Issued Patents All Time
Showing 1–19 of 19 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12411916 | Protecting commercial off-the-shelf program binaries from piracy using hardware enclaves | Xinyang Ge, Ben Niu, Ling Tony Chen | 2025-09-09 |
| 11928190 | Protecting commercial off-the-shelf program binaries from piracy using hardware enclaves | Xinyang Ge, Ben Niu, Ling Tony Chen | 2024-03-12 |
| 11922168 | Stack traces using shadow stack | Ben Niu, Gregory J. Colombo, Jason Lin, Kenneth D. Johnson | 2024-03-05 |
| 11500969 | Protecting commercial off-the-shelf program binaries from piracy using hardware enclaves | Xinyang Ge, Ben Niu, Ling Tony Chen | 2022-11-15 |
| 11294682 | Stack traces using shadow stack | Ben Niu, Gregory J. Colombo, Jason Lin, Kenneth D. Johnson | 2022-04-05 |
| 10565511 | Reverse debugging of software failures | Xinyang Ge, Baris Kasikci, Ben Niu, Ruoyu Wang, Insu YUN | 2020-02-18 |
| 10505954 | Detecting malicious lateral movement across a computer network | Jack Wilson Stokes, III, Robert Mead, Tim W. Burrell, Ian Hellen, John J. Lambert +2 more | 2019-12-10 |
| 9619654 | Application monitoring through collective record and replay | Brendan Dolan-Gavitt, David Molnar | 2017-04-11 |
| 9329845 | Determining target types for generic pointers in source code | Marcus Peinado | 2016-05-03 |
| 9152868 | Personal identification combining proximity sensing with biometrics | Christopher Stephen Frederick Smowton, Ronnie Chaiken, Oliver H. Foehr, Jacob R. Lorch, David Molnar +3 more | 2015-10-06 |
| 9129058 | Application monitoring through continuous record and replay | Brendan Dolan-Gavitt, David Molnar | 2015-09-08 |
| 8955114 | Application monitoring through collective record and replay | Brendan Dolan-Gavitt, David Molnar | 2015-02-10 |
| 8935677 | Automatic reverse engineering of input formats | Marcus Peinado, Karl Chen, Jiahe Helen Wang, Luis Irun-Briz | 2015-01-13 |
| 8613096 | Automatic data patch generation for unknown vulnerabilities | Marcus Peinado, Jiahe Helen Wang, Michael E. Locasto | 2013-12-17 |
| 8589888 | Demand-driven analysis of pointers for software program analysis and debugging | Marcus Peinado, Zhilei Xu | 2013-11-19 |
| 8584254 | Data access reporting platform for secure active monitoring | Marcus Peinado, Martim Carbone | 2013-11-12 |
| 8566944 | Malware investigation by analyzing computer memory | Marcus Peinado | 2013-10-22 |
| 7933946 | Detecting data propagation in a distributed system | Benjamin Livshits | 2011-04-26 |
| 7802009 | Automatic reverse engineering of message formats from network traces | Jayanthkumar Kannan, Jiahe Helen Wang | 2010-09-21 |