US8079086B1
(en)
|
1997-11-06 |
2011-12-13 |
Finjan, Inc. |
Malicious mobile code runtime monitoring system and methods
|
US7058822B2
(en)
|
2000-03-30 |
2006-06-06 |
Finjan Software, Ltd. |
Malicious mobile code runtime monitoring system and methods
|
US9219755B2
(en)
|
1996-11-08 |
2015-12-22 |
Finjan, Inc. |
Malicious mobile code runtime monitoring system and methods
|
US6711583B2
(en)
*
|
1998-09-30 |
2004-03-23 |
International Business Machines Corporation |
System and method for detecting and repairing document-infecting viruses using dynamic heuristics
|
WO2000034867A1
(en)
|
1998-12-09 |
2000-06-15 |
Network Ice Corporation |
A method and apparatus for providing network and computer system security
|
US7389540B2
(en)
*
|
1999-02-03 |
2008-06-17 |
Cybersoft, Inc. |
Apparatus and methods for intercepting, examining and controlling code, data and files and their transfer
|
US7346929B1
(en)
*
|
1999-07-29 |
2008-03-18 |
International Business Machines Corporation |
Method and apparatus for auditing network security
|
US7089591B1
(en)
*
|
1999-07-30 |
2006-08-08 |
Symantec Corporation |
Generic detection and elimination of marco viruses
|
US7406603B1
(en)
*
|
1999-08-31 |
2008-07-29 |
Intertrust Technologies Corp. |
Data protection systems and methods
|
US6851057B1
(en)
|
1999-11-30 |
2005-02-01 |
Symantec Corporation |
Data driven detection of viruses
|
US8006243B2
(en)
*
|
1999-12-07 |
2011-08-23 |
International Business Machines Corporation |
Method and apparatus for remote installation of network drivers and software
|
US6785818B1
(en)
|
2000-01-14 |
2004-08-31 |
Symantec Corporation |
Thwarting malicious registry mapping modifications and map-loaded module masquerade attacks
|
US6971019B1
(en)
|
2000-03-14 |
2005-11-29 |
Symantec Corporation |
Histogram-based virus detection
|
US6519703B1
(en)
*
|
2000-04-14 |
2003-02-11 |
James B. Joyce |
Methods and apparatus for heuristic firewall
|
US7921459B2
(en)
*
|
2000-04-28 |
2011-04-05 |
International Business Machines Corporation |
System and method for managing security events on a network
|
US7089428B2
(en)
*
|
2000-04-28 |
2006-08-08 |
Internet Security Systems, Inc. |
Method and system for managing computer security information
|
US6973577B1
(en)
*
|
2000-05-26 |
2005-12-06 |
Mcafee, Inc. |
System and method for dynamically detecting computer viruses through associative behavioral analysis of runtime state
|
US20040034794A1
(en)
*
|
2000-05-28 |
2004-02-19 |
Yaron Mayer |
System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages
|
US9213836B2
(en)
*
|
2000-05-28 |
2015-12-15 |
Barhon Mayer, Batya |
System and method for comprehensive general electric protection for computers against malicious programs that may steal information and/or cause damages
|
US6611925B1
(en)
*
|
2000-06-13 |
2003-08-26 |
Networks Associates Technology, Inc. |
Single point of entry/origination item scanning within an enterprise or workgroup
|
US20040064737A1
(en)
*
|
2000-06-19 |
2004-04-01 |
Milliken Walter Clark |
Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses
|
US20040073617A1
(en)
|
2000-06-19 |
2004-04-15 |
Milliken Walter Clark |
Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail
|
US7162649B1
(en)
*
|
2000-06-30 |
2007-01-09 |
Internet Security Systems, Inc. |
Method and apparatus for network assessment and authentication
|
US8341743B2
(en)
*
|
2000-07-14 |
2012-12-25 |
Ca, Inc. |
Detection of viral code using emulation of operating system functions
|
US7350235B2
(en)
*
|
2000-07-14 |
2008-03-25 |
Computer Associates Think, Inc. |
Detection of decryption to identify encrypted virus
|
US7093239B1
(en)
*
|
2000-07-14 |
2006-08-15 |
Internet Security Systems, Inc. |
Computer immune system and method for detecting unwanted code in a computer system
|
US7636945B2
(en)
*
|
2000-07-14 |
2009-12-22 |
Computer Associates Think, Inc. |
