Issued Patents All Time
Showing 1–25 of 109 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12225035 | Systems, methods, and media for defending computing systems from attack | Yuan Jochen Kang | 2025-02-11 |
| 12079345 | Methods, systems, and media for testing insider threat detection systems | Preetam Kumar Dutta | 2024-09-03 |
| 11841966 | Inhibiting memory disclosure attacks using destructive code reads | Adrian J. Tang, Lakshminarasimhan Sethumadhavan | 2023-12-12 |
| 11831418 | Systems, methods, and media for defending computing systems from attack | Yuan Jochen Kang | 2023-11-28 |
| 11374960 | Methods, systems and media for evaluating layered computer security products | Nathaniel Gordon Boggs | 2022-06-28 |
| 11361083 | Method and apparatus for securing embedded device firmware | Ang Cui | 2022-06-14 |
| 11310249 | Systems, methods, and media for defending computing systems from attack | Yuan Jochen Kang | 2022-04-19 |
| 11288090 | Methods, systems, and media for injecting code into embedded devices | Ang Cui | 2022-03-29 |
| 11227056 | Inhibiting memory disclosure attacks using destructive code reads | Adrian J. Tang, Lakshminarasimhan Sethumadhavan | 2022-01-18 |
| 11194915 | Methods, systems, and media for testing insider threat detection systems | Preetam Kumar Dutta | 2021-12-07 |
| 11106799 | Methods, media, and systems for detecting an anomalous sequence of function calls | Angelos D. Keromytis | 2021-08-31 |
| 10902111 | Methods, media, and systems for detecting attack on a digital processing device | Wei Li, Angelos D. Keromytis, Elli Androulaki | 2021-01-26 |
| 10891375 | Document behavior analytics—abnormal document flows to identify suspicious exfiltration utility patent | — | 2021-01-12 |
| 10887340 | Methods, systems, and media for inhibiting attacks on embedded devices | Ang Cui | 2021-01-05 |
| 10819726 | Detecting network anomalies by probabilistic modeling of argument strings with markov chains | Yingbo Song, Angelos D. Keromytis | 2020-10-27 |
| 10686836 | Host-based deception security technology | — | 2020-06-16 |
| 10673884 | Apparatus method and medium for tracing the origin of network transmissions using n-gram distribution of data | — | 2020-06-02 |
| 10657262 | Method and apparatus for securing embedded device firmware | Ang Cui | 2020-05-19 |
| 10650087 | Systems and methods for content extraction from a mark-up language text accessible at an internet domain | Suhit Gupta, Gail Kaiser | 2020-05-12 |
| 10594722 | Methods, systems and media for evaluating layered computer security products | Nathaniel Gordon Boggs | 2020-03-17 |
| 10476908 | Generating highly realistic decoy email and documents | Carl Sable | 2019-11-12 |
| 10423788 | Methods, media, and systems for detecting an anomalous sequence of function calls | Angelos D. Keromytis | 2019-09-24 |
| 10341378 | Methods, systems, and media for inhibiting attacks on embedded devices | Ang Cui | 2019-07-02 |
| 10305919 | Systems and methods for inhibiting attacks on applications | Michael E. Locasto, Angelos D. Keromytis, Ke Wang | 2019-05-28 |
| 10181026 | Methods, media, and systems for detecting attack on a digital processing device | Wei Li, Angelos D. Keromytis, Elli Androulaki | 2019-01-15 |