| 10431228 |
Proving file ownership |
— |
2019-10-01 |
| 10129278 |
Detecting malware in content items |
Jon A. McClintock, Eric J. Martin, Karl Andre McCabe, Adam Cecchetti, David Erdmann |
2018-11-13 |
| 10044728 |
Endpoint segregation to prevent scripting attacks |
Aridaman Tripathi |
2018-08-07 |
| 9942267 |
Endpoint segregation to prevent scripting attacks |
Aridaman Tripathi |
2018-04-10 |
| 9812138 |
Proving file ownership |
— |
2017-11-07 |
| 9575979 |
Determining application composition and ownership |
Jon Arron McClintock, Shailendra Batra, Scott Gerard Carmack, Sachin Purushottam Joglekar, Alun Jones +3 more |
2017-02-21 |
| 9465942 |
Dictionary generation for identifying coded credentials |
David James Kane-Parry, Nima Sharifi Mehr |
2016-10-11 |
| 9348977 |
Detecting malware in content items |
Jon A. McClintock, Eric J. Martin, Karl Andre McCabe, Adam Cecchetti, David Erdmann |
2016-05-24 |
| 9336381 |
Entropy-based detection of sensitive information in code |
David James Kane-Parry |
2016-05-10 |
| 8621613 |
Detecting malware in content items |
Jon A. McClintock, Eric J. Martin, Karl Andre McCabe, Adam Cecchetti, David Erdmann |
2013-12-31 |