Detection of polymorphic script language viruses by data driven lexical analysis
|
US7069583B2
(en)
*
|
2000-07-14 |
2006-06-27 |
Computer Associates Think, Inc. |
Detection of polymorphic virus code using dataflow analysis
|
GB2366693B
(en)
*
|
2000-08-31 |
2002-08-14 |
F Secure Oyj |
Software virus protection
|
US6968461B1
(en)
*
|
2000-10-03 |
2005-11-22 |
Networks Associates Technology, Inc. |
Providing break points in a malware scanning operation
|
US9027121B2
(en)
|
2000-10-10 |
2015-05-05 |
International Business Machines Corporation |
Method and system for creating a record for one or more computer security incidents
|
US7146305B2
(en)
*
|
2000-10-24 |
2006-12-05 |
Vcis, Inc. |
Analytical virtual machine
|
US7231440B1
(en)
*
|
2000-12-18 |
2007-06-12 |
Mcafee, Inc. |
System and method for distributing portable computer virus definition records with binary file conversion
|
US6622150B1
(en)
*
|
2000-12-18 |
2003-09-16 |
Networks Associates Technology, Inc. |
System and method for efficiently managing computer virus definitions using a structured virus database
|
US7130466B2
(en)
*
|
2000-12-21 |
2006-10-31 |
Cobion Ag |
System and method for compiling images from a database and comparing the compiled images with known images
|
WO2002061544A2
(en)
*
|
2001-01-31 |
2002-08-08 |
Internet Security Systems, Inc. |
Method and system for configuring and scheduling security audits of a computer network
|
US20020178375A1
(en)
*
|
2001-01-31 |
2002-11-28 |
Harris Corporation |
Method and system for protecting against malicious mobile code
|
US7404212B2
(en)
*
|
2001-03-06 |
2008-07-22 |
Cybersoft, Inc. |
Apparatus and methods for intercepting, examining and controlling code, data and files and their transfer
|
WO2002093334A2
(en)
*
|
2001-04-06 |
2002-11-21 |
Symantec Corporation |
Temporal access control for computer virus outbreaks
|
US20020188649A1
(en)
*
|
2001-06-12 |
2002-12-12 |
Ron Karim |
Mechanism for safely executing an untrusted program
|
US7657419B2
(en)
*
|
2001-06-19 |
2010-02-02 |
International Business Machines Corporation |
Analytical virtual machine
|
US7861303B2
(en)
*
|
2001-08-01 |
2010-12-28 |
Mcafee, Inc. |
Malware scanning wireless service agent system and method
|
US6792543B2
(en)
|
2001-08-01 |
2004-09-14 |
Networks Associates Technology, Inc. |
Virus scanning on thin client devices using programmable assembly language
|
US7657935B2
(en)
|
2001-08-16 |
2010-02-02 |
The Trustees Of Columbia University In The City Of New York |
System and methods for detecting malicious email transmission
|
US7234167B2
(en)
*
|
2001-09-06 |
2007-06-19 |
Mcafee, Inc. |
Automatic builder of detection and cleaning routines for computer viruses
|
AU2002333625B2
(en)
*
|
2001-09-14 |
2007-10-11 |
Computer Associates Think, Inc. |
Virus detection system
|
US7266844B2
(en)
*
|
2001-09-27 |
2007-09-04 |
Mcafee, Inc. |
Heuristic detection of polymorphic computer viruses based on redundancy in viral code
|
US9306966B2
(en)
|
2001-12-14 |
2016-04-05 |
The Trustees Of Columbia University In The City Of New York |
Methods of unsupervised anomaly detection using a geometric framework
|
US7401359B2
(en)
*
|
2001-12-21 |
2008-07-15 |
Mcafee, Inc. |
Generating malware definition data for mobile computing devices
|
US7114185B2
(en)
*
|
2001-12-26 |
2006-09-26 |
Mcafee, Inc. |
Identifying malware containing computer files using embedded text
|
AU2003202876A1
(en)
*
|
2002-01-04 |
2003-07-24 |
Internet Security Systems, Inc. |
System and method for the managed security control of processes on a computer system
|
US7225343B1
(en)
*
|
2002-01-25 |
2007-05-29 |
The Trustees Of Columbia University In The City Of New York |
System and methods for adaptive model generation for detecting intrusions in computer systems
|
US7340777B1
(en)
|
2003-03-31 |
2008-03-04 |
Symantec Corporation |
In memory heuristic system and method for detecting viruses
