| 11610024 |
Systems and methods for protecting search privacy |
Kevin Roundy, Ashwin Kayyoor |
2023-03-21 |
| 11550691 |
Computing resources schedule recommendation |
Ayyappa Muthusami, Jiani Chen, Amanjit Singh Johal, Devarajan Sundararajan |
2023-01-10 |
| 11283881 |
Management and protection of internet of things devices |
Yuqiong Sun |
2022-03-22 |
| 11184162 |
Privacy preserving secure task automation |
Sandeep Bhatkar, Yuqiong Sun, Saurabh Shintre |
2021-11-23 |
| 11132447 |
Determining security vulnerabilities of Internet of Things devices |
Yuqiong Sun, Xueqiang Wang, Petros Efstathopoulos |
2021-09-28 |
| 11122040 |
Systems and methods for fingerprinting devices |
Yuqiong Sun, Xueqiang Wang, Yun Shen, Pierre-Antoine Vervier, Petros Efstathopoulos |
2021-09-14 |
| 11048809 |
Systems and methods for detecting misuse of online service access tokens |
Yuqiong Sun, Sandeep Bhatkar, Mingliang Pei |
2021-06-29 |
| 10958666 |
Systems and methods for verifying connection integrity |
Brian Witten, Qing Li, Ronald Frederick, Roelof Nico du Toit, Saurabh Shintre +1 more |
2021-03-23 |
| 10887351 |
Security for IoT home voice assistants |
Yuqiong Sun, Saurabh Shintre |
2021-01-05 |
| 10601864 |
Using disposable profiles for privacy in internet sessions |
— |
2020-03-24 |
| 10447663 |
Decrypting network traffic on a middlebox device using a trusted execution environment |
Yuqiong Sun, Daniel Marino, Saurabh Shintre, Brian Witten, Ronald Frederick +1 more |
2019-10-15 |
| 10264020 |
Systems and methods for scalable network monitoring in virtual data centers |
Yuqiong Sun |
2019-04-16 |
| 10044691 |
Decrypting network traffic on a middlebox device using a trusted execution environment |
Yuqiong Sun, Daniel Marino, Saurabh Shintre, Brian Witten, Ronald Frederick +1 more |
2018-08-07 |
| 9961105 |
Systems and methods for monitoring virtual networks |
Yuqiong Sun |
2018-05-01 |
| 9800560 |
Systems and methods for monitoring encrypted data transmission |
Fanglu Guo |
2017-10-24 |
| 9692768 |
Sharing confidential graph data using multi-level graph summarization with varying data utility and privacy protection |
Ashwin Kayyoor, Petros Efstathopoulos |
2017-06-27 |
| 9686304 |
Systems and methods for healing infected document files |
Fanglu Guo, Sandeep Bhatkar |
2017-06-20 |
| 9317679 |
Systems and methods for detecting malicious documents based on component-object reuse |
Sandeep Bhatkar, Fanglu Guo |
2016-04-19 |
| 9230111 |
Systems and methods for protecting document files from macro threats |
Sandeep Bhatkar, Fanglu Guo |
2016-01-05 |
| 9135447 |
Systems and methods for deploying a pre-boot environment to enable an address offset mode after execution of system bios for booting a operating system in a protected area |
Kent E. Griffin |
2015-09-15 |
| 9065725 |
Techniques for virtual environment-based web client management |
Tzi-Cker Chiueh |
2015-06-23 |
| 9009459 |
Systems and methods for neutralizing file-format-specific exploits included within files contained within electronic communications |
Carey Nachenberg, Fanglu Guo, Sandeep Bhatkar, Darren Shou, Marc Dacier |
2015-04-14 |
| 8555083 |
Systems and methods for protecting against unauthorized access of encrypted data during power-management modes |
Kent E. Griffin |
2013-10-08 |
| 8555385 |
Techniques for behavior based malware analysis |
Sandeep Bhatkar, Jeffrey Wilhelm |
2013-10-08 |
| 8429745 |
Systems and methods for data loss prevention on mobile computing systems |
Jim Casaburi, Kent E. Griffin, Sanjay Sawhney, Matthew Conover |
2013-04-23 |