-
公开(公告)号:US10419483B1
公开(公告)日:2019-09-17
申请号:US14489267
申请日:2014-09-17
Applicant: Amazon Technologies, Inc.
Inventor: Nicholas Alexander Allen
Abstract: A system and method for generating remediated instructions that complies with one or more policies that specify constraints for computer executable instructions. The remediated instructions are generated based at least in part on an evaluation of a set of straight-line paths of the set of executable instructions and an execution flow for the set of straight-line paths.
-
公开(公告)号:USRE47593E1
公开(公告)日:2019-09-03
申请号:US15449814
申请日:2017-03-03
Applicant: Amazon Technologies, Inc.
Inventor: Nicholas Alexander Allen
Abstract: In certain embodiments, a computer-implemented method includes receiving a request for a reliability estimate associated with an ad hoc application. In response to the request, one or more components associated with the ad hoc application and upon which the ad hoc application relies are identified. The method also includes generating a directed graph. The directed graph identifies one or more dependency relationships among the identified components. The method also includes calculating, based at least in part on the directed graph, a reliability estimate for the ad hoc application.
-
公开(公告)号:US10291408B2
公开(公告)日:2019-05-14
申请号:US15389991
申请日:2016-12-23
Applicant: Amazon Technologies, Inc.
Inventor: Matthew John Campagna , Nicholas Alexander Allen , Gregory Alan Rubin
Abstract: A proof-of-work system where a first party (e.g., a client computer system) may request access to a computing resource. A second party (e.g., a service provider) may determine a challenge that may be provided to the first party. A valid solution to the challenge may be generated and provided for the request to be fulfilled. The challenge may include a message and a seed, such that the seed may be used at least in part to cryptographically derive information that may be used to generate a solution to the challenge. A hash tree may be generated as of generating the solution.
-
公开(公告)号:US10097581B1
公开(公告)日:2018-10-09
申请号:US14981737
申请日:2015-12-28
Applicant: Amazon Technologies, Inc.
Inventor: Nicholas Alexander Allen
CPC classification number: H04L63/1491 , G06F16/188 , G06F16/245 , G06F16/248 , G06F16/256 , G06F21/554 , G06F21/566 , H04L63/061 , H04L63/062 , H04L63/08
Abstract: The disclosure relates to provisioning honeypot computing services using a simulation state database to simulate a set of computing resources. One example includes a system that receives a mutating request associated with honeypot credentials, updates a simulation state database associated with the honeypot credentials at least based on the mutating request and generates a simulated mutating response based at least on the simulation state database that simulates a response to the mutating request. The system can also receive a query request associated with the honeypot credentials, query the simulation state database at least based on the query request, and generate a simulated query response based at least on the simulation state database that simulates a response to the query request.
-
公开(公告)号:US20180183774A1
公开(公告)日:2018-06-28
申请号:US15390214
申请日:2016-12-23
Applicant: Amazon Technologies, Inc.
Inventor: Matthew John Campagna , Gregory Alan Rubin , Nicholas Alexander Allen , Andrew Kyle Driggs , Eric Jason Brandwine
CPC classification number: H04L63/067 , H04L9/0819 , H04L9/0869 , H04L9/0891 , H04L9/3236 , H04L9/3247 , H04L63/0884
Abstract: A key distribution service operated by a signature authority distributes one-time-use cryptographic keys to one or more delegates that generate digital signatures on behalf of the signature authority. The key distribution service uses a root seed value to generate subordinate seeds. The subordinate seeds are used to generate a set of cryptographic keys. Hashes are generated for each key, and the hashes are arranged into a Merkle tree with a root hash controlled by the signature authority. In response to a request from a delegate, the signature authority provides a subordinate seed to the delegate. The delegate uses the subordinate seed to generate one or more cryptographic keys. The cryptographic keys are used to generate digital signatures which are verifiable up to the root hash of the Merkle tree. Additional subordinate seeds may be distributed to entities by the signature authority when appropriate.
