Patents by Inventor Xinran Wang

Xinran Wang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10896253
    Abstract: A computer processing node is described that is configured to perform a control flow integrity (CFI) method on a protected process operating on the processing node. The CFI method includes intercepting a system call originating from execution of the protected process executing in the runtime environment. A fast path operating within a kernel of the computer system accesses, from a kernel memory, a processor trace packet corresponding to the system call. The fast path attempts to establish a match between the processor trace packet and a program control flow (edge) entry within a credit-labeled control flow graph (CFG) definition having an associated credit value. The credit value represents a degree to which the program control flow is credible.
    Type: Grant
    Filed: February 2, 2018
    Date of Patent: January 19, 2021
    Assignee: Huawei Technologies Co., Ltd.
    Inventors: Yutao Liu, Haibo Chen, Peitao Shi, Xinran Wang
  • Patent number: 10867041
    Abstract: Techniques for performing static and dynamic analysis on a mobile device application are disclosed. Static analysis is performed on a mobile device application using a static analysis engine. A set of static analysis results is generated. Dynamic analysis of the application is selectively customized based at least in part on a presence of a permission in the set of static analysis results. Dynamic analysis is performed using a dynamic analysis engine. A determination of whether the application is malicious is made based at least in part on the dynamic analysis.
    Type: Grant
    Filed: June 11, 2018
    Date of Patent: December 15, 2020
    Assignee: Palo Alto Networks, Inc.
    Inventors: Zhi Xu, Xinran Wang, Huagang Xie
  • Publication number: 20200385888
    Abstract: The present invention discloses a method for preparing large-area transition metal dichalcogenide (TMDC) single-crystal films and the products obtained therefrom. The method comprises the steps of: (1) providing a single-crystal C-plane sapphire with surface steps along <1010>directions; and (2) taking the sapphire in step (1) as the substrate, generating unidirectionally arranged TMDC domains on the sapphire surface based on a vapor deposition method and keeping the domains continuously grow and merge into a large-area single-crystal film. The lateral size of the TMDC single-crystal films prepared by the method can reach inch level or above, and is limited only by the size of the substrate.
    Type: Application
    Filed: August 21, 2020
    Publication date: December 10, 2020
    Inventors: Xinran Wang, Taotao Li, Yi Shi
  • Publication number: 20200383153
    Abstract: This disclosure relates to methods, non-transitory computer readable media, and client devices that automatically initiate a wireless network connection (e.g., a pairing) with an auxiliary computing device based on recurring detection of a wireless broadcast signal from the auxiliary computing device. Upon detecting a wireless broadcast signal for an auxiliary computing device satisfying a signal-strength threshold at multiple times or locations, for example, the disclosed client devices can automatically initiate a wireless network connection (e.g., a pairing) with the auxiliary computing device. By automatically initiating a wireless connection with such an auxiliary computing device, the disclosed client devices obviate inefficient user interactions conventional computing devices use to establish a pairing, facilitate pairings with auxiliary computing devices for unsavvy technology users, and avoid unsecure wireless connections that may compromise data on the disclosed provider client devices.
    Type: Application
    Filed: May 28, 2019
    Publication date: December 3, 2020
    Inventors: Sachin Agarwal, Megha Chhabra, Luke Greenwood, Xiaofan Hu, Ryan Tancredi, Sergey Shlykovich, Xinran Wang, Shuchang Zheng
  • Publication number: 20200264558
    Abstract: A two-step optimization process is utilized to define an optimal phase profile for a LCoS spatial light modulator. The two-step optimization process first utilizes a nonlinear constrained optimization (NCO) program to determine the specific parameters required to obtain an optimal phase profile (hologram), where the “optimal phase profile” is typically defined as that profile which achieves maximum diffraction efficiency for optical switching. Following this first step, phase scaling (and perhaps an adjustment in the number of pixels per period) is employed to slightly modify the values of the optimal phase profile to effectively suppress crosstalk peaks. If any orders still exhibit an unacceptable level of crosstalk, these orders are then subtracted from the phase profile to create the final design.
    Type: Application
    Filed: February 18, 2019
    Publication date: August 20, 2020
    Applicant: II-VI Delaware, Inc.
    Inventors: Kun Gao, Jack R. Kelly, Helen Chen, Guomin Jiang, Xinran Wang, Lixin (Lawrence) Wang, Qingyu (Tom) Li, Haiji J. Yuan
  • Patent number: 10726125
    Abstract: Techniques for malware detection using clustering with malware source information are disclosed. In some embodiments, malware detection using clustering with malware source information includes generating a first cluster of source information associated with a first malware sample, in which the first malware sample was determined to be malware, and the first malware sample was determined to be downloaded from a first source; and determining that a second source is associated with malware based on the first cluster.
