Mit Lincoln Laboratory
Technical Staff
Massachusetts Institute of Technology (Mit)
Technical Staff
Bear Stearns Jan 2007 - Jul 2007
Data Security Analyst
Intel Corporation Oct 2004 - Jan 2007
Security Architect
Lucent Bell Labs Sep 2000 - Jul 2004
Senior Network Security Engineer
Education:
Boston University 2012 - 2014
Odessa I.i.mechnikov National University 1976 - 1981
Master of Science, Masters, Applied Mathematics
Skills:
Security Network Security Computer Security Cryptography Software Development Distributed Systems Virtualization Information Security Security Architecture Design System Architecture Networking Network Architecture Software Engineering Linux System Deployment Operating Systems Architecture Perl Unix Algorithms Testing Snmp Network Administration Information Assurance Systems Engineering Wireless Networking Pki Software Design Java C++ Tcp/Ip Python Computer Science Shell Scripting Analysis Embedded Systems Intrusion Detection Penetration Testing Enterprise Software Solaris Architectures C/C++ Mac Os X
Michael Marcovici - Montville NJ, US Semyon B. Mizikovsky - Morganville NJ, US Sarvar M. Patel - Wheaton IL, US Uri Blumenthal - Fair Lawn NJ, US
Assignee:
Alcatel-Lucent USA Inc. - Murray Hill NJ
International Classification:
H04L 9/32 H04L 9/00
US Classification:
455411, 713171, 380 44
Abstract:
A method is provided for determining a private key for a first network based on at least one security value associated with a second network. The method further includes establishing a plurality of sessions between a mobile terminal and the first network based on the private key.
Secure Platform Voucher Service For Software Components Within An Execution Environment
Embodiments of apparatus, articles, methods, and systems for secure platform voucher service for software components within an execution environment are generally described herein. An embodiment includes the ability for a Virtual Machine Monitor, Operating System Monitor, or other underlying platform capability to restrict memory regions for access only by specifically authenticated, authorized and verified software components, even when part of an otherwise compromised operating system environment. A provisioning remote entity or gateway only needs to know a platform's public key or certificate hierarchy in order to receive verification proof for any component in the platform. The verification proof or voucher helps to assure to the remote entity that no man-in-the-middle, rootkit, spyware or other malware running in the platform or on the network will have access to the provisioned material. The underlying platform to lock and unlock secrets on behalf of the authenticated/authorized/verified software component provided in protected memory regions only accessible to the authenticated/authorized/verified software component. Other embodiments may be described and claimed.
Apparatus, system, and method having a first counter to record a number of invalid authentication requests, a first timer to set a first time period based on a value of the first counter, and an authentication module associated with the first counter and the first timer to receive an initial authentication request that includes a username and when said username is invalid, the module is to invalidate any subsequent authentication requests under the username during the first time period regardless of whether the subsequent requests includes a valid username. The system further includes a communication medium. The method includes receiving an authentication request with new information in a first session, validating the new information, and caching the validated new information in the first session.
Platform Posture And Policy Information Exchange Method And Apparatus
Uri Blumenthal - Fair Lawn NJ, US Hormuzd Khosravi - Portland OR, US Karanvir Grewal - Hillsboro OR, US
Assignee:
Intel Corporation - Santa Clara CA
International Classification:
H04L 29/06
US Classification:
726 1, 713164
Abstract:
Transport agnostic, secure communication protocol for transmitting host platform posture information to the Network Access Control Server or PDP (Policy Decision Point) and for receiving policy information to be enforced on the trusted host platform and respective applications for data processing and communication are described herein.
