The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Apr. 30, 2024

Filed:

Feb. 25, 2020
Applicant:

The Trustees of Princeton University, Princeton, NJ (US);

Inventors:

Tanujay Saha, Princeton, NJ (US);

Najwa Aaraj, Paris, FR;

Niraj K. Jha, Princeton, NJ (US);

Assignee:
Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04L 29/06 (2006.01); G06F 18/214 (2023.01); G06F 18/2411 (2023.01); G06N 7/01 (2023.01); G06N 20/00 (2019.01); H04L 9/40 (2022.01);
U.S. Cl.
CPC ...
H04L 63/1416 (2013.01); G06F 18/214 (2023.01); G06F 18/2411 (2023.01); G06N 7/01 (2023.01); G06N 20/00 (2019.01); H04L 63/1425 (2013.01); H04L 63/1458 (2013.01);
Abstract

According to various embodiments, a method for detecting security vulnerabilities in at least one of cyber-physical systems (CPSs) and Internet of Things (IoT) devices is disclosed. The method includes constructing an attack directed acyclic graph (DAG) from a plurality of regular expressions, where each regular expression corresponds to control-data flow for a known CPS/IoT attack. The method further includes performing a linear search on the attack DAG to determine unexploited CPS/IoT attack vectors, where a path in the attack DAG that does not represent a known CPS/IoT attack vector represents an unexploited CPS/IoT attack vector. The method also includes applying a trained machine learning module to the attack DAG to predict new CPS/IoT vulnerability exploits. The method further includes constructing a defense DAG configured to protect against the known CPS/IoT attacks, the unexploited CPS/IoT attacks, and the new CPS/IoT vulnerability exploits.


Find Patent Forward Citations

Loading…