Patents by Inventor Jiangxia Liu
Jiangxia Liu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11836213Abstract: A client device requests a web page via a clientless VPN. In response to the request, web page content comprising at least one script element is received at the clientless VPN. The clientless VPN inserts a wrapper function around at least a portion of the script element, forming modified web content. The client device is provided with the modified web content.Type: GrantFiled: October 21, 2022Date of Patent: December 5, 2023Assignee: Palo Alto Networks, Inc.Inventors: Jiangxia Liu, Qi Zhang, Bin Zhao
-
Patent number: 11762922Abstract: A native web storage function call is received at a client device. A modified browser storage function call is executed, to facilitate browser storage associated with a clientless VPN. The modified browser storage function call executes a call to the native browser storage function call to facilitate access to the browser storage.Type: GrantFiled: September 23, 2020Date of Patent: September 19, 2023Assignee: Palo Alto Networks, Inc.Inventors: Qi Zhang, Jiangxia Liu
-
Patent number: 11757936Abstract: Techniques for providing a large scale high-interaction honeypot farm are disclosed. In some embodiments, a system/method/computer program product for providing a large scale high-interaction honeypot farm includes sending traffic detected at a sensor to a smart proxy for a honeypot farm that is executed in a honeypot cloud, wherein the traffic is forwarded attack traffic that is sent using a tunneling protocol, and wherein the honeypot farm includes a plurality of container images of distinct types of vulnerable services; selecting a matching type of vulnerable service from the plurality of container images of distinct types of vulnerable services based on a profile of the attack traffic; forwarding the traffic to an instance of the matching type of vulnerable service; and executing a security agent associated with the instance of the matching type of vulnerable service to identify a threat by monitoring behaviors and detecting anomalies or post exploitation activities.Type: GrantFiled: January 13, 2022Date of Patent: September 12, 2023Assignee: Palo Alto Networks, Inc.Inventors: Zihang Xiao, Cong Zheng, Jiangxia Liu
-
Patent number: 11757844Abstract: Techniques for providing a smart proxy for a large scale high-interaction honeypot farm are disclosed. In some embodiments, a system/method/computer program product for providing a smart proxy for a large scale high-interaction honeypot farm includes receiving tunneled traffic at a smart proxy from a sensor for a honeypot farm that is executed in a honeypot cloud, wherein the tunneled traffic is forwarded attack traffic, and wherein the honeypot farm includes a plurality of container images of distinct types of vulnerable services; selecting a matching type of vulnerable service from the plurality of container images of distinct types of vulnerable services based on a profile of the attack traffic; and forwarding the tunneled traffic to an instance of the matching type of vulnerable service.Type: GrantFiled: January 13, 2022Date of Patent: September 12, 2023Assignee: Palo Alto Networks, Inc.Inventors: Zihang Xiao, Cong Zheng, Jiangxia Liu
-
Patent number: 11736446Abstract: Content obtained from a remote server by a clientless VPN is received in response to a request made by a client browser executing on a client device. The content includes a script and is received at the client device. A determination is made by the client device that the obtained content includes a script that invokes a native accessor function call. Functionality provided by the script is preserved, at least in part, by the client device executing a modified accessor function call.Type: GrantFiled: January 14, 2022Date of Patent: August 22, 2023Assignee: Palo Alto Networks, Inc.Inventors: Jiangxia Liu, Qi Zhang
-
Publication number: 20230244787Abstract: Detection of an exploit including shellcode is disclosed. Memory blocks are monitored during dynamic analysis of a sample to identify a memory block including suspicious shellcode. The memory block is dumped in memory to identify a candidate shellcode entry point associated with the suspicious shellcode. The suspicious shellcode is executed based on the candidate shellcode entry point to determine whether the suspicious shellcode is malicious. A verdict is generated regarding the sample based on results of executing the suspicious shellcode.Type: ApplicationFiled: January 28, 2022Publication date: August 3, 2023Inventors: Tao Yan, Jin Chen, Bo Qu, Jiangxia Liu, Edouard Bochin, Royce Lu
-
Publication number: 20230056928Abstract: A client device requests a web page via a clientless VPN. In response to the request, web page content comprising at least one script element is received at the clientless VPN. The clientless VPN inserts a wrapper function around at least a portion of the script element, forming modified web content. The client device is provided with the modified web content.Type: ApplicationFiled: October 21, 2022Publication date: February 23, 2023Inventors: Jiangxia Liu, Qi Zhang, Bin Zhao
-
