Patents by Inventor Jason D. Hiser

Jason D. Hiser has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11042631
    Abstract: According to some illustrative embodiments, a method for blending the data of an execution environment and the data of the protected application includes modifying the data values of the protected application using the values of the execution environment in a semantically-neutral manner or modifying the data values of the execution environment using the values of the protected application in a semantically-neutral manner.
    Type: Grant
    Filed: December 11, 2015
    Date of Patent: June 22, 2021
    Assignee: UNIVERSITY OF VIRGINIA PATENT FOUNDATION
    Inventors: Sudeep Ghosh, Jason D. Hiser, Jack W. Davidson
  • Patent number: 10452370
    Abstract: According to some illustrative embodiments of the invention, a method is performed that includes using a representation of a computer software program, using identified addresses which correspond to a part of the representation, and converting the representation into a created binary program, which includes reserving spaces at the identified addresses in the created binary program's address space at the same addresses as the identified addresses in the representation.
    Type: Grant
    Filed: January 8, 2016
    Date of Patent: October 22, 2019
    Assignee: UNIVERSITY OF VIRGINIA PATENT FOUNDATION
    Inventors: Jack W. Davidson, Clark Lynch Coleman, Jason D. Hiser, Anh Nguyen-Tuong
  • Patent number: 10382448
    Abstract: Methods and systems are described for detecting command injection attacks. A positive, taint inference method includes receiving signature fragments on one hand, converting command injection instructions into command fragments on another hand, thus identifying potential attacks upon the condition that a command injection instruction includes critical untrusted parts by using signature fragments. A system detects command injection attacks using this kind of method, and remediates and rejects potential attacks.
    Type: Grant
    Filed: April 20, 2017
    Date of Patent: August 13, 2019
    Assignee: University of Virginia Patent Foundation
    Inventors: Anh Nguyen-Tuong, Jack W. Davidson, Michele Co, Jason D. Hiser, John C. Knight
  • Publication number: 20190199730
    Abstract: Methods and systems are described for detecting command injection attacks. A positive, taint inference method includes receiving signature fragments on one hand, converting command injection instructions into command fragments on another hand, thus identifying potential attacks upon the condition that a command injection instruction includes critical untrusted parts by using signature fragments. A system detects command injection attacks using this kind of method, and remediates and rejects potential attacks.
    Type: Application
    Filed: April 20, 2017
    Publication date: June 27, 2019
    Applicant: University of Virginia Patent Foundation
    Inventors: Anh Nguyen-Tuong, Jack W. Davidson, Michele Co, Jason D. Hiser, John C. Knight
  • Patent number: 10193927
    Abstract: Systems and methods for relocating executable instructions to arbitrary locations are described, in which the relocation of the instructions may be arbitrary or random, and may operate on groups of instructions or individual instructions. Such relocation may be achieved through hardware or software, and may use a virtual machine, software dynamic translators, interpreters, or emulators. Instruction relocation may use or produce a specification governing how to relocate the desired instructions. Randomizing the location of instructions provides defenses against a variety of security attacks. Such systems and methods may provide many advantages over other instruction relocation techniques, such as low runtime overhead, no required user interaction, applicability post-deployment, and the ability to operate on arbitrary executable programs.
    Type: Grant
    Filed: February 27, 2013
    Date of Patent: January 29, 2019
    Assignee: University of Virginia Patent Foundation
    Inventors: Jason D. Hiser, Anh Nguyen-Tuong, Michele Co, Jack W. Davidson
  • Patent number: 10176324
    Abstract: Method, system and computer program product for applying existing anti-tampering and obfuscation techniques to virtual machine technology and offers several distinct advantages. The anti-tampering and obfuscation transforms can be applied continuously to prevent adversaries from gaining information about the program through emulation or dynamic analysis. In addition, the encryption can be used to prevent hackers from gaining information using static attacks. The use of a virtual machine also allows for low overhead execution of the obfuscated binaries as well as finer adjustment of the amount of overhead that can be tolerated. In addition, more protection can be applied to specific portions of the application that can tolerate slowdown. The in-corporation of a virtual machine also makes it easy to extend the technology to integrate new developments and resistance mechanisms, leading to less development time, increased savings, and quicker deployment.
    Type: Grant
    Filed: July 21, 2016
    Date of Patent: January 8, 2019
    Assignee: University of Virginia Patent Foundation
    Inventors: Jack W. Davidson, Jason D. Hiser
  • Publication number: 20180268130
    Abstract: According to some illustrative embodiments, a method for blending the data of an execution environment and the data of the protected application includes modifying the data values of the protected application using the values of the execution environment in a semantically-neutral manner or modifying the data values of the execution environment using the values of the protected application in a semantically-neutral manner.
    Type: Application
    Filed: December 11, 2015
    Publication date: September 20, 2018
    Inventors: Sudeep GHOSH, Jason D. HISER, Jack W. DAVIDSON
  • Publication number: 20170371635
    Abstract: According to some illustrative embodiments of the invention, a method is performed that includes using a representation of a computer software program, using identified addresses which correspond to a part of the representation, and converting the representation into a created binary program, which includes reserving spaces at the identified addresses in the created binary program's address space at the same addresses as the identified addresses in the representation.
