Patents by Inventor Wenjun Hu

Wenjun Hu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230342461
    Abstract: The detection of malicious documents using knowledge distillation assisted learning is disclosed. A document is received for maliciousness determination. A likelihood that the received document represents a threat is determined. The determination is made, at least in part, using a raw bytes model that was trained, at least in part, using image model prediction probabilities. A verdict for the document is provided as output based at least in part on the determined likelihood.
    Type: Application
    Filed: June 29, 2022
    Publication date: October 26, 2023
    Inventors: Min Du, Curtis Leland Carmony, Wenjun Hu
  • Publication number: 20230342460
    Abstract: The detection of malicious documents using deep mutual learning is disclosed. A document is received for maliciousness determination. A likelihood that the received document represents a threat is determined. The determination is made, at least in part, using a raw bytes model that was trained, at least in part, using a mutual learning process in conjunction with training an image based model. A verdict for the document is provided as output based at least in part on the determined likelihood.
    Type: Application
    Filed: June 29, 2022
    Publication date: October 26, 2023
    Inventors: Min Du, Curtis Leland Carmony, Wenjun Hu
  • Publication number: 20230344861
    Abstract: Malware signature generation through combination rule mining is disclosed. A set of properties associated, collectively, with a plurality of data samples is received. A first data sample has a first set of properties and a second data sample has a second set of properties. A combination signature comprising at least a first property included in the first set of properties and a second property included in the second set of properties is generated.
    Type: Application
    Filed: June 30, 2023
    Publication date: October 26, 2023
    Inventors: Min Du, Wenjun Hu, William Redington Hewlett, II
  • Publication number: 20230342452
    Abstract: Execution of an application in an application-level sandbox is disclosed. A request to launch an application is received by an operating system executing on a device. A determination is made that a stored copy of the application should be executed within an application-level sandbox. The stored copy of the application is executed in the application-level sandbox.
    Type: Application
    Filed: May 12, 2023
    Publication date: October 26, 2023
    Inventors: Zhi Xu, Cong Zheng, Tongbo Luo, Wenjun Hu
  • Publication number: 20230306114
    Abstract: Automatic generation of a malware signature is disclosed. Code of a sample including packages and function names is parsed. Standard type packages and vendor type packages are filtered from the code of the sample to obtain main type packages. A signature using a fuzzy hash for the sample is generated based on the main type packages. A determination of whether the sample is malware is performed using the signature and a similarity score threshold.
    Type: Application
    Filed: February 7, 2022
    Publication date: September 28, 2023
    Inventors: Yang Ji, Tyler Pals Halfpop, Zihang Xiao, Wenjun Hu
  • Patent number: 11743286
    Abstract: Malware signature generation through combination rule mining is disclosed. A set of properties associated, collectively, with a plurality of data samples is received. A first data sample has a first set of properties and a second data sample has a second set of properties. A combination signature comprising at least a first property included in the first set of properties and a second property included in the second set of properties is generated.
    Type: Grant
    Filed: June 30, 2021
    Date of Patent: August 29, 2023
    Assignee: Palo Alto Networks, Inc.
    Inventors: Min Du, Wenjun Hu, William Redington Hewlett, II
  • Publication number: 20230269259
    Abstract: A set of metadata associated with a plurality of samples is received. The samples are clustered. For members of a first cluster, a set of similarities shared among at least a portion of the members of the first cluster is determined. A cluster member is identified within the first cluster, and in response, additional analysis is caused to be performed on the outlier cluster member.
    Type: Application
    Filed: May 1, 2023
    Publication date: August 24, 2023
    Inventors: Zhi Xu, Jiajie Wang, Xiao Zhang, Wenjun Hu
  • Patent number: 11720666
    Abstract: Execution of an application in an application-level sandbox is disclosed. A request to launch an application is received by an operating system executing on a device. A determination is made that a stored copy of the application should be executed within an application-level sandbox. The stored copy of the application is executed in the application-level sandbox.
    Type: Grant
    Filed: October 21, 2021
    Date of Patent: August 8, 2023
    Assignee: Palo Alto Networks, Inc.
    Inventors: Zhi Xu, Cong Zheng, Tongbo Luo, Wenjun Hu
  • Publication number: 20230185915
    Abstract: The present application discloses a method, system, and computer system for detecting malicious files. The method includes receiving a sample, extracting an embedded script from the sample, applying a malicious script detector in connection with determining whether the sample is malicious, and in response to determining that the sample is malicious sending, to a security entity, an indication that the sample is malicious.
