Patents by Inventor Weidong Cui
Weidong Cui has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240231866Abstract: A computer implemented method includes loading a first kernel layer having a first privilege level onto a hosting environment. A second kernel layer having a second privilege level different from the first privilege level is also loaded onto the hosting environment. The first kernel layer is isolated from the second kernel layer and access to a hosting environment memory protection table is controlled via the first kernel layer.Type: ApplicationFiled: October 21, 2022Publication date: July 11, 2024Inventors: Gangadhara Swamy SHIVAGANGA NAGARAJU, Pushkar Vijay CHITNIS, Weidong CUI, Ziqiao ZHOU
-
Publication number: 20240152583Abstract: This disclosure describes systems and methods for protecting commercial off-the-shelf software program code from piracy. A software program may include an executable file. The executable file may include code and data. A platform may modify the executable file such that the data may be placed at a location in memory not based on a fixed distance from the code. The platform may modify the executable file to indicate that the code should be loaded in a hardware enclave and at least a portion of the data should be loaded in the memory outside the hardware enclave. The platform may encrypt the code and provide it to a computing device.Type: ApplicationFiled: January 16, 2024Publication date: May 9, 2024Inventors: Xinyang GE, Weidong CUI, Ben NIU, Ling Tony CHEN
-
Publication number: 20240134668Abstract: A computer implemented method includes loading a first kernel layer having a first privilege level onto a hosting environment. A second kernel layer having a second privilege level different from the first privilege level is also loaded onto the hosting environment. The first kernel layer is isolated from the second kernel layer and access to a hosting environment memory protection table is controlled via the first kernel layer.Type: ApplicationFiled: October 20, 2022Publication date: April 25, 2024Inventors: Gangadhara Swamy SHIVAGANGA NAGARAJU, Pushkar Vijay CHITNIS, Weidong CUI, Ziqiao ZHOU
-
Patent number: 11928190Abstract: This disclosure describes systems and methods for protecting commercial off-the-shelf software program code from piracy. A software program may include an executable file having code and data. A platform may modify the executable file such that the data may be placed at a location in memory that is an arbitrary distance from the code. The platform may modify the executable file to include a separation header. The separation header may indicate that the data can be placed at an arbitrary distance in the memory from the code. The separation header may indicate that the code should be loaded into a hardware enclave and that the data should be loaded outside of the hardware enclave. The platform may encrypt the code and provide it to a computing device. The computing device may load the encrypted code into the hardware enclave but load the data into memory outside the hardware enclave.Type: GrantFiled: October 20, 2022Date of Patent: March 12, 2024Assignee: Microsoft Technology Licensing, LLCInventors: Xinyang Ge, Weidong Cui, Ben Niu, Ling Tony Chen
-
Patent number: 11922168Abstract: A program is executed using a call stack and shadow stack. The call stack includes frames having respective return addresses. The frames may also store variables and/or parameters. The shadow stack stores duplicates of the return addresses in the call stack. The call stack and the shadow stack are maintained by, (i) each time a function is called, adding a corresponding stack frame to the call stack and adding a corresponding return address to the shadow stack, and (ii) each time a function is exited, removing a corresponding frame from the call stack and removing a corresponding return address from the shadow stack. A backtrace of the program's current call chain is generated by accessing the return addresses in the shadow stack. The outputted backtrace includes the return addresses from the shadow stack and/or information about the traced functions that is derived from the shadow stack's return addresses.Type: GrantFiled: March 23, 2022Date of Patent: March 5, 2024Assignee: Microsoft Technology Licensing, LLCInventors: Ben Niu, Gregory John Colombo, Weidong Cui, Jason Lin, Kenneth Dean Johnson
-
Publication number: 20230349912Abstract: Provided herein are methods of processing a polypeptide or protein for analysis, e.g., peptide mapping analysis by mass spectrometry. In exemplary embodiments, the method comprises incubating a digested sample at a mildly acidic pH and/or in the presence of a chaotrope, wherein the digested sample is produced by digesting a polypeptide with a protease to produce a digested sample comprising at least two peptides. In exemplary embodiments, the method comprises digesting the polypeptide with a protease which cleaves C-terminal to tryptophan to produce a digested sample comprising at least two peptides. In exemplary embodiments, the method comprises digesting the polypeptide with trypsin at an enzyme:substrate (E:S) weight ratio of about 1:1 to about 1:15 to produce a digested sample comprising at least two peptides. In exemplary aspects, the digested sample comprises at least one or two peptides each comprising a tyrosine at the C-terminus.Type: ApplicationFiled: September 17, 2021Publication date: November 2, 2023Applicant: AMGEN INC.Inventors: Gang XIAO, Pavel BONDARENKO, Liuqing SHI, Thomas M. DILLON, Da REN, Margaret Speed RICCI, Weidong CUI, John Joseph HARRAHY, Jake PAWLOWSKI, Andrew DYKSTRA, Dylan RIGGS
-