    Type: Application
    Filed: January 8, 2016
    Publication date: December 28, 2017
    Applicant: UNIVERSITY OF VIRGINIA PATENT FOUNDATION D/B/A UNIVERSITY OF VIRGINIA LICENSING & VENTURES GROUP
    Inventors: Jack W. Davidson, Clark Lynch Coleman, Jason D. Hiser, Anh Nguyen-Tuong
  • Patent number: 9635033
    Abstract: Methods and systems are described for detecting command injection attacks. A positive, taint inference method includes receiving signature fragments on one hand, converting command injection instructions into command fragments on another hand, thus identifying potential attacks upon the condition that a command injection instruction includes critical untrusted parts by using signature fragments. A system detects command injection attacks using this kind of method, and remediates and rejects potential attacks.
    Type: Grant
    Filed: November 14, 2013
    Date of Patent: April 25, 2017
    Assignee: University of Virginia Patent Foundation
    Inventors: Anh Nguyen-Tuong, Jack W. Davidson, Michele Co, Jason D. Hiser, John C. Knight
  • Publication number: 20160328559
    Abstract: Method, system and computer program product for applying existing anti-tampering and obfuscation techniques to virtual machine technology and offers several distinct advantages. The anti-tampering and obfuscation transforms can be applied continuously to prevent adversaries from gaining information about the program through emulation or dynamic analysis. In addition, the encryption can be used to prevent hackers from gaining information using static attacks. The use of a virtual machine also allows for low overhead execution of the obfuscated binaries as well as finer adjustment of the amount of overhead that can be tolerated. In addition, more protection can be applied to specific portions of the application that can tolerate slowdown. The in-corporation of a virtual machine also makes it easy to extend the technology to integrate new developments and resistance mechanisms, leading to less development time, increased savings, and quicker deployment.
    Type: Application
    Filed: July 21, 2016
    Publication date: November 10, 2016
    Inventors: Jack W. DAVIDSON, Jason D. HISER
  • Publication number: 20160217287
    Abstract: Method, system and computer program product for applying existing anti-tampering and obfuscation techniques to virtual machine technology and offers several distinct advantages. The anti-tampering and obfuscation transforms can be applied continuously to prevent adversaries from gaining information about the program through emulation or dynamic analysis. In addition, the encryption can be used to prevent hackers from gaining information using static attacks. The use of a virtual machine also allows for low overhead execution of the obfuscated binaries as well as finer adjustment of the amount of overhead that can be tolerated. In addition, more protection can be applied to specific portions of the application that can tolerate slowdown. The in-corporation of a virtual machine also makes it easy to extend the technology to integrate new developments and resistance mechanisms, leading to less development time, increased savings, and quicker deployment.
    Type: Application
    Filed: March 23, 2016
    Publication date: July 28, 2016
    Inventors: Jack W. DAVIDSON, Jason D. HISER
  • Publication number: 20150304337
    Abstract: Methods and systems are described for detecting command injection attacks. A positive, taint inference method includes receiving signature fragments on one hand, converting command injection instructions into command fragments on another hand, thus identifying potential attacks upon the condition that a command injection instruction includes critical untrusted parts by using signature fragments. A system detects command injection attacks using this kind of method, and remediates and rejects potential attacks.
    Type: Application
    Filed: November 14, 2013
    Publication date: October 22, 2015
    Applicant: UNIVERSITY OF VIRGINIA PATENT FOUNDATION
    Inventors: Anh Nguyen-Tuong, Jack W. Davidson, Michele Co, Jason D. Hiser, John C. Knight
  • Publication number: 20150106872
    Abstract: A method and system for relocating executable instructions to arbitrary locations are disclosed. The instruction relocation may be arbitrary or random, and may operate on groups of instructions or individual instructions. Such relocation may be achieved through hardware or software, and may use a virtual machine, software dynamic translators, interpreters, or emulators. Instruction relocation may use or produce a specification governing how to relocate the desired instructions. Randomizing the location of instructions provides defenses against a variety of security attacks. The disclosed embodiments provide many advantages over other instruction relocation techniques, such as low runtime overhead, no required user interaction, applicability post-deployment, and the ability to operate on arbitrary executable programs.
    Type: Application
    Filed: February 27, 2013
    Publication date: April 16, 2015
    Applicant: University of Virginia Patent Foundation
    Inventors: Jason D. Hiser, Anh Nguyen-Tuong, Michele Co, Jack W. Davidson
  • Publication number: 20110035601
    Abstract: Method, system and computer program product for applying existing anti-tampering and obfuscation technique to virtual machine technology and offers several distinct advantages. The anti-tampering and obfuscation transforms can be applied continuously to prevent adversaries from gaining information about the program through emulation or dynamic analysis. In addition, the encryption can be used to prevent hackers from gaining information using static attacks. The use of a virtual machine also allows for low overhead execution of the obfuscated binaries as well as finer adjustment of the amount of overhead that can be tolerated. In addition, more protection can be applied to specific portions of the application that can tolerate slowdown. The incorporation of a virtual machine also makes it easy to extend the technology to integrate new developments and resistance mechanisms, leading to less development time, increased savings, and quicker deployment.
    Type: Application
    Filed: December 19, 2008
    Publication date: February 10, 2011
    Applicant: University of Virginia Patent Foundation
    Inventors: Jack W. Davidson, Jason D. Hiser