    Type: Application
    Filed: December 14, 2021
    Publication date: June 15, 2023
    Inventors: Akshata Krishnamoorthy Rao, Yaron Samuel, Lauren Che, Wenjun Hu
  • Patent number: 11677764
    Abstract: The automatic generation of malware family signatures is disclosed. A set of metadata associated with a plurality of samples is received. The samples are clustered. For members of a first cluster, a set of similarities shared among at least a portion of the members of the first cluster is determined. The similarities are evaluated for suitability as a malware family signature. Suitability is evaluated based on how well the similarities uniquely identify the members of the first cluster. In the event the similarities are determined to be suitable as a malware family signature, a signature is generated.
    Type: Grant
    Filed: June 1, 2021
    Date of Patent: June 13, 2023
    Assignee: Palo Alto Networks, Inc.
    Inventors: Zhi Xu, Jiajie Wang, Xiao Zhang, Wenjun Hu
  • Patent number: 11620383
    Abstract: A sample is analyzed to determine a set of events that should be selected for performing by a dynamic analyzer executing the sample in an instrumented, emulated environment. In some cases, analyzing the sample includes extracting the sample's user interface layout into a tree hierarchy of user interface elements. The set of selected events is performed. In some cases, at least one emulator detection resistance action is performed. A maliciousness verdict is determined for the sample based at least in part on one or more responses taken by the sample in response to the set of selected events being performed by the dynamic analyzer.
    Type: Grant
    Filed: February 4, 2021
    Date of Patent: April 4, 2023
    Assignee: Palo Alto Networks, Inc.
    Inventors: Cong Zheng, Wenjun Hu, Zhi Xu
  • Publication number: 20230078962
    Abstract: A sample is analyzed to determine a set of events that should be selected for performing by a dynamic analyzer executing the sample in an instrumented, emulated environment. The set of selected events is performed. In some cases, at least one emulator detection resistance action is performed. A maliciousness verdict is determined for the sample based at least in part on one or more responses taken by the sample in response to the set of selected events being performed by the dynamic analyzer.
    Type: Application
    Filed: November 21, 2022
    Publication date: March 16, 2023
    Inventors: Cong Zheng, Wenjun Hu, Zhi Xu
  • Publication number: 20230082289
    Abstract: Automated fuzzy hash based signature collection is disclosed. A set of candidate fuzzy hashes corresponding to a set of false negative samples is received. A false positive reduction analysis is performed on the received set of candidate fuzzy hashes to generate a reduced set of fuzzy hashes. At least a portion of the reduced set of fuzzy hashes is clustered into a fuzzy hash cluster. A signature for a family of malware is generated based at least in part on the fuzzy hash cluster.
    Type: Application
    Filed: September 10, 2021
    Publication date: March 16, 2023
    Inventors: Yang Ji, Wenjun Hu, Xiao Zhang
  • Patent number: 11604878
    Abstract: A virtualized storage for use in performing dynamic analysis on a sample is configured, at least in part by copying the sample to the virtualized storage. A virtual machine emulator is launched using a snapshot of a virtualized platform. The virtualized platform is previously configured to use the virtualized storage, and the snapshot is configured to use a placeholder file to occupy space for later use when installing the sample. A location of the copied sample in an image corresponding to the virtualized storage is determined. The copied sample is installed and dynamic analysis is performed on the sample.
    Type: Grant
    Filed: February 3, 2021
    Date of Patent: March 14, 2023
    Assignee: Palo Alto Networks, Inc.
    Inventors: Wenjun Hu, Cong Zheng, Zhi Xu
  • Publication number: 20230075632
    Abstract: Provided is a method for preparing isavuconazonium sulfate. Specifically, the preparation method involved comprises: reacting a compound of formula V in the presence of a provided compound having a bisulfate ion so as to obtain isavuconazonium sulfate as shown in formula VI. The preparation method has the advantages of stable intermediate, easy separation and purification, simple operation, high reaction yield, and easy industrial production.
