Search

Derek L Bruening

age ~48

from Troy, NY

Also known as:
  • Derek Lane Bruening
  • Derek Bruening Lane
Phone and address:
127 Hickory Ct, Troy, NY 12180
518-488-8341

Derek Bruening Phones & Addresses

  • 127 Hickory Ct, Troy, NY 12180 • 518-488-8341
  • 129 Franklin St, Cambridge, MA 02139 • 617-577-1317
  • 524 Putnam Ave, Cambridge, MA 02139 • 617-868-5628
  • 6 Carlisle St, Cambridge, MA 02139 • 617-868-5628
  • West Valley, UT
  • Ogden, UT

Us Patents

  • Secure Execution Of A Computer Program

    view source
  • US Patent:
    7594111, Sep 22, 2009
  • Filed:
    Dec 18, 2003
  • Appl. No.:
    10/740063
  • Inventors:
    Vladimir L. Kiriansky - Mountain View CA, US
    Derek L. Bruening - Cambridge MA, US
    Saman P. Amarasinghe - Waltham MA, US
  • Assignee:
    Massachusetts Institute of Technology - Cambridge MA
  • International Classification:
    G06F 21/00
  • US Classification:
    713166, 726 17
  • Abstract:
    Hijacking of an application is prevented by monitoring control flow transfers during program execution in order to enforce a security policy. At least three basic techniques are used. The first technique, Restricted Code Origins (RCO), can restrict execution privileges on the basis of the origins of instruction executed. This distinction can ensure that malicious code masquerading as data is never executed, thwarting a large class of security attacks. The second technique, Restricted Control Transfers (RCT), can restrict control transfers based on instruction type, source, and target. The third technique, Un-Circumventable Sandboxing (UCS), guarantees that sandboxing checks around any program operation will never be bypassed.
  • Secure Execution Of A Computer Program Using A Code Cache

    view source
  • US Patent:
    7603704, Oct 13, 2009
  • Filed:
    Dec 18, 2003
  • Appl. No.:
    10/739499
  • Inventors:
    Derek L. Bruening - Cambridge MA, US
    Vladimir L. Kiriansky - Mountain View CA, US
    Saman P. Amarasinghe - Waltham MS, US
  • Assignee:
    Massachusetts Institute of Technology - Cambridge MA
  • International Classification:
    G06F 11/00
  • US Classification:
    726 22, 726 23
  • Abstract:
    Hijacking of an application is prevented by monitoring control flow transfers during program execution in order to enforce a security policy. At least three basic techniques are used. The first technique, Restricted Code Origins (RCO), can restrict execution privileges on the basis of the origins of instruction executed. This distinction can ensure that malicious code masquerading as data is never executed, thwarting a large class of security attacks. The second technique, Restricted Control Transfers (RCT), can restrict control transfers based on instruction type, source, and target. The third technique, Un-Circumventable Sandboxing (UCS), guarantees that sandboxing checks around any program operation will never be bypassed.
  • 0-Touch And 1-Touch Techniques For Improving The Availability Of Computer Programs Under Protection Without Compromising Security

    view source
  • US Patent:
    7735136, Jun 8, 2010
  • Filed:
    Apr 18, 2006
  • Appl. No.:
    11/406063
  • Inventors:
    Srinivas Mantripragada - Cupertino CA, US
    Tim Garnett - Boston MA, US
    Derek Bruening - Troy NY, US
    Vladimir Kiriansky - Cambridge MA, US
    Bharath Chandramohan - Sunnyvale CA, US
    James Brink - Oakland CA, US
    Saman P. Amarasinghe - Waltham MA, US
    Sandy Wilbourn - Palo Alto CA, US
  • Assignee:
    VMware, Inc. - Palo Alto CA
  • International Classification:
    G06F 12/14
  • US Classification:
    726 22, 713166
  • Abstract:
    Protected software, such as an application and/or DLL, is monitored by protective software to guard against attacks, while distinguishing spurious, benign events from attacks. In a 1-touch approach, the protected software is monitored in a testing environment to detect spurious, benign events caused by, e. g. , incompatibility or interoperability problems. The spurious events can be remediated in different ways, such as by applying a relaxed security policy. In a production mode, or 0-touch mode, when the protected software is subject to attacks, the corresponding remediation can be applied when the spurious events are again detected. Security events which occur in production mode can also be treated as benign when they occur within a specified time window. The applications and/or DLLs can further be classified according to whether they are known to have bad properties, known to be well-behaved, or unknown. Appropriate treatment is provided based on the classification.
  • Adaptive Cache Sizing By Utilizing Regenerative Entries