|
US7162715B1
(en)
|
2002-03-16 |
2007-01-09 |
I-Squared, Inc. |
Method and apparatus for preemptive monitoring of software binaries by instruction interception and dynamic recompilation
|
US7290282B1
(en)
*
|
2002-04-08 |
2007-10-30 |
Symantec Corporation |
Reducing false positive computer virus detections
|
US20040111632A1
(en)
*
|
2002-05-06 |
2004-06-10 |
Avner Halperin |
System and method of virus containment in computer networks
|
US7370360B2
(en)
*
|
2002-05-13 |
2008-05-06 |
International Business Machines Corporation |
Computer immune system and method for detecting unwanted code in a P-code or partially compiled native-code program executing within a virtual machine
|
US7155742B1
(en)
|
2002-05-16 |
2006-12-26 |
Symantec Corporation |
Countering infections to communications modules
|
US7409717B1
(en)
*
|
2002-05-23 |
2008-08-05 |
Symantec Corporation |
Metamorphic computer virus detection
|
US7367056B1
(en)
|
2002-06-04 |
2008-04-29 |
Symantec Corporation |
Countering malicious code infections to computer files that have been infected more than once
|
JP2005531072A
(ja)
|
2002-06-25 |
2005-10-13 |
エイビーエス ソフトウェア パートナーズ エルエルシー |
チャット及びインスタントメッセージの参加者を監視し、参加者と相互作用するためのシステム及び方法
|
US7418729B2
(en)
*
|
2002-07-19 |
2008-08-26 |
Symantec Corporation |
Heuristic detection of malicious computer code by page tracking
|
US7380277B2
(en)
*
|
2002-07-22 |
2008-05-27 |
Symantec Corporation |
Preventing e-mail propagation of malicious computer code
|
US7478431B1
(en)
|
2002-08-02 |
2009-01-13 |
Symantec Corporation |
Heuristic detection of computer viruses
|
GB2391965B
(en)
*
|
2002-08-14 |
2005-11-30 |
Messagelabs Ltd |
Method of, and system for, heuristically detecting viruses in executable code
|
US7748039B2
(en)
*
|
2002-08-30 |
2010-06-29 |
Symantec Corporation |
Method and apparatus for detecting malicious code in an information handling system
|
US7832011B2
(en)
*
|
2002-08-30 |
2010-11-09 |
Symantec Corporation |
Method and apparatus for detecting malicious code in an information handling system
|
US7331062B2
(en)
*
|
2002-08-30 |
2008-02-12 |
Symantec Corporation |
Method, computer software, and system for providing end to end security protection of an online transaction
|
US7509679B2
(en)
*
|
2002-08-30 |
2009-03-24 |
Symantec Corporation |
Method, system and computer program product for security in a global computer network transaction
|
US7469419B2
(en)
*
|
2002-10-07 |
2008-12-23 |
Symantec Corporation |
Detection of malicious computer code
|
US7337471B2
(en)
|
2002-10-07 |
2008-02-26 |
Symantec Corporation |
Selective detection of malicious computer code
|
US7260847B2
(en)
|
2002-10-24 |
2007-08-21 |
Symantec Corporation |
Antivirus scanning in a hard-linked environment
|
US7159149B2
(en)
*
|
2002-10-24 |
2007-01-02 |
Symantec Corporation |
Heuristic detection and termination of fast spreading network worm attacks
|
US7249187B2
(en)
|
2002-11-27 |
2007-07-24 |
Symantec Corporation |
Enforcement of compliance with network security policies
|
GB2396227B
(en)
*
|
2002-12-12 |
2006-02-08 |
Messagelabs Ltd |
Method of and system for heuristically detecting viruses in executable code
|
US8122498B1
(en)
|
2002-12-12 |
2012-02-21 |
Mcafee, Inc. |
Combined multiple-application alert system and method
|
US8312535B1
(en)
|
2002-12-12 |
2012-11-13 |
Mcafee, Inc. |
System, method, and computer program product for interfacing a plurality of related applications
|
US8239941B1
(en)
*
|
2002-12-13 |
2012-08-07 |
Mcafee, Inc. |
Push alert system, method, and computer program product
|
US8990723B1
(en)
|
2002-12-13 |
2015-03-24 |
Mcafee, Inc. |
System, method, and computer program product for managing a plurality of applications via a single interface
|
US7631353B2
(en)
|
2002-12-17 |
2009-12-08 |
Symantec Corporation |
Blocking replication of e-mail worms
|
US20040128379A1
(en)
*
|
2002-12-30 |
2004-07-01 |
