Ann Arbor, MI, United States of America

Mark Gallagher

USPTO Granted Patents = 2 

Average Co-Inventor Count = 4.0

ph-index = 1

Forward Citations = 2(Granted Patents)


Company Filing History:


Years Active: 2022-2023

Loading Chart...
2 patents (USPTO):Explore Patents

Title: Mark Gallagher: Innovator in Computer Security

Introduction

Mark Gallagher is a prominent inventor based in Ann Arbor, MI (US). He has made significant contributions to the field of computer security, particularly through his innovative patents. With a total of 2 patents, Gallagher's work focuses on enhancing the protection of computer systems against vulnerability attacks.

Latest Patents

Gallagher's latest patents include a groundbreaking computer system with moving target defenses against vulnerability attacks. This system features an ensemble moving target defense architecture that protects against attacks by utilizing one or more composable protection layers that change with each churn cycle. This dynamic approach requires an attacker to acquire critical information needed for an attack, such as code and pointers, and successfully deploy the attack before the layers change state. Each layer is designed to deploy a respective attack information asset protection, providing multiple protections that differ each churn cycle.

Career Highlights

Mark Gallagher is affiliated with the University of Michigan, where he continues to push the boundaries of innovation in computer security. His work has garnered attention for its potential to significantly enhance the resilience of computer systems against various forms of cyber threats.

Collaborations

Some of Gallagher's notable coworkers include Todd Austin and Valeria Bertacco, who share a commitment to advancing research in computer security.

Conclusion

Mark Gallagher's contributions to the field of computer security through his innovative patents demonstrate his dedication to protecting computer systems from vulnerabilities. His work at the University of Michigan continues to influence the landscape of cybersecurity.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…