US6067410A
(en)
*
|
1996-02-09 |
2000-05-23 |
Symantec Corporation |
Emulation repair system
|
JP3763903B2
(ja)
*
|
1996-10-29 |
2006-04-05 |
株式会社日立製作所 |
情報処理装置
|
US9219755B2
(en)
|
1996-11-08 |
2015-12-22 |
Finjan, Inc. |
Malicious mobile code runtime monitoring system and methods
|
US8079086B1
(en)
|
1997-11-06 |
2011-12-13 |
Finjan, Inc. |
Malicious mobile code runtime monitoring system and methods
|
US7058822B2
(en)
|
2000-03-30 |
2006-06-06 |
Finjan Software, Ltd. |
Malicious mobile code runtime monitoring system and methods
|
US6802028B1
(en)
*
|
1996-11-11 |
2004-10-05 |
Powerquest Corporation |
Computer virus detection and removal
|
DE19734585C2
(de)
*
|
1997-08-09 |
2002-11-07 |
Brunsch Hans |
Verfahren und Vorrichtung zur Überwachung von Informationsflüssen in Computersystemen
|
US5978917A
(en)
*
|
1997-08-14 |
1999-11-02 |
Symantec Corporation |
Detection and elimination of macro viruses
|
US6357008B1
(en)
*
|
1997-09-23 |
2002-03-12 |
Symantec Corporation |
Dynamic heuristic method for detecting computer viruses using decryption exploration and evaluation phases
|
US6081894A
(en)
*
|
1997-10-22 |
2000-06-27 |
Rvt Technologies, Inc. |
Method and apparatus for isolating an encrypted computer system upon detection of viruses and similar data
|
US6108799A
(en)
*
|
1997-11-21 |
2000-08-22 |
International Business Machines Corporation |
Automated sample creation of polymorphic and non-polymorphic marcro viruses
|
US5987610A
(en)
*
|
1998-02-12 |
1999-11-16 |
Ameritech Corporation |
Computer virus screening methods and systems
|
AUPP514198A0
(en)
*
|
1998-08-07 |
1998-09-03 |
Compucat Research Pty Limited |
Data transfer
|
US20020032867A1
(en)
*
|
1998-11-24 |
2002-03-14 |
Kellum Charles W. |
Multi-system architecture using general purpose active-backplane and expansion-bus compatible single board computers and their peripherals for secure exchange of information and advanced computing
|
US20020040439A1
(en)
*
|
1998-11-24 |
2002-04-04 |
Kellum Charles W. |
Processes systems and networks for secure exchange of information and quality of service maintenance using computer hardware
|
US20010039624A1
(en)
*
|
1998-11-24 |
2001-11-08 |
Kellum Charles W. |
Processes systems and networks for secured information exchange using computer hardware
|
WO2000034867A1
(en)
|
1998-12-09 |
2000-06-15 |
Network Ice Corporation |
A method and apparatus for providing network and computer system security
|
CA2360782A1
(en)
*
|
1998-12-11 |
2000-06-22 |
Steven D. Mann |
Method and apparatus for isolating a computer system upon detection of viruses and similar data
|
AU6218800A
(en)
|
1999-07-14 |
2001-01-30 |
Recourse Technologies, Inc. |
System and method for quickly authenticating messages using sequence numbers
|
US7117532B1
(en)
|
1999-07-14 |
2006-10-03 |
Symantec Corporation |
System and method for generating fictitious content for a computer
|
US6981155B1
(en)
|
1999-07-14 |
2005-12-27 |
Symantec Corporation |
System and method for computer security
|
US7346929B1
(en)
|
1999-07-29 |
2008-03-18 |
International Business Machines Corporation |
Method and apparatus for auditing network security
|
US7203962B1
(en)
|
1999-08-30 |
2007-04-10 |
Symantec Corporation |
System and method for using timestamps to detect attacks
|
US7406603B1
(en)
*
|
1999-08-31 |
2008-07-29 |
Intertrust Technologies Corp. |
Data protection systems and methods
|
US6976258B1
(en)
|
1999-11-30 |
2005-12-13 |
Ensim Corporation |
Providing quality of service guarantees to virtual hosts
|
US6851057B1
(en)
*
|
1999-11-30 |
2005-02-01 |
Symantec Corporation |
Data driven detection of viruses
|
US8006243B2
(en)
|
1999-12-07 |
2011-08-23 |
International Business Machines Corporation |
Method and apparatus for remote installation of network drivers and software
|
US6954858B1
(en)
|
1999-12-22 |
2005-10-11 |
Kimberly Joyce Welborn |
Computer virus avoidance system and mechanism
|
US6701440B1
(en)
*
|
2000-01-06 |
2004-03-02 |
Networks Associates Technology, Inc. |
Method and system for protecting a computer using a remote e-mail scanning device
|
US7293087B2
(en)
|
2000-01-21 |
2007-11-06 |
Scriptlogic Corporation |
Event-based application for performing configuration changes in a networked environment
|
US6711607B1
(en)
|
2000-02-04 |
2004-03-23 |
Ensim Corporation |
Dynamic scheduling of task streams in a multiple-resource system to ensure task stream quality of service
|
US6529985B1
(en)
|
2000-02-04 |
2003-03-04 |
Ensim Corporation |
Selective interception of system calls
|
US6560613B1
(en)
|
2000-02-08 |
2003-05-06 |
Ensim Corporation |
Disambiguating file descriptors
|
US6754716B1
(en)
|
2000-02-11 |
2004-06-22 |
Ensim Corporation |
Restricting communication between network devices on a common network
|
US7343421B1
(en)
|
2000-02-14 |
2008-03-11 |
Digital Asset Enterprises Llc |
Restricting communication of selected processes to a set of specific network addresses
|
GB2359908B
(en)
*
|
2000-03-04 |
2004-09-15 |
Motorola Inc |
Communication system architecture and method of controlling data download to subscriber equipment
|
US6948003B1
(en)
|
2000-03-15 |
2005-09-20 |
Ensim Corporation |
Enabling a service provider to provide intranet services
|
US6775780B1
(en)
*
|
2000-03-16 |
2004-08-10 |
Networks Associates Technology, Inc. |
Detecting malicious software by analyzing patterns of system calls generated during emulation
|
US7921459B2
(en)
|
2000-04-28 |
2011-04-05 |
International Business Machines Corporation |
System and method for managing security events on a network
