# of Displayed Technologies: 3 / 3

Applied Category Filter (Click To Remove): Algorithms


Categories

VerDiff: Automated Vulnerability Version Detection for Open Source Security
TS-071385 — The Need Open source software is foundational to modern development, yet it introduces significant security risks due to outdated dependencies and inaccurate vulnerability advisories. Public databases often fail to identify all affected versions of software, leaving organizations exposed. With vulne…
  • College: College of Engineering (COE)
  • Inventors: Anwar, Md Sakib; Lin, Zhiqiang; Yagemann, Carter
  • Licensing Officer: Mess, David

Counterattacking Smart Contract Exploits: An Active Defense Approach
TS-063027 — The Need Smart contracts have revolutionized the way transactions are conducted, but their unique nature makes them susceptible to exploitation. Despite extensive efforts in vulnerability identification, exploitable vulnerabilities persist, resulting in substantial financial losses. To mitigate thi…
  • College: College of Engineering (COE)
  • Inventors: Lin, Zhiqiang; Morales, Marcelo
  • Licensing Officer: Mess, David

3DScope: Detecting 3D Model Clones
TS-057129 — Algorithm for extracting 3D models, indexing them using a value-insensitive normalization algorithm, and comparing the model indexes to detect cloned 3D models.
The unauthorized copying of 3D models robs designers of property, reduces innovation going into the creation of 3D models, creates liability for entities unknowingly using copied models, and indicates a lapse in IP security. With the vast amount of 3D assets in use, it is infeasible for humans to …
  • College: College of Engineering (COE)
  • Inventors: Zuo, Chaoshun; Lin, Zhiqiang
  • Licensing Officer: Mess, David

Loading icon