Patents by Inventor Junghwan Rhee

Junghwan Rhee has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20170132053
    Abstract: Methods and systems for profiling requests include generating request units based on collected kernel events that include complete request units and half-open request units. The generated request units are sequenced based on a causality relationship set that describes causality relationships between kernel events.
    Type: Application
    Filed: September 14, 2016
    Publication date: May 11, 2017
    Inventors: Hui Zhang, Guofei Jiang, Junghwan Rhee, Nipun Arora
  • Patent number: 9602338
    Abstract: A computer implemented method for network monitoring includes providing network packet event characterization and analysis for network monitoring that includes supporting summarization and characterization of network packet traces collected across multiple processing elements of different types in a virtual network, including a trace slicing to organize individual packet events into path-based trace slices, a trace characterization to extract at least 2 types of feature matrix describing those trace slices, and a trace analysis to cluster, rank and query packet traces based on metrics of the feature matrix.
    Type: Grant
    Filed: December 18, 2014
    Date of Patent: March 21, 2017
    Assignee: NEC Corporation
    Inventors: Hui Zhang, Junghwan Rhee, Nipun Arora, Cristian Lumezanu, Guofei Jiang
  • Patent number: 9602528
    Abstract: Methods and systems for process constraint include collecting system call information for a process. It is detected whether the process is idle based on the system call information and then whether the process is repeating using autocorrelation to determine whether the process issues system calls in a periodic fashion. The process is constrained if it is idle or repeating to limit an attack surface presented by the process.
    Type: Grant
    Filed: May 14, 2015
    Date of Patent: March 21, 2017
    Assignee: NEC Corporation
    Inventors: Zhiyun Qian, Jun Wang, Zhichun Li, Zhenyu Wu, Junghwan Rhee, Xia Ning, Guofei Jiang
  • Patent number: 9542232
    Abstract: A system and method for transforming a legacy device into a virtualized environment, comprising includes analyzing the profiling data for at least one application to determine usage frequency and resource requirements of the at least one application. Captured user events are benchmarked to simulate a user workload for the at least one application to determine how resource utilization and execution times scale from a legacy environment to a virtualized environment. The legacy device is transformed into the virtualized environment in accordance with a provisioning plan.
    Type: Grant
    Filed: December 15, 2015
    Date of Patent: January 10, 2017
    Assignee: International Business Machines Corporation
    Inventors: Kirk A. Beaty, Rajdeep Bhowmik, Andrzej Kochut, Junghwan Rhee, Hidayatullah H. Shaikh
  • Patent number: 9535814
    Abstract: The present invention enables capturing API level calls using a combination of dynamic instrumentation and library overriding. The invention allows event level tracing of API function calls and returns, and is able to generate an execution trace. The instrumentation is lightweight and relies on dynamic library/shared library linking mechanisms in most operating systems. Hence we need no source code modification or binary injection. The tool can be used to capture parameter values, and return values, which can be used to correlate traces across API function calls to generate transaction flow logic.
    Type: Grant
    Filed: March 23, 2015
    Date of Patent: January 3, 2017
    Assignee: NEC Corporation
    Inventors: Nipun Arora, Junghwan Rhee, Hui Zhang, Guofei Jiang
  • Patent number: 9489286
    Abstract: This invention provides a new mechanism for “Hot-Tracing” using a novel placeholder mechanism and binary rewriting techniques, which leverages existing compiler flags in order to enable light-weight and highly flexible dynamic instrumentation. Broadly, I-Probe can be divided in 2 distinct workflows—1. Pre-processing (ColdPatch), and 2. Hot Tracing. The first phase is a pre-processing mechanism to prepare the binary for phase 2. The second phase is the actual hot-tracing mechanism, which allows users to dynamically instrument functions (more specifically symbols) of their choice.
    Type: Grant
    Filed: January 30, 2014
    Date of Patent: November 8, 2016
    Assignee: NEC Corporation
    Inventors: Nipun Arora, Hui Zhang, Junghwan Rhee, Guofei Jiang, Kenji Yoshihira
  • Patent number: 9450823
    Abstract: Method and systems for controlling a hybrid network having software-defined network (SDN) switches and legacy switches include initializing a hybrid network topology by retrieving information on a physical and virtual infrastructure of the hybrid network; generating a path between two nodes on the hybrid network based on the physical and virtual infrastructure of the hybrid network; generating a virtual local area network by issuing remote procedure call instructions to legacy switches in accordance with a network configuration request; and generating an SDN network slice by issuing SDN commands to SDN switches in accordance with the network configuration request.
