Patents by Inventor Shiuh-Pyng Shieh

Shiuh-Pyng Shieh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9870471
    Abstract: A computer-implemented method for distilling a malware program in a system is disclosed. The computer-implemented method includes steps of receiving a known malware program sample; providing a benign program containing a first instruction set associated with a security; extracting the instruction set; tracing a program segment associated with the instruction set from the benign program using a plurality of data flow pathways; slicing the program segment into a plurality of independent data flow elements; identifying a partial program having elements identical to the plurality of independent data flow elements from the known malware program sample; and removing the partial program from the known malware program sample to distill the malware program.
    Type: Grant
    Filed: July 11, 2014
    Date of Patent: January 16, 2018
    Assignee: NATIONAL CHIAO TUNG UNIVERSITY
    Inventors: Zong-Shian Shen, Shiuh-Pyng Shieh
  • Patent number: 9304792
    Abstract: A computer system and a method for tracking information flow are provided. The computer system divides an information flow tracking task into two decoupled tasks executed by two procedures. The first procedure emulates execution of instructions and divides the instructions into code blocks according to an instruction executing sequence. The first procedure translates the instructions of the code blocks into information flow codes and transmits them to the second procedure. The first procedure further translates the instructions into dynamic emulation instructions and executes the dynamic emulation instructions to generate addressing results of the dynamic addressing instructions. The second procedure executes the information flow codes according to the addressing results to emulate the instructions of the code blocks. Moreover, the method also tries to reduce the amount of data transmission between the two procedures when the first procedure executes the emulation task.
    Type: Grant
    Filed: April 30, 2012
    Date of Patent: April 5, 2016
    Assignee: National Chiao Tung University
    Inventors: Chi-Wei Wang, Shiuh-Pyng Shieh, Yen-Ju Liu
  • Publication number: 20150058984
    Abstract: A computer-implemented method for distilling a malware program in a system is disclosed. The computer-implemented method includes steps of receiving a known malware program sample; providing a benign program containing a first instruction set associated with a security; extracting the instruction set; tracing a program segment associated with the instruction set from the benign program using a plurality of data flow pathways; slicing the program segment into a plurality of independent data flow elements; identifying a partial program having elements identical to the plurality of independent data flow elements from the known malware program sample; and removing the partial program from the known malware program sample to distill the malware program.
    Type: Application
    Filed: July 11, 2014
    Publication date: February 26, 2015
    Inventors: Zong-Shian Shen, Shiuh-Pyng Shieh
  • Patent number: 8595504
    Abstract: A method for authenticating a message in a network is provided. The method includes a step of generating, in a sink device, a private key and a public key. The private key includes a plurality of sub-private keys. The method further includes a step of generating, in the sink device, a signature for the message. The signature includes a sub-private key and an authentication path associated with the sub-private key in a hash tree. The hash tree is constructed during the generation of the sub-public keys.
    Type: Grant
    Filed: August 12, 2008
    Date of Patent: November 26, 2013
    Assignee: Industrial Technology Research Institute
    Inventors: Shih-I Huang, Shiuh-Pyng Shieh, Sheng-Ming Chang, Chi-Wei Wang
  • Publication number: 20130185523
    Abstract: A computer system and a method for tracking information flow are provided. The computer system divides an information flow tracking task into two decoupled tasks executed by two procedures. The first procedure emulates execution of instructions and divides the instructions into code blocks according to an instruction executing sequence. The first procedure translates the instructions of the code blocks into information flow codes and transmits them to the second procedure. The first procedure further translates the instructions into dynamic emulation instructions and executes the dynamic emulation instructions to generate addressing results of the dynamic addressing instructions. The second procedure executes the information flow codes according to the addressing results to emulate the instructions of the code blocks. Moreover, the method also tries to reduce the amount of data transmission between the two procedures when the first procedure executes the emulation task.
    Type: Application
    Filed: April 30, 2012
    Publication date: July 18, 2013
    Applicant: NATIONAL CHIAO TUNG UNIVERSITY
    Inventors: Chi-Wei Wang, Shiuh-Pyng Shieh, Yen-Ju Liu
  • Patent number: 8027474
    Abstract: A method for transmitting sensed data in a wireless sensor network including multiple sensors, includes: encrypting the sensed data with an encryption key and a verification key to generate encrypted data in each of the multiple sensors that senses data; wirelessly receiving the encrypted data from the multiple sensors; determining that the sensed data from one of the multiple sensors is different from the sensed data from others of the multiple sensors without decrypting the encrypted data; and transmitting the encrypted sensed data determined to be different.
    Type: Grant
    Filed: October 22, 2007
    Date of Patent: September 27, 2011
    Assignee: Industrial Technology Research Institute
    Inventors: Shih-I Huang, Shiuh-Pyng Shieh
  • Publication number: 20100042842
    Abstract: A method for authenticating a message in a network is provided. The method includes a step of generating, in a sink device, a private key and a public key. The private key includes a plurality of sub-private keys. The method further includes a step of generating, in the sink device, a signature for the message. The signature includes a sub-private key and an authentication path associated with the sub-private key in a hash tree. The hash tree is constructed during the generation of the sub-public keys.
    Type: Application
    Filed: August 12, 2008
    Publication date: February 18, 2010
    Inventors: Shih-I Huang, Shiuh-Pyng Shieh, Sheng-Ming Chang, Chi-Wei Wang
  • Patent number: 7466711
    Abstract: A system and method for synchronously processing a packet are disclosed, which improve the speed of processing the packet by using a load balancing mechanism. The system comprises a switch and a clustered architecture for processing the packet. The switch is for receiving and transmitting the packet. The clustered architecture contains packet processing devices and receives the packet from the switch. All packet processing devices can synchronously process the packet. Each packet processing device has a non-duplicate device number.
    Type: Grant
    Filed: December 20, 2003
    Date of Patent: December 16, 2008
    Assignee: Accton Technology Corporation
    Inventors: Shiuh-Pyng Shieh, Yung-Zen Lai, Fu-Yuan Lee
  • Publication number: 20080247539
    Abstract: A method for transmitting sensed data in a wireless sensor network including multiple sensors, includes: encrypting the sensed data with an encryption key and a verification key to generate encrypted data in each of the multiple sensors that senses data; wirelessly receiving the encrypted data from the multiple sensors; determining that the sensed data from one of the multiple sensors is different from the sensed data from others of the multiple sensors without decrypting the encrypted data; and transmitting the encrypted sensed data determined to be different.
    Type: Application
    Filed: October 22, 2007
    Publication date: October 9, 2008
    Inventors: Shih-I Huang, Shiuh-Pyng Shieh
  • Publication number: 20040258078
    Abstract: A system and method for synchronously processing a packet are disclosed, which improve the speed of processing the packet by using a load balancing mechanism. The system comprises a switch and a clustered architecture for processing the packet. The switch is for receiving and transmitting the packet. The clustered architecture contains packet processing devices and receives the packet from the switch. All packet processing devices can synchronously process the packet. Each packet processing device has a non-duplicate device number.
    Type: Application
    Filed: December 20, 2003
    Publication date: December 23, 2004
    Inventors: Shiuh-Pyng Shieh, Yung-Zen Lai, Fu-Yuan Lee