    Type: Grant
    Filed: November 5, 2018
    Date of Patent: July 28, 2020
    Assignee: Palo Alto Networks, Inc.
    Inventors: Yanxin Zhang, Xinran Wang, Huagang Xie, Wei Xu
  • Patent number: 10678918
    Abstract: Evaluating a potentially malicious sample using a copy-on-write overlay is disclosed. A first virtual machine instance is initialized as a copy-on-write overlay associated with an original virtual machine image. The first virtual machine image is started and a first sample is executed. A second virtual machine instance is initialized as a copy-on-write overlay associated with a second original virtual machine image. The second virtual machine image is started and a second sample is executed. The first and second samples are executed at an overlapping time.
    Type: Grant
    Filed: February 6, 2018
    Date of Patent: June 9, 2020
    Assignee: Palo Alto Networks, Inc.
    Inventors: Xinran Wang, Huagang Xie
  • Publication number: 20190327265
    Abstract: Methods and apparatus are described for quarantining malicious injected code. target code is identified, in web page code requested by a client device, that is vulnerable to a code injection attack by malware. The web page code is modified by obfuscating the target code, and adding decoy code to the web page code that is vulnerable to the code injection attack.
    Type: Application
    Filed: July 2, 2019
    Publication date: October 24, 2019
    Applicant: Shape Security, Inc.
    Inventors: Yao Zhao, Xinran Wang
  • Patent number: 10341380
    Abstract: Methods and apparatus are described for automatically modifying web page code. Specific implementations relate to the modification of web page code for the purpose of combatting Man-in-the-Browser (MitB) attacks.
    Type: Grant
    Filed: April 23, 2018
    Date of Patent: July 2, 2019
    Inventors: Yao Zhao, Xinran Wang
  • Publication number: 20190166141
    Abstract: Techniques are provided for detection of malicious activity using behavior data. A behavior model is trained with behavior data generated in association with a plurality of requests. Data is received that describes a particular request from a particular client device to a server system hosting a website. The data includes particular behavior data generated at the particular client device in association with the particular request. The particular behavior data is analyzed using the behavior model to generate a behavior model result. An automation determination for the particular request is generated based on the behavior model result. The particular request is handled based on the automation determination for the particular request.
    Type: Application
    Filed: May 22, 2018
    Publication date: May 30, 2019
    Applicant: SHAPE SECURITY, INC.
    Inventors: Ye Xu, Yao Zhao, Xinran Wang, Jarrod Overson
  • Publication number: 20190141064
    Abstract: A computer-implemented method includes providing, for use by a third-party, injectable computer code that is capable of being served with other code provided by the third-party to client computing devices; receiving data from client computing devices that have been served the code by the third-party, the data including data that characterizes (a) the client computing devices and (b) user interaction with the client computing devices; classifying the client computing devices as controlled by actual users or instead by automated software based on analysis of the received data from the client computing devices; and providing to the third party one or more reports that characterize an overall level of automated software activity among client computing devices that have been served code by the third party.
    Type: Application
    Filed: December 28, 2018
    Publication date: May 9, 2019
    Inventors: Justin D. Call, Xinran Wang, Yao Zhao, Timothy Dylan Peacock
  • Patent number: 10237283
    Abstract: Techniques for malware domain detection using passive Domain Name Service (DNS) are disclosed. In some embodiments, malware domain detection using passive DNS includes generating a malware association graph that associates a plurality of malware samples with malware source information, in which the malware source information includes a first domain; generating a reputation score for the first domain using the malware association graph and passive DNS information; and determining whether the first domain is a malware domain based on the reputation score for the first domain.
    Type: Grant
    Filed: July 18, 2017
    Date of Patent: March 19, 2019
    Assignee: Palo Alto Networks, Inc.
    Inventors: Yanxin Zhang, Xinran Wang, Huagang Xie, Wei Xu
  • Patent number: 10235521
    Abstract: Techniques for malware detection using clustering with malware source information are disclosed. In some embodiments, malware detection using clustering with malware source information includes generating a first cluster of source information associated with a first malware sample, in which the first malware sample was determined to be malware, and the first malware sample was determined to be downloaded from a first source; and determining that a second source is associated with malware based on the first cluster.
    Type: Grant
    Filed: June 5, 2017
    Date of Patent: March 19, 2019
    Assignee: Palo Alto Networks, Inc.
