| 9647847 |
Tamper evidence per device protected identity |
Victor Tan, Adam G. Poulos |
2017-05-09 |
| 9262594 |
Tamper evidence per device protected identity |
Victor Tan, Adam G. Poulos |
2016-02-16 |
| 8726042 |
Tamper resistant memory protection |
Dinarte R. Morais, Victor Tan, Adam G. Poulos |
2014-05-13 |
| 8661234 |
Individualized per device initialization of computing devices in avoidance of mass exploitation of vulnerabilities |
Adam G. Poulos, Victor Tan |
2014-02-25 |
| 8656190 |
One time settable tamper resistant software repository |
Adam G. Poulos, Victor Tan |
2014-02-18 |
| 8467278 |
Protecting optical media using random, moving radio frequency scatterers |
Darko Kirovski, Gerald DeJean, Barry Bond |
2013-06-18 |
| 7779460 |
Partial grant set evaluation from partial evidence in an evidence-based security policy manager |
Gregory D. Fee, Brian Irl Pratt, Loren M. Kohnfelder |
2010-08-17 |
| 7770202 |
Cross assembly call interception |
Christopher W. Brumme, Vance Morrison, Gregory D. Fee, Dario Russi, Simon J. Hall +2 more |
2010-08-03 |
| 7743423 |
Security requirement determination |
Gregory D. Fee, Aaron Goldfeder, Ivan Medvedev, Michael Gashler |
2010-06-22 |
| 7669238 |
Evidence-based application security |
Gregory D. Fee, Aaron Goldfeder, John M. Hawkins, Jamie Cool, Sergey Khorun |
2010-02-23 |
| 7647629 |
Hosted code runtime protection |
Christopher W. Brumme, Gregory D. Fee, Michael Gashler, Mahesh Prakriya |
2010-01-12 |
| 7207064 |
Partial grant set evaluation from partial evidence in an evidence-based security policy manager |
Gregory D. Fee, Brian Irl Pratt, Loren M. Kohnfelder |
2007-04-17 |