| 10148442 |
End-to-end security for hardware running verified software |
Chris Hawblitzel, Jacob R. Lorch, Jonathan R. Howell, Brian D. Zill |
2018-12-04 |
| 9544280 |
Utilization of a protected module to prevent offline dictionary attacks |
Stuart Schechter, David Molnar, Jacob R. Lorch, Barry Bond |
2017-01-10 |
| 9536093 |
Automated verification of a software system |
Chris Hawblitzel, Jacob R. Lorch, Jonathan R. Howell, Brian D. Zill |
2017-01-03 |
| 9432401 |
Providing consistent security information |
John R. Douceur, Robert Wilson Reeder |
2016-08-30 |
| 9363087 |
End-to-end security for hardware running verified software |
Chris Hawblitzel, Jacob R. Lorch, Jonathan R. Howell, Brian D. Zill |
2016-06-07 |
| 9294281 |
Utilization of a protected module to prevent offline dictionary attacks |
Stuart Schechter, David Molnar, Jacob R. Lorch, Barry Bond |
2016-03-22 |
| 9230100 |
Securing anti-virus software with virtualization |
Jiahe Helen Wang, Jacob R. Lorch |
2016-01-05 |
| 9152868 |
Personal identification combining proximity sensing with biometrics |
Christopher Stephen Frederick Smowton, Ronnie Chaiken, Weidong Cui, Oliver H. Foehr, Jacob R. Lorch +3 more |
2015-10-06 |
| 9106650 |
User-driven access control |
Franziska Roesner, Tadayoshi Kohno, Alexander Moshchuk, Helen Wang |
2015-08-11 |
| 8627414 |
Methods and apparatuses for user-verifiable execution of security-sensitive code |
Jonathan M. McCune, Adrian Perrig, Anupam Datta, Virgil D. Gligor, Yanlin Li +2 more |
2014-01-07 |
| 8352738 |
Method and apparatus for secure online transactions |
Cynthia Kuo, Adrian Perrig |
2013-01-08 |
| 8307443 |
Securing anti-virus software with virtualization |
Jiahe Helen Wang, Jacob R. Lorch |
2012-11-06 |
| 8031875 |
Key distribution in unidirectional channels with applications to RFID |
Ari Juels |
2011-10-04 |