Search

Manasi Bhattacharyya Phones & Addresses

  • 1508 Damen Ave, Chicago, IL 60622 (773) 697-8315
  • 4310 Kissena Blvd APT 9A, Flushing, NY 11355 (718) 961-6728
  • Washington, DC

Work

Company: Latham & watkins Oct 2007 Position: Associate

Education

Degree: Doctor of Jurisprudence, Doctorates School / High School: Georgetown University Law Center 2004 to 2007 Specialities: Law

Skills

Corporate Law • Legal Writing • Corporate Governance • Capital Markets • Securities • Corporate Finance • Finance • Contract Negotiation • Business Strategy • Business Analysis • Due Diligence • Legal Research

Industries

Law Practice

Professional Records

Lawyers & Attorneys

Manasi Bhattacharyya Photo 1

Manasi Bhattacharyya, Chicago IL - Lawyer

View page
Address:
Chicago, IL
(312) 777-7068 (Office)
Licenses:
New Jersey - Active 2008
Manasi Bhattacharyya Photo 2

Manasi Bhattacharyya, Chicago IL - Lawyer

View page
Address:
Latham & Watkins LLP
233 S Wacker Dr Ste 5800, Chicago, IL 60606
(312) 876-7700 (Office)
Licenses:
New York - Currently registered 2008
Education:
Georgetown University Law Center

Resumes

Resumes

Manasi Bhattacharyya Photo 3

Associate

View page
Location:
Chicago, IL
Industry:
Law Practice
Work:
Latham & Watkins
Associate

Morgan & Finnegan May 2005 - Aug 2005
Summer Associate

S&P Global Market Intelligence May 2003 - Aug 2004
Software Developer

Chimborazo Jan 2003 - Apr 2003
Technical Writer

I-Deal Llc Sep 2002 - Dec 2002
Consultant Software Engineer
Education:
Georgetown University Law Center 2004 - 2007
Doctor of Jurisprudence, Doctorates, Law
Columbia University In the City of New York 2001 - 2002
Master of Science, Masters, Computer Science
Columbia University In the City of New York 1997 - 2001
Bachelors, Bachelor of Science, Economics, Computer Science
Skills:
Corporate Law
Legal Writing
Corporate Governance
Capital Markets
Securities
Corporate Finance
Finance
Contract Negotiation
Business Strategy
Business Analysis
Due Diligence
Legal Research

Publications

Us Patents

System And Methods For Detecting Malicious Email Transmission

View page
US Patent:
7657935, Feb 2, 2010
Filed:
Aug 16, 2002
Appl. No.:
10/222632
Inventors:
Salvatore J. Stolfo - Ridgewood NJ, US
Eleazar Eskin - Santa Monica CA, US
Manasi Bhattacharyya - Flushing NY, US
Assignee:
The Trustees of Columbia University in the City of New York - New York NY
International Classification:
G06F 11/00
G06F 12/14
US Classification:
726 22, 726 23, 726 25, 726 24, 709206, 709223, 709225
Abstract:
A system and methods of detecting an occurrence of a violation of an email security policy of a computer system. A model relating to the transmission of prior emails through the computer system is defined which is derived from statistics relating to the prior emails. For selected emails to be analyzed, statistics concerning the selected email are gathered. Such statistics may refer to the behavior or other features of the selected emails, attachments to emails, or email accounts. The determination of whether a violation of an email security policy has occurred is performed by applying the model of prior email transmission to the statistics relating to the selected email. The model may be statistical or probabilistic. A model of prior email transmission may include grouping email recipients into cliques. A determination of a violation of a security policy may occur if email recipients for a particular email are in more than one clique.