Patent number: 11520852Abstract: A client device requests a web page via a clientless VPN. In response to the request, web page content comprising at least one script element is received at the clientless VPN. The clientless VPN inserts a wrapper function around at least a portion of the script element, forming modified web content. The client device is provided with the modified web content.Type: GrantFiled: July 7, 2021Date of Patent: December 6, 2022Assignee: Palo Alto Networks, Inc.Inventors: Jiangxia Liu, Qi Zhang, Bin Zhao
-
Publication number: 20220141253Abstract: Techniques for providing a large scale high-interaction honeypot farm are disclosed. In some embodiments, a system/method/computer program product for providing a large scale high-interaction honeypot farm includes sending traffic detected at a sensor to a smart proxy for a honeypot farm that is executed in a honeypot cloud, wherein the traffic is forwarded attack traffic that is sent using a tunneling protocol, and wherein the honeypot farm includes a plurality of container images of distinct types of vulnerable services; selecting a matching type of vulnerable service from the plurality of container images of distinct types of vulnerable services based on a profile of the attack traffic; forwarding the traffic to an instance of the matching type of vulnerable service; and executing a security agent associated with the instance of the matching type of vulnerable service to identify a threat by monitoring behaviors and detecting anomalies or post exploitation activities.Type: ApplicationFiled: January 13, 2022Publication date: May 5, 2022Inventors: Zihang Xiao, Cong Zheng, Jiangxia Liu
-
Publication number: 20220141193Abstract: Content obtained from a remote server by a clientless VPN is received in response to a request made by a client browser executing on a client device. The content includes a script and is received at the client device. A determination is made by the client device that the obtained content includes a script that invokes a native accessor function call. Functionality provided by the script is preserved, at least in part, by the client device executing a modified accessor function call.Type: ApplicationFiled: January 14, 2022Publication date: May 5, 2022Inventors: Jiangxia Liu, Qi Zhang
-
Publication number: 20220141194Abstract: Techniques for providing a smart proxy for a large scale high-interaction honeypot farm are disclosed. In some embodiments, a system/method/computer program product for providing a smart proxy for a large scale high-interaction honeypot farm includes receiving tunneled traffic at a smart proxy from a sensor for a honeypot farm that is executed in a honeypot cloud, wherein the tunneled traffic is forwarded attack traffic, and wherein the honeypot farm includes a plurality of container images of distinct types of vulnerable services; selecting a matching type of vulnerable service from the plurality of container images of distinct types of vulnerable services based on a profile of the attack traffic; and forwarding the tunneled traffic to an instance of the matching type of vulnerable service.Type: ApplicationFiled: January 13, 2022Publication date: May 5, 2022Inventors: Zihang Xiao, Cong Zheng, Jiangxia Liu
-
Patent number: 11271907Abstract: Techniques for providing a smart proxy for a large scale high-interaction honeypot farm are disclosed. In some embodiments, a system/method/computer program product for providing a smart proxy for a large scale high-interaction honeypot farm includes receiving tunneled traffic at a smart proxy from a sensor for a honeypot farm that is executed in a honeypot cloud, wherein the tunneled traffic is forwarded attack traffic, and wherein the honeypot farm includes a plurality of container images of distinct types of vulnerable services; selecting a matching type of vulnerable service from the plurality of container images of distinct types of vulnerable services based on a profile of the attack traffic; and forwarding the tunneled traffic to an instance of the matching type of vulnerable service.Type: GrantFiled: December 19, 2019Date of Patent: March 8, 2022Assignee: Palo Alto Networks, Inc.Inventors: Zihang Xiao, Cong Zheng, Jiangxia Liu
-
Publication number: 20220070223Abstract: Techniques for a security platform with external inline processing of assembled selected traffic are disclosed. In some embodiments, a system/method/computer program product for providing a security platform with external inline processing of assembled selected traffic includes monitoring network traffic of a session at a security platform; selecting a subset of the monitored network traffic associated with the session to send to a cloud-based security service for analysis based on a security policy, wherein the selected subset of the monitored network traffic is proxied to the cloud-based security service; and receiving, from the cloud-based security service, results of the analysis based on the security policy, and performing a responsive action based on the results of the analysis based on the security policy.Type: ApplicationFiled: August 31, 2020Publication date: March 3, 2022Inventors: Suiqiang Deng, Jiangxia Liu
-
