| 10460104 |
Continuous malicious software identification through responsive machine learning |
John J. Danahy, Kirk R. Swidowski, Stephen C. Carlucci, Christopher Baron |
2019-10-29 |
| 10198280 |
Method and apparatus for hypervisor based monitoring of system interactions |
Kirk R. Swidowski, Stephen C. Carlucci, John J. Danahy |
2019-02-05 |
| 10078752 |
Continuous malicious software identification through responsive machine learning |
John J. Danahy, Kirk R. Swidowski, Stephen C. Carlucci, Christopher Baron |
2018-09-18 |
| 9977895 |
Malicious software identification integrating behavioral analytics and hardware events |
John J. Danahy, Kirk R. Swidowski, Stephen C. Carlucci |
2018-05-22 |
| 9733976 |
Method and apparatus for SYSRET monitoring of system interactions |
Kirk R. Swidowski, Stephen C. Carlucci, John J. Danahy |
2017-08-15 |
| 9589132 |
Method and apparatus for hypervisor based monitoring of system interactions |
Kirk R. Swidowski, Stephen C. Carlucci, John J. Danahy |
2017-03-07 |
| 9098623 |
Static analysis of validator routines |
Marco Pistoia, Takaaki Tateishi, Omer Tripp |
2015-08-04 |
| 9075997 |
Global variable security analysis |
Shay Artzi, John Peyton, Marco Pistoia, Manu Sridharan, Takaaki Tateishi +2 more |
2015-07-07 |
| 8793800 |
Static analysis for verification of software program access to secure resources for computer systems |
Paolina Centonze, Marco Pistoia, Omer Tripp |
2014-07-29 |
| 8726246 |
Static analysis of validator routines |
Marco Pistoia, Takaaki Tateishi, Omer Tripp |
2014-05-13 |
| 8701186 |
Formal analysis of the quality and conformance of information flow downgraders |
Marco Pistoia, Takaaki Tateishi, Stephen D. Teilhet, Omer Tripp |
2014-04-15 |
| 8683599 |
Static analysis for verification of software program access to secure resources for computer systems |
Paolina Centonze, Marco Pistoia, Omer Tripp |
2014-03-25 |
| 8667584 |
Formal analysis of the quality and conformance of information flow downgraders |
Marco Pistoia, Takaaki Tateishi, Stephen D. Teilhet, Omer Tripp |
2014-03-04 |
| 8656496 |
Global variable security analysis |
Shay Artzi, John Peyton, Marco Pistoia, Manu Sridharan, Takaaki Tateishi +2 more |
2014-02-18 |
| 8572747 |
Policy-driven detection and verification of methods such as sanitizers and validators |
Marco Pistoia, Takaaki Tateishi, Omer Tripp |
2013-10-29 |
| 8434070 |
Generating specifications of client-server applications for static analysis |
Shay Artzi, John Peyton, Marco Pistoia, Manu Sridharan, Robert Wiener |
2013-04-30 |
| 8381242 |
Static analysis for verification of software program access to secure resources for computer systems |
Paolina Centonze, Marco Pistoia, Omer Tripp |
2013-02-19 |
| 8365281 |
Determining whether method of computer program is a validator |
Takaaki Tateishi, Marco Pistoia, Omer Tripp, Robert Wiener |
2013-01-29 |
| 8156483 |
Method and system for detecting vulnerabilities in source code |
Larry Rose, John Peyton, John J. Danahy, Robert A. Gottlieb, Chris Rehbein |
2012-04-10 |
| 7418734 |
Method and system for detecting privilege escalation vulnerabilities in source code |
Larry Rose, John Peyton, John J. Danahy, Robert A. Gottlieb, Chris Rehbein |
2008-08-26 |
| 7398516 |
Method and system for detecting race condition vulnerabilities in source code |
Larry Rose, John Peyton, John J. Danahy, Robert A. Gottlieb, Chris Rehbein |
2008-07-08 |
| 7398517 |
Method and system for detecting vulnerabilities in source code |
Larry Rose, John Peyton, John J. Danahy, Robert A. Gottlieb, Chris Rehbein |
2008-07-08 |
| 7240332 |
Method and system for detecting vulnerabilities in source code |
Larry Rose, John Peyton, John J. Danahy, Robert A. Gottlieb, Chris Rehbein |
2007-07-03 |