    Type: Grant
    Filed: August 6, 2014
    Date of Patent: September 20, 2016
    Assignee: NEC Corporation
    Inventors: Nipun Arora, Hui Zhang, Cristian Lumezanu, Junghwan Rhee, Guofei Jiang, Hui Lu
  • Patent number: 9367821
    Abstract: A system and method for profiling a request in a service system with kernel events including a pre-processing module configured to obtain kernel event traces from the service system and determine starting and ending communication pairs of a request path for a request. A learning module is configured to learn pairwise relationships between the starting and ending communication pairs of training traces of sequential requests. A generation module is configured to generate communication paths for the request path from the starting and ending communication pairs of testing traces of concurrent requests using a heuristic procedure that is guided by the learned pairwise relationships and generate the request path for the request from the communication paths. The system and method precisely determine request paths for applications in a distributed system from kernel event traces even when there are numerous concurrent requests.
    Type: Grant
    Filed: August 28, 2015
    Date of Patent: June 14, 2016
    Assignee: NEC Corporation
    Inventors: Hui Zhang, Xia Ning, Junghwan Rhee, Guofei Jiang, Hongteng Xu
  • Patent number: 9367428
    Abstract: Methods and systems for performance inference include inferring an internal application status based on a unified call stack trace that includes both user and kernel information by inferring user function instances. A calling context encoding is generated that includes information regarding function calling paths. Application performance is analyzed based on the encoded calling contexts. The analysis includes performing a top-down latency breakdown and ranking calling contexts according to how costly each function calling path is.
    Type: Grant
    Filed: October 13, 2014
    Date of Patent: June 14, 2016
    Assignee: NEC Corporation
    Inventors: Junghwan Rhee, Hui Zhang, Nipun Arora, Guofei Jiang, Chung Hwan Kim
  • Publication number: 20160098301
    Abstract: A system and method for transforming a legacy device into a virtualized environment, comprising includes analyzing the profiling data for at least one application to determine usage frequency and resource requirements of the at least one application. Captured user events are benchmarked to simulate a user workload for the at least one application to determine how resource utilization and execution times scale from a legacy environment to a virtualized environment. The legacy device is transformed into the virtualized environment in accordance with a provisioning plan.
    Type: Application
    Filed: December 15, 2015
    Publication date: April 7, 2016
    Inventors: Kirk A. Beaty, Rajdeep Bhowmik, Andrzej Kochut, Junghwan Rhee, Hidayatullah H. Shaikh
  • Publication number: 20160063398
    Abstract: A system and method for profiling a request in a service system with kernel events including a pre-processing module configured to obtain kernel event traces from the service system and determine starting and ending communication pairs of a request path for a request. A learning module is configured to learn pairwise relationships between the starting and ending communication pairs of training traces of sequential requests. A generation module is configured to generate communication paths for the request path from the starting and ending communication pairs of testing traces of concurrent requests using a heuristic procedure that is guided by the learned pairwise relationships and generate the request path for the request from the communication paths. The system and method precisely determine request paths for applications in a distributed system from kernel event traces even when there are numerous concurrent requests.
    Type: Application
    Filed: August 28, 2015
    Publication date: March 3, 2016
    Inventors: Hui Zhang, Xia Ning, Junghwan Rhee, Guofei Jiang, Hongteng Xu
  • Publication number: 20160034687
    Abstract: Systems and methods for detection and prevention of Return-Oriented-Programming (ROP) attacks in one or more applications, including an attack detection device and a stack inspection device for performing stack inspection to detect ROP gadgets in a stack. The stack inspection includes stack walking from a stack frame at a top of the stack toward a bottom of the stack to detect one or more failure conditions, determining whether a valid stack frame and return code address is present; and determining a failure condition type if no valid stack frame and return code is present, with Type III failure conditions indicating an ROP attack. The ROP attack is contained using a containment device, and the ROP gadgets detected in the stack during the ROP attack are analyzed using an attack analysis device.
    Type: Application
    Filed: July 29, 2015
    Publication date: February 4, 2016
    Inventors: Junghwan Rhee, Yangchun Fu, Zhenyu Wu, Hui Zhang, Zhichun Li, Guofei Jiang
  • Patent number: 9244704
    Abstract: A system and method for transforming a legacy device into a virtualized environment, comprising includes analyzing the profiling data for at least one application to determine usage frequency and resource requirements of the at least one application. Captured user events are benchmarked to simulate a user workload for the at least one application to determine how resource utilization and execution times scale from a legacy environment to a virtualized environment. The legacy device is transformed into the virtualized environment in accordance with a provisioning plan.
