Patents by Inventor Yih Huang
Yih Huang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20180103053Abstract: Processor(s) for detecting malicious software. A hardware virtual machine monitor (HVMM) operates under a host OS. Container(s) initialized with network application template(s) operate under a guest OSVM. A detection module operates under the guest OSVM includes a trigger detection module, a logging module and a container command module. The trigger detection module monitors activity on container(s) for a trigger event. The logging module writes activity report(s) in response to trigger event(s). The container command module issues command(s) in response to trigger event(s). The command(s) include a container start, stop and revert commands. A virtual machine control console operates under the host OS and starts/stops the HVMM. A container control module operates under the guest OSVM and controls container(s) in response to the command(s). The server communication module sends activity report(s) to a central collection network appliance that maintains a repository of activities for infected devices.Type: ApplicationFiled: December 14, 2017Publication date: April 12, 2018Applicant: George Mason Research Foundation, Inc.Inventors: Anup GHOSH, Yih HUANG, Jiang WANG, Angelos STAVROU
-
Publication number: 20180046479Abstract: An on-demand disposable virtual work system that includes: a virtual machine monitor to host virtual machines, a virtual machine pool manager, a host operating system, a host program permissions list, and a request handler module. The virtual machine pool manager manages virtual machine resources. The host operating system interfaces with a user and virtual machines created with an image of a reference operating system. The host program permissions list may be a black list and/or a white list used to indicate allowable programs. The request handler module allows execution of the program if the program is allowable. If the program is not allowable, the host request handler module: denies program execution and urges a virtual machine specified by the virtual machine pool manager to execute the program. The virtual machine is terminated when the program closes.Type: ApplicationFiled: October 27, 2017Publication date: February 15, 2018Applicant: George Mason Research Foundation, Inc.Inventors: Anup K. GHOSH, Sushil JAJODIA, Yih HUANG, Jiang WANG
-
Publication number: 20180028629Abstract: The present disclosure encompasses immunogenic/therapeutic compositions including Globo series antigens (SSEA-4, Globo H or SSEA-3) glycoconjugates and therapeutic adjuvants (OBI-821 or OBI-834) as well as methods of making and using the same to treat proliferative diseases such as cancer. The therapeutic conjugates include an antigen linked to a carrier. In particular, the therapeutic conjugates include a SSEA-4, Globo H or SSEA-3 moiety and a KLH moiety subunit linked via a linker. The therapeutic compositions are in part envisaged to act as cancer vaccines (single valent, bi-valent or tri-valent vaccines) for boosting the body's natural ability to protect itself, through the immune system from dangers posed by damaged or abnormal cells such as cancer cells. Exemplary immune response can be characterized by reduction of the severity of disease, including but not limited to, prevention of disease, delay in onset of disease, decreased severity of symptoms, decreased morbidity and delayed mortality.Type: ApplicationFiled: July 27, 2017Publication date: February 1, 2018Inventors: Cheng-Der Tony YU, Peiwen YU, Kuo-Pao LAI, Wei-Han LEE, I-Ju CHEN, Shu-Yi LIN, Yih-Huang HSIEH
-
Patent number: 9871812Abstract: Processor(s) for detecting malicious software. A hardware virtual machine monitor (HVMM) operates under a host OS. Container(s) initialized with network application template(s) operate under a guest OS VM. A detection module operates under the guest OS VM includes a trigger detection module, a logging module and a container command module. The trigger detection module monitors activity on container(s) for a trigger event. The logging module writes activity report(s) in response to trigger event(s). The container command module issues command(s) in response to trigger event(s). The command(s) include a container start, stop and revert commands. A virtual machine control console operates under the host OS and starts/stops the HVMM. A container control module operates under the guest OS VM and controls container(s) in response to the command(s). The server communication module sends activity report(s) to a central collection network appliance that maintains a repository of activities for infected devices.Type: GrantFiled: March 15, 2017Date of Patent: January 16, 2018Assignee: George Mason Research Foundation, Inc.Inventors: Anup Ghosh, Yih Huang, Jiang Wang, Angelos Stavrou
-