|
US7574740B1
(en)
|
2000-04-28 |
2009-08-11 |
International Business Machines Corporation |
Method and system for intrusion detection in a computer network
|
US6985937B1
(en)
|
2000-05-11 |
2006-01-10 |
Ensim Corporation |
Dynamically modifying the resources of a virtual server
|
US6907421B1
(en)
|
2000-05-16 |
2005-06-14 |
Ensim Corporation |
Regulating file access rates according to file type
|
US6973577B1
(en)
*
|
2000-05-26 |
2005-12-06 |
Mcafee, Inc. |
System and method for dynamically detecting computer viruses through associative behavioral analysis of runtime state
|
US20020035696A1
(en)
*
|
2000-06-09 |
2002-03-21 |
Will Thacker |
System and method for protecting a networked computer from viruses
|
US7913078B1
(en)
|
2000-06-22 |
2011-03-22 |
Walter Mason Stewart |
Computer network virus protection system and method
|
US6901519B1
(en)
*
|
2000-06-22 |
2005-05-31 |
Infobahn, Inc. |
E-mail virus protection system and method
|
US7162649B1
(en)
|
2000-06-30 |
2007-01-09 |
Internet Security Systems, Inc. |
Method and apparatus for network assessment and authentication
|
US7143024B1
(en)
|
2000-07-07 |
2006-11-28 |
Ensim Corporation |
Associating identifiers with virtual processes
|
US7093239B1
(en)
*
|
2000-07-14 |
2006-08-15 |
Internet Security Systems, Inc. |
Computer immune system and method for detecting unwanted code in a computer system
|
US7350235B2
(en)
*
|
2000-07-14 |
2008-03-25 |
Computer Associates Think, Inc. |
Detection of decryption to identify encrypted virus
|
US8341743B2
(en)
*
|
2000-07-14 |
2012-12-25 |
Ca, Inc. |
Detection of viral code using emulation of operating system functions
|
US6909691B1
(en)
|
2000-08-07 |
2005-06-21 |
Ensim Corporation |
Fairly partitioning resources while limiting the maximum fair share
|
US6981279B1
(en)
*
|
2000-08-17 |
2005-12-27 |
International Business Machines Corporation |
Method and apparatus for replicating and analyzing worm programs
|
GB2368233B
(en)
*
|
2000-08-31 |
2002-10-16 |
F Secure Oyj |
Maintaining virus detection software
|
US6732211B1
(en)
|
2000-09-18 |
2004-05-04 |
Ensim Corporation |
Intercepting I/O multiplexing operations involving cross-domain file descriptor sets
|
US7178166B1
(en)
|
2000-09-19 |
2007-02-13 |
Internet Security Systems, Inc. |
Vulnerability assessment and authentication of a computer by a local scanner
|
US9027121B2
(en)
*
|
2000-10-10 |
2015-05-05 |
International Business Machines Corporation |
Method and system for creating a record for one or more computer security incidents
|
US7086090B1
(en)
|
2000-10-20 |
2006-08-01 |
International Business Machines Corporation |
Method and system for protecting pervasive devices and servers from exchanging viruses
|
US7146305B2
(en)
*
|
2000-10-24 |
2006-12-05 |
Vcis, Inc. |
Analytical virtual machine
|
US6996845B1
(en)
|
2000-11-28 |
2006-02-07 |
S.P.I. Dynamics Incorporated |
Internet security analysis system and process
|
US7130466B2
(en)
|
2000-12-21 |
2006-10-31 |
Cobion Ag |
System and method for compiling images from a database and comparing the compiled images with known images
|
US7219354B1
(en)
|
2000-12-22 |
2007-05-15 |
Ensim Corporation |
Virtualizing super-user privileges for multiple virtual processes
|
US20020147803A1
(en)
|
2001-01-31 |
2002-10-10 |
Dodd Timothy David |
Method and system for calculating risk in association with a security audit of a computer network
|
US7797251B2
(en)
*
|
2001-02-14 |
2010-09-14 |
5th Fleet, L.L.C. |
System and method providing secure credit or debit transactions across unsecure networks
|
US7010698B2
(en)
|
2001-02-14 |
2006-03-07 |
Invicta Networks, Inc. |
Systems and methods for creating a code inspection system
|
US6618736B1
(en)
|
2001-03-09 |
2003-09-09 |
Ensim Corporation |
Template-based creation and archival of file systems
|
CN1147795C
(zh)
*
|
2001-04-29 |
2004-04-28 |
北京瑞星科技股份有限公司 |
检测和清除已知及未知计算机病毒的方法、系统
|
US6931552B2
(en)
*
|
2001-05-02 |
2005-08-16 |
James B. Pritchard |
Apparatus and method for protecting a computer system against computer viruses and unauthorized access
|
US7392541B2
(en)
*
|
2001-05-17 |
2008-06-24 |
Vir2Us, Inc. |
Computer system architecture and method providing operating-system independent virus-, hacker-, and cyber-terror-immune processing environments
|
US7237264B1
(en)
|
2001-06-04 |
2007-06-26 |
Internet Security Systems, Inc. |
System and method for preventing network misuse
|
US20020188649A1
(en)
*
|
2001-06-12 |
2002-12-12 |
Ron Karim |
Mechanism for safely executing an untrusted program
|
US7657419B2
(en)
|
2001-06-19 |
2010-02-02 |
International Business Machines Corporation |
Analytical virtual machine
|
US7000250B1
(en)
*
|
2001-07-26 |
2006-02-14 |
Mcafee, Inc. |
Virtual opened share mode system with virus protection
|
US7356736B2
(en)
*
|
2001-09-25 |
2008-04-08 |
Norman Asa |
Simulated computer system for monitoring of software performance
|
US20030093689A1
(en)
*
|
2001-11-15 |
2003-05-15 |
Aladdin Knowledge Systems Ltd. |
Security router
|
US20030101381A1
(en)
*
|
2001-11-29 |
2003-05-29 |
Nikolay Mateev |
System and method for virus checking software
|
JP3914757B2
(ja)
|
2001-11-30 |
2007-05-16 |
デュアキシズ株式会社 |
ウィルス検査のための装置と方法とシステム
|
US20030115479A1
(en)
*
|
2001-12-14 |
2003-06-19 |
Jonathan Edwards |
Method and system for detecting computer malwares by scan of process memory after process initialization
|
WO2003058451A1
(en)
|
2002-01-04 |
2003-07-17 |
Internet Security Systems, Inc. |
System and method for the managed security control of processes on a computer system
