Issued Patents All Time
Showing 26–50 of 53 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9124623 | Systems and methods for detecting scam campaigns | — | 2015-09-01 |
| 9104873 | Systems and methods for determining whether graphics processing units are executing potentially malicious processes | Brendon Woirhaye | 2015-08-11 |
| 9088604 | Systems and methods for treating locally created files as trustworthy | Jeffrey Wilhelm | 2015-07-21 |
| 9077747 | Systems and methods for responding to security breaches | Kamron Farrokh | 2015-07-07 |
| 8832835 | Detecting and remediating malware dropped by files | Zhongning Chen | 2014-09-09 |
| 8819828 | Systems and methods for identifying malware threat vectors | Torrey Umland | 2014-08-26 |
| 8756432 | Systems and methods for detecting malicious digitally-signed applications | Rui Jing | 2014-06-17 |
| 8683585 | Using file reputations to identify malicious file sources in real time | Brendon Woirhaye | 2014-03-25 |
| 8650649 | Systems and methods for determining whether to evaluate the trustworthiness of digitally signed files based on signer reputation | Brendon Woirhaye | 2014-02-11 |
| 8646079 | Systems and methods for using property tables to perform non-iterative malware scans | Allen Hair | 2014-02-04 |
| 8635699 | Performance optimization for scanning of digital content on read-only optical media | Brendon Woirhaye | 2014-01-21 |
| 8627469 | Systems and methods for using acquisitional contexts to prevent false-positive malware classifications | Jeffrey Wilhelm | 2014-01-07 |
| 8561195 | Detection of malicious code based on its use of a folder shortcut | Jing Rui | 2013-10-15 |
| 8544090 | Systems and methods for detecting a potentially malicious uniform resource locator | — | 2013-09-24 |
| 8528090 | Systems and methods for creating customized confidence bands for use in malware detection | Jamie Jooyoung Park | 2013-09-03 |
| 8490195 | Method and apparatus for behavioral detection of malware in a computer system | Jamie Jooyoung Park | 2013-07-16 |
| 8413235 | Malware detection using file heritage data | Christopher Peterson | 2013-04-02 |
| 8402539 | Systems and methods for detecting malware | Adam Glick, Jeffrey Wilhelm | 2013-03-19 |
| 8402545 | Systems and methods for identifying unique malware variants | Christopher Peterson | 2013-03-19 |
| 8370942 | Proactively analyzing binary files from suspicious sources | Christopher Peterson, Robert Conrad | 2013-02-05 |
| 8353033 | Collecting malware samples via unauthorized download protection | Brendon Woirhaye | 2013-01-08 |
| 8321935 | Identifying originators of malware | Christopher Peterson, Robert Conrad | 2012-11-27 |
| 8302191 | Filtering malware related content | Robert Conrad, Christopher Peterson | 2012-10-30 |
| 8302194 | Using file prevalence to inform aggressiveness of behavioral heuristics | Robert Conrad | 2012-10-30 |
| 8281399 | Systems and methods for using property tables to perform non-iterative malware scans | Allen Hair | 2012-10-02 |