| 12411741 |
Techniques for tracking and securing sensitive data in distributed storage networks |
Anil Gathala, Sandeep Kumar, Chakravarthi Valicherla, Shlomo Yehezkel |
2025-09-09 |
| 11861007 |
Detecting container threats through extracting kernel events to process in reserved scanner containers |
Mircea Ciubotariu, Shlomo Yehezkel |
2024-01-02 |
| 11176276 |
Systems and methods for managing endpoint security states using passive data integrity attestations |
Joseph Chen, QuBo Song, Spencer Smith, Shaun Aimoto, Haik Mesropian +3 more |
2021-11-16 |
| 10318250 |
Systems and methods for locating functions for later interception |
Vishal Saxena |
2019-06-11 |
| 10049214 |
Systems and methods for detecting malicious processes on computing devices |
— |
2018-08-14 |
| 10043013 |
Systems and methods for detecting gadgets on computing devices |
Joseph Chen |
2018-08-07 |
| 8621606 |
Systems and methods for identifying external functions called by untrusted applications |
— |
2013-12-31 |
| 8402541 |
Proactive exploit detection |
Cristian Craioveanu, Ying Lin, Bruce Dang |
2013-03-19 |
| 7996836 |
Using a hypervisor to provide computer security |
Bruce McCorkendale |
2011-08-09 |
| 7797702 |
Preventing execution of remotely injected threads |
— |
2010-09-14 |
| 7797747 |
Detection of malicious code in non-paged pool unused pages |
— |
2010-09-14 |
| 7698742 |
Method and apparatus for scanning exclusively locked files |
— |
2010-04-13 |
| 7664626 |
Ambiguous-state support in virtual machine emulators |
— |
2010-02-16 |
| 7665139 |
Method and apparatus to detect and prevent malicious changes to tokens |
Peter Szor |
2010-02-16 |
| 7617534 |
Detection of SYSENTER/SYSCALL hijacking |
Peter Szor, Matthew Conover |
2009-11-10 |
| 7607173 |
Method and apparatus for preventing rootkit installation |
Peter Szor, Matthew Conover |
2009-10-20 |
| 7568233 |
Detecting malicious software through process dump scanning |
Peter Szor |
2009-07-28 |
| 7540026 |
No-execute processor feature global disabling prevention system and method |
Peter Szor |
2009-05-26 |