|
US7269851B2
(en)
*
|
2002-01-07 |
2007-09-11 |
Mcafee, Inc. |
Managing malware protection upon a computer network
|
US7607171B1
(en)
*
|
2002-01-17 |
2009-10-20 |
Avinti, Inc. |
Virus detection by executing e-mail code in a virtual machine
|
US9652613B1
(en)
|
2002-01-17 |
2017-05-16 |
Trustwave Holdings, Inc. |
Virus detection by executing electronic message code in a virtual machine
|
FR2835132B1
(fr)
*
|
2002-01-24 |
2004-05-14 |
Ercom Engineering Reseaux Comm |
Procede, systeme et dispositif pour securiser l'acces a un serveur
|
AU2003234720A1
(en)
*
|
2002-04-13 |
2003-11-03 |
Computer Associates Think, Inc. |
System and method for detecting malicicous code
|
DE10218429A1
(de)
*
|
2002-04-25 |
2003-11-06 |
Strothmann Rolf |
System zur Erkennung von Computerviren
|
US7155741B2
(en)
*
|
2002-05-06 |
2006-12-26 |
Symantec Corporation |
Alteration of module load locations
|
US7370360B2
(en)
|
2002-05-13 |
2008-05-06 |
International Business Machines Corporation |
Computer immune system and method for detecting unwanted code in a P-code or partially compiled native-code program executing within a virtual machine
|
US7487543B2
(en)
*
|
2002-07-23 |
2009-02-03 |
International Business Machines Corporation |
Method and apparatus for the automatic determination of potentially worm-like behavior of a program
|
US20040064722A1
(en)
*
|
2002-10-01 |
2004-04-01 |
Dinesh Neelay |
System and method for propagating patches to address vulnerabilities in computers
|
US7188369B2
(en)
*
|
2002-10-03 |
2007-03-06 |
Trend Micro, Inc. |
System and method having an antivirus virtual scanning processor with plug-in functionalities
|
US7412723B2
(en)
*
|
2002-12-31 |
2008-08-12 |
International Business Machines Corporation |
Method and system for morphing honeypot with computer security incident correlation
|
US7383578B2
(en)
*
|
2002-12-31 |
2008-06-03 |
International Business Machines Corporation |
Method and system for morphing honeypot
|
US7013483B2
(en)
*
|
2003-01-03 |
2006-03-14 |
Aladdin Knowledge Systems Ltd. |
Method for emulating an executable code in order to detect maliciousness
|
US7913303B1
(en)
|
2003-01-21 |
2011-03-22 |
International Business Machines Corporation |
Method and system for dynamically protecting a computer system from attack
|
JP3835421B2
(ja)
*
|
2003-03-28 |
2006-10-18 |
コニカミノルタビジネステクノロジーズ株式会社 |
制御プログラムおよび制御装置
|
US8838950B2
(en)
|
2003-06-23 |
2014-09-16 |
International Business Machines Corporation |
Security architecture for system on chip
|
US7523484B2
(en)
|
2003-09-24 |
2009-04-21 |
Infoexpress, Inc. |
Systems and methods of controlling network access
|
US7657938B2
(en)
|
2003-10-28 |
2010-02-02 |
International Business Machines Corporation |
Method and system for protecting computer networks by altering unwanted network data traffic
|
US7587765B2
(en)
*
|
2003-12-23 |
2009-09-08 |
International Business Machines Corporation |
Automatic virus fix
|
WO2005062707A2
(en)
*
|
2003-12-30 |
2005-07-14 |
Checkpoint Software Technologies Ltd. |
Universal worm catcher
|
US7913305B2
(en)
*
|
2004-01-30 |
2011-03-22 |
Microsoft Corporation |
System and method for detecting malware in an executable code module according to the code module's exhibited behavior
|
US7730530B2
(en)
*
|
2004-01-30 |
2010-06-01 |
Microsoft Corporation |
System and method for gathering exhibited behaviors on a .NET executable module in a secure manner
|
US8898788B1
(en)
|
2004-04-01 |
2014-11-25 |
Fireeye, Inc. |
Systems and methods for malware attack prevention
|
US8793787B2
(en)
*
|
2004-04-01 |
2014-07-29 |
Fireeye, Inc. |
Detecting malicious network content using virtual environment components
|
US9106694B2
(en)
|
2004-04-01 |
2015-08-11 |
Fireeye, Inc. |
Electronic message analysis for malware detection
|
US8171553B2
(en)
|
2004-04-01 |
2012-05-01 |
Fireeye, Inc. |
Heuristic based capture with replay to virtual machine
|
US9027135B1
(en)
|
2004-04-01 |
2015-05-05 |
Fireeye, Inc. |
Prospective client identification using malware attack detection
|
US8375444B2
(en)
|
2006-04-20 |
2013-02-12 |
Fireeye, Inc. |
Dynamic signature creation and enforcement
|
US8549638B2
(en)
*
|
2004-06-14 |
2013-10-01 |
Fireeye, Inc. |
System and method of containing computer worms
|
US8566946B1
(en)
*
|
2006-04-20 |
2013-10-22 |
Fireeye, Inc. |
Malware containment on connection
|
US8584239B2
(en)
|
2004-04-01 |
2013-11-12 |
Fireeye, Inc. |
Virtual machine with dynamic data flow analysis
|
US8881282B1
(en)
|
2004-04-01 |
2014-11-04 |
Fireeye, Inc. |
Systems and methods for malware attack detection and identification
|
US7587537B1
(en)
|
2007-11-30 |
2009-09-08 |
Altera Corporation |
Serializer-deserializer circuits formed from input-output circuit registers
|
US8539582B1
(en)
|
2004-04-01 |
2013-09-17 |
Fireeye, Inc. |
Malware containment and security analysis on connection
|
US8528086B1
(en)
|
2004-04-01 |
2013-09-03 |
Fireeye, Inc. |
System and method of detecting computer worms
|
US7757287B2
(en)
*
|
2004-04-19 |
2010-07-13 |
Computer Associates Think, Inc. |
Systems and methods for computer security
|
US8407792B2
(en)
*
|
2004-05-19 |
2013-03-26 |
Ca, Inc. |
Systems and methods for computer security
|
EP1757063B1
(de)
*
|
2004-05-19 |
2017-02-15 |
CA, Inc. |
Verfahren und systeme für computersicherheit
|
US7761919B2
(en)
*
|
2004-05-20 |
2010-07-20 |
Computer Associates Think, Inc. |
Intrusion detection with automatic signature generation
|
US8042180B2
(en)
*
|
2004-05-21 |
2011-10-18 |
Computer Associates Think, Inc. |
