| 11089057 |
System, apparatus and method for automatically verifying exploits within suspect objects and highlighting the display information associated with the verified exploits |
Ashar Aziz, Muhammad Amin, Osman Abdoul Ismael |
2021-08-10 |
| 10637880 |
Classifying sets of malicious indicators for detecting command and control communications associated with malware |
Ali Islam |
2020-04-28 |
| 10476909 |
System, apparatus and method for automatically verifying exploits within suspect objects and highlighting the display information associated with the verified exploits |
Ashar Aziz, Muhammad Amin, Osman Abdoul Ismael |
2019-11-12 |
| 10467411 |
System and method for generating a malware identifier |
Vinay Pidathala, Ashar Aziz |
2019-11-05 |
| 10432649 |
System and method for classifying an object based on an aggregated behavior results |
James Bennett |
2019-10-01 |
| 10192052 |
System, apparatus and method for classifying a file as malicious using static scanning |
Abhishek Singh, Yichong Lin, Angshuman Mukherjee |
2019-01-29 |
| 10140451 |
Detection of malicious scripting language code in a network environment |
Chong Xu, Bing Sun, Navtej Singh, Yichong Lin |
2018-11-27 |
| 10133863 |
Zero-day discovery system |
Yichong Lin |
2018-11-20 |
| 10033753 |
System and method for detecting malicious activity and classifying a network communication based on different indicator types |
Ali Islam |
2018-07-24 |
| 9990490 |
Generic privilege escalation prevention |
Bing Sun, Chong Xu, Jeff Hetzler |
2018-06-05 |
| 9756074 |
System and method for IPS and VM-based detection of suspicious objects |
Ashar Aziz, Muhammad Amin, Osman Abdoul Ismael |
2017-09-05 |
| 9747446 |
System and method for run-time object classification |
Vinay Pidathala, Ashar Aziz |
2017-08-29 |
| 9635039 |
Classifying sets of malicious indicators for detecting command and control communications associated with malware |
Ali Islam |
2017-04-25 |
| 9306974 |
System, apparatus and method for automatically verifying exploits within suspect objects and highlighting the display information associated with the verified exploits |
Ashar Aziz, Muhammad Amin, Osman Abdoul Ismael |
2016-04-05 |
| 9251343 |
Detecting bootkits resident on compromised computers |
Michael Vincent, Abhishek Singh, Muhammad Amin |
2016-02-02 |
| 9241010 |
System and method for network behavior detection |
James Bennett |
2016-01-19 |
| 9197660 |
Generic privilege escalation prevention |
Bing Sun, Chong Xu, Jeff Hetzler |
2015-11-24 |
| 9106680 |
System and method for protocol fingerprinting and reputation correlation |
Dmitri Alperovitch, David F. Diehl, Sven Krasser |
2015-08-11 |
| 8910269 |
System, method, and computer program product for preventing communication of unwanted network traffic by holding only a last portion of the network traffic |
Garrick Zhu |
2014-12-09 |
| 8560715 |
System, method, and computer program product to automate the flagging of obscure flows as at least potentially unwanted |
Vinay Mahadik |
2013-10-15 |
| 8448232 |
System, method, and computer program product for preventing communication of unwanted network traffic by holding only a last portion of the network traffic |
Ge Zhu |
2013-05-21 |
| 8051479 |
Method and apparatus for detecting shellcode |
Fengmin Gong |
2011-11-01 |
| 8024473 |
System, method, and computer program product to automate the flagging of obscure network flows as at least potentially unwanted |
Vinay Mahadik |
2011-09-20 |
| 8024462 |
System, method, and computer program product for preventing communication of unwanted network traffic by holding only a last portion of the network traffic |
Ge Zhu |
2011-09-20 |
| 7904955 |
Method and apparatus for detecting shellcode |
Fengmin Gong |
2011-03-08 |