# of Displayed Technologies: 5 / 5


Categories

RILDEFENDER: System-level defense from SMS attacks in Android smartphones
TS-071387 — The Need Mobile devices remain vulnerable to SMS-based attacks, which can bypass app-layer defenses and exploit low-level system components. Existing solutions are either passive, OS-specific, or require extensive hardware modifications, leaving a critical gap in real-time, system-level protection. …
  • College: College of Engineering (COE)
  • Inventors: Lin, Zhiqiang; Porras, Phillip; Wen, Haohuang
  • Licensing Officer: Mess, David

VerDiff: Automated Vulnerability Version Detection for Open Source Security
TS-071385 — The Need Open source software is foundational to modern development, yet it introduces significant security risks due to outdated dependencies and inaccurate vulnerability advisories. Public databases often fail to identify all affected versions of software, leaving organizations exposed. With vulne…
  • College: College of Engineering (COE)
  • Inventors: Anwar, Md Sakib; Lin, Zhiqiang; Yagemann, Carter
  • Licensing Officer: Mess, David

Counterattacking Smart Contract Exploits: An Active Defense Approach
TS-063027 — The Need Smart contracts have revolutionized the way transactions are conducted, but their unique nature makes them susceptible to exploitation. Despite extensive efforts in vulnerability identification, exploitable vulnerabilities persist, resulting in substantial financial losses. To mitigate thi…
  • College: College of Engineering (COE)
  • Inventors: Lin, Zhiqiang; Morales, Marcelo
  • Licensing Officer: Mess, David

3DScope: Detecting 3D Model Clones
TS-057129 — Algorithm for extracting 3D models, indexing them using a value-insensitive normalization algorithm, and comparing the model indexes to detect cloned 3D models.
The unauthorized copying of 3D models robs designers of property, reduces innovation going into the creation of 3D models, creates liability for entities unknowingly using copied models, and indicates a lapse in IP security. With the vast amount of 3D assets in use, it is infeasible for humans to …
  • College: College of Engineering (COE)
  • Inventors: Zuo, Chaoshun; Lin, Zhiqiang
  • Licensing Officer: Mess, David

Protecting Bluetooth Low Energy from Address Tracking When Using Whitelisting
TS-052807 — Bluetooth Low Energy (BLE) is ubiquitous today due to its extremely low energy consumption and relatively large communication coverage. However, the devices communicated through Bluetooth are subject to address tracking attacks, where a nearby attacker can associate Bluetooth addresses to particul…
  • College: College of Engineering (COE)
  • Inventors: Lin, Zhiqiang; Zhang, Yue
  • Licensing Officer: Mess, David

Loading icon