Intrusion detection based on amount of network traffic
|
US7908653B2
(en)
|
2004-06-29 |
2011-03-15 |
Intel Corporation |
Method of improving computer security through sandboxing
|
US8131804B2
(en)
*
|
2004-11-19 |
2012-03-06 |
J Michael Greata |
Method and apparatus for immunizing data in computer systems from corruption
|
US20060112430A1
(en)
*
|
2004-11-19 |
2006-05-25 |
Deisenroth Jerrold M |
Method and apparatus for immunizing data in computer systems from corruption
|
US20060137013A1
(en)
*
|
2004-12-06 |
2006-06-22 |
Simon Lok |
Quarantine filesystem
|
KR100599084B1
(ko)
*
|
2005-02-24 |
2006-07-12 |
삼성전자주식회사 |
이동 통신 네트워크에서의 바이러스 치료 방법
|
WO2006106527A1
(en)
*
|
2005-04-04 |
2006-10-12 |
Trinity Future-In Private Limited |
An electro-mechanical system for filtering data
|
US20060259971A1
(en)
*
|
2005-05-10 |
2006-11-16 |
Tzu-Jian Yang |
Method for detecting viruses in macros of a data stream
|
WO2007022454A2
(en)
|
2005-08-18 |
2007-02-22 |
The Trustees Of Columbia University In The City Of New York |
Systems, methods, and media protecting a digital data processing device from attack
|
US7590733B2
(en)
*
|
2005-09-14 |
2009-09-15 |
Infoexpress, Inc. |
Dynamic address assignment for access control on DHCP networks
|
US7739740B1
(en)
|
2005-09-22 |
2010-06-15 |
Symantec Corporation |
Detecting polymorphic threats
|
US7845005B2
(en)
*
|
2006-02-07 |
2010-11-30 |
International Business Machines Corporation |
Method for preventing malicious software installation on an internet-connected computer
|
US20090133124A1
(en)
*
|
2006-02-15 |
2009-05-21 |
Jie Bai |
A method for detecting the operation behavior of the program and a method for detecting and clearing the virus program
|
US20070192858A1
(en)
*
|
2006-02-16 |
2007-08-16 |
Infoexpress, Inc. |
Peer based network access control
|
US20070192500A1
(en)
*
|
2006-02-16 |
2007-08-16 |
Infoexpress, Inc. |
Network access control including dynamic policy enforcement point
|
WO2007107766A1
(en)
*
|
2006-03-22 |
2007-09-27 |
British Telecommunications Public Limited Company |
Method and apparatus for automated testing software
|
US8640235B2
(en)
*
|
2006-03-31 |
2014-01-28 |
Symantec Corporation |
Determination of malicious entities
|
US8316439B2
(en)
|
2006-05-19 |
2012-11-20 |
Iyuko Services L.L.C. |
Anti-virus and firewall system
|
ES2454198T3
(es)
|
2006-07-07 |
2014-04-09 |
E-Blink |
Procedimiento de sincronización de dos dispositivos electrónicos de un enlace inalámbrico, particularmente de una red de telefonía móvil y sistema de implementación de este procedimiento
|
US20080016572A1
(en)
*
|
2006-07-12 |
2008-01-17 |
Microsoft Corporation |
Malicious software detection via memory analysis
|
KR100833958B1
(ko)
|
2006-07-28 |
2008-05-30 |
고려대학교 산학협력단 |
악성 프로그램을 탐지하는 프로그램이 저장된 기록 매체 및악성 프로그램 탐지 방법
|
US20080101223A1
(en)
*
|
2006-10-30 |
2008-05-01 |
Gustavo De Los Reyes |
Method and apparatus for providing network based end-device protection
|
US20080115215A1
(en)
*
|
2006-10-31 |
2008-05-15 |
Jeffrey Scott Bardsley |
Methods, systems, and computer program products for automatically identifying and validating the source of a malware infection of a computer system
|
US8407160B2
(en)
|
2006-11-15 |
2013-03-26 |
The Trustees Of Columbia University In The City Of New York |
Systems, methods, and media for generating sanitized data, sanitizing anomaly detection models, and/or generating sanitized anomaly detection models
|
US20080229416A1
(en)
*
|
2007-01-09 |
2008-09-18 |
G. K. Webb Services Llc |
Computer Network Virus Protection System and Method
|
US8856782B2
(en)
|
2007-03-01 |
2014-10-07 |
George Mason Research Foundation, Inc. |
On-demand disposable virtual work system
|
US20080271025A1
(en)
*
|
2007-04-24 |
2008-10-30 |
Stacksafe, Inc. |
System and method for creating an assurance system in a production environment
|
US20080271019A1
(en)
*
|
2007-04-24 |
2008-10-30 |
Stratton Robert J |
System and Method for Creating a Virtual Assurance System
|
US8402529B1
(en)
|
2007-05-30 |
2013-03-19 |
M86 Security, Inc. |
Preventing propagation of malicious software during execution in a virtual machine
|
US8160847B2
(en)
*
|
2007-07-07 |
2012-04-17 |
Neal Solomon |
Hybrid multi-layer artificial immune system
|
CN101359356B
(zh)
*
|
2007-08-03 |
2010-08-25 |
联想(北京)有限公司 |
删除或隔离计算机病毒的方法及系统
|
KR100945247B1
(ko)
*
|
2007-10-04 |
2010-03-03 |
한국전자통신연구원 |
가상 환경을 이용한 비실행 파일 내의 악성 코드 분석 방법및 장치
|
US8276200B2
(en)
*
|
2008-01-09 |
2012-09-25 |
International Business Machines Corporation |
Systems and methods for securely processing sensitive streams in a mixed infrastructure
|
EP2157525B1
(de)
*
|
2008-08-21 |
2018-01-10 |
Unify GmbH & Co. KG |
Verfahren zur Erkennung von Schadsoftware
|
US9098698B2
(en)
|
2008-09-12 |
2015-08-04 |
George Mason Research Foundation, Inc. |
Methods and apparatus for application isolation
|
US8997219B2
(en)
|
2008-11-03 |
2015-03-31 |
Fireeye, Inc. |
Systems and methods for detecting malicious PDF network content
|
US8850571B2
(en)
|
2008-11-03 |
2014-09-30 |
Fireeye, Inc. |
Systems and methods for detecting malicious network content
|
US8839422B2
(en)
|
2009-06-30 |
2014-09-16 |
George Mason Research Foundation, Inc. |
Virtual browsing environment
|
US8832829B2
(en)
|
2009-09-30 |
2014-09-09 |
Fireeye, Inc. |
Network-based binary file extraction and analysis for malware detection
|
FR2956934B1
(fr)
|
2010-02-26 |
2012-09-28 |
Blink E |
Procede et dispositif d'emission/reception de signaux electromagnetiques recus/emis sur une ou plusieurs premieres bandes de frequences.
