1
Osman Abdoul Ismael, Dawn Song: Framework for efficient security coverage of mobile software applications installed on mobile devices. FireEye, Blakely Sokoloff Taylor & Zafman, April 14, 2015: US09009823 (83 worldwide citation)

A method is described that includes generating a representation of an application that describes specific states of the application and specific state transitions of the application. The method also includes identifying a region of interest of the application based on rules and observations of the a ...


2
Osman Abdoul Ismael, Dawn Song, Phung Te Ha, Peter J Gilbert, Hui Xue: Framework for computer application analysis of sensitive information tracking. FireEye, Rutan & Tucker, William W Schaal, October 13, 2015: US09159035 (39 worldwide citation)

A method is described that involves generating one or more machine learned rules with a machine learning system. The method also involves generating a representation of an application that describes various states and state transitions of the application. The method also involves referring to the on ...


3
Osman Abdoul Ismael, Dawn Song, Ashar Aziz, Noah Johnson, Prashanth Mohan, Hui Xue: Framework for efficient security coverage of mobile software applications. FireEye, Rutan & Tucker, William W Schaal, November 3, 2015: US09176843 (36 worldwide citation)

A method is described that includes receiving an application and generating a representation of the application that describes specific states of the application and specific state transitions of the application. The method further includes identifying a region of interest of the application based o ...


4
Osman Abdoul Ismael, Dawn Song, Ashar Aziz: Framework for iterative analysis of mobile software applications. FireEye, Rutan & Tucker, William W Schaal, December 29, 2015: US09225740 (34 worldwide citation)

A method is described that includes operations for receiving an application, identifying a region of interest of the application based on rules or analysis of the application, and determining specific stimuli that will cause one or more state transitions within the application to reach the region of ...


5
Osman Abdoul Ismael, Dawn Song, Hui Xue: Framework for efficient security coverage of mobile software applications using symbolic execution to reach regions of interest within an application. FireEye, Rutan & Tucker, William W Schaal, June 14, 2016: US09367681 (13 worldwide citation)

A method is described that involves receiving an application and generating a representation of the application that describes states of the application and transitions between the states. The method further includes referring to one or more rules and/or information from an inference engine that is ...


6
Osman Abdoul Ismael, Dawn Song, Phung Te Ha, Peter J Gilbert, Hui Xue: Framework for efficient security coverage of mobile software applications using machine learning. FireEye, Rutan & Tucker, March 14, 2017: US09594905 (5 worldwide citation)

For one embodiment, a method is described that involves the instrumenting of an application of a computing system with at least one monitoring function, where the monitoring function is capable of operating in a run-time environment during processing of the instrumented application. The movement of ...


7
Xiaodong Dawn Song, Ian Fischer, Gautam Altekar, Lorenzo Martignoni, Zvonimir Pavlinovic: Secure surrogate cloud browsing. Menlo Security, The Regents of the University of California, Van Pelt Yi & James, July 12, 2016: US09391832 (4 worldwide citation)

Surrogate browsing techniques are disclosed. A request for a page is received, from a client, by a surrogate. The specified page is requested by the surrogate. The page is rendered at the surrogate. A representation of the page is transmitted to the client. An event is received from the client. An u ...


8
Osman Abdoul Ismael, Dawn Song, Ashar Aziz, Noah Johnson, Prshanth Mohan, Hui Xue: Framework for efficient security coverage of mobile software applications. FireEye, Rutan & Tucker, October 17, 2017: US09792196 (1 worldwide citation)

A method is described that includes receiving an application and generating a representation of the application that describes specific states of the application and specific state transitions of the application. The method further includes identifying a region of interest of the application based o ...


9
Osman Abdoul Ismael, Dawn Song, Ashar Aziz, Noah Johnson, Adrian Matthew Mettler: Framework for efficient security coverage of mobile software applications that is usable to harden in the field code. FireEye, Rutan & Tucker, November 21, 2017: US09824209 (1 worldwide citation)

A method is described that includes receiving an application and creating a representation of the application that describes states and state transitions of the application. The method further includes receiving a description of unwanted behaviors of the application. The method further includes usin ...


10
Emil Stefanov, Elaine Shi, Dawn Song: Concealing access patterns to electronic data storage for privacy. The Regents of the University of California, John P O Banion, April 21, 2015: US09015853

Methods and systems of concealing access patterns to data storage, such as within servers of a cloud computing environment are presented. Server data storage is securely partitioned into smaller electronic data storage partitions of predetermined size. The client side maintains a shuffling buffer an ...