| 11989161 |
Generating readable, compressed event trace logs from raw event trace logs |
— |
2024-05-21 |
| 11868471 |
Particle encoding for automatic sample processing |
— |
2024-01-09 |
| 11861007 |
Detecting container threats through extracting kernel events to process in reserved scanner containers |
Shlomo Yehezkel, Peter Ferrie |
2024-01-02 |
| 11803642 |
Optimization of high entropy data particle extraction |
— |
2023-10-31 |
| 11768937 |
Hash based flexible threat scanning engine |
— |
2023-09-26 |
| 11704408 |
Threat scanning transplanted containers |
Muhammad Wasiq, Shane Pereira |
2023-07-18 |
| 11403016 |
Optimizing snapshot changed blocks metadata querying |
— |
2022-08-02 |
| 11379421 |
Generating readable, compressed event trace logs from raw event trace logs |
— |
2022-07-05 |
| 11372811 |
Optimizing disk volume scanning using snapshot metadata |
Sandeep Kumar, Shlomo Yehezkel, Chakravarthi Valicherla, Tal Eidelman, Shane Pereira |
2022-06-28 |
| 10977368 |
Detecting malware based on memory allocation patterns |
— |
2021-04-13 |
| 10846405 |
Systems and methods for detecting and protecting against malicious software |
Dumitru Stama |
2020-11-24 |
| 10645099 |
Malware detection facilitated by copying a memory range from an emulator for analysis and signature generation |
— |
2020-05-05 |
| 10621348 |
Detecting a malicious application executing in an emulator based on a check made by the malicious application after making an API call |
Priti More |
2020-04-14 |
| 10338943 |
Techniques for emulating microprocessor instructions |
Costin Ionescu |
2019-07-02 |
| 9170791 |
Storing data items with content encoded in storage addresses |
— |
2015-10-27 |