    Inventors: Yanxin Zhang, Xinran Wang, Huagang Xie, Wei Xu
  • Publication number: 20190073474
    Abstract: Techniques for malware detection using clustering with malware source information are disclosed. In some embodiments, malware detection using clustering with malware source information includes generating a first cluster of source information associated with a first malware sample, in which the first malware sample was determined to be malware, and the first malware sample was determined to be downloaded from a first source; and determining that a second source is associated with malware based on the first cluster.
    Type: Application
    Filed: November 5, 2018
    Publication date: March 7, 2019
    Inventors: Yanxin Zhang, Xinran Wang, Huagang Xie, Wei Xu
  • Patent number: 10187408
    Abstract: A computer-implemented method includes providing, for use by a third-party, injectable computer code that is capable of being served with other code provided by the third-party to client computing devices; receiving data from client computing devices that have been served the code by the third-party, the data including data that characterizes (a) the client computing devices and (b) user interaction with the client computing devices; classifying the client computing devices as controlled by actual users or instead by automated software based on analysis of the received data from the client computing devices; and providing to the third party one or more reports that characterize an overall level of automated software activity among client computing devices that have been served code by the third party.
    Type: Grant
    Filed: July 10, 2017
    Date of Patent: January 22, 2019
    Assignee: SHAPE SECURITY, INC.
    Inventors: Justin D. Call, Xinran Wang, Yao Zhao, Timothy Dylan Peacock
  • Patent number: 10169579
    Abstract: Detecting malicious PDF documents is disclosed. A PDF document is received. The PDF is classified using a classifier. The classifier is trained at least in part by using one of the following: (1) a feature associated with embedded script code; (2) a feature associated with a PDF action; and (3) a feature associated with a PDF structure.
    Type: Grant
    Filed: September 28, 2012
    Date of Patent: January 1, 2019
    Assignee: Palo Alto Networks, Inc.
    Inventors: Wei Xu, Xinran Wang, Huagang Xie, Yanxin Zhang
  • Publication number: 20180298520
    Abstract: Disclosed is a method for depositing ultrathin C8-BTBT, PTCDA and their heterojunctions with precise control of the molecular layers. In the method, source of the organic semiconductor material to grow (C8-BTBT or PTCDA) and a support are spaced from each other in a vacuum chamber with a temperature gradient, and ultrathin organic semiconductor crystal can be deposited on the support in crystalline form and with precisely controlled molecular layers. The as-deposited C8-BTBT or PTCDA crystals can be one-molecular-layer or two-molecular-layer in thickness and has full coverage on the support without any additional layers or voids. Ultrathin heterojunctions of these two-dimensional organic semiconductors can also be achieved.
    Type: Application
    Filed: April 17, 2017
    Publication date: October 18, 2018
    Applicant: Nanjing University
    Inventors: Xinran WANG, Bing Wu, Yi SHI, Daowei HE
  • Publication number: 20180300483
    Abstract: Techniques for performing static and dynamic analysis on a mobile device application are disclosed. Static analysis is performed on a mobile device application using a static analysis engine. A set of static analysis results is generated. Dynamic analysis of the application is selectively customized based at least in part on a presence of a permission in the set of static analysis results. Dynamic analysis is performed using a dynamic analysis engine. A determination of whether the application is malicious is made based at least in part on the dynamic analysis.
    Type: Application
    Filed: June 11, 2018
    Publication date: October 18, 2018
    Inventors: Zhi Xu, Xinran Wang, Huagang Xie
  • Publication number: 20180241774
    Abstract: Methods and apparatus are described for automatically modifying web page code. Specific implementations relate to the modification of web page code for the purpose of combatting Man-in-the-Browser (MitB) attacks.
    Type: Application
    Filed: April 23, 2018
    Publication date: August 23, 2018
    Inventors: Yao Zhao, Xinran Wang
  • Publication number: 20180225446
    Abstract: A computer processing node is described that is configured to perform a control flow integrity (CFI) method on a protected process operating on the processing node. The CFI method includes intercepting a system call originating from execution of the protected process executing in the runtime environment. A fast path operating within a kernel of the computer system accesses, from a kernel memory, a processor trace packet corresponding to the system call. The fast path attempts to establish a match between the processor trace packet and a program control flow (edge) entry within a credit-labeled control flow graph (CFG) definition having an associated credit value. The credit value represents a degree to which the program control flow is credible.
    Type: Application
    Filed: February 2, 2018
    Publication date: August 9, 2018
    Inventors: Yutao LIU, Haibo CHEN, Peitao SHI, Xinran WANG