Patent number: 9846588Abstract: An on-demand disposable virtual work system that includes: a virtual machine monitor to host virtual machines, a virtual machine pool manager, a host operating system, a host program permissions list, and a request handler module. The virtual machine pool manager manages virtual machine resources. The host operating system interfaces with a user and virtual machines created with an image of a reference operating system. The host program permissions list may be a black list and/or a white list used to indicate allowable programs. The request handler module allows execution of the program if the program is allowable. If the program is not allowable, the host request handler module: denies program execution and urges a virtual machine specified by the virtual machine pool manager to execute the program. The virtual machine is terminated when the program closes.Type: GrantFiled: September 10, 2014Date of Patent: December 19, 2017Assignee: George Mason Research Foundation, Inc.Inventors: Anup K. Ghosh, Sushil Jajodia, Yih Huang, Jiang Wang
-
Publication number: 20170302692Abstract: Processor(s) for detecting malicious software. A hardware virtual machine monitor (HVMM) operates under a host OS. Container(s) initialized with network application template(s) operate under a guest OS VM. A detection module operates under the guest OS VM includes a trigger detection module, a logging module and a container command module. The trigger detection module monitors activity on container(s) for a trigger event. The logging module writes activity report(s) in response to trigger event(s). The container command module issues command(s) in response to trigger event(s). The command(s) include a container start, stop and revert commands. A virtual machine control console operates under the host OS and starts/stops the HVMM. A container control module operates under the guest OSVM and controls container(s) in response to the command(s). The server communication module sends activity report(s) to a central collection network appliance that maintains a repository of activities for infected devices.Type: ApplicationFiled: March 15, 2017Publication date: October 19, 2017Applicant: George Mason Research Foundation, Inc.Inventors: Anup GHOSH, Yih HUANG, Jiang WANG, Angelos STAVROU
-
Publication number: 20170206348Abstract: An embodiment for providing a secure virtual browsing environment includes creating a virtual browsing environment with a virtualized operating system sharing an operating system kernel of a supporting operating system and executing the browser application within the virtual browsing environment. Another embodiment includes receiving a website selection within a browser application, determining if the website selection corresponds to a secure bookmark, and creating a second virtual browsing environment and executing the browser application within the second virtual browsing environment to access the website selection when the website selection corresponds to a website specified as a secure bookmark.Type: ApplicationFiled: August 29, 2016Publication date: July 20, 2017Applicant: George Mason Research Foundation, Inc.Inventors: Anup K. GHOSH, Sushil JAJODIA, Yih HUANG, Jiang WANG
-
Patent number: 9602524Abstract: Processor(s) for detecting malicious software. A hardware virtual machine monitor (HVMM) operates under a host OS. Container(s) initialized with network application template(s) operate under a guest OS VM. A detection module operates under the guest OS VM includes a trigger detection module, a logging module and a container command module. The trigger detection module monitors activity on container(s) for a trigger event. The logging module writes activity report(s) in response to trigger event(s). The container command module issues command(s) in response to trigger event(s). The command(s) include a container start, stop and revert commands. A virtual machine control console operates under the host OS and starts/stops the HVMM. A container control module operates under the guest OSVM and controls container(s) in response to the command(s). The server communication module sends activity report(s) to a central collection network appliance that maintains a repository of activities for infected devices.Type: GrantFiled: July 24, 2015Date of Patent: March 21, 2017Assignee: George Mason Research Foundation, Inc.Inventors: Anup Ghosh, Yih Huang, Jiang Wang, Angelos Stavrou
-
Publication number: 20160339089Abstract: The present disclosure encompasses immunogenic/therapeutic compositions including Globo H-KLH glycoconjugates (OBI-822) and/or therapeutic adjuvants (OBI-821/OBI-834) as well as methods of making and using the same to treat proliferative diseases such as cancer. The therapeutic conjugates include an antigen linked to a carrier. In particular the therapeutic conjugates include a Globo H moiety and a KLH moiety and/or a derivatized KLH moiety subunit optionally linked via a linker. The therapeutic compositions are in part envisaged to act as cancer vaccines for boosting the body's natural ability to protect itself, through the immune system from dangers posed by damaged or abnormal cells such as cancer cells. Exemplary immune response can be characterized by reduction of the severity of disease, including but not limited to, prevention of disease, delay in onset of disease, decreased severity of symptoms, decreased morbidity and delayed mortality.Type: ApplicationFiled: September 15, 2015Publication date: November 24, 2016Inventors: Cheng-Der Tony YU, Yih Huang HSIEH, I-Ju CHEN, Wei-Han LEE, Nan-Hsuan WANG
-