Patent number: 11265346Abstract: Techniques for providing a large scale high-interaction honeypot farm are disclosed. In some embodiments, a system/method/computer program product for providing a large scale high-interaction honeypot farm includes sending traffic detected at a sensor to a smart proxy for a honeypot farm that is executed in a honeypot cloud, wherein the traffic is forwarded attack traffic that is sent using a tunneling protocol, and wherein the honeypot farm includes a plurality of container images of distinct types of vulnerable services; selecting a matching type of vulnerable service from the plurality of container images of distinct types of vulnerable services based on a profile of the attack traffic; forwarding the traffic to an instance of the matching type of vulnerable service; and executing a security agent associated with the instance of the matching type of vulnerable service to identify a threat by monitoring behaviors and detecting anomalies or post exploitation activities.Type: GrantFiled: December 19, 2019Date of Patent: March 1, 2022Assignee: Palo Alto Networks, Inc.Inventors: Zihang Xiao, Cong Zheng, Jiangxia Liu
-
Patent number: 11265295Abstract: A modified accessor function call is provided to the client device by a clientless VPN in conjunction with a browsing session performed by the client device via the clientless VPN. A native accessor function call is received at a client device. The modified accessor function call is executed at the client device, including by using the native accessor function call.Type: GrantFiled: January 26, 2021Date of Patent: March 1, 2022Assignee: Palo Alto Networks, Inc.Inventors: Jiangxia Liu, Qi Zhang
-
Publication number: 20210334330Abstract: A client device requests a web page via a clientless VPN. In response to the request, web page content comprising at least one script element is received at the clientless VPN. The clientless VPN inserts a wrapper function around at least a portion of the script element, forming modified web content. The client device is provided with the modified web content.Type: ApplicationFiled: July 7, 2021Publication date: October 28, 2021Inventors: Jiangxia Liu, Qi Zhang, Bin Zhao
-
Patent number: 11093574Abstract: A client device requests a web page, via a clientless VPN. In response to the request, web page content comprising dynamic content is received at the clientless VPN. The clientless VPN inserts a wrapper function around the dynamic content, forming modified web content. The client device is provided with the modified web content.Type: GrantFiled: July 26, 2018Date of Patent: August 17, 2021Assignee: Palo Alto Networks, Inc.Inventors: Jiangxia Liu, Qi Zhang, Bin Zhao
-
Publication number: 20210194853Abstract: Techniques for providing a smart proxy for a large scale high-interaction honeypot farm are disclosed. In some embodiments, a system/method/computer program product for providing a smart proxy for a large scale high-interaction honeypot farm includes receiving tunneled traffic at a smart proxy from a sensor for a honeypot farm that is executed in a honeypot cloud, wherein the tunneled traffic is forwarded attack traffic, and wherein the honeypot farm includes a plurality of container images of distinct types of vulnerable services; selecting a matching type of vulnerable service from the plurality of container images of distinct types of vulnerable services based on a profile of the attack traffic; and forwarding the tunneled traffic to an instance of the matching type of vulnerable service.Type: ApplicationFiled: December 19, 2019Publication date: June 24, 2021Inventors: Zihang Xiao, Cong Zheng, Jiangxia Liu
-
Publication number: 20210194925Abstract: Techniques for providing a large scale high-interaction honeypot farm are disclosed. In some embodiments, a system/method/computer program product for providing a large scale high-interaction honeypot farm includes sending traffic detected at a sensor to a smart proxy for a honeypot farm that is executed in a honeypot cloud, wherein the traffic is forwarded attack traffic that is sent using a tunneling protocol, and wherein the honeypot farm includes a plurality of container images of distinct types of vulnerable services; selecting a matching type of vulnerable service from the plurality of container images of distinct types of vulnerable services based on a profile of the attack traffic; forwarding the traffic to an instance of the matching type of vulnerable service; and executing a security agent associated with the instance of the matching type of vulnerable service to identify a threat by monitoring behaviors and detecting anomalies or post exploitation activities.Type: ApplicationFiled: December 19, 2019Publication date: June 24, 2021Inventors: Zihang Xiao, Cong Zheng, Jiangxia Liu
-
Publication number: 20210152524Abstract: A modified accessor function call is provided to the client device by a clientless VPN in conjunction with a browsing session performed by the client device via the clientless VPN. A native accessor function call is received at a client device. The modified accessor function call is executed at the client device, including by using the native accessor function call.Type: ApplicationFiled: January 26, 2021Publication date: May 20, 2021Inventors: Jiangxia Liu, Qi Zhang