-
公开(公告)号:US20180183771A1
公开(公告)日:2018-06-28
申请号:US15390205
申请日:2016-12-23
Applicant: Amazon Technologies, Inc.
Inventor: Matthew John Campagna , Gregory Alan Rubin , Nicholas Alexander Allen , Andrew Kyle Driggs , Eric Jason Brandwine
CPC classification number: H04L63/0442 , H04L9/3239 , H04L9/3247 , H04L9/3268 , H04L63/062 , H04L2209/38
Abstract: A signature authority generates revocable one-time-use keys that are able to generate digital signatures. The signature authority generates a set of one-time-use keys, where each one-time-use key has a secret key and a public key derived from a hash of the secret key. The signature authority generates one or more revocation values that, when published, proves that the signature authority has the authority to revoke corresponding cryptographic keys. The signature authority hashes the public keys and the revocation values and arranges the hashes in a hash tree where the root of the hash tree acts as a public key of the signature authority. In some implementations, the one-time-use cryptographic keys are generated from a tree of seed values, and a particular revocation value is linked to a particular seed value, allowing for the revocation of a block of one-time-use cryptographic keys associated with the particular seed.
-
公开(公告)号:US20180157828A1
公开(公告)日:2018-06-07
申请号:US15876020
申请日:2018-01-19
Applicant: Amazon Technologies, Inc.
Inventor: Nicholas Alexander Allen
Abstract: Techniques for restricting the execution of algorithms contained in applications executing on virtual machines executing within a computer system are described herein. A first sampled set of computer executable instructions is gathered from a virtual machine by a controlling domain and compared against a reference set of computer executable instructions. If the first set is similar to the reference set, and if the execution of the algorithm corresponding to the reference set is restricted by one or more computer system polices, one or more operations limiting the execution of the restricted algorithm are performed, thus ensuring conformance with the computer system policies.
-
公开(公告)号:US20170372065A1
公开(公告)日:2017-12-28
申请号:US15698399
申请日:2017-09-07
Applicant: Amazon Technologies, Inc.
Inventor: Nicholas Alexander Allen
Abstract: A method and apparatus for detecting kernel data structure tampering are disclosed. In the method and apparatus, a memory region of a computer system is scanned for one or more characteristics of a kernel data structure of an operating system kernel. It is then determined, based at least in part on identifying whether the one or more characteristics are found in the memory region, whether the kernel data structure is stored in the memory region of the computer system for tampering with the kernel data structure.
-
公开(公告)号:US09818078B1
公开(公告)日:2017-11-14
申请号:US13796240
申请日:2013-03-12
Applicant: Amazon Technologies, Inc.
Inventor: Nicholas Alexander Allen
CPC classification number: G06Q10/0633 , G06Q10/06316
Abstract: Event records, such as log files, generated by a non-workflow program may be collected and provided to an event processor. The event processor may cluster the event records into distinct event clusters. A network inferencer may then generate one or more candidate workflow networks based on the event clusters generated by the event processor. Scores may be generated for evaluating the candidate workflow networks based upon the ability of the candidate workflow networks to explain the event records and/or the ability of the event records to attest to the candidate workflow networks. A workflow inferencer may then map a candidate workflow network to a workflow description.
-
公开(公告)号:US20170272337A1
公开(公告)日:2017-09-21
申请号:US15472157
申请日:2017-03-28
Applicant: Amazon Technologies, Inc.
Inventor: Nicholas Alexander Allen
IPC: H04L12/26
CPC classification number: G06F8/65
Abstract: Remote computing resource service providers allow customers to execute virtual computer systems in a virtual environment on hardware provided by the computing resource service provider. The virtual computer systems may be suspended for an indeterminate amount of time and saved as images in one or more storage systems of the service provider. Periodically, updates for the virtual computer systems are required. In order to update virtual computer systems that are stored in a suspended state, an offline patch and indirection map is generated and used to update the virtual computer systems.
-
-
-
-
-
-
-
-
-