Patents by Inventor Jiangxia Liu

Jiangxia Liu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10951588
    Abstract: A modified accessor function call is provided to the client device by a clientless VPN in conjunction with a browsing session performed by the client device via the clientless VPN. A native accessor function call is received at a client device. The modified accessor function call is executed at the client device, including by using the native accessor function call.
    Type: Grant
    Filed: July 26, 2018
    Date of Patent: March 16, 2021
    Assignee: Palo Alto Networks, Inc.
    Inventors: Jiangxia Liu, Qi Zhang
  • Publication number: 20210073297
    Abstract: A native web storage function call is received at a client device. A modified browser storage function call is executed, to facilitate browser storage associated with a clientless VPN. The modified browser storage function call executes a call to the native browser storage function call to facilitate access to the browser storage.
    Type: Application
    Filed: September 23, 2020
    Publication date: March 11, 2021
    Inventors: Qi Zhang, Jiangxia Liu
  • Patent number: 10831836
    Abstract: A native web storage function call is received at a client device. A modified web storage function call is executed, to facilitate web storage associated with a clientless VPN. The modified web storage function call executes a call to the native web storage function call to facilitate access to the web storage.
    Type: Grant
    Filed: July 26, 2018
    Date of Patent: November 10, 2020
    Assignee: Palo Alto Networks, Inc.
    Inventors: Qi Zhang, Jiangxia Liu
  • Patent number: 10803168
    Abstract: Techniques for rendering an object using multiple versions of an application in a single process for dynamic malware analysis are disclosed. In some embodiments, a system, process, and/or computer program product for rendering an object using multiple versions of an application in a single process for dynamic malware analysis includes receiving a sample at a cloud security service, in which the sample includes an embedded object; detonating the sample using a browser executed in an instrumented virtual machine environment; and rendering the embedded object using a plurality of versions of an application in a single process during a dynamic malware analysis using the instrumented virtual machine environment.
    Type: Grant
    Filed: September 17, 2019
    Date of Patent: October 13, 2020
    Assignee: Palo Alto Networks, Inc.
    Inventors: Jiangxia Liu, Bo Qu, Tao Yan, Zhanglin He
  • Publication number: 20200036685
    Abstract: A modified accessor function call is provided to the client device by a clientless VPN in conjunction with a browsing session performed by the client device via the clientless VPN. A native accessor function call is received at a client device. The modified accessor function call is executed at the client device, including by using the native accessor function call.
    Type: Application
    Filed: July 26, 2018
    Publication date: January 30, 2020
    Inventors: Jiangxia Liu, Qi Zhang
  • Publication number: 20200034489
    Abstract: A client device requests a web page, via a clientless VPN. In response to the request, web page content comprising dynamic content is received at the clientless VPN. The clientless VPN inserts a wrapper function around the dynamic content, forming modified web content. The client device is provided with the modified web content.
    Type: Application
    Filed: July 26, 2018
    Publication date: January 30, 2020
    Inventors: Jiangxia Liu, Qi Zhang, Bin Zhao
  • Publication number: 20200034483
    Abstract: A native web storage function call is received at a client device. A modified web storage function call is executed, to facilitate web storage associated with a clientless VPN. The modified web storage function call executes a call to the native web storage function call to facilitate access to the web storage.
    Type: Application
    Filed: July 26, 2018
    Publication date: January 30, 2020
    Inventors: Qi Zhang, Jiangxia Liu
  • Publication number: 20200012781
    Abstract: Techniques for rendering an object using multiple versions of an application in a single process for dynamic malware analysis are disclosed. In some embodiments, a system, process, and/or computer program product for rendering an object using multiple versions of an application in a single process for dynamic malware analysis includes receiving a sample at a cloud security service, in which the sample includes an embedded object; detonating the sample using a browser executed in an instrumented virtual machine environment; and rendering the embedded object using a plurality of versions of an application in a single process during a dynamic malware analysis using the instrumented virtual machine environment.
    Type: Application
    Filed: September 17, 2019
    Publication date: January 9, 2020
    Inventors: Jiangxia Liu, Bo Qu, Tao Yan, Zhanglin He
  • Patent number: 10482239
    Abstract: Techniques for rendering an object using multiple versions of an application in a single process for dynamic malware analysis are disclosed. In some embodiments, a system, process, and/or computer program product for rendering an object using multiple versions of an application in a single process for dynamic malware analysis includes receiving a sample at a cloud security service, in which the sample includes an embedded object; detonating the sample using a browser executed in an instrumented virtual machine environment; and rendering the embedded object using a plurality of versions of an application in a single process during a dynamic malware analysis using the instrumented virtual machine environment.
    Type: Grant
    Filed: June 30, 2016
    Date of Patent: November 19, 2019
    Assignee: Palo Alto Networks, Inc.
    Inventors: Jiangxia Liu, Bo Qu, Tao Yan, Zhanglin He
  • Patent number: 10216931
    Abstract: Various techniques for detection of malware that attempt to exploit a memory allocation vulnerability are disclosed. In some embodiments, a system, process, and/or computer program product for detecting an attempt to exploit a memory allocation vulnerability includes receiving a malware sample; monitoring an array operation performed by the malware sample using a memory monitoring component; and determining whether the array operation performed by the malware sample is suspicious. For example, an array operation, such as a vector operation performed by an application that is executed using an ActionScript virtual machine, can be monitored to detect any suspicious vector operations.
