2017-09-18
Applicant: Architecture Technology Corporation
Inventor: Matthew Donovan , Colleen Kimball
Abstract: A computer-implemented adaptive group training method a computer accessing a virtual system and initiating a group training exercise for training a trainee group comprising one or more trainees, the group training exercise including one or more challenges to the virtual system, each of the one or more challenges including a pre-defined sequence of one or more injectable events; the computer controlling subsequent execution of the group training exercise comprising injecting the injectable events; and the computer evaluating performance of the trainee group during the subsequent execution of the group training exercise, including analyzing actions taken by the trainee group in response to each of the injections, and attributing one or more of the actions taken to a trainee.
-
公开(公告)号:US12019756B1
公开(公告)日:2024-06-25
申请号:US17870575
申请日:2022-07-21
Applicant: Architecture Technology Corporation
Inventor: Matthew Donovan , Scott Aloisio , Judson Powers
CPC classification number: G06F21/577 , G06F8/53 , G06F9/54 , G06N20/00
Abstract: Embodiments disclosed herein describe systems and methods for assessing vulnerabilities of embedded non-IP devices. In an illustrative embodiment, a system of assessing the vulnerabilities of embedded non-IP devices may be within a portable device. The portable device may include a plurality of wired connectors for various wired communication/data transfer protocols. The portable device may include tools for analyzing the firmware binaries of the embedded non-IP devices, such as disassemblers and modules for concrete and symbolic (concolic) execution. Based upon the disassembly and the concolic execution, the portable device may identify vulnerabilities such as buffer overflows and programming flaws in the firmware binaries.
-
公开(公告)号:US20220238037A1
公开(公告)日:2022-07-28
申请号:US17710631
申请日:2022-03-31
Applicant: Architecture Technology Corporation
Inventor: Matthew Donovan , Colleen Kimball
Abstract: A computer-implemented adaptive group training method a computer accessing a virtual system and initiating a group training exercise for training a trainee group comprising one or more trainees, the group training exercise including one or more challenges to the virtual system, each of the one or more challenges including a pre-defined sequence of one or more injectable events; the computer controlling subsequent execution of the group training exercise comprising injecting the injectable events; and the computer evaluating performance of the trainee group during the subsequent execution of the group training exercise, including analyzing actions taken by the trainee group in response to each of the injections, and attributing one or more of the actions taken to a trainee.
-
公开(公告)号:US20200233938A1
公开(公告)日:2020-07-23
申请号:US16839728
申请日:2020-04-03
Applicant: Architecture Technology Corporation
Inventor: Joseph Sirianni , Matthew Donovan
Abstract: A method for detecting, identifying, and mitigating advanced persistent threats in a computer network having one or more computers includes a processor in the computer network: receiving a request to access a resource in the computer network; identifying the request as originating from an application executing on the computer network; executing an anomaly operation to determine a behavior of the application is one of anomalous and not anomalous; executing a privilege operation to determine the request is one of permanently allowed and not-permanently allowed; granting access to the resource for both a non-anomalous-behaving application and a permanently allowed request; and generating and displaying, on a graphical user interface of the computer network, and prompt for either an anomalous-behaving application or a not-permanently allowed request.
-
-
-
-
-