SS

Salvatore J. Stolfo

CU Columbia University: 94 patents #1 of 2,492Top 1%
AT Allure Security Technology: 5 patents #1 of 3Top 35%
RS Red Balloon Security: 2 patents #3 of 3Top 100%
CN Citibank, N.A.: 1 patents #266 of 589Top 50%
UN Unknown: 1 patents #29,356 of 83,584Top 40%
📍 New York, NY: #46 of 20,192 inventorsTop 1%
🗺 New York: #462 of 115,490 inventorsTop 1%
Overall (All Time): #12,111 of 4,157,543Top 1%
109
Patents All Time

Issued Patents All Time

Showing 1–25 of 109 patents

Patent #TitleCo-InventorsDate
12225035 Systems, methods, and media for defending computing systems from attack Yuan Jochen Kang 2025-02-11
12079345 Methods, systems, and media for testing insider threat detection systems Preetam Kumar Dutta 2024-09-03
11841966 Inhibiting memory disclosure attacks using destructive code reads Adrian J. Tang, Lakshminarasimhan Sethumadhavan 2023-12-12
11831418 Systems, methods, and media for defending computing systems from attack Yuan Jochen Kang 2023-11-28
11374960 Methods, systems and media for evaluating layered computer security products Nathaniel Gordon Boggs 2022-06-28
11361083 Method and apparatus for securing embedded device firmware Ang Cui 2022-06-14
11310249 Systems, methods, and media for defending computing systems from attack Yuan Jochen Kang 2022-04-19
11288090 Methods, systems, and media for injecting code into embedded devices Ang Cui 2022-03-29
11227056 Inhibiting memory disclosure attacks using destructive code reads Adrian J. Tang, Lakshminarasimhan Sethumadhavan 2022-01-18
11194915 Methods, systems, and media for testing insider threat detection systems Preetam Kumar Dutta 2021-12-07
11106799 Methods, media, and systems for detecting an anomalous sequence of function calls Angelos D. Keromytis 2021-08-31
10902111 Methods, media, and systems for detecting attack on a digital processing device Wei Li, Angelos D. Keromytis, Elli Androulaki 2021-01-26
10891375 Document behavior analytics—abnormal document flows to identify suspicious exfiltration utility patent 2021-01-12
10887340 Methods, systems, and media for inhibiting attacks on embedded devices Ang Cui 2021-01-05
10819726 Detecting network anomalies by probabilistic modeling of argument strings with markov chains Yingbo Song, Angelos D. Keromytis 2020-10-27
10686836 Host-based deception security technology 2020-06-16
10673884 Apparatus method and medium for tracing the origin of network transmissions using n-gram distribution of data 2020-06-02
10657262 Method and apparatus for securing embedded device firmware Ang Cui 2020-05-19
10650087 Systems and methods for content extraction from a mark-up language text accessible at an internet domain Suhit Gupta, Gail Kaiser 2020-05-12
10594722 Methods, systems and media for evaluating layered computer security products Nathaniel Gordon Boggs 2020-03-17
10476908 Generating highly realistic decoy email and documents Carl Sable 2019-11-12
10423788 Methods, media, and systems for detecting an anomalous sequence of function calls Angelos D. Keromytis 2019-09-24
10341378 Methods, systems, and media for inhibiting attacks on embedded devices Ang Cui 2019-07-02
10305919 Systems and methods for inhibiting attacks on applications Michael E. Locasto, Angelos D. Keromytis, Ke Wang 2019-05-28
10181026 Methods, media, and systems for detecting attack on a digital processing device Wei Li, Angelos D. Keromytis, Elli Androulaki 2019-01-15