| 11188638 |
Fine-grained memory address space layout randomization |
Nicholas C. Allegra, Simon P. Cooper, Gregory D. Hughes |
2021-11-30 |
| 10867031 |
Marking valid return targets |
Gregory D. Hughes, Conrado Blasco, Gerard R. Williams, III, Jeffry E. Gonion, Timothy R. Paaske +1 more |
2020-12-15 |
| 10430577 |
Method and apparatus for inter process privilige transfer |
James M. Magee, Russell A. Blaine, Vishal Patel, Daniel A. Steffen, Kevin J. Van Vechten +2 more |
2019-10-01 |
| 10410003 |
Multiple containers assigned to an application |
Kelly B. Yancey, Eric Olaf Carlson, Paul William Chinn, Simon P. Cooper |
2019-09-10 |
| 10311228 |
Using a fine-grained address space layout randomization to mitigate potential security exploits |
Nicholas C. Allegra, Simon P. Cooper, Gregory D. Hughes |
2019-06-04 |
| 10311227 |
Obfuscation of an address space layout randomization mapping in a data processing system |
Gregory D. Hughes, Simon P. Cooper, Nicholas C. Allegra |
2019-06-04 |
| 10122759 |
Centralized operation management |
Peter Kiehtreiber, Christopher S. Linn, Randy D. Saldinger, Braden Thomas |
2018-11-06 |
| 9137261 |
Centralized operation management |
Peter Kiehtreiber, Christopher S. Linn, Randy D. Saldinger, Braden Thomas |
2015-09-15 |
| 8978094 |
Centralized operation management |
Peter Kiehtreiber, Christopher S. Linn, Randy D. Saldinger, Braden Thomas |
2015-03-10 |
| 8966574 |
Centralized operation management |
Peter Kiehtreiber, Christopher S. Linn, Randy D. Saldinger, Braden Thomas |
2015-02-24 |
| 8646050 |
System and method for supporting JIT in a secure system with randomly allocated memory ranges |
Lionel D. Desai |
2014-02-04 |
| 8631482 |
Method for managing computer resources accessed by a program operating in a restricted environment |
Ivan Krstic, Austin G. Jennings |
2014-01-14 |
| 8181264 |
Method and apparatus for deferred security analysis |
Christopher S. Linn, Aaron M. Sigel |
2012-05-15 |