    Type: Grant
    Filed: June 7, 2013
    Date of Patent: January 26, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Kirk A. Beaty, Rajdeep Bhowmik, Andrzej Kochut, Junghwan Rhee, Hidayatullah H. Shaikh
  • Publication number: 20150334128
    Abstract: Methods and systems for process constraint include collecting system call information for a process. It is detected whether the process is idle based on the system call information and then whether the process is repeating using autocorrelation to determine whether the process issues system calls in a periodic fashion. The process is constrained if it is idle or repeating to limit an attack surface presented by the process.
    Type: Application
    Filed: May 14, 2015
    Publication date: November 19, 2015
    Inventors: Zhiyun Qian, Jun Wang, Zhichun Li, Zhenyu Wu, Junghwan Rhee, Xia Ning, Guofei Jiang
  • Publication number: 20150281076
    Abstract: A computer implemented method for network monitoring includes providing network packet event characterization and analysis for network monitoring that includes supporting summarization and characterization of network packet traces collected across multiple processing elements of different types in a virtual network, including a trace slicing to organize individual packet events into path-based trace slices, a trace characterization to extract at least 2 types of feature matrix describing those trace slices, and a trace analysis to cluster, rank and query packet traces based on metrics of the feature matrix.
    Type: Application
    Filed: March 23, 2015
    Publication date: October 1, 2015
    Inventors: Hui Zhang, Cristian Lumezanu, Junghwan Rhee, Nipun Arora, Qiang Xu, Guofei Jiang
  • Publication number: 20150278069
    Abstract: The present invention enables capturing API level calls using a combination of dynamic instrumentation and library overriding. The invention allows event level tracing of API function calls and returns, and is able to generate an execution trace. The instrumentation is lightweight and relies on dynamic library/shared library linking mechanisms in most operating systems. Hence we need no source code modification or binary injection. The tool can be used to capture parameter values, and return values, which can be used to correlate traces across API function calls to generate transaction flow logic.
    Type: Application
    Filed: March 23, 2015
    Publication date: October 1, 2015
    Inventors: Nipun Arora, Junghwan Rhee, Hui Zhang, Guofei Jiang
  • Patent number: 9092568
    Abstract: A system for automatically instrumenting and tracing an application program and related software components achieves a correlated tracing of the program execution. It includes tracing of endpoints that are the set of functions in the program execution path that the developers are interested. The tracing endpoints and related events become the total set of functions to be traced in the program (called instrument points). This invention automatically analyzes the program and generates such instrumentation points to enable correlated tracing. The generated set of instrumentation points addresses common questions that developers ask when they use monitoring tools.
    Type: Grant
    Filed: April 30, 2013
    Date of Patent: July 28, 2015
    Assignee: NEC Laboratories America, Inc.
    Inventors: Junghwan Rhee, Hui Zhang, Nipun Arora, Guofei Jiang, Kenji Yoshihira, Myoungku Song
  • Publication number: 20150180755
    Abstract: A computer implemented method for network monitoring includes providing network packet event characterization and analysis for network monitoring that includes supporting summarization and characterization of network packet traces collected across multiple processing elements of different types in a virtual network, including a trace slicing to organize individual packet events into path-based trace slices, a trace characterization to extract at least 2 types of feature matrix describing those trace slices, and a trace analysis to cluster, rank and query packet traces based on metrics of the feature matrix.
    Type: Application
    Filed: December 18, 2014
    Publication date: June 25, 2015
    Inventors: Hui Zhang, Junghwan Rhee, Nipun Arora, Cristian Lumezanu, Guofei Jiang
  • Publication number: 20150172185
    Abstract: Methods and systems for finding a packet's routing path in a network includes intercepting control messages sent by a controller to one or more switches in a software defined network (SDN). A state of the SDN at a requested time is emulated and one or more possible routing paths through the emulated SDN is identified by replaying the intercepted control messages to one or more emulated switches in the emulated SDN. The one or more possible routing paths correspond to a requested packet injected into the SDN at the requested time.
    Type: Application
    Filed: December 16, 2014
    Publication date: June 18, 2015
    Inventors: Hui Zhang, Behnaz Arzani, Franjo Ivancic, Junghwan Rhee, Nipun Arora, Guofei Jiang
  • Publication number: 20150106794
    Abstract: Methods and systems for performance inference include inferring an internal application status based on a unified call stack trace that includes both user and kernel information by inferring user function instances. A calling context encoding is generated that includes information regarding function calling paths. Application performance is analyzed based on the encoded calling contexts. The analysis includes performing a top-down latency breakdown and ranking calling contexts according to how costly each function calling path is.
    Type: Application
    Filed: October 13, 2014
    Publication date: April 16, 2015
    Inventors: Junghwan Rhee, Hui Zhang, Nipun Arora, Guofei Jiang, Chung Hwan Kim