BackgroundCheck.run
Search For

Daniel J Wyschogrod, 6828 Judith Rd, Newton, MA 02459

Daniel Wyschogrod Phones & Addresses

28 Judith Rd, Newton Center, MA 02459    617-3321506    617-5157080   

Newton, MA   

Brookline, MA   

Cambridge, MA   

Framingham, MA   

New York, NY   

28 Judith Rd, Newton Center, MA 02459    617-5157080   

Social networks

Daniel J Wyschogrod

Linkedin

Work

Company: Bbn technologies Dec 2009 Position: Senior scientist

Education

Degree: M.S. School / High School: New York University 1982 to 1984 Specialities: Computer Science

Skills

Algorithms • C • Perl • Computer Science • Programming • Software Development • C++ • Java • Software Engineering • Embedded Systems • Unix • Software Design • Image Processing • System Architecture • Pattern Recognition • Python • Optimization • Computer Security • Distributed Systems • Computer Vision • Linux • Tcp/Ip • Eclipse • Signal Processing • Multithreading • Cryptography • Bash • Debugging • Embedded Software • Git • Subversion • Object Oriented Design • Device Drivers • Shell Scripting

Languages

Hebrew

Industries

Defense & Space

Mentions for Daniel J Wyschogrod

Resumes & CV records

Resumes

Daniel Wyschogrod Photo 1

Senior Scientist

Location:
28 Judith Rd, Newton Center, MA 02459
Industry:
Defense & Space
Work:
BBN Technologies since Dec 2009
Senior Scientist
BAE Systems 2005 - Dec 2009
Principal Engineer
Safenet 2003 - 2005
Director
Raqia Networks 1999 - 2003
Director
MIT LIncoln Laboratory 1989 - 1998
Staff
Montefiore Medical Center 1982 - 1983
Programmer
Education:
New York University 1982 - 1984
M.S., Computer Science
State University of New York at Stony Brook 1979 - 1981
M.A., Physics
Columbia University in the City of New York 1973 - 1978
B.A., Physics
Ramaz 1967 - 1973
HS
Skills:
Algorithms, C, Perl, Computer Science, Programming, Software Development, C++, Java, Software Engineering, Embedded Systems, Unix, Software Design, Image Processing, System Architecture, Pattern Recognition, Python, Optimization, Computer Security, Distributed Systems, Computer Vision, Linux, Tcp/Ip, Eclipse, Signal Processing, Multithreading, Cryptography, Bash, Debugging, Embedded Software, Git, Subversion, Object Oriented Design, Device Drivers, Shell Scripting
Languages:
Hebrew

Publications & IP owners

Us Patents

High Speed Data Stream Pattern Recognition

US Patent:
6856981, Feb 15, 2005
Filed:
Dec 3, 2001
Appl. No.:
10/005462
Inventors:
Daniel Wyschogrod - Newton MA, US
Alain Arnaud - Newton MA, US
David Eric Berman Lees - Lexington MA, US
Leonid Leibman - Weston MA, US
Assignee:
SafeNet, Inc. - Belcamp MD
International Classification:
G06F017/00
US Classification:
706 48
Abstract:
A system and method in accordance with the present invention determines in real-time the portions of a set of characters from a data or character stream which satisfies one or more predetermined regular expressions. A eal-time eterministic inite state utomaton (RDFA) ensures that the set of characters is processed at high speeds with relatively small memory requirements. An optimized state machine models the regular expression(s) and state related alphabet lookup and next state tables are generated. Characters from the data stream are processed in parallel using the alphabet lookup and next state tables, to determine whether to transition to a next state or a terminal state, until the regular expression is satisfied or processing is terminated. Additional means may be implemented to determine a next action from satisfaction of the regular expression.

System And Method For Determining The Start Of A Match Of A Regular Expression

US Patent:
7305391, Dec 4, 2007
Filed:
Feb 6, 2004
Appl. No.:
10/773595
Inventors:
Daniel Wyschogrod - Newton MA, US
Leonid Leibman - Weston MA, US
Assignee:
SafeNet, Inc. - Belcamp MD
International Classification:
G06F 7/00
US Classification:
707 6
Abstract:
A method for determining the start of a match of a regular expression using the special state table, the set of start state registers and the DFA next state table, includes the step of determining from the regular expression each start-of-match start state and each end-of-match terminal state. For each start state, a start state entry is loaded into the special state table. For each terminal state, a terminal state entry is loaded into each special state table. The next state table is used to return the next state from the current state and an input character. When a start state is encountered, the current offset from the beginning of the input character string is loaded into the start state register. When a terminal state is encountered, the terminal state entry is retrieved from the special state table, and the value of the start state register corresponding to the rule number of the terminal entry in the special state table is further retrieved. The value of the start state register which is retrieved indicates the location in the character string where the start-of-match occurred for a particular rule.

Fast Hardware Processing Of Regular Expressions Containing Sub-Expressions

US Patent:
7461370, Dec 2, 2008
Filed:
Feb 7, 2003
Appl. No.:
10/359839
Inventors:
Daniel Wyschogrod - Newton MA, US
Leonid Leibman - Weston MA, US
Assignee:
SafeNet, Inc. - Belcamp MD
International Classification:
G06F 9/45
US Classification:
717144, 717142, 717143, 717154
Abstract:
A system for processing regular expressions containing one or more sub-expressions. Information regarding one or more regular expressions, each containing one or more sub-expressions, is stored. Data is compared to the stored information regarding expressions in only a single pass through the data. From the comparison, for any stored expression, the location within the data of the beginning and end of each sub-expression, and the end of the regular expression, are determined. From such determination, the presence within the data of any one or more stored regular expressions containing one or more sub-expressions is identified.

