Cybersecurity Research

Cybersecurity Research

Cybersecurity is of paramount importance in an increasingly pervasive digital world. Charles' cybersecurity research experience centers on the wireless mobile Internet. It covers both mobile devices at the edge network and servers in the IP-telecommunication core network.


Along with former colleagues at AT&T, Charles co-invented a series of US patented technologies to prevent security and privacy compromises for everyday mobile users.

Novel  "verification service" that leverages various network entities to determine whether the information sender is authentic, allowing the network provider to identify the legitimate sender and protect the user from phishing attacks.

US8739247B2 - Verification service - Google Patents
Concepts and technologies are disclosed herein for verifying sender information. According to various embodiments of the concepts and technologies disclosed herein, a verification service can determine, receive a request, or receive a call to verify sender information associated with data. The…
Verification Service, US Patent No. 8739247

New app metadata analysis method for verifying mobile apps in order to prevent malicious apps from harming the users' devices.

US9449104B2 - Method and apparatus for deriving and using trustful application metadata - Google Patents
A method, non-transitory computer readable medium and apparatus for deriving trustful metadata for an application are disclosed. For example, the method crawls online for the application, analyzes the application to determine a function of the application, and generates trustful meta-data for …
Method and Apparatus for Deriving and Using Trustful Application Metadata, US Patent No. 9449104

Novel methods to reduce vulnerabilities of private virtual mobile networks, which allows users to access their home network when they connect via other remote networks

US9172678B2 - Methods and apparatus to improve security of a virtual private mobile network - Google Patents
Methods and apparatus are disclosed to improve security of a virtual private mobile network. An example method includes identifying a request to initialize the virtual private mobile network, identifying a number of subgroups to associate with the virtual private mobile network, generating a v…
Methods and Apparatus to Improve Security of A Virtual Private Mobile Network, US Patent No. 9172678

Multi-layers of deceptions such as honey servers, honey files, and honey databases to detect network intrusions

US8739281B2 - Multilayered deception for intrusion detection and prevention - Google Patents
Concepts and technologies are disclosed herein for multilayered deception for intrusion detection. According to various embodiments of the concepts and technologies disclosed herein, a multilayer deception system includes honey servers, honey files and folders, honey databases, and/or honey co…
Multilayered deception for intrusion detection and prevention, US Patent No. 8739281

Server overload monitoring and detection methods to protect users from denial-of-service attacks

US9766947B2 - Methods and apparatus to monitor server loads - Google Patents
Methods and apparatus to monitor server loads are disclosed. An example load monitor includes a first virtual machine to replicate a first server; a router interface to cause a router to redirect a portion of requests destined for the first server to the first virtual machine, the first virtua…
Methods and Apparatus to Monitor Server Loads, US Patent No. 9766947B2

Charles also conducted one of the first comprehensive studies on secure Internet multimedia signaling performance evaluation and modeling for IP-based telecommunications networks. This work is a collaboration with researchers from both Columbia University and IBM, and was published at a top Computer Science Journal IEEE/ACM Transactions on Networking

The Impact of TLS on SIP Server Performance: Measurement and Modeling
Securing Voice over IP (VoIP) is a crucial requirement for its successful adoption. A key component of this is securing the signaling path, which is performed by the Session Initiation Protocol (SIP). Securing SIP can be accomplished by using Transport Layer Security (TLS) instead of UDP as the tran…
The Impact of TLS on SIP Server Performance: Measurement and Modeling