Publication number: 20230044383Abstract: This disclosure describes systems and methods for protecting commercial off-the-shelf software program code from piracy. A software program may include an executable file having code and data. A platform may modify the executable file such that the data may be placed at a location in memory that is an arbitrary distance from the code. The platform may modify the executable file to include a separation header. The separation header may indicate that the data can be placed at an arbitrary distance in the memory from the code. The separation header may indicate that the code should be loaded into a hardware enclave and that the data should be loaded outside of the hardware enclave. The platform may encrypt the code and provide it to a computing device. The computing device may load the encrypted code into the hardware enclave but load the data into memory outside the hardware enclave.Type: ApplicationFiled: October 20, 2022Publication date: February 9, 2023Inventors: Xinyang GE, Weidong CUI, Ben NIU, Ling Tony CHEN
-
Patent number: 11500969Abstract: This disclosure describes systems and methods for protecting commercial off-the-shelf software program code from piracy. A software program may include multiple image files having code and data. A platform may modify the executable file such that the data may be placed at a location in memory that is an arbitrary distance from the code. The platform may encrypt the code and provide it to a computing device comprising a hardware enclave. The computing device may load the encrypted code into the hardware enclave but load the data into memory outside the hardware enclave. The computing device may request a decryption key from an authentication server using a hash of the hardware enclave signed by a processor. The authentication server may provide the decryption key if it verifies the signature and the hash. The computing device may decrypt the code and mark the hardware enclave as non-readable.Type: GrantFiled: January 3, 2020Date of Patent: November 15, 2022Assignee: Microsoft Technology Licensing, LLCInventors: Xinyang Ge, Weidong Cui, Ben Niu, Ling Tony Chen
-
Publication number: 20220214882Abstract: A program is executed using a call stack and shadow stack. The call stack includes frames having respective return addresses. The frames may also store variables and/or parameters. The shadow stack stores duplicates of the return addresses in the call stack. The call stack and the shadow stack are maintained by, (i) each time a function is called, adding a corresponding stack frame to the call stack and adding a corresponding return address to the shadow stack, and (ii) each time a function is exited, removing a corresponding frame from the call stack and removing a corresponding return address from the shadow stack. A backtrace of the program's current call chain is generated by accessing the return addresses in the shadow stack. The outputted backtrace includes the return addresses from the shadow stack and/or information about the traced functions that is derived from the shadow stack's return addresses.Type: ApplicationFiled: March 23, 2022Publication date: July 7, 2022Inventors: Ben NIU, Gregory John COLOMBO, Weidong CUI, Jason LIN, Kenneth Dean JOHNSON
-
Patent number: 11294682Abstract: A program is executed using a call stack and shadow stack. The call stack includes frames having respective return addresses. The frames may also store variables and/or parameters. The shadow stack stores duplicates of the return addresses in the call stack. The call stack and the shadow stack are maintained by, (i) each time a function is called, adding a corresponding stack frame to the call stack and adding a corresponding return address to the shadow stack, and (ii) each time a function is exited, removing a corresponding frame from the call stack and removing a corresponding return address from the shadow stack. A backtrace of the program's current call chain is generated by accessing the return addresses in the shadow stack. The outputted backtrace includes the return addresses from the shadow stack and/or information about the traced functions that is derived from the shadow stack's return addresses.Type: GrantFiled: May 20, 2019Date of Patent: April 5, 2022Assignee: Microsoft Technology Licensing, LLCInventors: Ben Niu, Gregory John Colombo, Weidong Cui, Jason Lin, Kenneth Dean Johnson
-
Publication number: 20210209201Abstract: This disclosure describes systems and methods for protecting commercial off-the-shelf software program code from piracy. A software program may include multiple image files having code and data. A platform may modify the executable file such that the data may be placed at a location in memory that is an arbitrary distance from the code. The platform may encrypt the code and provide it to a computing device comprising a hardware enclave. The computing device may load the encrypted code into the hardware enclave but load the data into memory outside the hardware enclave. The computing device may request a decryption key from an authentication server using a hash of the hardware enclave signed by a processor. The authentication server may provide the decryption key if it verifies the signature and the hash. The computing device may decrypt the code and mark the hardware enclave as non-readable.Type: ApplicationFiled: January 3, 2020Publication date: July 8, 2021Inventors: Xinyang GE, Weidong CUI, Ben NIU, Ling Tony CHEN
-
Publication number: 20200371809Abstract: A program is executed using a call stack and shadow stack. The call stack includes frames having respective return addresses. The frames may also store variables and/or parameters. The shadow stack stores duplicates of the return addresses in the call stack. The call stack and the shadow stack are maintained by, (i) each time a function is called, adding a corresponding stack frame to the call stack and adding a corresponding return address to the shadow stack, and (ii) each time a function is exited, removing a corresponding frame from the call stack and removing a corresponding return address from the shadow stack. A backtrace of the program's current call chain is generated by accessing the return addresses in the shadow stack. The outputted backtrace includes the return addresses from the shadow stack and/or information about the traced functions that is derived from the shadow stack's return addresses.Type: ApplicationFiled: May 20, 2019Publication date: November 26, 2020Inventors: Ben NIU, Gregory John COLOMBO, Weidong CUI, Jason LIN, Kenneth Dean JOHNSON
-