Patent number: 9436822Abstract: An embodiment for providing a secure virtual browsing environment includes creating a virtual browsing environment with a virtualized operating system sharing an operating system kernel of a supporting operating system and executing the browser application within the virtual browsing environment. Another embodiment includes receiving a website selection within a browser application, determining if the website selection corresponds to a secure bookmark, and creating a second virtual browsing environment and executing the browser application within the second virtual browsing environment to access the website selection when the website selection corresponds to a website specified as a secure bookmark.Type: GrantFiled: September 9, 2014Date of Patent: September 6, 2016Assignee: George Mason Research Foundation, Inc.Inventors: Anup K. Ghosh, Sushil Jajodia, Yih Huang, Jiang Wang
-
Publication number: 20160182540Abstract: Processor(s) for detecting malicious software. A hardware virtual machine monitor (HVMM) operates under a host OS. Container(s) initialized with network application template(s) operate under a guest OS VM. A detection module operates under the guest OS VM includes a trigger detection module, a logging module and a container command module. The trigger detection module monitors activity on container(s) for a trigger event. The logging module writes activity report(s) in response to trigger event(s). The container command module issues command(s) in response to trigger event(s). The command(s) include a container start, stop and revert commands. A virtual machine control console operates under the host OS and starts/stops the HVMM. A container control module operates under the guest OSVM and controls container(s) in response to the command(s). The server communication module sends activity report(s) to a central collection network appliance that maintains a repository of activities for infected devices.Type: ApplicationFiled: July 24, 2015Publication date: June 23, 2016Applicant: GEORGE MASON RESEARCH FOUNDATION, INC.Inventors: Anup GHOSH, Yih HUANG, Jiang WANG, Angelos STAVROU
-
Publication number: 20160019391Abstract: An embodiment for providing a secure virtual browsing environment includes creating a virtual browsing environment with a virtualized operating system sharing an operating system kernel of a supporting operating system and executing the browser application within the virtual browsing environment. Another embodiment includes receiving a website selection within a browser application, determining if the website selection corresponds to a secure bookmark, and creating a second virtual browsing environment and executing the browser application within the second virtual browsing environment to access the website selection when the website selection corresponds to a website specified as a secure bookmark.Type: ApplicationFiled: September 9, 2014Publication date: January 21, 2016Applicant: GEORGE MASON RESEARCH FOUNDATION, INC.Inventors: Anup K. GHOSH, Sushil Jajodia, Yih HUANG, Jiang WANG
-
Publication number: 20150328299Abstract: The present invention provides vaccines comprising carbohydrate antigen conjugated to a diphtheria toxin (DT) as a carrier protein, wherein the ratio of the number of carbohydrate antigen molecule to the carrier protein molecule is higher than 5:1. Also disclosed herein is a novel saponin adjuvant and methods to inhibit cancer cells, by administering an effective amount of the vaccine disclose herein.Type: ApplicationFiled: January 6, 2014Publication date: November 19, 2015Inventors: WEI HAN LEE, NAN-HSUAN WANG, CHUNG HAO CHANG, Yih-Huang Hsieh, CHENG DER TONY YU, Cheng-Chi Wang, Yu-Hsin Lin, Yu-Chen Lin, I-Ju Chen
-
Patent number: 9098698Abstract: Processor(s) for detecting malicious software. A hardware virtual machine monitor (HVMM) operates under a host OS. Container(s) initialized with network application template(s) operate under a guest OS VM. A detection module operates under the guest OS VM includes a trigger detection module, a logging module and a container command module. The trigger detection module monitors activity on container(s) for a trigger event. The logging module writes activity report(s) in response to trigger event(s). The container command module issues command(s) in response to trigger event(s). The command(s) include a container start, stop and revert commands. A virtual machine control console operates under the host OS and starts/stops the HVMM. A container control module operates under the guest OSVM and controls container(s) in response to the command(s). The server communication module sends activity report(s) to a central collection network appliance that maintains a repository of activities for infected devices.Type: GrantFiled: September 14, 2009Date of Patent: August 4, 2015Assignee: George Mason Research Foundation, Inc.Inventors: Anup Ghosh, Yih Huang, Jiang Wang, Angelos Stavrou
-
Publication number: 20150212842Abstract: An on-demand disposable virtual work system that includes: a virtual machine monitor to host virtual machines, a virtual machine pool manager, a host operating system, a host program permissions list, and a request handler module. The virtual machine pool manager manages virtual machine resources. The host operating system interfaces with a user and virtual machines created with an image of a reference operating system. The host program permissions list may be a black list and/or a white list used to indicate allowable programs. The request handler module allows execution of the program if the program is allowable. If the program is not allowable, the host request handler module: denies program execution and urges a virtual machine specified by the virtual machine pool manager to execute the program. The virtual machine is terminated when the program closes.Type: ApplicationFiled: September 10, 2014Publication date: July 30, 2015Applicant: GEORGE MASON RESEARCH FOUNDATION, INC.Inventors: Anup K. GHOSH, Sushil JAJODIA, Yih HUANG, Jiang WANG