|
KR101122650B1
(ko)
*
|
2010-04-28 |
2012-03-09 |
한국전자통신연구원 |
정상 프로세스에 위장 삽입된 악성코드 탐지 장치, 시스템 및 방법
|
JP5739182B2
(ja)
|
2011-02-04 |
2015-06-24 |
インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation |
制御システム、方法およびプログラム
|
JP5731223B2
(ja)
|
2011-02-14 |
2015-06-10 |
インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation |
異常検知装置、監視制御システム、異常検知方法、プログラムおよび記録媒体
|
JP5689333B2
(ja)
*
|
2011-02-15 |
2015-03-25 |
インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation |
異常検知システム、異常検知装置、異常検知方法、プログラムおよび記録媒体
|
CN102298681B
(zh)
*
|
2011-06-22 |
2013-07-31 |
西北大学 |
一种基于数据流切片的软件识别方法
|
EP2756366B1
(de)
|
2011-09-15 |
2020-01-15 |
The Trustees of Columbia University in the City of New York |
Systeme, verfahren und medien zur erkennung von rop-nutzdaten
|
US9081959B2
(en)
|
2011-12-02 |
2015-07-14 |
Invincea, Inc. |
Methods and apparatus for control and detection of malicious content using a sandbox environment
|
US9519782B2
(en)
|
2012-02-24 |
2016-12-13 |
Fireeye, Inc. |
Detecting malicious network content
|
FR2990315B1
(fr)
|
2012-05-04 |
2014-06-13 |
Blink E |
Procede de transmission d'informations entre une unite emettrice et une unite receptrice
|
CN103679015A
(zh)
*
|
2012-09-04 |
2014-03-26 |
江苏中科慧创信息安全技术有限公司 |
一种保护内核系统的攻击控制方法
|
KR101244731B1
(ko)
*
|
2012-09-11 |
2013-03-18 |
주식회사 안랩 |
디버그 이벤트를 이용한 악성 쉘 코드 탐지 장치 및 방법
|
US8850581B2
(en)
|
2012-11-07 |
2014-09-30 |
Microsoft Corporation |
Identification of malware detection signature candidate code
|
US10572665B2
(en)
|
2012-12-28 |
2020-02-25 |
Fireeye, Inc. |
System and method to create a number of breakpoints in a virtual machine via virtual machine trapping events
|
US8990944B1
(en)
|
2013-02-23 |
2015-03-24 |
Fireeye, Inc. |
Systems and methods for automatically detecting backdoors
|
US9009823B1
(en)
|
2013-02-23 |
2015-04-14 |
Fireeye, Inc. |
Framework for efficient security coverage of mobile software applications installed on mobile devices
|
US9367681B1
(en)
|
2013-02-23 |
2016-06-14 |
Fireeye, Inc. |
Framework for efficient security coverage of mobile software applications using symbolic execution to reach regions of interest within an application
|
US9195829B1
(en)
|
2013-02-23 |
2015-11-24 |
Fireeye, Inc. |
User interface with real-time visual playback along with synchronous textual analysis log display and event/time index for anomalous behavior detection in applications
|
US9824209B1
(en)
|
2013-02-23 |
2017-11-21 |
Fireeye, Inc. |
Framework for efficient security coverage of mobile software applications that is usable to harden in the field code
|
US9159035B1
(en)
|
2013-02-23 |
2015-10-13 |
Fireeye, Inc. |
Framework for computer application analysis of sensitive information tracking
|
US9009822B1
(en)
|
2013-02-23 |
2015-04-14 |
Fireeye, Inc. |
Framework for multi-phase analysis of mobile applications
|
US9176843B1
(en)
|
2013-02-23 |
2015-11-03 |
Fireeye, Inc. |
Framework for efficient security coverage of mobile software applications
|
US9626509B1
(en)
|
2013-03-13 |
2017-04-18 |
Fireeye, Inc. |
Malicious content analysis with multi-version application support within single operating environment
|
US9355247B1
(en)
|
2013-03-13 |
2016-05-31 |
Fireeye, Inc. |
File extraction from memory dump for malicious content analysis
|
US9565202B1
(en)
|
2013-03-13 |
2017-02-07 |
Fireeye, Inc. |
System and method for detecting exfiltration content
|
US9104867B1
(en)
|
2013-03-13 |
2015-08-11 |
Fireeye, Inc. |
Malicious content analysis using simulated user interaction without user involvement
|
US9311479B1
(en)
|
2013-03-14 |
2016-04-12 |
Fireeye, Inc. |
Correlation and consolidation of analytic data for holistic view of a malware attack
|
US9430646B1
(en)
|
2013-03-14 |
2016-08-30 |
Fireeye, Inc. |
Distributed systems and methods for automatically detecting unknown bots and botnets
|
US9251343B1
(en)
|
2013-03-15 |
2016-02-02 |
Fireeye, Inc. |
Detecting bootkits resident on compromised computers
|
US9413781B2
(en)
|
2013-03-15 |
2016-08-09 |
Fireeye, Inc. |
System and method employing structured intelligence to verify and contain threats at endpoints
|
US10713358B2
(en)
|
2013-03-15 |
2020-07-14 |
Fireeye, Inc. |
System and method to extract and utilize disassembly features to classify software intent
|
US9495180B2
(en)
|
2013-05-10 |
2016-11-15 |
Fireeye, Inc. |
Optimized resource allocation for virtual machines within a malware content detection system
|
US9635039B1
(en)
|
2013-05-13 |
2017-04-25 |
Fireeye, Inc. |
Classifying sets of malicious indicators for detecting command and control communications associated with malware
|
US9536091B2
(en)
|
2013-06-24 |
2017-01-03 |
Fireeye, Inc. |
System and method for detecting time-bomb malware
|
US10133863B2
(en)
|
2013-06-24 |
2018-11-20 |
Fireeye, Inc. |
Zero-day discovery system
|
US9300686B2
(en)
|
2013-06-28 |
2016-03-29 |
Fireeye, Inc. |
System and method for detecting malicious links in electronic messages
|
US9888016B1
(en)
|
2013-06-28 |
2018-02-06 |
Fireeye, Inc. |
System and method for detecting phishing using password prediction
|
US9628507B2
(en)
|
2013-09-30 |
2017-04-18 |
Fireeye, Inc. |
Advanced persistent threat (APT) detection center
|
US9736179B2
(en)
|
2013-09-30 |
2017-08-15 |
Fireeye, Inc. |
System, apparatus and method for using malware analysis results to drive adaptive instrumentation of virtual machines to improve exploit detection
|
US9294501B2
(en)
|
2013-09-30 |
2016-03-22 |
Fireeye, Inc. |
