| 10685123 |
Method for validating an untrusted native code module |
Matthew T. Harren, Matthew Nicholas Papakipos, David C. Sehr, Bennet S. Yee |
2020-06-16 |
| 9756149 |
Machine-specific instruction set translation |
David C. Sehr, Bennet S. Yee, Robert Muth, Jan Voung, Derek L. Schuff |
2017-09-05 |
| 9710654 |
Method for validating an untrusted native code module |
Matthew T. Harren, Matthew Nicholas Papakipos, David C. Sehr, Bennet S. Yee |
2017-07-18 |
| 9536079 |
Safely executing an untrusted native code module on a computing device |
Matthew T. Harren, Matthew Nicholas Papakipos, David C. Sehr, Bennet S. Yee, Gregory Dardyk |
2017-01-03 |
| 9372704 |
Virtual environment having harvard architecture |
David C. Sehr, Bennet S. Yee |
2016-06-21 |
| 9361453 |
Validating an untrusted native code module |
Matthew T. Harren, Matthew Nicholas Papakipos, David C. Sehr, Bennet S. Yee |
2016-06-07 |
| 9300760 |
Machine-specific instruction set translation |
David C. Sehr, Bennet S. Yee, Robert Muth, Jan Voung, Derek L. Schuff |
2016-03-29 |
| 9141360 |
Web application module translation service |
Alan A. Donovan, Robert Muth, David C. Sehr, Bennet S. Yee |
2015-09-22 |
| 9058483 |
Method for validating an untrusted native code module |
Matthew T. Harren, Matthew Nicholas Papakipos, David C. Sehr, Bennet S. Yee |
2015-06-16 |
| 8959632 |
Safely executing an untrusted native code module on a computing device |
Matthew T. Harren, Matthew Nicholas Papakipos, David C. Sehr, Bennet S. Yee, Gregory Dardyk |
2015-02-17 |
| 8935776 |
Native code module security for 64-bit instruction set architectures |
David C. Sehr, Bennet S. Yee, Victor Khimenko |
2015-01-13 |
| 8850573 |
Computing device with untrusted user execution mode |
Bennet S. Yee, David C. Sehr |
2014-09-30 |
| 8595832 |
Masking mechanism that facilitates safely executing untrusted native code |
Bennet S. Yee, David C. Sehr |
2013-11-26 |
| 8424082 |
Safely executing an untrusted native code module on a computing device |
Matthew T. Harren, Matthew Nicholas Papakipos, David C. Sehr, Bennet S. Yee, Gregory Dardyk |
2013-04-16 |
| 8307193 |
User-level segmentation mechanism that facilitates safely executing untrusted native code |
David C. Sehr, Bennet S. Yee |
2012-11-06 |
| 8151349 |
Masking mechanism that facilitates safely executing untrusted native code |
Bennet S. Yee, David C. Sehr |
2012-04-03 |
| 8136158 |
User-level segmentation mechanism that facilitates safely executing untrusted native code |
David C. Sehr, Bennet S. Yee |
2012-03-13 |
| 6327700 |
Method and system for identifying instrumentation targets in computer programs related to logical transactions |
Brian N. Bershad |
2001-12-04 |