Jerry Mizell |
Collecting standard interval metrics using a randomized collection period
|
US7296293B2
(en)
|
2002-12-31 |
2007-11-13 |
Symantec Corporation |
Using a benevolent worm to assess and correct computer security vulnerabilities
|
US7013483B2
(en)
*
|
2003-01-03 |
2006-03-14 |
Aladdin Knowledge Systems Ltd. |
Method for emulating an executable code in order to detect maliciousness
|
US7913303B1
(en)
|
2003-01-21 |
2011-03-22 |
International Business Machines Corporation |
Method and system for dynamically protecting a computer system from attack
|
US7293290B2
(en)
|
2003-02-06 |
2007-11-06 |
Symantec Corporation |
Dynamic detection of computer worms
|
US7228563B2
(en)
|
2003-02-06 |
2007-06-05 |
Symantec Corporation |
Shell code blocking system and method
|
US7246227B2
(en)
|
2003-02-10 |
2007-07-17 |
Symantec Corporation |
Efficient scanning of stream based data
|
US7203959B2
(en)
|
2003-03-14 |
2007-04-10 |
Symantec Corporation |
Stream scanning through network proxy servers
|
US20060130016A1
(en)
*
|
2003-03-17 |
2006-06-15 |
Wagner John R |
Method of kernal-mode instruction interception and apparatus therefor
|
US7546638B2
(en)
|
2003-03-18 |
2009-06-09 |
Symantec Corporation |
Automated identification and clean-up of malicious computer code
|
GB2400932B
(en)
*
|
2003-04-25 |
2005-12-14 |
Messagelabs Ltd |
A method of,and system for,heuristically determining that an unknown file is harmless by using traffic heuristics
|
US7287281B1
(en)
|
2003-06-17 |
2007-10-23 |
Symantec Corporation |
Send blocking system and method
|
US7392543B2
(en)
*
|
2003-06-30 |
2008-06-24 |
Symantec Corporation |
Signature extraction system and method
|
US7739737B2
(en)
*
|
2003-07-29 |
2010-06-15 |
Wisconsin Alumni Research Foundation |
Method and apparatus to detect malicious software
|
US8271774B1
(en)
|
2003-08-11 |
2012-09-18 |
Symantec Corporation |
Circumstantial blocking of incoming network traffic containing code
|
US7739278B1
(en)
|
2003-08-22 |
2010-06-15 |
Symantec Corporation |
Source independent file attribute tracking
|
US7203964B1
(en)
*
|
2003-10-07 |
2007-04-10 |
Elmer V. Pass |
Method of stopping internet viruses
|
US7657938B2
(en)
*
|
2003-10-28 |
2010-02-02 |
International Business Machines Corporation |
Method and system for protecting computer networks by altering unwanted network data traffic
|
US20050137980A1
(en)
*
|
2003-12-17 |
2005-06-23 |
Bank Of America Corporation |
Active disablement of malicious code in association with the provision of on-line financial services
|
US7730530B2
(en)
*
|
2004-01-30 |
2010-06-01 |
Microsoft Corporation |
System and method for gathering exhibited behaviors on a .NET executable module in a secure manner
|
US7913305B2
(en)
*
|
2004-01-30 |
2011-03-22 |
Microsoft Corporation |
System and method for detecting malware in an executable code module according to the code module's exhibited behavior
|
US7437759B1
(en)
|
2004-02-17 |
2008-10-14 |
Symantec Corporation |
Kernel mode overflow attack prevention system and method
|
US7895448B1
(en)
*
|
2004-02-18 |
2011-02-22 |
Symantec Corporation |
Risk profiling
|
US7984304B1
(en)
*
|
2004-03-02 |
2011-07-19 |
Vmware, Inc. |
Dynamic verification of validity of executable code
|
US7337327B1
(en)
|
2004-03-30 |
2008-02-26 |
Symantec Corporation |
Using mobility tokens to observe malicious mobile code
|
US8549638B2
(en)
|
2004-06-14 |
2013-10-01 |
Fireeye, Inc. |
System and method of containing computer worms
|
US8561177B1
(en)
|
2004-04-01 |
2013-10-15 |
Fireeye, Inc. |
Systems and methods for detecting communication channels of bots
|
US8539582B1
(en)
|
2004-04-01 |
2013-09-17 |
Fireeye, Inc. |
Malware containment and security analysis on connection
|
US8898788B1
(en)
|
2004-04-01 |
2014-11-25 |
Fireeye, Inc. |
Systems and methods for malware attack prevention
|
US8566946B1
(en)
|
2006-04-20 |
2013-10-22 |