Fuzzy hash of behavioral results
|
US10515214B1
(en)
|
2013-09-30 |
2019-12-24 |
Fireeye, Inc. |
System and method for classifying malware within content created during analysis of a specimen
|
US10089461B1
(en)
|
2013-09-30 |
2018-10-02 |
Fireeye, Inc. |
Page replacement code injection
|
US9171160B2
(en)
|
2013-09-30 |
2015-10-27 |
Fireeye, Inc. |
Dynamically adaptive framework and method for classifying malware using intelligent static, emulation, and dynamic analyses
|
US9690936B1
(en)
|
2013-09-30 |
2017-06-27 |
Fireeye, Inc. |
Multistage system and method for analyzing obfuscated content for malware
|
US10192052B1
(en)
|
2013-09-30 |
2019-01-29 |
Fireeye, Inc. |
System, apparatus and method for classifying a file as malicious using static scanning
|
US9921978B1
(en)
|
2013-11-08 |
2018-03-20 |
Fireeye, Inc. |
System and method for enhanced security of storage devices
|
US9189627B1
(en)
|
2013-11-21 |
2015-11-17 |
Fireeye, Inc. |
System, apparatus and method for conducting on-the-fly decryption of encrypted objects for malware detection
|
US9747446B1
(en)
|
2013-12-26 |
2017-08-29 |
Fireeye, Inc. |
System and method for run-time object classification
|
US9756074B2
(en)
|
2013-12-26 |
2017-09-05 |
Fireeye, Inc. |
System and method for IPS and VM-based detection of suspicious objects
|
US9292686B2
(en)
|
2014-01-16 |
2016-03-22 |
Fireeye, Inc. |
Micro-virtualization architecture for threat-aware microvisor deployment in a node of a network environment
|
US9262635B2
(en)
|
2014-02-05 |
2016-02-16 |
Fireeye, Inc. |
Detection efficacy of virtual machine-based analysis with application specific events
|
US9241010B1
(en)
|
2014-03-20 |
2016-01-19 |
Fireeye, Inc. |
System and method for network behavior detection
|
US10242185B1
(en)
|
2014-03-21 |
2019-03-26 |
Fireeye, Inc. |
Dynamic guest image creation and rollback
|
US9591015B1
(en)
|
2014-03-28 |
2017-03-07 |
Fireeye, Inc. |
System and method for offloading packet processing and static analysis operations
|
US9223972B1
(en)
|
2014-03-31 |
2015-12-29 |
Fireeye, Inc. |
Dynamically remote tuning of a malware content detection system
|
US9432389B1
(en)
|
2014-03-31 |
2016-08-30 |
Fireeye, Inc. |
System, apparatus and method for detecting a malicious attack based on static analysis of a multi-flow object
|
US9973531B1
(en)
|
2014-06-06 |
2018-05-15 |
Fireeye, Inc. |
Shellcode detection
|
US9594912B1
(en)
|
2014-06-06 |
2017-03-14 |
Fireeye, Inc. |
Return-oriented programming detection
|
US9438623B1
(en)
|
2014-06-06 |
2016-09-06 |
Fireeye, Inc. |
Computer exploit detection using heap spray pattern matching
|
US10084813B2
(en)
|
2014-06-24 |
2018-09-25 |
Fireeye, Inc. |
Intrusion prevention and remedy system
|
US10805340B1
(en)
|
2014-06-26 |
2020-10-13 |
Fireeye, Inc. |
Infection vector and malware tracking with an interactive user display
|
US9398028B1
(en)
|
2014-06-26 |
2016-07-19 |
Fireeye, Inc. |
System, device and method for detecting a malicious attack based on communcations between remotely hosted virtual machines and malicious web servers
|
US10002252B2
(en)
|
2014-07-01 |
2018-06-19 |
Fireeye, Inc. |
Verification of trusted threat-aware microvisor
|
US9363280B1
(en)
|
2014-08-22 |
2016-06-07 |
Fireeye, Inc. |
System and method of detecting delivery of malware using cross-customer data
|
US10671726B1
(en)
|
2014-09-22 |
2020-06-02 |
Fireeye Inc. |
System and method for malware analysis using thread-level event monitoring
|
US10027689B1
(en)
|
2014-09-29 |
2018-07-17 |
Fireeye, Inc. |
Interactive infection visualization for improved exploit detection and signature generation for malware and malware families
|
US9773112B1
(en)
|
2014-09-29 |
2017-09-26 |
Fireeye, Inc. |
Exploit detection of malware and malware families
|
US9495188B1
(en)
|
2014-09-30 |
2016-11-15 |
Palo Alto Networks, Inc. |
Synchronizing a honey network configuration to reflect a target network environment
|
US10044675B1
(en)
|
2014-09-30 |
2018-08-07 |
Palo Alto Networks, Inc. |
Integrating a honey network with a target network to counter IP and peer-checking evasion techniques
|
US9716727B1
(en)
|
2014-09-30 |
2017-07-25 |
Palo Alto Networks, Inc. |
Generating a honey network configuration to emulate a target network environment
|
US9882929B1
(en)
|
2014-09-30 |
2018-01-30 |
Palo Alto Networks, Inc. |
Dynamic selection and generation of a virtual clone for detonation of suspicious content within a honey network
|
US9860208B1
(en)
|
2014-09-30 |
2018-01-02 |
Palo Alto Networks, Inc. |
Bridging a virtual clone of a target device in a honey network to a suspicious device in an enterprise network
|
US9690933B1
(en)
|
2014-12-22 |
2017-06-27 |
Fireeye, Inc. |
Framework for classifying an object as malicious with machine learning for deploying updated predictive models
|
US10075455B2
(en)
|
2014-12-26 |
2018-09-11 |
Fireeye, Inc. |
Zero-day rotating guest image profile
|
US9934376B1
(en)
|
2014-12-29 |
2018-04-03 |
Fireeye, Inc. |
Malware detection appliance architecture
|
US9838417B1
(en)
|
2014-12-30 |
2017-12-05 |
Fireeye, Inc. |
Intelligent context aware user interaction for malware detection
|
US9690606B1
(en)
|
2015-03-25 |
2017-06-27 |
Fireeye, Inc. |
Selective system call monitoring
|
US10148693B2
(en)
|
2015-03-25 |
2018-12-04 |
Fireeye, Inc. |
Exploit detection system
|
US9438613B1
(en)
|
2015-03-30 |
2016-09-06 |
Fireeye, Inc. |
Dynamic content activation for automated analysis of embedded objects
|
US9483644B1
(en)
|
2015-03-31 |
