Patents by Inventor Anh Nguyen-Tuong

Anh Nguyen-Tuong has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10452370
    Abstract: According to some illustrative embodiments of the invention, a method is performed that includes using a representation of a computer software program, using identified addresses which correspond to a part of the representation, and converting the representation into a created binary program, which includes reserving spaces at the identified addresses in the created binary program's address space at the same addresses as the identified addresses in the representation.
    Type: Grant
    Filed: January 8, 2016
    Date of Patent: October 22, 2019
    Assignee: UNIVERSITY OF VIRGINIA PATENT FOUNDATION
    Inventors: Jack W. Davidson, Clark Lynch Coleman, Jason D. Hiser, Anh Nguyen-Tuong
  • Patent number: 10382448
    Abstract: Methods and systems are described for detecting command injection attacks. A positive, taint inference method includes receiving signature fragments on one hand, converting command injection instructions into command fragments on another hand, thus identifying potential attacks upon the condition that a command injection instruction includes critical untrusted parts by using signature fragments. A system detects command injection attacks using this kind of method, and remediates and rejects potential attacks.
    Type: Grant
    Filed: April 20, 2017
    Date of Patent: August 13, 2019
    Assignee: University of Virginia Patent Foundation
    Inventors: Anh Nguyen-Tuong, Jack W. Davidson, Michele Co, Jason D. Hiser, John C. Knight
  • Publication number: 20190199730
    Abstract: Methods and systems are described for detecting command injection attacks. A positive, taint inference method includes receiving signature fragments on one hand, converting command injection instructions into command fragments on another hand, thus identifying potential attacks upon the condition that a command injection instruction includes critical untrusted parts by using signature fragments. A system detects command injection attacks using this kind of method, and remediates and rejects potential attacks.
    Type: Application
    Filed: April 20, 2017
    Publication date: June 27, 2019
    Applicant: University of Virginia Patent Foundation
    Inventors: Anh Nguyen-Tuong, Jack W. Davidson, Michele Co, Jason D. Hiser, John C. Knight
  • Patent number: 10193927
    Abstract: Systems and methods for relocating executable instructions to arbitrary locations are described, in which the relocation of the instructions may be arbitrary or random, and may operate on groups of instructions or individual instructions. Such relocation may be achieved through hardware or software, and may use a virtual machine, software dynamic translators, interpreters, or emulators. Instruction relocation may use or produce a specification governing how to relocate the desired instructions. Randomizing the location of instructions provides defenses against a variety of security attacks. Such systems and methods may provide many advantages over other instruction relocation techniques, such as low runtime overhead, no required user interaction, applicability post-deployment, and the ability to operate on arbitrary executable programs.
    Type: Grant
    Filed: February 27, 2013
    Date of Patent: January 29, 2019
    Assignee: University of Virginia Patent Foundation
    Inventors: Jason D. Hiser, Anh Nguyen-Tuong, Michele Co, Jack W. Davidson
  • Publication number: 20170371635
    Abstract: According to some illustrative embodiments of the invention, a method is performed that includes using a representation of a computer software program, using identified addresses which correspond to a part of the representation, and converting the representation into a created binary program, which includes reserving spaces at the identified addresses in the created binary program's address space at the same addresses as the identified addresses in the representation.
    Type: Application
    Filed: January 8, 2016
    Publication date: December 28, 2017
    Applicant: UNIVERSITY OF VIRGINIA PATENT FOUNDATION D/B/A UNIVERSITY OF VIRGINIA LICENSING & VENTURES GROUP
    Inventors: Jack W. Davidson, Clark Lynch Coleman, Jason D. Hiser, Anh Nguyen-Tuong
  • Patent number: 9635033
    Abstract: Methods and systems are described for detecting command injection attacks. A positive, taint inference method includes receiving signature fragments on one hand, converting command injection instructions into command fragments on another hand, thus identifying potential attacks upon the condition that a command injection instruction includes critical untrusted parts by using signature fragments. A system detects command injection attacks using this kind of method, and remediates and rejects potential attacks.
    Type: Grant
    Filed: November 14, 2013
    Date of Patent: April 25, 2017
    Assignee: University of Virginia Patent Foundation
    Inventors: Anh Nguyen-Tuong, Jack W. Davidson, Michele Co, Jason D. Hiser, John C. Knight
  • Publication number: 20150304337
    Abstract: Methods and systems are described for detecting command injection attacks. A positive, taint inference method includes receiving signature fragments on one hand, converting command injection instructions into command fragments on another hand, thus identifying potential attacks upon the condition that a command injection instruction includes critical untrusted parts by using signature fragments. A system detects command injection attacks using this kind of method, and remediates and rejects potential attacks.
    Type: Application
    Filed: November 14, 2013
    Publication date: October 22, 2015
    Applicant: UNIVERSITY OF VIRGINIA PATENT FOUNDATION
    Inventors: Anh Nguyen-Tuong, Jack W. Davidson, Michele Co, Jason D. Hiser, John C. Knight
  • Publication number: 20150106872
    Abstract: A method and system for relocating executable instructions to arbitrary locations are disclosed. The instruction relocation may be arbitrary or random, and may operate on groups of instructions or individual instructions. Such relocation may be achieved through hardware or software, and may use a virtual machine, software dynamic translators, interpreters, or emulators. Instruction relocation may use or produce a specification governing how to relocate the desired instructions. Randomizing the location of instructions provides defenses against a variety of security attacks. The disclosed embodiments provide many advantages over other instruction relocation techniques, such as low runtime overhead, no required user interaction, applicability post-deployment, and the ability to operate on arbitrary executable programs.
    Type: Application
    Filed: February 27, 2013
    Publication date: April 16, 2015
    Applicant: University of Virginia Patent Foundation
    Inventors: Jason D. Hiser, Anh Nguyen-Tuong, Michele Co, Jack W. Davidson
  • Publication number: 20090144561
    Abstract: Software is protected by encoding the target software instructions and decoding the target instructions.
    Type: Application
    Filed: July 11, 2006
    Publication date: June 4, 2009
    Inventors: Jack W. Davidson, Anh Nguyen-Tuong, Jonathan C. Rowanhill, David E. Evans, John C. Knight, Adrian T. Filipi, Jason Hiser, Wei Hu