Method Of Generating Of Dfa State Machine That Groups Transitions Into Classes In Order To Conserve Memory

US Patent:
2003006, Apr 3, 2003
Filed:
Aug 8, 2002
Appl. No.:
10/217592
Inventors:
Daniel Wyschogrod - Newton MA, US
Alain Arnaud - Newton MA, US
David Lees - Lexington MA, US
Leonid Leibman - Weston MA, US
Assignee:
Raqia Networks Inc. - Newton MA
International Classification:
G06F015/173
G06F015/16
US Classification:
709/230000, 709/238000
Abstract:
A method for generating look-up tables for a high speed multi-bit Real-time Deterministic Finite state Automaton (hereinafter RDFA). The method begins with a DFA generated in accordance with the prior art. For each state in the DFA, and for each of the bytes recognized in parallel the following occurs. First an n-closure list is generated. An n-closure list is a list of states reachable in n-transitions from the current state. Next an alphabet transition list is generated for each state. An “alphabet transition list” is a list of the transitions out of a particular state for each of the characters in an alphabet. Finally, the transitions are grouped into classes. That is, the transitions that go to the same state are grouped into the same class. Each class is used to identify the next state. The result is a state machine that has less states than the original DFA.

Processing Data Across Packet Boundaries

US Patent:
2003011, Jun 12, 2003
Filed:
Jan 24, 2003
Appl. No.:
10/350540
Inventors:
Daniel Wyschogrod - Newton MA, US
Alain Arnaud - Newton MA, US
David Lees - Lexington MA, US
Assignee:
Raqia Networks, Inc. - Newton MA
International Classification:
G06F015/16
US Classification:
709/202000
Abstract:
Data that spans multiple packets is processes. A finite state machine is used to process the data in each packet and the “state” of a finite state machine is saved after processing a packet. The saved state is stored with information that identifies the particular data stream from which the packet originated. This means that a state machine engine (hardware implementation of the finite state machine) is not tied to a particular data stream. The present invention makes it possible to utilize state machine co-processors very efficiently in a multiple engine/multiple data stream system.

System And Method For Determining The Start Of A Match Of A Regular Expression

US Patent:
2008007, Mar 27, 2008
Filed:
Sep 18, 2007
Appl. No.:
11/901515
Inventors:
Daniel Wyschogrod - Newton MA, US
Leonid Leibman - Weston MA, US
International Classification:
G06F 7/06
G06F 17/30
US Classification:
707006000, 707E17014
Abstract:
A system for determining the start of a match of a regular expression has a special state table which contains start state entries and terminal state entries; a plurality of start state registers for storing offset information indicative of the start of a match of the regular expression; a deterministic finite state automaton (DFA) next state table which, given the current state and an input character, returns the next state. The DFA next state table includes a settable indicator for any next state table entry which indicates whether to perform a lookup into the special state table. A compiler loads values into the special state table based on the regular expression.

Systems And Methods For Detecting Covert Dns Tunnels

US Patent:
2012005, Mar 1, 2012
Filed:
Sep 1, 2010
Appl. No.:
12/873553
Inventors:
Daniel Wyschogrod - Newton MA, US
David Patrick Mankins - Cambridge MA, US
Assignee:
RAYTHEON BBN TECHNOLOGIES CORP. - Cambridge MA
International Classification:
G06F 21/20
US Classification:
726 22
Abstract:
Systems and methods are disclosed for detecting covert DNS tunnels using n-grams. The majority of legitimate DNS requests originate from network content itself, for example, through hyperlinks in websites. So, comparing data from incoming network communications to a hostname included in a DNS request can give an indication on whether the DNS request is a legitimate request or associated with a covert DNS tunnel. This process can be made computationally efficient by extracting n-grams from incoming network content and storing the n-grams in an efficient data structure, such as a Bloom filter. The stored n-grams are compared with n-grams extracted from outgoing DNS requests. If n-grams from an outgoing DNS request are not found in the data structure, the domain associated with the DNS request is determined to be associated with a suspected covert DNS tunnel.

System And Method For Computer Inspection Of Information Objects For Shared Malware Components

US Patent:
2014005, Feb 27, 2014
Filed:
Aug 23, 2012
Appl. No.:
13/592596
Inventors:
Daniel Wyschogrod - Newton MA, US
Steven W. Jilcott - Foxboro MA, US
Jonathan Aron Rubin - Bedford MA, US
John O. Everett - Great Falls VA, US
Assignee:
Raytheon BBN Technologies Corp. - Cambridge MA
International Classification:
G06F 21/00
US Classification:
726 23
Abstract:
Embodiments of a system and method for computer inspection of information objects, for example, executable software applications for common components that may include elements of computer viruses, items from hacker exploit libraries, or other malware components. Information objects may contain identified sequences of instructions, each of which may be identified and hierarchically grouped based on their structural relationship(s). In the software context, programming languages may include multiple components that include functional code; these components are often shared between programmers. In some embodiments, an inspection of the hierarchical relationship of components (e.g., constituent functions) in the information objects may allow for identification of common components shared between programs. In some embodiments, authorship of objects or components in the objects may be identified by comparisons between component samples. In some embodiments, inspection of the relationship between components is limited to component groups having a specified structural size, complexity, or eccentricity.

NOTICE: You may not use BackgroundCheck or the information it provides to make decisions about employment, credit, housing or any other purpose that would require Fair Credit Reporting Act (FCRA) compliance. BackgroundCheck is not a Consumer Reporting Agency (CRA) as defined by the FCRA and does not provide consumer reports.