2016-11-01 |
Fireeye, Inc. |
Methods for detecting file altering malware in VM based analysis
|
US10417031B2
(en)
|
2015-03-31 |
2019-09-17 |
Fireeye, Inc. |
Selective virtualization for security threat detection
|
US10474813B1
(en)
|
2015-03-31 |
2019-11-12 |
Fireeye, Inc. |
Code injection technique for remediation at an endpoint of a network
|
US9654485B1
(en)
|
2015-04-13 |
2017-05-16 |
Fireeye, Inc. |
Analytics-based security monitoring system and method
|
US9594904B1
(en)
|
2015-04-23 |
2017-03-14 |
Fireeye, Inc. |
Detecting malware based on reflection
|
US10454950B1
(en)
|
2015-06-30 |
2019-10-22 |
Fireeye, Inc. |
Centralized aggregation technique for detecting lateral movement of stealthy cyber-attacks
|
US10642753B1
(en)
|
2015-06-30 |
2020-05-05 |
Fireeye, Inc. |
System and method for protecting a software component running in virtual machine using a virtualization layer
|
US11113086B1
(en)
|
2015-06-30 |
2021-09-07 |
Fireeye, Inc. |
Virtual system and method for securing external network connectivity
|
US10726127B1
(en)
|
2015-06-30 |
2020-07-28 |
Fireeye, Inc. |
System and method for protecting a software component running in a virtual machine through virtual interrupts by the virtualization layer
|
US10715542B1
(en)
|
2015-08-14 |
2020-07-14 |
Fireeye, Inc. |
Mobile application risk analysis
|
US9742796B1
(en)
|
2015-09-18 |
2017-08-22 |
Palo Alto Networks, Inc. |
Automatic repair of corrupt files for a detonation engine
|
US10176321B2
(en)
|
2015-09-22 |
2019-01-08 |
Fireeye, Inc. |
Leveraging behavior-based rules for malware family classification
|
US10033747B1
(en)
|
2015-09-29 |
2018-07-24 |
Fireeye, Inc. |
System and method for detecting interpreter-based exploit attacks
|
US10817606B1
(en)
|
2015-09-30 |
2020-10-27 |
Fireeye, Inc. |
Detecting delayed activation malware using a run-time monitoring agent and time-dilation logic
|
US10601865B1
(en)
|
2015-09-30 |
2020-03-24 |
Fireeye, Inc. |
Detection of credential spearphishing attacks using email analysis
|
US10706149B1
(en)
|
2015-09-30 |
2020-07-07 |
Fireeye, Inc. |
Detecting delayed activation malware using a primary controller and plural time controllers
|
US10210329B1
(en)
|
2015-09-30 |
2019-02-19 |
Fireeye, Inc. |
Method to detect application execution hijacking using memory protection
|
US9825976B1
(en)
|
2015-09-30 |
2017-11-21 |
Fireeye, Inc. |
Detection and classification of exploit kits
|
US9825989B1
(en)
|
2015-09-30 |
2017-11-21 |
Fireeye, Inc. |
Cyber attack early warning system
|
US10284575B2
(en)
|
2015-11-10 |
2019-05-07 |
Fireeye, Inc. |
Launcher for setting analysis environment variations for malware detection
|
US10846117B1
(en)
|
2015-12-10 |
2020-11-24 |
Fireeye, Inc. |
Technique for establishing secure communication between host and guest processes of a virtualization architecture
|
US10447728B1
(en)
|
2015-12-10 |
2019-10-15 |
Fireeye, Inc. |
Technique for protecting guest processes using a layered virtualization architecture
|
US10108446B1
(en)
|
2015-12-11 |
2018-10-23 |
Fireeye, Inc. |
Late load technique for deploying a virtualization layer underneath a running operating system
|
US10621338B1
(en)
|
2015-12-30 |
2020-04-14 |
Fireeye, Inc. |
Method to detect forgery and exploits using last branch recording registers
|
US10565378B1
(en)
|
2015-12-30 |
2020-02-18 |
Fireeye, Inc. |
Exploit of privilege detection framework
|
US10133866B1
(en)
|
2015-12-30 |
2018-11-20 |
Fireeye, Inc. |
System and method for triggering analysis of an object for malware in response to modification of that object
|
US10050998B1
(en)
|
2015-12-30 |
2018-08-14 |
Fireeye, Inc. |
Malicious message analysis system
|
US9824216B1
(en)
|
2015-12-31 |
2017-11-21 |
Fireeye, Inc. |
Susceptible environment detection system
|
US10581874B1
(en)
|
2015-12-31 |
2020-03-03 |
Fireeye, Inc. |
Malware detection system with contextual analysis
|
US11552986B1
(en)
|
2015-12-31 |
2023-01-10 |
Fireeye Security Holdings Us Llc |
Cyber-security framework for application of virtual features
|
US10601863B1
(en)
|
2016-03-25 |
2020-03-24 |
Fireeye, Inc. |
System and method for managing sensor enrollment
|
US10476906B1
(en)
|
2016-03-25 |
2019-11-12 |
Fireeye, Inc. |
System and method for managing formation and modification of a cluster within a malware detection system
|
US10785255B1
(en)
|
2016-03-25 |
2020-09-22 |
Fireeye, Inc. |
Cluster configuration within a scalable malware detection system
|
US10671721B1
(en)
|
2016-03-25 |
2020-06-02 |
Fireeye, Inc. |
Timeout management services
|
US10893059B1
(en)
|
2016-03-31 |
2021-01-12 |
Fireeye, Inc. |
Verification and enhancement using detection systems located at the network periphery and endpoint devices
|
US10169585B1
(en)
|
2016-06-22 |
2019-01-01 |
Fireeye, Inc. |
System and methods for advanced malware detection through placement of transition events
|
US10462173B1
(en)
|
2016-06-30 |
2019-10-29 |
Fireeye, Inc. |
Malware detection verification and enhancement by coordinating endpoint and malware detection systems
|
US10592678B1
(en)
|
2016-09-09 |
2020-03-17 |
Fireeye, Inc. |
Secure communications between peers using a verified virtual trusted platform module
|
US10491627B1
(en)
|
2016-09-29 |
2019-11-26 |
Fireeye, Inc. |
Advanced malware detection using similarity analysis
|
US10795991B1
(en)
|
2016-11-08 |
2020-10-06 |
Fireeye, Inc. |
Enterprise search
|
US10587647B1
(en)
|
2016-11-22 |
2020-03-10 |
Fireeye, Inc. |
