A method for improving security to a computer system, and a computer system with improved security, that performs the steps of interrogating at least one device in communication with the computer system to gather a device identifier uniquely identifying the device, compares the device identifier with a list of identifiers to determine a level of trust, and regulates communication between the device and the computer based upon the level of trust.
Apparatuses and computer-implemented methods of tracking high-risk, computer-readable files as they are accessed or created on a computing or data storage device are described according to some aspects. In one embodiment, file access events and file creation events between at least one software, middleware, or firmware application and at least one file system are monitored. When a high-risk file is created or accessed on the file systems, a unique identifier can be associated with the file and stored in a data store, which is independent of the file system. Access-event and creation-even information can then be stored to records in the data store for the high-risk files associated with unique identifiers.
Usb Communications Tunneling Through Usb Printer Device Class
- Pine River MN, US Anthony Kempka - Backus MN, US
International Classification:
G06F 9/44 G06F 13/38 G06F 13/10
Abstract:
A USB tunnel apparatus is disclosed herein. In various aspects, the USB tunnel apparatus may include a USB printer class interface operatively received by an application specific USB peripheral. The USB printer class interface is configured to identify the application specific USB peripheral as a printer class device to the host during Plug and Play enumeration, and the USB printer class interface is configured to generate a response during Plug and Play enumeration that alters the process of PnP enumeration to create a partially instantiated printer driver stack on the host when the application specific USB peripheral is in USB communication with the host, in various aspects. Related methods and compositions of matter are also disclosed. This Abstract is presented to meet requirements of 37 C.F.R. 1.72(b) only. This Abstract is not intended to identify key elements of the apparatus, methods, and compositions of matter disclosed herein or to delineate the scope thereof.
Methods And Apparatus For Usb Tunneling Through Usb Printer Device Class
- PINE RIVER MN, US ANTHONY KEMPKA - BACKUS MN, US
Assignee:
MIDNIGHT MOSAIC, LLC - PINE RIVER MN
International Classification:
G06F 3/12
US Classification:
358 115
Abstract:
A USB tunnel apparatus is disclosed herein. In various aspects, the USB tunnel apparatus may include a USB printer class interface operatively received by an application specific USB peripheral. The USB printer class interface is configured to identify the application specific USB peripheral as a printer class device to the host during Plug and Play enumeration, and the USB printer class interface is configured to generate a response during Plug and Play enumeration that alters the process of PnP enumeration to create a partially instantiated printer driver stack on the host when the application specific USB peripheral is in USB communication with the host, in various aspects. Related methods and compositions of matter are also disclosed. This Abstract is presented to meet requirements of 37 C.F.R. 1.72(b) only. This Abstract is not intended to identify key elements of the apparatus, methods, and compositions of matter disclosed herein or to delineate the scope thereof.
Mantech
Cyber Research Engineer
Plex Solutions, Llc
Site Director
Ringø Technologies, Inc. Oct 2012 - Aug 2019
Principal Cyber Security Research Engineer
Driverworx™ May 2012 - Jan 2014
Principal Research Engineer
Itt Nov 2007 - May 2012
Lead Principal Special Projects Engineer
Education:
Washington State University 1990 - 1992
MS, Computer Science
University of Minnesota - Morris Sep 1986 - May 1990
Bachelors, Computer Science
University of Minnesota - Morris Sep 1986 - Apr 1990
Bachelors, Philosophy
Skills:
Embedded Systems Device Drivers Usb Linux C Reverse Engineering C++ Rtos Windows Network Security Wireless Kernel Programming Scsi I2C Rs232 File Systems Cissp Fibre Channel Iscsi Raid Ethernet Wireshark Pcie Fortran Peripherals Plc Scada Sata Bsd Jtag Rs485 Spi 802.1X Cyber Security Os Kernel Development Ice Ida Uefi Bios Hba Ieee 802.11 Firewire Assembly Solaris Tpm Trusted Computing Dsp Ip Networking Selinux Ism
2012 to 2000 Cyber Security Research Engineer / Technical DirectorIntegrity Instruments, Inc
Nov 1995 to 2013 Co-Founder: Software/Firmware/Electronics EngineerITT Exelis (EVI Technology)
2007 to 2012 Lead Principal Special Projects EngineerGeneral Dynamics C4S
2006 to 2007 Lead Principal Software Engineer - Information AssurancePacific Northwest National Laboratory
2004 to 2006 Senior Staff Research Scientist - Cyber SecurityDevice Drivers International, Inc.
Aug 1996 to 2004 Consulting Software Engineer - Principal & Co-FounderUS Robotics (3com)
Feb 1997 to Feb 1998 Staff Software EngineerCogito Software, Inc
Dec 1993 to Oct 1995 Consulting Software EngineerHACH Company
May 1993 to Dec 1993 Consulting Software Engineer / Firmware EngineerEXABYTE Inc
Jun 1992 to May 1993 Firmware EngineerUSDA - Agriculture Research Service (ARS)
1989 to 1991 Software & Controls EngineerHunt Technologies Inc
1987 to 1989 Engineering Programmer - FirmwareSYS-CON Inc
1984 to 1987 Controls Engineer
Education:
Washington State University Jan 1992 MS in Computer ScienceUniversity of Minnesota - Morris Jan 1990 Bachelors in Computer ScienceUniversity of Minnesota - Morris Jan 1990 Bachelor's in Philosophy
Skills:
Current Security Clearance (TS/SCI with poly), CISSP certification, OS internals, device drivers, kernel programming, firmware, software, and electronics design.
Youtube
Nuremberg Trial Day 170 (1946) Erich Kempka, ...
On July 3, 1946, Erich Kempka, Adolf Hitler's personal chauffeur, was ...
Duration:
21m 42s
Justin Kempka #18 WR/LB 2010 Offense: Blockin...
Sport: Football High School: Greensburg Central Catholic Position: WR/...
Duration:
5m 13s
Karczewko 2019 DJI Mavic 2pro
Duration:
4m 10s
Josh Kempka 2012 Highlight Video Hempfield Ar...
Sport: Football High School: Hempfield Area Position: Outside Lineback...
Duration:
7m 49s
Kyle Explains His Prison Experience to Anthon...
Kyle Explains His Prison Experience to Anthony Cumia | PKA Subscribe: ...
Duration:
19m 5s
Anthony Cumia's HILARIOUS Rehab Stories | PKA
Anthony Cumia's HILARIOUS Rehab Stories | PKA & Anthony Cumia Podcast ...