1
Benjamin Livshits, Weidong Cui: Detecting data propagation in a distributed system. Microsoft Corporation, Workman Nydegger, April 26, 2011: US07933946 (28 worldwide citation)

Embodiments gather historical information about data propagation by monitoring requests to and replies from a server. When a request is received from a client system to upload code onto a web site, a user identity associated with the client system is determined and a tag that uniquely identifies the ...


2
Richard Schwartz, John Michael Berry, Weidong Cui: Methods of producing influenza vaccine compositions. MedImmune Vaccines, August 28, 2007: US07262045 (19 worldwide citation)

Methods and compositions for the optimization of production of influenza viruses suitable as influenza vaccines are provided.


3
Weidong Cui, Marcus Peinado, Zhilei Xu: Demand-driven analysis of pointers for software program analysis and debugging. Microsoft Corporation, Lyon & Harr, Mark A Watson, November 19, 2013: US08589888 (7 worldwide citation)

A “Demand-Driven Pointer Analyzer” (DDPA) provides a “demand-driven” field-sensitive pointer analysis process. This process rapidly and accurately identifies alias sets for selected pointers in software modules or programs of any size, including large-scale C/C++ programs such as a complete operatin ...


4
Marcus Peinado, Weidong Cui: Malware investigation by analyzing computer memory. Microsoft Corporation, October 22, 2013: US08566944 (5 worldwide citation)

Technology is described for malware investigation by analyzing computer memory in a computing device. The method can include performing static analysis on code for a software environment to form an extended type graph. A raw memory snapshot of the computer memory can be obtained at runtime. The raw ...


5
Weidong Cui, Jayanthkumar Kannan, Jiahe Helen Wang: Automatic reverse engineering of message formats from network traces. Microsoft Corporation, Lee & Hayes PLLC, September 21, 2010: US07802009 (4 worldwide citation)

A system for automatic inference of message formats from network packets is described. Each network message from a set of network messages is split into one or more tokens based on the types of bytes in the network messages. The set of network messages can then be classified into clusters based on t ...


6
Marcus Peinado, Weidong Cui, Jiahe Helen Wang, Michael E Locasto: Automatic data patch generation for unknown vulnerabilities. Microsoft Corporation, December 17, 2013: US08613096 (3 worldwide citation)

The claimed subject matter provides a system and/or method that generates data patches for vulnerabilities. The system can include devices and components that examine exploits received or obtained from data streams, constructs probes and determines whether the probes take advantage of vulnerabilitie ...


7
Weidong Cui, Marcus Peinado, Martim Carbone: Data access reporting platform for secure active monitoring. Microsoft Corporation, Medley Behrens & Lewis, November 12, 2013: US08584254 (3 worldwide citation)

Technologies pertaining to detecting accesses to monitored regions of memory and transmitting data to a protection system responsive to the detecting are described herein. A region of memory that includes objects in an object graph utilized by an operating system to determine which processes to exec ...


8
Christopher Stephen Frederick Smowton, Ronnie Chaiken, Weidong Cui, Oliver H Foehr, Jacob Rubin Lorch, David Molnar, Bryan Jeffrey Parno, Stefan Saroiu, Alastair Wolman: Personal identification combining proximity sensing with biometrics. Microsoft Technology Licensing, Judy Yee, Micky Minhas, October 6, 2015: US09152868 (1 worldwide citation)

Described is a technology by which the identity of a person (e.g., a customer in a commercial transaction) is determinable without active identification effort, via biometric data is obtained without action by the person. Machine processing of the biometric data over a set of possible persons, deter ...


9
Weidong Cui, Brendan Dolan Gavitt, David Molnar: Application monitoring through continuous record and replay. MICROSOFT TECHNOLOGY LICENSING, Julie Kane Akhter, Stein Dolan, Micky Minhas, September 8, 2015: US09129058 (1 worldwide citation)

A method, system, and computer-readable storage medium for application monitoring through continuous record and replay are described herein. The method includes continuously recording execution traces including external non-deterministic input data for an application at a user device and analyzing t ...


10
Weidong Cui, Marcus Peinado: Determining target types for generic pointers in source code. Microsoft Technology Licensing, Alin Corie, Sandy Swain, Micky Minhas, May 3, 2016: US09329845

A system described herein includes a receiver component that receives source code from a computer-readable medium of a computing device and a static analysis component that executes a points-to analysis algorithm over the source code to cause generation of a points-to graph, wherein the points-to gr ...



Click the thumbnails below to visualize the patent trend.