Systems And Methods For Detection Of New Malicious Executables

View page
US Patent:
7979907, Jul 12, 2011
Filed:
Dec 18, 2008
Appl. No.:
12/338479
Inventors:
Matthew G. Schultz - Ithaca NY, US
Eleazar Eskin - Santa Monica CA, US
Erez Zadok - Middle Island NY, US
Manasi Bhattacharyya - Flushing NY, US
Stolfo Salvatore J. - Ridgewood NJ, US
Assignee:
The Trustees of Columbia University in the City of New York - New York NY
International Classification:
G06F 11/00
G06F 12/14
US Classification:
726 24, 726 13, 713188
Abstract:
A system and methods for detecting malicious executable attachments at an email processing application of a computer system using data mining techniques. The email processing application may be located at the server or at the client or host. The executable attachments are filtered from said email, and byte sequence features are extracted from the executable attachment. The executable attachments are classified by comparing the byte sequence feature of the executable attachment to a classification rule set derived from byte sequence features of a data set of known executables having a predetermined class in a set of classes, e. g. , malicious or benign. The system is also able to classify executable attachments as borderline when the difference between the probability that the executable is malicious and the probability that the executable is benign are within a predetermined threshold. The system can notify the user when the number of borderline attachments exceeds the threshold in order to refine the classification rule set.

System And Methods For Detecting Malicious Email Transmission

View page
US Patent:
8443441, May 14, 2013
Filed:
Dec 8, 2009
Appl. No.:
12/633493
Inventors:
Salvatore J. Stolfo - Ridgewood NJ, US
Eleazar Eskin - Santa Monica CA, US
Manasi Bhattacharyya - Flushing NY, US
Assignee:
The Trustees of Columbia University in the City of New York - New York NY
International Classification:
G06F 21/00
US Classification:
726 22, 709206
Abstract:
A system and methods of detecting an occurrence of a violation of an email security policy of a computer system. A model relating to the transmission of prior emails through the computer system is defined which is derived from statistics relating to the prior emails. For selected emails to be analyzed, statistics concerning the selected email are gathered. Such statistics may refer to the behavior or other features of the selected emails, attachments to emails, or email accounts. The determination of whether a violation of an email security policy has occurred is performed by applying the model of prior email transmission to the statistics relating to the selected email. The model may be statistical or probabilistic. A model of prior email transmission may include grouping email recipients into cliques. A determination of a violation of a security policy may occur if email recipients for a particular email are in more than one clique.

System And Methods For Detection Of New Malicious Executables

View page
US Patent:
20030065926, Apr 3, 2003
Filed:
Jul 30, 2002
Appl. No.:
10/208432
Inventors:
Matthew Schultz - Ithaca NY, US
Eleazar Eskin - Santa Monica CA, US
Erez Zadok - Middle Island NY, US
Manasi Bhattacharyya - Flushing NY, US
Stolfo Salvatore - Ridgewood NJ, US
International Classification:
G06F011/30
US Classification:
713/188000
Abstract:
A system and methods for detecting malicious executable attachments at an email processing application of a computer system using data mining techniques. The email processing application may be located at the server or at the client or host. The executable attachments are filtered from said email, and byte sequence features are extracted from the executable attachment. The executable attachments are classified by comparing the byte sequence feature of the executable attachment to a classification rule set derived from byte sequence features of a data set of known executables having a predetermined class in a set of classes, e.g., malicious or benign. The system is also able to classify executable attachments as borderline when the difference between the probability that the executable is malicious and the probability that the executable is benign are within a predetermined threshold. The system can notify the user when the number of borderline attachments exceeds the threshold in order to refine the classification rule set.

System And Methods For Detecting Malicious Email Transmission

View page
US Patent:
20130239210, Sep 12, 2013
Filed:
Mar 21, 2013
Appl. No.:
13/848529
Inventors:
Eleazar Eskin - Santa Monica CA, US
Manasi Bhattacharyya - Flushing NY, US
Assignee:
Trustees of Columbia University in the City of New York - New York NY
International Classification:
H04L 29/06
US Classification:
726 22
Abstract:
A system and methods of detecting an occurrence of a violation of an email security policy of a computer system. A model relating to the transmission of prior emails through the computer system is defined which is derived from statistics relating to the prior emails. For selected emails to be analyzed, statistics concerning the selected email are gathered. Such statistics may refer to the behavior or other features of the selected emails, attachments to emails, or email accounts. The determination of whether a violation of an email security policy has occurred is performed by applying the model of prior email transmission to the statistics relating to the selected email. The model may be statistical or probabilistic. A model of prior email transmission may include grouping email recipients into cliques. A determination of a violation of a security policy may occur if email recipients for a particular email are in more than one clique.