    view source
  • US Patent:
    7856531, Dec 21, 2010
  • Filed:
    Dec 30, 2008
  • Appl. No.:
    12/345768
  • Inventors:
    Derek L. Bruening - Troy NY, US
    Saman P. Amarasinghe - Waltham MA, US
  • Assignee:
    Massachusetts Institute of Technology - Cambridge MA
  • International Classification:
    G06F 12/00
  • US Classification:
    711129, 711133, 711170
  • Abstract:
    A runtime code manipulation system is provided that supports code transformations on a program while it executes. The runtime code manipulation system uses code caching technology to provide efficient and comprehensive manipulation of an application running on an operating system and hardware. The code cache includes a system for automatically keeping the code cache at an appropriate size for the current working set of an application running.
  • Secure Execution Of A Computer Program

    view source
  • US Patent:
    7886148, Feb 8, 2011
  • Filed:
    Sep 21, 2009
  • Appl. No.:
    12/563871
  • Inventors:
    Vladimir L. Kiriansky - Mountain View CA, US
    Derek L. Bruening - Troy NY, US
    Saman P. Amarasinghe - Saltham MA, US
  • Assignee:
    Massachusetts Institute of Technology - Cambridge MA
  • International Classification:
    G06F 21/00
  • US Classification:
    713166, 726 17
  • Abstract:
    Hijacking of an application is prevented by securing execution of a computer program on a computing system. Prior to execution of the computer program, the computer program is analyzed to identify permitted targets of all indirect transfers. An application-specific policy based on the permitted targets is created. When the program is executed on the computing system, the application-specific policy is enforced such that the program is prohibited from executing indirect transfer instructions that do not target one of the permitted targets.
  • Constraint Injection System For Immunizing Software Programs Against Vulnerabilities And Attacks

    view source
  • US Patent:
    7945958, May 17, 2011
  • Filed:
    Jun 6, 2006
  • Appl. No.:
    11/422547
  • Inventors:
    Saman P. Amarasinghe - Waltham MA, US
    Bharath Chandramohan - Sunnyvale CA, US
    Charles Renert - Winchester MA, US
    Derek L. Bruening - Troy NY, US
    Vladimir L. Kiriansky - Cambridge MA, US
    Tim Garnett - Boston MA, US
    Sandy Wilbourn - Palo Alto CA, US
    Warren Wu - Los Altos CA, US
  • Assignee:
    VMware, Inc. - Palo Alto CA
  • International Classification:
    G06F 11/00
  • US Classification:
    726 25, 726 22
  • Abstract:
    A constraint is inserted into a program to address a vulnerability of the program to attacks. The constraint includes a segment of code that determines when the program has been asked to execute a “corner case” which does not occur in normal operations. The constraint code can access a library of detector and remediator functions to detect various attacks and remediate against them. Optionally, the detector can be employed without the remediator for analysis. The context of the program can be saved and restored if necessary to continue operating after remediation is performed. The constraints can include descriptors, along with machine instructions or byte code, which indicate how the constraints are to be used.
  • 0-Touch And 1-Touch Techniques For Improving The Availability Of Computer Programs Under Protection Without Compromising Security

    view source
  • US Patent:
    8171548, May 1, 2012
  • Filed:
    Apr 21, 2010
  • Appl. No.:
    12/764622
  • Inventors:
    Srinivas Mantripragada - Cupertino CA, US
    Timothy Garnett - Boston MA, US
    Derek L. Bruening - Troy NY, US
    Vladimir Kiriansky - Mountain View CA, US
    Bharath Chandramohan - Santa Clara CA, US
    James Brink - Oakland CA, US
    Saman P. Amarasinghe - Waltham MA, US
    Sandy Wilbourn - Palo Alto CA, US
  • Assignee:
    VMware, Inc. - Palo Alto CA
  • International Classification:
    G06F 12/14
  • US Classification:
    726 22, 713166
  • Abstract:
    Protected software, such as an application and/or DLL, is monitored by protective software to guard against attacks, while distinguishing spurious, benign events from attacks. In a 1-touch approach, the protected software is monitored in a testing environment to detect spurious, benign events caused by, e. g. , incompatibility or interoperability problems. The spurious events can be remediated in different ways, such as by applying a relaxed security policy. In a production mode, or 0-touch mode, when the protected software is subject to attacks, the corresponding remediation can be applied when the spurious events are again detected. Security events which occur in production mode can also be treated as benign when they occur within a specified time window. The applications and/or DLLs can further be classified according to whether they are known to have bad properties, known to be well-behaved, or unknown. Appropriate treatment is provided based on the classification.
  • Sharing And Persisting Code Caches

