Issued Patents All Time
Showing 1–25 of 25 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 11089057 | System, apparatus and method for automatically verifying exploits within suspect objects and highlighting the display information associated with the verified exploits | Ashar Aziz, Muhammad Amin, Osman Abdoul Ismael | 2021-08-10 |
| 10637880 | Classifying sets of malicious indicators for detecting command and control communications associated with malware | Ali Islam | 2020-04-28 |
| 10476909 | System, apparatus and method for automatically verifying exploits within suspect objects and highlighting the display information associated with the verified exploits | Ashar Aziz, Muhammad Amin, Osman Abdoul Ismael | 2019-11-12 |
| 10467411 | System and method for generating a malware identifier | Vinay Pidathala, Ashar Aziz | 2019-11-05 |
| 10432649 | System and method for classifying an object based on an aggregated behavior results | James Bennett | 2019-10-01 |
| 10192052 | System, apparatus and method for classifying a file as malicious using static scanning | Abhishek Singh, Yichong Lin, Angshuman Mukherjee | 2019-01-29 |
| 10140451 | Detection of malicious scripting language code in a network environment | Chong Xu, Bing Sun, Navtej Singh, Yichong Lin | 2018-11-27 |
| 10133863 | Zero-day discovery system | Yichong Lin | 2018-11-20 |
| 10033753 | System and method for detecting malicious activity and classifying a network communication based on different indicator types | Ali Islam | 2018-07-24 |
| 9990490 | Generic privilege escalation prevention | Bing Sun, Chong Xu, Jeff Hetzler | 2018-06-05 |
| 9756074 | System and method for IPS and VM-based detection of suspicious objects | Ashar Aziz, Muhammad Amin, Osman Abdoul Ismael | 2017-09-05 |
| 9747446 | System and method for run-time object classification | Vinay Pidathala, Ashar Aziz | 2017-08-29 |
| 9635039 | Classifying sets of malicious indicators for detecting command and control communications associated with malware | Ali Islam | 2017-04-25 |
| 9306974 | System, apparatus and method for automatically verifying exploits within suspect objects and highlighting the display information associated with the verified exploits | Ashar Aziz, Muhammad Amin, Osman Abdoul Ismael | 2016-04-05 |
| 9251343 | Detecting bootkits resident on compromised computers | Michael Vincent, Abhishek Singh, Muhammad Amin | 2016-02-02 |
| 9241010 | System and method for network behavior detection | James Bennett | 2016-01-19 |
| 9197660 | Generic privilege escalation prevention | Bing Sun, Chong Xu, Jeff Hetzler | 2015-11-24 |
| 9106680 | System and method for protocol fingerprinting and reputation correlation | Dmitri Alperovitch, David F. Diehl, Sven Krasser | 2015-08-11 |
| 8910269 | System, method, and computer program product for preventing communication of unwanted network traffic by holding only a last portion of the network traffic | Garrick Zhu | 2014-12-09 |
| 8560715 | System, method, and computer program product to automate the flagging of obscure flows as at least potentially unwanted | Vinay Mahadik | 2013-10-15 |
| 8448232 | System, method, and computer program product for preventing communication of unwanted network traffic by holding only a last portion of the network traffic | Ge Zhu | 2013-05-21 |
| 8051479 | Method and apparatus for detecting shellcode | Fengmin Gong | 2011-11-01 |
| 8024473 | System, method, and computer program product to automate the flagging of obscure network flows as at least potentially unwanted | Vinay Mahadik | 2011-09-20 |
| 8024462 | System, method, and computer program product for preventing communication of unwanted network traffic by holding only a last portion of the network traffic | Ge Zhu | 2011-09-20 |
| 7904955 | Method and apparatus for detecting shellcode | Fengmin Gong | 2011-03-08 |