System And Methods For Detecting Malicious Email Transmission

View page
US Patent:
20190020672, Jan 17, 2019
Filed:
Jul 3, 2018
Appl. No.:
16/026801
Inventors:
- New York NY, US
Eleazar Eskin - Santa Monica CA, US
Manasi Bhattacharyya - Flushing NY, US
Assignee:
THE TRUSTEES OF COLUMBIA UNIVERSITY IN THE CITY OF NEW YORK - New York NY
International Classification:
H04L 29/06
H04L 12/58
Abstract:
A system and methods of detecting an occurrence of a violation of an email security policy of a computer system. A model relating to the transmission of prior emails through the computer system is defined which is derived from statistics relating to the prior emails. For selected emails to be analyzed, statistics concerning the selected email are gathered. Such statistics may refer to the behavior or other features of the selected emails, attachments to emails, or email accounts. The determination of whether a violation of an email security policy has occurred is performed by applying the model of prior email transmission to the statistics relating to the selected email. The model may be statistical or probabilistic. A model of prior email transmission may include grouping email recipients into cliques. A determination of a violation of a security policy may occur if email recipients for a particular email are in more than one clique.

System And Methods For Detecting Malicious Email Transmission

View page
US Patent:
20180124081, May 3, 2018
Filed:
Jul 11, 2017
Appl. No.:
15/646733
Inventors:
- New York NY, US
Eleazar Eskin - Santa Monica CA, US
Manasi Bhattacharyya - Flushing NY, US
Assignee:
THE TRUSTEES OF COLUMBIA UNIVERSITY IN THE CITY OF NEW YORK - New York NY
International Classification:
H04L 29/06
H04L 12/58
Abstract:
A system and methods of detecting an occurrence of a violation of an email security policy of a computer system. A model relating to the transmission of prior emails through the computer system is defined which is derived from statistics relating to the prior emails. For selected emails to be analyzed, statistics concerning the selected email are gathered. Such statistics may refer to the behavior or other features of the selected emails, attachments to emails, or email accounts. The determination of whether a violation of an email security policy has occurred is performed by applying the model of prior email transmission to the statistics relating to the selected email. The model may be statistical or probabilistic. A model of prior email transmission may include grouping email recipients into cliques. A determination of a violation of a security policy may occur if email recipients for a particular email are in more than one clique.

System And Methods For Detecting Malicious Email Transmission

View page
US Patent:
20160366165, Dec 15, 2016
Filed:
Sep 24, 2014
Appl. No.:
14/495168
Inventors:
- New York NY, US
Eleazar Eskin - Santa Monica CA, US
Manasi Bhattacharyya - Flushing NY, US
International Classification:
H04L 29/06
H04L 12/58
Abstract:
A system and methods of detecting an occurrence of a violation of an email security policy of a computer system. A model relating to the transmission of prior emails through the computer system is defined which is derived from statistics relating to the prior emails. For selected emails to be analyzed, statistics concerning the selected email are gathered. Such statistics may refer to the behavior or other features of the selected emails, attachments to emails, or email accounts. The determination of whether a violation of an email security policy has occurred is performed by applying the model of prior email transmission to the statistics relating to the selected email. The model may be statistical or probabilistic. A model of prior email transmission may include grouping email recipients into cliques. A determination of a violation of a security policy may occur if email recipients for a particular email are in more than one clique.
Manasi M Bhattacharyya from Chicago, IL, age ~45 Get Report