-
Patent number: 8856782Abstract: An on-demand disposable virtual work system that includes: a virtual machine monitor to host virtual machines, a virtual machine pool manager, a host operating system, a host program permissions list, and a request handler module. The virtual machine pool manager manages virtual machine resources. The host operating system interfaces with a user and virtual machines created with an image of a reference operating system. The host program permissions list may be a black list and/or a white list used to indicate allowable programs. The request handler module allows execution of the program if the program is allowable. If the program is not allowable, the host request handler module: denies program execution and urges a virtual machine specified by the virtual machine pool manager to execute the program. The virtual machine is terminated when the program closes.Type: GrantFiled: February 26, 2008Date of Patent: October 7, 2014Assignee: George Mason Research Foundation, Inc.Inventors: Anup K Ghosh, Sushil Jajodia, Yih Huang, Jiang Wang
-
Patent number: 8839422Abstract: An embodiment for providing a secure virtual browsing environment includes creating a virtual browsing environment with a virtualized operating system sharing an operating system kernel of a supporting operating system and executing the browser application within the virtual browsing environment. Another embodiment includes receiving a website selection within a browser application, determining if the website selection corresponds to a secure bookmark, and creating a second virtual browsing environment and executing the browser application within the second virtual browsing environment to access the website selection when the website selection corresponds to a website specified as a secure bookmark.Type: GrantFiled: June 30, 2010Date of Patent: September 16, 2014Assignee: George Mason Research Foundation, Inc.Inventors: Anup K Ghosh, Sushil Jajodia, Yih Huang, Jiang Wang
-
Publication number: 20140053269Abstract: An attack resistant continuous network service trustworthiness controller comprising: state estimation module(s), response selection module(s), actuation module(s), and client dispatcher communication module(s) for maintaining the availability and integrity of online server(s). The state estimation module(s) are configured to generate state estimate(s) for online server(s) using behavior data obtained using sensor module(s). The response selection module(s) are configured to determine corrective action(s) to maintain the availability and integrity of online server(s) when state estimate(s) indicate that the integrity of an online server(s) is compromised. The actuation module(s) are configured to activate actuator(s) based upon the corrective action(s). Client dispatcher communication module(s) are configured to communicate online server availability information to a client dispatcher.Type: ApplicationFiled: October 24, 2013Publication date: February 20, 2014Applicant: George Mason Research Foundation, Inc.Inventors: Anup K. Ghosh, Yih Huang, Arun Sood
-
Patent number: 8572735Abstract: An attack resistant continuous network service trustworthiness controller comprising: state estimation module(s), response selection module(s), actuation module(s), and client dispatcher communication module(s) for maintaining the availability and integrity of online server(s). The state estimation module(s) are configured to generate state estimate(s) for online server(s) using behavior data obtained using sensor module(s). The response selection module(s) are configured to determine corrective action(s) to maintain the availability and integrity of online server(s) when state estimate(s) indicate that the integrity of an online server(s) is compromised. The actuation module(s) are configured to activate actuator(s) based upon the corrective action(s). Client dispatcher communication module(s) are configured to communicate online server availability information to a client dispatcher.Type: GrantFiled: March 31, 2008Date of Patent: October 29, 2013Assignee: George Mason Research Foundation, Inc.Inventors: Anup K. Ghosh, Yih Huang, Arun Sood
-
Patent number: 8429219Abstract: A method, system and computer program product for controlling a processing unit connected to a network. The method includes providing information to the network by the processing unit via plural communication channels; sending a reset signal from a controller to a reset unit of the processing unit after a specified amount of time, the reset unit being connected only to a communication channel of the controller and being isolated from the plural communication channels; and rebooting the processor unit when the reset signal is received by the reset unit.Type: GrantFiled: May 23, 2006Date of Patent: April 23, 2013Assignee: George Mason Research Foundation, Inc.Inventors: David Arsenault, Arun Sood, Yih Huang