Issued Patents All Time
Showing 25 most recent of 44 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12346453 | Automated testing of operating system (OS) kernel helper functions accessible through extended BPF (EBPF) filters | Anthony Saieva, Frederico Araujo, Sanjeev Das, Michael Vu Le | 2025-07-01 |
| 12326940 | Graph exploration framework for adversarial example generation | Taesung Lee, Kevin Eykholt, Douglas Lee Schales, Ian M. Molloy | 2025-06-10 |
| 12288154 | Adaptive robustness certification against adversarial examples | Kevin Eykholt, Taesung Lee, Shiqi Wang, Ian M. Molloy | 2025-04-29 |
| 12045713 | Detecting adversary attacks on a deep neural network (DNN) | Jialong Zhang, Zhongshu Gu, Marc Philippe Stoecklin, Ian M. Molloy | 2024-07-23 |
| 11947956 | Software intelligence as-a-service | Dhilung Hang Kirat, Marc Philippe Stoecklin | 2024-04-02 |
| 11936661 | Detecting malicious beaconing communities using lockstep detection and co-occurrence graph | Dhilung Hang Kirat, Bum Jun Kwon, Douglas Lee Schales, Marc Philippe Stoecklin | 2024-03-19 |
| 11847555 | Constraining neural networks for robustness through alternative encoding | Kevin Eykholt, Taesung Lee, Ian M. Molloy | 2023-12-19 |
| 11822673 | Guided micro-fuzzing through hybrid program analysis | Frederico Araujo, William Blair, Sanjeev Das | 2023-11-21 |
| 11818145 | Characterizing user behavior in a computer system by automated learning of intention embedded in a system-generated event graph | Xiaorui Pan, Xiaokui Shu, Dhilung Hang Kirat, Marc Philippe Stoecklin | 2023-11-14 |
| 11748473 | Intrusion detection in micro-services through container telemetry and behavior modeling | Frederico Araujo, Teryl Paul Taylor, Will Blair | 2023-09-05 |
| 11728977 | Method for efficient and practical key distribution in network coding systems | Xin Hu, Wentao Huang, Theodoros Salonidis, Marc Ph Stoecklin, Ting Wang | 2023-08-15 |
| 11632393 | Detecting and mitigating malware by evaluating HTTP errors | Jialong Zhang, Marc Philippe Stoecklin | 2023-04-18 |
| 11533325 | Automatic categorization of IDPS signatures from multiple different IDPS systems | Xin Hu, Douglas Lee Schales, Marc Philippe Stoecklin, Ting Wang | 2022-12-20 |
| 11520939 | Protecting computer systems from malicious USB devices via a USB firewall | Anton Beitler, Dhilung Hang Kirat, Anil Kurmus, Matthias Neugschwandtner, Marc Philippe Stoecklin | 2022-12-06 |
| 11362810 | Method and system for rateless and pollution-attack-resilient network coding | Xin Hu, Wentao Huang, Theodoros Salonidis, Marc Ph Stoecklin, Ting Wang | 2022-06-14 |
| 11153337 | Methods and systems for improving beaconing detection algorithms | Xin Hu, Douglas Lee Schales, Marc Stoecklin, Ting Wang | 2021-10-19 |
| 11144642 | Deactivating evasive malware | Zhongshu Gu, Heqing Huang, Dhilung Hang Kirat, Xiaokui Shu, Marc Philippe Stoecklin +1 more | 2021-10-12 |
| 11089040 | Cognitive analysis of security data with signal flow-based graph exploration | Dhilung Hang Kirat, Youngja Park, Marc Philippe Stoecklin | 2021-08-10 |
| 11082434 | Inferring temporal relationships for cybersecurity events | Preeti Ravindra, Youngja Park, Dhilung Hang Kirat, Marc Philippe Stoecklin | 2021-08-03 |
| 11032251 | AI-powered cyber data concealment and targeted mission execution | Dhilung Hang Kirat, Marc Philippe Stoecklin | 2021-06-08 |
| 11025656 | Automatic categorization of IDPS signatures from multiple different IDPS systems | Xin Hu, Douglas Lee Schales, Marc Philippe Stoecklin, Ting Wang | 2021-06-01 |
| 10958672 | Cognitive offense analysis using contextual data and knowledge graphs | William A. Bird, Suzanne C. Deffeyes, Dhilung Hang Kirat, Youngja Park, Josyula R. Rao +1 more | 2021-03-23 |
| 10887323 | Detecting malicious beaconing communities using lockstep detection and co-occurrence graph | Dhilung Hang Kirat, Bum Jun Kwon, Douglas Lee Schales, Marc Philippe Stoecklin | 2021-01-05 |
| 10841320 | Identifying command and control endpoint used by domain generation algorithm (DGA) malware | Xin Hu, Douglas Lee Schales, Marc Philippe Stoecklin, Ting Wang | 2020-11-17 |
| 10686830 | Corroborating threat assertions by consolidating security and threat intelligence with kinetics data | Dhilung Hang Kirat, Youngja Park, Marc Philippe Stoecklin | 2020-06-16 |