The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
May. 20, 2025

Filed:

Apr. 08, 2021
Applicant:

Iowa State University Research Foundation, Inc., Ames, IA (US);

Inventors:

Alaa Al Ghazo, Port Jefferson, NY (US);

Ratnesh Kumar, Ames, IA (US);

Attorney:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
H04L 9/40 (2022.01); G06N 7/01 (2023.01); H04L 41/14 (2022.01); H04L 69/22 (2022.01);
U.S. Cl.
CPC ...
H04L 63/1433 (2013.01); G06N 7/01 (2023.01); H04L 41/14 (2013.01); H04L 63/1425 (2013.01); H04L 63/1441 (2013.01); H04L 69/22 (2013.01);
Abstract

A hybrid approach involving the mix of communication patterns and passive fingerprinting is used to identify unknown device types, manufacturers, and models of devices of digital control systems. ANDVI implementation maps the identified devices to their known vulnerabilities. According to one example, to identify how interdependence among existing atomic vulnerabilities may be exploited by an adversary to stitch together an attack that can compromise the system, model-checking based A2G2V is employed. According to another example, an A2G2V algorithm uses existing model-checking tools, an architecture description tool, and code to generate an attack-graph that enumerates the set of all possible sequences in which atomic-level vulnerabilities can be exploited to compromise system security. In yet another example, identification of label-cuts within an attack-graph automatically identifies a set of critical-attacks that, when blocked, renders the system secure. A linear complexity approximation utilizing SCCs helps identify the minimum label-cut representing a critical-attacks set.


Find Patent Forward Citations

Loading…