    Type: Grant
    Filed: February 1, 2018
    Date of Patent: February 26, 2019
    Assignee: Palo Alto Networks, Inc.
    Inventors: Bo Qu, ChienHua Lu, Tao Yan, Jiangxia Liu
  • Publication number: 20180285564
    Abstract: Various techniques for detection of malware that attempt to exploit a memory allocation vulnerability are disclosed. In some embodiments, a system, process, and/or computer program product for detecting an attempt to exploit a memory allocation vulnerability includes receiving a malware sample; monitoring an array operation performed by the malware sample using a memory monitoring component; and determining whether the array operation performed by the malware sample is suspicious. For example, an array operation, such as a vector operation performed by an application that is executed using an ActionScript virtual machine, can be monitored to detect any suspicious vector operations.
    Type: Application
    Filed: February 1, 2018
    Publication date: October 4, 2018
    Inventors: Bo Qu, ChienHua Lu, Tao Yan, Jiangxia Liu
  • Patent number: 9996695
    Abstract: Various techniques for performing malware analysis of a URL (e.g., a URL sample) using a browser executed in an instrumented virtual machine environment are disclosed.
    Type: Grant
    Filed: June 23, 2016
    Date of Patent: June 12, 2018
    Assignee: Palo Alto Networks, Inc.
    Inventors: Jiangxia Liu, Xin Ouyang, Bo Qu
  • Patent number: 9916443
    Abstract: Various techniques for detection of malware that attempt to exploit a memory allocation vulnerability are disclosed. In some embodiments, a system, process, and/or computer program product for detecting an attempt to exploit a memory allocation vulnerability includes receiving a malware sample; monitoring an array operation performed by the malware sample using a memory monitoring component; and determining whether the array operation performed by the malware sample is suspicious. For example, an array operation, such as a vector operation performed by an application that is executed using an ActionScript virtual machine, can be monitored to detect any suspicious vector operations.
    Type: Grant
    Filed: July 21, 2015
    Date of Patent: March 13, 2018
    Assignee: Palo Alto Networks, Inc.
    Inventors: Bo Qu, ChienHua Lu, Tao Yan, Jiangxia Liu
  • Publication number: 20160366100
    Abstract: Various techniques for performing malware analysis of a URL (e.g., a URL sample) using a browser executed in an instrumented virtual machine environment are disclosed.
    Type: Application
    Filed: June 23, 2016
    Publication date: December 15, 2016
    Inventors: Jiangxia Liu, Xin Ouyang, Bo Qu
  • Patent number: 9491142
    Abstract: In some embodiments, a malware analysis system includes receiving a potential malware sample from a firewall; analyzing the potential malware sample using a virtual machine to determine if the potential malware sample is malware; and automatically generating a signature if the potential malware sample is determined to be malware. In some embodiments, the potential malware sample does not match a preexisting signature, and the malware is a zero-day attack.
    Type: Grant
    Filed: April 21, 2015
    Date of Patent: November 8, 2016
    Assignee: Palo Alto Networks, Inc.
    Inventors: Huagang Xie, Xinran Wang, Jiangxia Liu
  • Patent number: 9413774
    Abstract: Various techniques for performing malware analysis of a URL (e.g., a URL sample) using a browser executed in an instrumented virtual machine environment are disclosed.
    Type: Grant
    Filed: October 27, 2014
    Date of Patent: August 9, 2016
    Assignee: Palo Alto Networks, Inc.
    Inventors: Jiangxia Liu, Xin Ouyang, Bo Qu
  • Publication number: 20150319136
    Abstract: In some embodiments, a malware analysis system includes receiving a potential malware sample from a firewall; analyzing the potential malware sample using a virtual machine to determine if the potential malware sample is malware; and automatically generating a signature if the potential malware sample is determined to be malware. In some embodiments, the potential malware sample does not match a preexisting signature, and the malware is a zero-day attack.
    Type: Application
    Filed: April 21, 2015
    Publication date: November 5, 2015
    Inventors: Huagang Xie, Xinran Wang, Jiangxia Liu
  • Patent number: 9047441
    Abstract: In some embodiments, a malware analysis system includes receiving a potential malware sample from a firewall; analyzing the potential malware sample using a virtual machine to determine if the potential malware sample is malware; and automatically generating a signature if the potential malware sample is determined to be malware. In some embodiments, the potential malware sample does not match a preexisting signature, and the malware is a zero-day attack.
    Type: Grant
    Filed: May 24, 2011
    Date of Patent: June 2, 2015
    Assignee: Palo Alto Networks, Inc.
    Inventors: Huagang Xie, Xinran Wang, Jiangxia Liu
  • Publication number: 20120304244
    Abstract: In some embodiments, a malware analysis system includes receiving a potential malware sample from a firewall; analyzing the potential malware sample using a virtual machine to determine if the potential malware sample is malware; and automatically generating a signature if the potential malware sample is determined to be malware. In some embodiments, the potential malware sample does not match a preexisting signature, and the malware is a zero-day attack.
    Type: Application
    Filed: May 24, 2011
    Publication date: November 29, 2012
    Applicant: PALO ALTO NETWORKS, INC.
    Inventors: Huagang Xie, Xinran Wang, Jiangxia Liu