    view source
  • US Patent:
    8321850, Nov 27, 2012
  • Filed:
    Jun 6, 2008
  • Appl. No.:
    12/135020
  • Inventors:
    Derek Bruening - Troy NY, US
    Vladimir L. Kiriansky - Alameda CA, US
  • Assignee:
    VMware, Inc. - Palo CA
  • International Classification:
    G06F 9/45
  • US Classification:
    717151
  • Abstract:
    Computer code from an application program comprising a plurality of modules that each comprise a separately loadable file is code cached in a shared and persistent caching system. A shared code caching engine receives native code comprising at least a portion of a single module of the application program, and stores runtime data corresponding to the native code in a cache data file in the non-volatile memory. The engine then converts cache data file into a code cache file and enables the code cache file to be pre-loaded as a runtime code cache. These steps are repeated to store a plurality of separate code cache files at different locations in non-volatile memory.

Resumes

Derek Bruening Photo 1

Software Engineer

view source
Location:
127 Hickory Ct, Troy, NY 12180
Industry:
Computer Software
Work:
Vmware Aug 2007 - Nov 2010
Staff Engineer

Google Aug 2007 - Nov 2010
Software Engineer

Determina May 2003 - Aug 2007
Founder and Chief Scientist

Hewlett-Packard Jun 2000 - Aug 2001
Summer Research Intern
Education:
Massachusetts Institute of Technology 1994 - 2004
Doctorates, Bachelors, Masters, Doctor of Philosophy, Master of Engineering, Bachelor of Science, Computer Science
Skyline High School 1991 - 1994
Skills:
Software
Derek Bruening Photo 2

Software Engineer At Google

view source
Position:
Software Engineer at Google
Location:
Albany, New York Area
Industry:
Computer Software
Work:
Google since Nov 2010
Software Engineer

VMware Aug 2007 - Nov 2010
Staff Engineer

Determina May 2003 - Aug 2007
Founder and Chief Scientist

Hewlett-Packard Laboratories Jun 2000 - Aug 2001
Summer Research Intern
Education:
Massachusetts Institute of Technology 1994 - 2004
PhD, MEng, BS, Computer Science
Skyline High School 1991 - 1994

Myspace

Derek Bruening Photo 3

Derek Bruening

view source
Locality:
RIO LINDA, California
Gender:
Male
Birthday:
1950
Derek Bruening Photo 4

derek bruening

view source
Locality:
HERLONG, California
Gender:
Male
Birthday:
1928

Googleplus

Derek Bruening Photo 5

Derek Bruening

Facebook

Derek Bruening Photo 6

Derek Bruening

view source
Friends:
Travis Miller, Alicia Stanley, Hannah Gaidos, Kristal Vasquez, Cameron Scott

Youtube

All My Children: Dixie's Trial Verdict

2005-The verdict as Zach and Dixie's trial. Features: Julia Barr-Brook...

  • Category:
    Entertainment
  • Uploaded:
    21 Sep, 2008
  • Duration:
    3m

All My Children: Dixie and Babe's Funeral Par...

2-16-07-Part 2/2-Pine Valley says goodbye to Dixie and Babe (who is ac...

  • Category:
    Entertainment
  • Uploaded:
    07 Apr, 2009
  • Duration:
    7m

All My Children: Dixie Dies-3/3

1-29-07 & 1-30-07-After eating poisoned pancakes meant for Babe, Dixie...

  • Category:
    Entertainment
  • Uploaded:
    14 Mar, 2009
  • Duration:
    9m 47s

All My Children: Dixie Dies-2/3

1-29-07 & 1-30-07-After eating poisoned pancakes meant for Babe, Dixie...

  • Category:
    Entertainment
  • Uploaded:
    14 Mar, 2009
  • Duration:
    10m

All My Children: Closing Credits 2006

The 2006 Christmas Episode Credits Julia Barr-Brooke English Jeff Bran...

  • Category:
    Entertainment
  • Uploaded:
    01 Nov, 2008
  • Duration:
    1m 33s

All My Children: Dixie and Babe's Funeral Par...

2-16-07-Part 1/2-Pine Valley says goodbye to Dixie and Babe (who is ac...

  • Category:
    Entertainment
  • Uploaded:
    07 Apr, 2009
  • Duration:
    9m 54s

All My Children: Dixie Dies-1/3

1-29-07 & 1-30-07-After eating poisoned pancakes meant for Babe, Dixie...

  • Category:
    Entertainment
  • Uploaded:
    14 Mar, 2009
  • Duration:
    10m 34s

Derek Bruening - DynamicRIO - RCOS Summer 201...

  • Duration:
    14m 43s

Get Report for Derek L Bruening from Troy, NY, age ~48
Control profile