| 12346453 |
Automated testing of operating system (OS) kernel helper functions accessible through extended BPF (EBPF) filters |
Anthony Saieva, Sanjeev Das, Michael Vu Le, Jiyong Jang |
2025-07-01 |
| 12323436 |
Modulation and regulation of system event monitoring streams |
Teryl Paul Taylor |
2025-06-03 |
| 11985165 |
Detecting web resources spoofing through stylistic fingerprints |
Xu Lin, Teryl Paul Taylor |
2024-05-14 |
| 11941054 |
Iterative constraint solving in abstract graph matching for cyber incident reasoning |
Xiaokui Shu, Douglas Lee Schales, Marc Philippe Stoecklin |
2024-03-26 |
| 11829879 |
Detecting adversarial attacks through decoy training |
Jialong Zhang, Teryl Paul Taylor, Marc Philippe Stoecklin |
2023-11-28 |
| 11822673 |
Guided micro-fuzzing through hybrid program analysis |
William Blair, Sanjeev Das, Jiyong Jang |
2023-11-21 |
| 11775638 |
Identification and extraction of key forensics indicators of compromise using subject-specific filesystem views |
Anne E. Kohlbrenner, Marc Philippe Stoecklin, Teryl Paul Taylor |
2023-10-03 |
| 11748473 |
Intrusion detection in micro-services through container telemetry and behavior modeling |
Teryl Paul Taylor, Jiyong Jang, Will Blair |
2023-09-05 |
| 11720667 |
Stateful microservice-aware intrusion detection |
William Blair, Teryl Paul Taylor |
2023-08-08 |
| 11562086 |
Filesystem view separation for data confidentiality and integrity using lattice-based security domains |
Marc Phillipe Stoecklin, Teryl Paul Taylor |
2023-01-24 |
| 11501156 |
Detecting adversarial attacks through decoy training |
Jialong Zhang, Teryl Paul Taylor, Marc Philippe Stoecklin |
2022-11-15 |
| 11163878 |
Integrity, theft protection and cyber deception using a deception-based filesystem |
Douglas Lee Schales, Marc Philippe Stoecklin, Teryl Paul Taylor |
2021-11-02 |
| 10979453 |
Cyber-deception using network port projection |
Douglas Lee Schales, Marc Philippe Stoecklin, Teryl Paul Taylor |
2021-04-13 |
| 10887346 |
Application-level sandboxing |
Douglas Lee Schales, Marc Philippe Stoecklin, Teryl Paul Taylor |
2021-01-05 |
| 10733292 |
Defending against model inversion attacks on neural networks |
Jialong Zhang, Teryl Paul Taylor, Marc Philippe Stoecklin |
2020-08-04 |
| 10528733 |
Integrity, theft protection and cyber deception using a deception-based filesystem |
Douglas Lee Schales, Marc Philippe Stoecklin, Teryl Paul Taylor |
2020-01-07 |
| 10498763 |
On-demand injection of software booby traps in live processes |
Douglas Lee Schales, Marc Philippe Stoecklin, Teryl Paul Taylor |
2019-12-03 |