| 11727017 |
Methods for introspecting code in a multi-tenant environment |
Nicholas Chun Yuan Chen, Lovi Yu, Christopher Alan Ebert, Michael Boilen, Samantha Reynard |
2023-08-15 |
| 11256802 |
Application behavioral fingerprints |
Joao M. Forcada, Haik Mesropian, Alexander Danileiko, Charlotte Chang, Huawei Xing +1 more |
2022-02-22 |
| 9385869 |
Systems and methods for trusting digitally signed files in the absence of verifiable signature conditions |
Sourabh Satish |
2016-07-05 |
| 8413235 |
Malware detection using file heritage data |
Joseph Chen |
2013-04-02 |
| 8402545 |
Systems and methods for identifying unique malware variants |
Joseph Chen |
2013-03-19 |
| 8370942 |
Proactively analyzing binary files from suspicious sources |
Robert Conrad, Joseph Chen |
2013-02-05 |
| 8346649 |
Methods and computer software applications for selecting securities for an investment portfolio |
Dan Waldron, David McGarel, Robert Hensley |
2013-01-01 |
| 8321935 |
Identifying originators of malware |
Joseph Chen, Robert Conrad |
2012-11-27 |
| 8302191 |
Filtering malware related content |
Robert Conrad, Joseph Chen |
2012-10-30 |
| 8281403 |
Methods and systems for evaluating the health of computing systems based on when operating-system changes occur |
Daniel Asheghian, Robert Conrad, Chris Sakuma |
2012-10-02 |
| 8225405 |
Heuristic detection malicious code blacklist updating and protection system and method |
Joseph Chen |
2012-07-17 |
| 8176555 |
Systems and methods for detecting malicious processes by analyzing process names and process characteristics |
Anthony Schreiner, Brian Hernacki, William E. Sobel, Mark Kennedy |
2012-05-08 |