    Type: Application
    Filed: December 21, 2020
    Publication date: March 9, 2023
    Inventors: Xiaoxia AN, Nan ZHAO, Jiayu JIN, Jingyu HU, Wenjun HU, Junjie WEI, Menglong LI
  • Patent number: 11565832
    Abstract: A harmless low-consumption on-orbit continuous launch system includes a satellite platform, a launch apparatus and a plurality of CubeSats. The satellite platform carries the launch apparatus and dozens or hundreds of CubeSats, and is launched from a ground into an orbit for on-orbit operation. The launch apparatus is configured to store the plurality of CubeSats and provide power for on-orbit launching of each of the CubeSats. A solid working medium in the launch apparatus is activated by heating to undergo a phase change, and the activated solid working medium expands instantly and is converted into a high-pressure gaseous working medium. The high-pressure gaseous working medium does work to eject the CubeSats, such that the CubeSats obtain a speed increment. The CubeSats enter a transfer orbit towards different target spacecraft through the speed increment applied by the launch apparatus to perform a plurality of different on-orbit serving missions.
    Type: Grant
    Filed: May 26, 2022
    Date of Patent: January 31, 2023
    Assignee: NATIONAL UNIVERSITY OF DEFENSE TECHNOLOGY
    Inventors: Yueneng Yang, Wenjun Hu, Chaoyan Zhang, Shifeng Zhang, Xin Xu, Shurui Huang, Xiaotong Bu, Zhiyang Liu
  • Publication number: 20220380066
    Abstract: A harmless low-consumption on-orbit continuous launch system includes a satellite platform, a launch apparatus and a plurality of CubeSats. The satellite platform carries the launch apparatus and dozens or hundreds of CubeSats, and is launched from a ground into an orbit for on-orbit operation. The launch apparatus is configured to store the plurality of CubeSats and provide power for on-orbit launching of each of the CubeSats. A solid working medium in the launch apparatus is activated by heating to undergo a phase change, and the activated solid working medium expands instantly and is converted into a high-pressure gaseous working medium. The high-pressure gaseous working medium does work to eject the CubeSats, such that the CubeSats obtain a speed increment. The CubeSats enter a transfer orbit towards different target spacecraft through the speed increment applied by the launch apparatus to perform a plurality of different on-orbit serving missions.
    Type: Application
    Filed: May 26, 2022
    Publication date: December 1, 2022
    Applicant: NATIONAL UNIVERSITY OF DEFENSE TECHNOLOGY
    Inventors: Yueneng YANG, Wenjun HU, Chaoyan ZHANG, Shifeng ZHANG, Xin XU, Shurui HUANG, Xiaotong BU, Zhiyang LIU
  • Publication number: 20220247758
    Abstract: Malware signature generation through combination rule mining is disclosed. A set of properties associated, collectively, with a plurality of data samples is received. A first data sample has a first set of properties and a second data sample has a second set of properties. A combination signature comprising at least a first property included in the first set of properties and a second property included in the second set of properties is generated.
    Type: Application
    Filed: June 30, 2021
    Publication date: August 4, 2022
    Inventors: Min Du, Wenjun Hu, William Redington Hewlett, II
  • Publication number: 20220043906
    Abstract: Execution of an application in an application-level sandbox is disclosed. A request to launch an application is received by an operating system executing on a device. A determination is made that a stored copy of the application should be executed within an application-level sandbox. The stored copy of the application is executed in the application-level sandbox.
    Type: Application
    Filed: October 21, 2021
    Publication date: February 10, 2022
    Inventors: Zhi Xu, Cong Zheng, Tongbo Luo, Wenjun Hu
  • Publication number: 20220036208
    Abstract: To leverage the higher detection rate of a supplemental model and manage the higher false positive rate of that model, an activation range is tuned for the candidate model to operate in conjunction with an incumbent model. The activation range is a range of output values for the incumbent model that activates the supplemental model. Inputs having benign output values from the incumbent model that are within the activation range are fed into the supplemental model. Thus, the lower threshold of the activation range corresponds to the malware detection threshold of the incumbent model and the upper threshold determines how many benign classified outputs from the incumbent model activate the supplemental model. This conjoining of models with a tuned activation range manages overall false positive rate of the conjoined detection models while the malware detection rate increases over the incumbent detection model alone.
    Type: Application
    Filed: July 28, 2020
    Publication date: February 3, 2022
    Inventors: Akshata Krishnamoorthy Rao, Danny Tsechansky, Wenjun Hu