| 9800588 |
Automated analysis pipeline determination in a malware analysis environment |
Andrew Watson |
2017-10-24 |
| 9740876 |
Securely storing and provisioning security telemetry of multiple organizations for cloud based analytics |
Carey Nachenberg, Paul Agbabian, Andrew Watson |
2017-08-22 |
| 9703956 |
Systems and methods for categorizing virtual-machine-aware applications for further analysis |
Andrew Watson |
2017-07-11 |
| 9692773 |
Systems and methods for identifying detection-evasion behaviors of files undergoing malware analyses |
Andrew Watson |
2017-06-27 |
| 9652615 |
Systems and methods for analyzing suspected malware |
Andrew Watson |
2017-05-16 |
| 9378385 |
Systems and methods for determining whether transmission of sensitive data is expected |
Xiaole Zhu, Matthew Yeo |
2016-06-28 |
| 9311481 |
Systems and methods for classifying package files as trojans |
Matthew Yeo, Jun Mao |
2016-04-12 |
| 9230105 |
Detecting malicious tampering of web forms |
Sourabh Satish |
2016-01-05 |
| 9223966 |
Systems and methods for replicating computing system environments |
Sourabh Satish |
2015-12-29 |
| 9202057 |
Systems and methods for identifying private keys that have been compromised |
Jun Mao, Matthew Yeo |
2015-12-01 |
| 9092615 |
Identifying application sources on non-rooted devices |
Jun Mao |
2015-07-28 |
| 9064120 |
Systems and methods for directing application updates |
Sourabh Satish, Petrus Johannes Viljoen, Gerry A. Egan |
2015-06-23 |
| 8984632 |
Systems and methods for identifying malware |
Barry Laffoon, Jun Mao, Bruce McCorkendale |
2015-03-17 |
| 8925088 |
Method and apparatus for automatically excluding false positives from detection as malware |
Jeffrey Wilhelm |
2014-12-30 |
| 8732834 |
Systems and methods for detecting illegitimate applications |
Jun Mao, Bruce McCorkendale, Barry Laffoon |
2014-05-20 |
| 8677346 |
Providing installer package information to a user |
Kent E. Griffin, Sourabh Satish, Vijay Seshadri, Jing Zhou |
2014-03-18 |
| 8381302 |
Systems and methods for translating non-comparable values into comparable values for use in heuristics |
Mark Kennedy |
2013-02-19 |
| 8356352 |
Security scanner for user-generated web content |
Gerry A. Egan, Adam Bromwich |
2013-01-15 |
| 8331618 |
Method and apparatus for monitoring instant messaging with visual identification |
Pak Wai Yung, Jung Eun Choi |
2012-12-11 |
| 8296255 |
Method and apparatus for automatically classifying an unknown site to improve internet browsing control |
— |
2012-10-23 |
| 8260711 |
Systems and methods for managing rights of data via dynamic taint analysis |
Michael Spertus |
2012-09-04 |