Network Vulnerability Assessment Of A Host Platform From An Isolated Partition In The Host Platform
Ravi Sahita - Beaverton OR, US Uday Savagaonkar - Beaverton OR, US Hormuzd Khosravi - Portland OR, US Uri Blumenthal - Fair Lawn NJ, US
Assignee:
Intel Corporation - Santa Clara CA
International Classification:
H04L 29/06
US Classification:
726 25
Abstract:
According to embodiments of the present invention, host platform device includes an embedded firmware agent that may detect an attempt by the host platform device to fully connect to a network. The firmware agent may restrict traffic between the host platform device and the network to bootstrap traffic, test the device to determine device vulnerability, may temporarily stop access to other peripheral devices, and transmit a report of the device vulnerability to a remote policy server. After the test(s) are performed, the firmware agent may receive an indication from the remote policy server as to whether the device is permitted to fully connect to the network and, if so, whether there are any further restrictions on traffic flow, for example, and if the peripheral device access may be allowed.
Provisioning Active Management Technology (Amt) In Computer Systems
Avigdor Eldar - Jerusalem, IL Howard C. Herbert - Phoenix AZ, US Purushottam Goel - Beaverton OR, US Uri Blumenthal - Fair Lawn NJ, US David Hines - Phoenix AZ, US Carey Smith - Hillsboro OR, US
Assignee:
Intel Corporation - Santa Clara CA
International Classification:
H04L 29/06
US Classification:
726 5, 713155, 713156, 713157, 713182, 713184
Abstract:
Active management technology (AMT) may be provisioned in a client device automatically, which may provide a secure connection between the provisioning server and the client device. The client device comprising the active management technology may support zero-touch provisioning and one-touch provisioning.
Secure Platform Voucher Service For Software Components Within An Execution Environment
Apparatuses, articles, methods, and systems for secure platform voucher service for software within an execution environment. An embodiment includes the ability for a Virtual Machine Monitor, Operating System Monitor, or other underlying platform capability to restrict memory regions for access only by authenticated, authorized and verified software components. A provisioning remote entity or gateway only needs to know a platform's public key or certificate hierarchy to receive verification for any component. The verification or voucher helps assure to the remote entity that no malware running in the platform or on the network will have access to provisioned material. The underlying platform to lock and unlock secrets on behalf of the authenticated/authorized/verified software component provided in protected memory regions only accessible to the software component.
Methods And Apparatus For Managing Dependencies In Distributed Systems
Alexander Keller - New York NY, US Uri Blumenthal - Fair Lawn NJ, US Rory Jackson - Eastchester NY, US Lorraine Jackson - Eastchester NY, US Gautam Kar - Yorktown Heights NY, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F007/00
US Classification:
707/100000
Abstract:
Techniques for managing information in a computing environment. Information associated with components of the computing environment is obtained. Then, from at least a portion of the obtained information, a determination is made as to the existence of one or more relationships associated with at least a portion of the components of the computing environment. The determination of the existence of one or more relationships is capable of accounting for a full lifecycle (e.g., including deployment, installation and runtime) associated with at least one component of the computing environment. Thus, techniques for managing runtime dependencies between the various components of computing systems are disclosed which provide a level of abstraction from individual systems and allow the computation of service/component (wherein the component may, for example, be an application, middleware, hardware, a device driver, an operating system and a system associated with the computing environment) dependencies that are related to end-to-end services, as perceived by a customer. By way of example, the inventive techniques may be applied to a distributed computing environment. The computing environment may also be an autonomic computing environment.
Youtube
Blumenthal Family - Daria "turtures" Uri - Ra...
- "" 1978 - 8 " , .
Duration:
3m 31s
Uri Buri Restaurant with Chef Uri Jeremias
We talk with Chef Uri Jeremias of Uri Buri Restaurant in Acre, Israel....
Duration:
7m 33s
Uri Avnery, a Dissident Israel Voice of Non-R...
Uri Avnery passed away on August 20th, a man who challenged the Israel...
Duration:
5m 48s
The Life and Legcy of Uri Avnery
THE RUNDOWN | Often criticized, Uri Avnery lived a life fighting for a...
Duration:
3m 53s
LIVE - Gaza under attack: Israeli apartheid w...
Israel is bombing Gaza, while extremists ethnically cleanse Palestinia...
Duration:
2h 41m 8s
Max Blumenthal slams the corporate state at D...
The Grayzone's Max Blumenthal addresses the April 10, 2022 Defeat The ...