# of Displayed Technologies: 10 / 13

Applied Category Filter (Click To Remove): Security/Cybersecurity


Categories

DIAMOND: Risk-Based Cyber Vulnerability Management with Business Context Analytics
TS-074364 — Senior executives struggle to understand and prioritize cybersecurity risk in business terms. Existing vulnerability scoring systems rely on opaque or arbitrary measures that fail to connect cybersecurity decisions to financial impact, staffing costs, or operational tradeoffs. As a result, organiz…
  • College: College of Engineering (COE)
  • Inventors: Allen, Theodore "Ted"; RoyChowdhury, Sayak
  • Licensing Officer: Zinn, Ryan

Robust Positioning and Navigation Using Low Earth Orbit Satellite Signals
TS-072827 — The Need Current navigation systems, such as GNSS, face limitations in urban canyons, indoor environments, and areas with signal jamming or spoofing. The rapid proliferation of LEO satellite constellations presents an untapped opportunity for resilient, accurate positioning. However, leveraging thes…
  • College: College of Engineering (COE)
  • Inventors: Kassas, Zak
  • Licensing Officer: Ashouripashaki, Mandana

NeuroThread: Ultrathin Wire-Type Neurochemical Sensor for Real-Time CNS Monitoring
TS-071414 — The Need Current neurochemical monitoring technologies are limited by bulky form factors, complex fabrication, and invasiveness, which restrict their clinical and research utility. Existing sensors often cause tissue damage, lack real-time resolution, and are costly to manufacture, impeding widespre…
  • College: College of Engineering (COE)
  • Inventors: Li, Jinghua; Liu, Tzu Li
  • Licensing Officer: Ashouripashaki, Mandana

VerDiff: Automated Vulnerability Version Detection for Open Source Security
TS-071385 — The Need Open source software is foundational to modern development, yet it introduces significant security risks due to outdated dependencies and inaccurate vulnerability advisories. Public databases often fail to identify all affected versions of software, leaving organizations exposed. With vulne…
  • College: College of Engineering (COE)
  • Inventors: Anwar, Md Sakib; Lin, Zhiqiang; Yagemann, Carter
  • Licensing Officer: Mess, David

Vectorized Channel Estimation and SINR Optimization for Ultra-Wideband Communications
TS-070631 — The Need Ultra-wideband communication systems, including mmWave and optical wireless networks, demand highly accurate and low-latency channel estimation to maintain throughput and reliability. Existing methods, such as hybrid correlation and least squares estimators, suffer from high computational c…
  • College: College of Engineering (COE)
  • Inventors: Cai, Jian-Feng; Mao, Chongchang; Xian, Poline Y.; Xue, Ye; Zhang, Haiming
  • Licensing Officer: Ashouripashaki, Mandana

Advanced LEO Satellite-Based Position, Navigation, and Timing Solutions
TS-069653 — Technology Bundle: T2025-053, T2025-055, T2025-056
The Need Current global navigation satellite systems (GNSS) face significant challenges, including signal vulnerability to interference, limited coverage in urban and remote areas, and insufficient accuracy for high-precision applications. There is a critical need for more robust, accurate, and rel…
  • College: College of Engineering (COE)
  • Inventors: Kassas, Zak; Kozhaya, Sharbel
  • Licensing Officer: Ashouripashaki, Mandana

A Cybersecurity Vulnerability Prioritization System Including Identifying "Super-Critical" Vulnerabilities, predicting "Dark Host" Vulnerabilities, and Addressing Economic Costs
TS-066063 — Our cybersecurity vulnerability maintenance system stands as a pillar of modern security strategy, transforming reactive security measures into a preemptive defense mechanism. This integration of technology and economics ensures that your most critical assets are protected efficiently and effectively, making it an invaluable tool for any organization serious about security.
In today’s hyper-connected world, the escalation in cyber threats poses significant risks to organizational data and systems. Vulnerabilities within network infrastructures can lead to massive security breaches, as demonstrated by incidents like the 2017 Equifax hack. Effective vulnerability…
  • College: College of Engineering (COE)
  • Inventors: Allen, Theodore "Ted"; Liu, Enhao
  • Licensing Officer: Giles, David

Introducing Revolutionary IC Chip Technology: Enhancing Cybersecurity with Physically Unclonable Functions
TS-065436 — The Need: In an era dominated by digital transactions and sensitive data exchanges, ensuring robust cybersecurity measures is paramount for individuals and organizations alike. Traditional methods of securing data often fall short in the face of sophisticated cyber threats, necessitating innovative …
  • College: College of Arts & Sciences
  • Inventors: Gauthier, Daniel; Canaday, Daniel; Charlot, Noeloikeau; Pomerance, Andrew
  • Licensing Officer: Dahlman, Jason "Jay"

Secure Your Digital Fortress: Revolutionizing Cybersecurity with Next-Gen PUF Technology
TS-065412 — The Need: In contemporary cybersecurity landscapes, the conventional methods of employing Physically Unclonable Functions (PUFs) necessitate maintaining a secure challenge-response database. However, this practice poses significant security risks as access to this database could lead to the comprom…
  • College: College of Arts & Sciences
  • Inventors: Gauthier, Daniel
  • Licensing Officer: Dahlman, Jason "Jay"

Counterattacking Smart Contract Exploits: An Active Defense Approach
TS-063027 — The Need Smart contracts have revolutionized the way transactions are conducted, but their unique nature makes them susceptible to exploitation. Despite extensive efforts in vulnerability identification, exploitable vulnerabilities persist, resulting in substantial financial losses. To mitigate thi…
  • College: College of Engineering (COE)
  • Inventors: Lin, Zhiqiang; Morales, Marcelo
  • Licensing Officer: Mess, David

Show More Technologies

Loading icon