Patent number: 10565511Abstract: Debugging systems are configured to resolve both memory aliasing conditions in which a write instruction is directed to an unknown destination address, and concurrency conditions in which control flow information is collected for multiple, concurrently executing threads. Recorded state values corresponding to an application's prior execution and control flow information are both obtained.Type: GrantFiled: October 1, 2018Date of Patent: February 18, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Weidong Cui, Xinyang Ge, Baris Can Cengiz Kasikci, Ben Niu, Ruoyu Wang, Insu Yun
-
Patent number: 10505954Abstract: Graph-based detection systems and techniques are provided to identify potential malicious lateral movement paths. System and security events may be used to generate a network connection graph and detect remote file executions and/or other detections, for use in tracking malicious lateral movement across a computer network, such as a compromised computer network. Lateral movement determination across a computer network may be divided into two subproblems: forensic analysis and general detection. With forensic analysis, given a malicious node, possible lateral movement leading into or out of the node is identified. General detection identifies previously unknown malicious lateral movement on a network using a remote file execution detector, and/or other detectors, and a rare path anomaly detection algorithm.Type: GrantFiled: June 14, 2017Date of Patent: December 10, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Jack Wilson Stokes, III, Robert James Mead, Tim William Burrell, Ian Hellen, John Joseph Lambert, Weidong Cui, Andrey Marochko, Qingyun Liu
-
Publication number: 20180367548Abstract: Graph-based detection systems and techniques are provided to identify potential malicious lateral movement paths. System and security events may be used to generate a network connection graph and detect remote file executions and/or other detections, for use in tracking malicious lateral movement across a computer network, such as a compromised computer network. Lateral movement determination across a computer network may be divided into two subproblems: forensic analysis and general detection. With forensic analysis, given a malicious node, possible lateral movement leading into or out of the node is identified. General detection identifies previously unknown malicious lateral movement on a network using a remote file execution detector, and/or other detectors, and a rare path anomaly detection algorithm.Type: ApplicationFiled: June 14, 2017Publication date: December 20, 2018Inventors: Jack Wilson STOKES, III, Robert James MEAD, Tim William BURRELL, Ian HELLEN, John Joseph LAMBERT, Weidong CUI, Andrey MAROCHKO, Qingyun LIU
-
Patent number: 9619654Abstract: Methods and systems for application monitoring through collective record and replay are disclosed herein. The method includes recording a number of execution traces for an application from a number of user devices at a runtime library, wherein the number of execution traces relates to non-deterministic data. The method also includes replaying the number of execution traces to determine whether a behavior of the application creates a security risk.Type: GrantFiled: January 30, 2015Date of Patent: April 11, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Brendan Dolan-Gavitt, David Alexander Molnar, Weidong Cui
-
Patent number: 9329845Abstract: A system described herein includes a receiver component that receives source code from a computer-readable medium of a computing device and a static analysis component that executes a points-to analysis algorithm over the source code to cause generation of a points-to graph, wherein the points-to graph is a directed graph that comprises a plurality of nodes and a plurality of edges, wherein nodes of the points-to graph represent pointers in the source code and edges represent inclusion relationships in the source code. The system also includes an inference component that infers target types for generic pointers in the source code based at least in part upon known type definitions and global variables in the source code.Type: GrantFiled: June 4, 2009Date of Patent: May 3, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Weidong Cui, Marcus Peinado
-
Publication number: 20160051660Abstract: Methods and compositions for the optimization of production of influenza viruses suitable as influenza vaccines are provided.Type: ApplicationFiled: March 4, 2015Publication date: February 25, 2016Inventors: George Robert TRAGER, Richard M. Schwartz, Vu Truong-Le, Luisa Yee, John Michael Berry, Weidong Cui
-
Publication number: 20160026782Abstract: Described is a technology by which the identity of a person (e.g., a customer in a commercial transaction) is determinable without active identification effort, via biometric data is obtained without action by the person. Machine processing of the biometric data over a set of possible persons, determined from secondary proximity sensing, is used to determine or assist in determining the identity of the person.Type: ApplicationFiled: September 4, 2015Publication date: January 28, 2016Applicant: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Christopher Stephen Frederick Smowton, Ronnie Chaiken, Weidong Cui, Oliver H. Foehr, Jacob Rubin Lorch, David Molnar, Bryan Jeffrey Parno, Stefan Saroiu, Alastair Wolman
-
Patent number: 9152868Abstract: Described is a technology by which the identity of a person (e.g., a customer in a commercial transaction) is determinable without active identification effort, via biometric data is obtained without action by the person. Machine processing of the biometric data over a set of possible persons, determined from secondary proximity sensing, is used to determine or assist in determining the identity of the person.Type: GrantFiled: March 23, 2012Date of Patent: October 6, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Christopher Stephen Frederick Smowton, Ronnie Chaiken, Weidong Cui, Oliver H. Foehr, Jacob Rubin Lorch, David Molnar, Bryan Jeffrey Parno, Stefan Saroiu, Alastair Wolman