US Pat. No. 10,511,648

METHOD AND SYSTEM FOR RECONSTRUCTING MEDIA STREAMS

CYBERTOKA LTD, Tel Aviv ...

1. A computer-implemented method for reconstructing a media stream, comprising:obtaining a first modified media stream of an original media stream;
obtaining a second modified media stream of the original media stream;
normalizing the first and second modified media streams to create corresponding normalized first and second media streams;
aligning the first and second normalized media streams to:
identify standard headers and standard trailers in at least the first normalized media stream;
identify a media data payload in at least the first normalized media stream; and,
identify proprietary headers and proprietary trailers in at least the first normalized media stream; and,
reconstructing the original media stream based on the identifications from the alignment of the first and second normalized media streams.

US Pat. No. 10,523,549

METHOD AND SYSTEM FOR DETECTING AND CLASSIFYING NETWORKED DEVICES

CYBERTOKA LTD, Tel Aviv ...

1. A computer-implemented method, for detecting a device on a network, comprising:probing the network to obtain at least one network parameter from at least one device along the network;
receiving at least one response to the probing the network, the at least one response including a payload of a content length, the content length defining the at least one network parameter;
performing an initial classification into at least one category of the at least one device, based on the content length of the at least one response from the at least one device; and,
performing a secondary classification on the at least one device in the at least one initial category based on data returned by the at least one device after issuing at least one application protocol specific request to the at least one device.

US Pat. No. 10,599,558

SYSTEM AND METHOD FOR IDENTIFYING INPUTS TO TRIGGER SOFTWARE BUGS

CYBERTOKA Ltd., Tel-Aviv...

1. A method for identifying inputs which trigger bugs in a computer program comprising:obtaining a snapshot of the state of an executing computer program;
creating an executable package associated with the computer program including a fuzzing manager and a fuzzing driver;
activating the executable package, to 1) run the fuzzing manager and the fuzzing driver, to instrument the computer program with at least one predetermined function to be hooked, and 2) execute the instrumented computer program;
analyzing at least one argument associated with each of the hooked functions in the computer program during its execution, to determine whether each of the at least one arguments is within predetermined limits; or matches a predetermined pattern; and,
should the at least one argument associated with each of the hooked functions in the computer program, be outside of the predetermined limits, or does not match a predetermined pattern, determine the input of the computer program to be the trigger of a bug in the computer program; and,
extracting metadata from the snapshot, the metadata including one or more of: 1) mapping between function names and their addresses; 2) basic block information of code of the computer program associated with a hook for hooking a function in the computer program; and, 3) information on memory being used such as identifying stack boundaries, VFTs (Virtual Function Tables), and segments of the code of the computer program, to be used in detecting anomalous behavior of the computer program.

US Pat. No. 10,674,118

METHOD AND SYSTEM FOR DISCREETLY ACCESSING SECURITY CAMERA SYSTEMS

CYBERTOKA Ltd., Tel-Aviv...

1. A method for surveillance comprising:detecting a triggering event including at least one of: facial motion detection, human motion detection, animal motion detection, weather conditions, environmental conditions, or object recognition, lighting conditions, changes in lighting conditions, magnetic conditions, detection of preprogrammed objects or occurrences, activation of a redirection at predetermined times, commands to cause redirection immediately, and, commands to cause redirection on a delay;
responding to the detected triggering event including, detecting a first data stream being transmitted to an intended first destination;
intercepting the first data stream;
redirecting the intercepted first data stream to a second destination different than the intended first destination;
transmitting a second data stream in replacement of the first data stream, to the intended first destination during at least a portion of the time that the first data stream is redirected, the second data stream including at least one of: a modified first data stream, a blank video stream, a prerecorded data stream, a silent audio stream, a distorted video and/or audio stream, and, a pre-recorded video and/or audio stream; and,
providing a timestamp to the second data stream indicating a time different from the time when the first data stream was intercepted.