Issued Patents All Time
Showing 1–25 of 63 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12166786 | Malware detection verification and enhancement by coordinating endpoint and malware detection systems | Ashar Aziz | 2024-12-10 |
| 12099864 | Formally verified trusted computing base with active security and policy enforcement | Ashar Aziz, Jonas Pfoh | 2024-09-24 |
| 11979428 | Technique for verifying exploit/malware at malware detection appliance through correlation with endpoints | Ashar Aziz | 2024-05-07 |
| 11936666 | Risk analyzer for ascertaining a risk of harm to a network and generating alerts regarding the ascertained risk | Ashar Aziz | 2024-03-19 |
| 11442770 | Formally verified trusted computing base with active security and policy enforcement | Ashar Aziz, Jonas Pfoh | 2022-09-13 |
| 11244056 | Verification of trusted threat-aware visualization layer | Hendrik Tews | 2022-02-08 |
| 11240262 | Malware detection verification and enhancement by coordinating endpoint and malware detection systems | Ashar Aziz | 2022-02-01 |
| 11153341 | System and method for detecting malicious network content using virtual environment components | Samuel Yie, Jayaraman Manni, Muhammad Amin, Bahman Mahbod | 2021-10-19 |
| 11089057 | System, apparatus and method for automatically verifying exploits within suspect objects and highlighting the display information associated with the verified exploits | Ashar Aziz, Muhammad Amin, Zheng Bu | 2021-08-10 |
| 11075945 | System, apparatus and method for reconfiguring virtual machines | — | 2021-07-27 |
| 10929266 | Real-time visual playback with synchronous textual analysis log display and event/time indexing | Harnish Goradia, Noah Johnson, Adrian Mettler, Ashar Aziz | 2021-02-23 |
| 10893059 | Verification and enhancement using detection systems located at the network periphery and endpoint devices | Ashar Aziz | 2021-01-12 |
| 10826933 | Technique for verifying exploit/malware at malware detection appliance through correlation with endpoints | Ashar Aziz | 2020-11-03 |
| 10740456 | Threat-aware architecture | Ashar Aziz | 2020-08-11 |
| 10623434 | System and method for virtual analysis of network data | Ashar Aziz, Ramesh Radhakrishnan | 2020-04-14 |
| 10592678 | Secure communications between peers using a verified virtual trusted platform module | Hendrik Tews | 2020-03-17 |
| 10528726 | Microvisor-based malware detection appliance architecture | — | 2020-01-07 |
| 10474813 | Code injection technique for remediation at an endpoint of a network | — | 2019-11-12 |
| 10476909 | System, apparatus and method for automatically verifying exploits within suspect objects and highlighting the display information associated with the verified exploits | Ashar Aziz, Muhammad Amin, Zheng Bu | 2019-11-12 |
| 10469512 | Optimized resource allocation for virtual machines within a malware content detection system | — | 2019-11-05 |
| 10462173 | Malware detection verification and enhancement by coordinating endpoint and malware detection systems | Ashar Aziz | 2019-10-29 |
| 10296437 | Framework for efficient security coverage of mobile software applications | Dawn Song, Ashar Aziz, Noah Johnson, Prashanth Mohan, Hui Xue | 2019-05-21 |
| 10198574 | System and method for analysis of a memory dump associated with a potentially malicious content suspect | Emmanuel Thioux, Muhammad Amin | 2019-02-05 |
| 10191861 | Technique for implementing memory views using a layered virtualization architecture | Udo Steinberg | 2019-01-29 |
| 10181029 | Security cloud service framework for hardening in the field code of mobile software applications | Dawn Song, Ashar Aziz, Noah Johnson, Adrian Mettler | 2019-01-15 |