| 9848016 |
Identifying malicious devices within a computer network |
Oskar Ibatullin, Daniel J. Quinlan |
2017-12-19 |
| 9813441 |
Detecting and breaking CAPTCHA automation scripts and preventing image scraping |
— |
2017-11-07 |
| 9787711 |
Enabling custom countermeasures from a security device |
— |
2017-10-10 |
| 9787638 |
Filtering data using malicious reference information |
— |
2017-10-10 |
| 9785787 |
Encrypting images on a client device for secure transmission and storage on a storage device |
— |
2017-10-10 |
| 9769197 |
Malware detection using external malware detection operations |
Daniel J. Quinlan |
2017-09-19 |
| 9769198 |
Malware detection using internal and/or external malware detection operations |
Daniel J. Quinlan |
2017-09-19 |
| 9740853 |
Configuring a sandbox environment for malware testing |
Jacob Asher Langton, Daniel J. Quinlan, Zhenxin Zhan |
2017-08-22 |
| 9740862 |
Identifying malware based on a relationship between a downloader file and a downloaded file |
Daniel J. Quinlan, Jacob Asher Langton |
2017-08-22 |
| 9729572 |
Remote remediation of malicious files |
Daniel J. Quinlan, Jacob Asher Langton |
2017-08-08 |
| 9722801 |
Detecting and preventing man-in-the-middle attacks on an encrypted connection |
— |
2017-08-01 |
| 9708575 |
Systems and methods for wine processing |
David A. Koretz, Donald G. Hubbard, Jr., Niculae Mustatea, Michael Dumont |
2017-07-18 |
| 9699212 |
Limiting the efficacy of a denial of service attack by increasing client resource demands |
Daniel J. Quinlan |
2017-07-04 |
| 9680845 |
Detecting a malicious file infection via sandboxing |
Jacob Asher Langton, Daniel J. Quinlan, Declan Conlon |
2017-06-13 |
| 9679141 |
Detecting keylogging |
Jacob Asher Langton, Daniel J. Quinlan |
2017-06-13 |
| 9654496 |
Obtaining suspect objects based on detecting suspicious activity |
Jacob Asher Langton, Daniel J. Quinlan, Zhenxin Zhan |
2017-05-16 |
| 9646159 |
Multi-file malware analysis |
Jacob Asher Langton, Daniel J. Quinlan, Declan Conlon |
2017-05-09 |
| 9594906 |
Confirming a malware infection on a client device using a remote access connection tool to identify a malicious file based on fuzzy hashes |
Jacob Asher Langton, Daniel J. Quinlan |
2017-03-14 |
| 9594908 |
Identifying an evasive malicious object based on a behavior delta |
Daniel J. Quinlan |
2017-03-14 |
| 9594902 |
Analyzing a password-protected file for malware |
Jacob Asher Langton, Daniel J. Quinlan |
2017-03-14 |
| 9571519 |
Targeted attack discovery |
Declan Conlon |
2017-02-14 |
| 9569520 |
Classification of software based on user interface elements |
Jacob Asher Langton, Daniel J. Quinlan |
2017-02-14 |