| 12411916 |
Protecting commercial off-the-shelf program binaries from piracy using hardware enclaves |
Xinyang Ge, Ben Niu, Ling Tony Chen |
2025-09-09 |
| 11928190 |
Protecting commercial off-the-shelf program binaries from piracy using hardware enclaves |
Xinyang Ge, Ben Niu, Ling Tony Chen |
2024-03-12 |
| 11922168 |
Stack traces using shadow stack |
Ben Niu, Gregory J. Colombo, Jason Lin, Kenneth D. Johnson |
2024-03-05 |
| 11500969 |
Protecting commercial off-the-shelf program binaries from piracy using hardware enclaves |
Xinyang Ge, Ben Niu, Ling Tony Chen |
2022-11-15 |
| 11294682 |
Stack traces using shadow stack |
Ben Niu, Gregory J. Colombo, Jason Lin, Kenneth D. Johnson |
2022-04-05 |
| 10565511 |
Reverse debugging of software failures |
Xinyang Ge, Baris Kasikci, Ben Niu, Ruoyu Wang, Insu YUN |
2020-02-18 |
| 10505954 |
Detecting malicious lateral movement across a computer network |
Jack Wilson Stokes, III, Robert Mead, Tim W. Burrell, Ian Hellen, John J. Lambert +2 more |
2019-12-10 |
| 9619654 |
Application monitoring through collective record and replay |
Brendan Dolan-Gavitt, David Molnar |
2017-04-11 |
| 9329845 |
Determining target types for generic pointers in source code |
Marcus Peinado |
2016-05-03 |
| 9152868 |
Personal identification combining proximity sensing with biometrics |
Christopher Stephen Frederick Smowton, Ronnie Chaiken, Oliver H. Foehr, Jacob R. Lorch, David Molnar +3 more |
2015-10-06 |
| 9129058 |
Application monitoring through continuous record and replay |
Brendan Dolan-Gavitt, David Molnar |
2015-09-08 |
| 8955114 |
Application monitoring through collective record and replay |
Brendan Dolan-Gavitt, David Molnar |
2015-02-10 |
| 8935677 |
Automatic reverse engineering of input formats |
Marcus Peinado, Karl Chen, Jiahe Helen Wang, Luis Irun-Briz |
2015-01-13 |
| 8613096 |
Automatic data patch generation for unknown vulnerabilities |
Marcus Peinado, Jiahe Helen Wang, Michael E. Locasto |
2013-12-17 |
| 8589888 |
Demand-driven analysis of pointers for software program analysis and debugging |
Marcus Peinado, Zhilei Xu |
2013-11-19 |
| 8584254 |
Data access reporting platform for secure active monitoring |
Marcus Peinado, Martim Carbone |
2013-11-12 |
| 8566944 |
Malware investigation by analyzing computer memory |
Marcus Peinado |
2013-10-22 |
| 7933946 |
Detecting data propagation in a distributed system |
Benjamin Livshits |
2011-04-26 |
| 7802009 |
Automatic reverse engineering of message formats from network traces |
Jayanthkumar Kannan, Jiahe Helen Wang |
2010-09-21 |