| 9910981 |
Malicious code infection cause-and-effect analysis |
David Steeves, Efim Hudis |
2018-03-06 |
| 9904912 |
Protecting transactions |
David Steeves, Kim Cameron, Todd L. Carpenter, David Foster, Quentin S. Miller |
2018-02-27 |
| 9886578 |
Malicious code infection cause-and-effect analysis |
David Steeves, Efim Hudis |
2018-02-06 |
| 9065812 |
Protecting transactions |
David Steeves, Kim Cameron, Todd L. Carpenter, David Foster, Quentin S. Miller |
2015-06-23 |
| 8955134 |
Malicious code infection cause-and-effect analysis |
David Steeves, Efim Hudis |
2015-02-10 |
| 8955135 |
Malicious code infection cause-and-effect analysis |
David Steeves, Efim Hudis |
2015-02-10 |
| 8914901 |
Trusted storage and display |
David Steeves, Todd L. Carpenter, David Abzarian, Mark Myers |
2014-12-16 |
| 8667581 |
Resource indicator trap doors for detecting and stopping malware propagation |
David Steeves |
2014-03-04 |
| 8380841 |
Strategies for investigating and mitigating vulnerabilities caused by the acquisition of credentials |
John Dunagan, Daniel R. Simon |
2013-02-19 |
| 8117659 |
Malicious code infection cause-and-effect analysis |
David Steeves, Efim Hudis |
2012-02-14 |
| 7933413 |
Key exchange verification |
David Steeves, Ryan Burkhardt, Jason Cohen |
2011-04-26 |
| 7913292 |
Identification and visualization of trusted user interface objects |
David Steeves |
2011-03-22 |
| 7779465 |
Distributed peer attack alerting |
Arthur H. Baker, Carl M. Ellison |
2010-08-17 |
| 7620987 |
Obfuscating computer code to prevent an attack |
Art Shelest |
2009-11-17 |