Technique for malware detection capability comparison of network security devices
|
US10581879B1
(en)
|
2016-12-22 |
2020-03-03 |
Fireeye, Inc. |
Enhanced malware detection for generated objects
|
US10552610B1
(en)
|
2016-12-22 |
2020-02-04 |
Fireeye, Inc. |
Adaptive virtual machine snapshot update framework for malware behavioral analysis
|
US10523609B1
(en)
|
2016-12-27 |
2019-12-31 |
Fireeye, Inc. |
Multi-vector malware detection and analysis
|
US10904286B1
(en)
|
2017-03-24 |
2021-01-26 |
Fireeye, Inc. |
Detection of phishing attacks using similarity analysis
|
US10791138B1
(en)
|
2017-03-30 |
2020-09-29 |
Fireeye, Inc. |
Subscription-based malware detection
|
US10848397B1
(en)
|
2017-03-30 |
2020-11-24 |
Fireeye, Inc. |
System and method for enforcing compliance with subscription requirements for cyber-attack detection service
|
US10902119B1
(en)
|
2017-03-30 |
2021-01-26 |
Fireeye, Inc. |
Data extraction system for malware analysis
|
US10798112B2
(en)
|
2017-03-30 |
2020-10-06 |
Fireeye, Inc. |
Attribute-controlled malware detection
|
US10855700B1
(en)
|
2017-06-29 |
2020-12-01 |
Fireeye, Inc. |
Post-intrusion detection of cyber-attacks during lateral movement within networks
|
US10601848B1
(en)
|
2017-06-29 |
2020-03-24 |
Fireeye, Inc. |
Cyber-security system and method for weak indicator detection and correlation to generate strong indicators
|
US10503904B1
(en)
|
2017-06-29 |
2019-12-10 |
Fireeye, Inc. |
Ransomware detection and mitigation
|
US10893068B1
(en)
|
2017-06-30 |
2021-01-12 |
Fireeye, Inc. |
Ransomware file modification prevention technique
|
US10747872B1
(en)
|
2017-09-27 |
2020-08-18 |
Fireeye, Inc. |
System and method for preventing malware evasion
|
US10805346B2
(en)
|
2017-10-01 |
2020-10-13 |
Fireeye, Inc. |
Phishing attack detection
|
US10824367B2
(en)
|
2017-10-19 |
2020-11-03 |
Seagate Technology Llc |
Adaptive intrusion detection based on monitored data transfer commands
|
US11108809B2
(en)
|
2017-10-27 |
2021-08-31 |
Fireeye, Inc. |
System and method for analyzing binary code for malware classification using artificial neural network techniques
|
US11240275B1
(en)
|
2017-12-28 |
2022-02-01 |
Fireeye Security Holdings Us Llc |
Platform and method for performing cybersecurity analyses employing an intelligence hub with a modular architecture
|
US11271955B2
(en)
|
2017-12-28 |
2022-03-08 |
Fireeye Security Holdings Us Llc |
Platform and method for retroactive reclassification employing a cybersecurity-based global data store
|
US11005860B1
(en)
|
2017-12-28 |
2021-05-11 |
Fireeye, Inc. |
Method and system for efficient cybersecurity analysis of endpoint events
|
US10826931B1
(en)
|
2018-03-29 |
2020-11-03 |
Fireeye, Inc. |
System and method for predicting and mitigating cybersecurity system misconfigurations
|
US10956477B1
(en)
|
2018-03-30 |
2021-03-23 |
Fireeye, Inc. |
System and method for detecting malicious scripts through natural language processing modeling
|
US11558401B1
(en)
|
2018-03-30 |
2023-01-17 |
Fireeye Security Holdings Us Llc |
Multi-vector malware detection data sharing system for improved detection
|
US11003773B1
(en)
|
2018-03-30 |
2021-05-11 |
Fireeye, Inc. |
System and method for automatically generating malware detection rule recommendations
|
US11314859B1
(en)
|
2018-06-27 |
2022-04-26 |
FireEye Security Holdings, Inc. |
Cyber-security system and method for detecting escalation of privileges within an access token
|
US11075930B1
(en)
|
2018-06-27 |
2021-07-27 |
Fireeye, Inc. |
System and method for detecting repetitive cybersecurity attacks constituting an email campaign
|
US11228491B1
(en)
|
2018-06-28 |
2022-01-18 |
Fireeye Security Holdings Us Llc |
System and method for distributed cluster configuration monitoring and management
|
US11316900B1
(en)
|
2018-06-29 |
2022-04-26 |
FireEye Security Holdings Inc. |
System and method for automatically prioritizing rules for cyber-threat detection and mitigation
|
US11182473B1
(en)
|
2018-09-13 |
2021-11-23 |
Fireeye Security Holdings Us Llc |
System and method for mitigating cyberattacks against processor operability by a guest process
|
US11763004B1
(en)
|
2018-09-27 |
2023-09-19 |
Fireeye Security Holdings Us Llc |
System and method for bootkit detection
|
US11368475B1
(en)
|
2018-12-21 |
2022-06-21 |
Fireeye Security Holdings Us Llc |
System and method for scanning remote services to locate stored objects with malware
|
US11258806B1
(en)
|
2019-06-24 |
2022-02-22 |
Mandiant, Inc. |
System and method for automatically associating cybersecurity intelligence to cyberthreat actors
|
US11556640B1
(en)
|
2019-06-27 |
2023-01-17 |
Mandiant, Inc. |
Systems and methods for automated cybersecurity analysis of extracted binary string sets
|
US11392700B1
(en)
|
2019-06-28 |
2022-07-19 |
Fireeye Security Holdings Us Llc |
System and method for supporting cross-platform data verification
|
US11886585B1
(en)
|
2019-09-27 |
2024-01-30 |
Musarubra Us Llc |
System and method for identifying and mitigating cyberattacks through malicious position-independent code execution
|
US11637862B1
(en)
|
2019-09-30 |
2023-04-25 |
Mandiant, Inc. |
System and method for surfacing cyber-security threats with a self-learning recommendation engine
|
US11265346B2
(en)
|
2019-12-19 |
2022-03-01 |
Palo Alto Networks, Inc. |
Large scale high-interactive honeypot farm
|
US11271907B2
(en)
|
2019-12-19 |
2022-03-08 |
Palo Alto Networks, Inc. |
Smart proxy for a large scale high-interaction honeypot farm
|