Fireeye, Inc. |
Malware containment on connection
|
US7587537B1
(en)
|
2007-11-30 |
2009-09-08 |
Altera Corporation |
Serializer-deserializer circuits formed from input-output circuit registers
|
US8204984B1
(en)
|
2004-04-01 |
2012-06-19 |
Fireeye, Inc. |
Systems and methods for detecting encrypted bot command and control communication channels
|
US8793787B2
(en)
|
2004-04-01 |
2014-07-29 |
Fireeye, Inc. |
Detecting malicious network content using virtual environment components
|
US8584239B2
(en)
|
2004-04-01 |
2013-11-12 |
Fireeye, Inc. |
Virtual machine with dynamic data flow analysis
|
US8171553B2
(en)
|
2004-04-01 |
2012-05-01 |
Fireeye, Inc. |
Heuristic based capture with replay to virtual machine
|
US8881282B1
(en)
|
2004-04-01 |
2014-11-04 |
Fireeye, Inc. |
Systems and methods for malware attack detection and identification
|
US8006305B2
(en)
|
2004-06-14 |
2011-08-23 |
Fireeye, Inc. |
Computer worm defense system and method
|
US9027135B1
(en)
|
2004-04-01 |
2015-05-05 |
Fireeye, Inc. |
Prospective client identification using malware attack detection
|
US9106694B2
(en)
|
2004-04-01 |
2015-08-11 |
Fireeye, Inc. |
Electronic message analysis for malware detection
|
US8375444B2
(en)
|
2006-04-20 |
2013-02-12 |
Fireeye, Inc. |
Dynamic signature creation and enforcement
|
US8528086B1
(en)
|
2004-04-01 |
2013-09-03 |
Fireeye, Inc. |
System and method of detecting computer worms
|
US7130981B1
(en)
|
2004-04-06 |
2006-10-31 |
Symantec Corporation |
Signature driven cache extension for stream based scanning
|
US7861304B1
(en)
|
2004-05-07 |
2010-12-28 |
Symantec Corporation |
Pattern matching using embedded functions
|
US7484094B1
(en)
|
2004-05-14 |
2009-01-27 |
Symantec Corporation |
Opening computer files quickly and safely over a network
|
US7373667B1
(en)
|
2004-05-14 |
2008-05-13 |
Symantec Corporation |
Protecting a computer coupled to a network from malicious code infections
|
US7370233B1
(en)
|
2004-05-21 |
2008-05-06 |
Symantec Corporation |
Verification of desired end-state using a virtual machine environment
|
US7694150B1
(en)
|
2004-06-22 |
2010-04-06 |
Cisco Technology, Inc |
System and methods for integration of behavioral and signature based security
|
US20060015939A1
(en)
*
|
2004-07-14 |
2006-01-19 |
International Business Machines Corporation |
Method and system to protect a file system from viral infections
|
US7441042B1
(en)
|
2004-08-25 |
2008-10-21 |
Symanetc Corporation |
System and method for correlating network traffic and corresponding file input/output traffic
|
US7690034B1
(en)
|
2004-09-10 |
2010-03-30 |
Symantec Corporation |
Using behavior blocking mobility tokens to facilitate distributed worm detection
|
US7480683B2
(en)
*
|
2004-10-01 |
2009-01-20 |
Webroot Software, Inc. |
System and method for heuristic analysis to identify pestware
|
US7565686B1
(en)
|
2004-11-08 |
2009-07-21 |
Symantec Corporation |
Preventing unauthorized loading of late binding code into a process
|
US20060112430A1
(en)
*
|
2004-11-19 |
2006-05-25 |
Deisenroth Jerrold M |
Method and apparatus for immunizing data in computer systems from corruption
|
US8131804B2
(en)
*
|
2004-11-19 |
2012-03-06 |
J Michael Greata |
Method and apparatus for immunizing data in computer systems from corruption
|
US7636856B2
(en)
*
|
2004-12-06 |
2009-12-22 |
Microsoft Corporation |
Proactive computer malware protection through dynamic translation
|
US20060161989A1
(en)
*
|
2004-12-13 |
2006-07-20 |
Eran Reshef |
System and method for deterring rogue users from attacking protected legitimate users
|
US7756933B2
(en)
*
|
2004-12-13 |
2010-07-13 |
Collactive Ltd. |
System and method for deterring rogue users from attacking protected legitimate users
|
US7810158B2
(en)
*
|
2004-12-16 |
2010-10-05 |
At&T Intellectual Property I, L.P. |
Methods and systems for deceptively trapping electronic worms
|
US8059551B2
(en)
*
|
2005-02-15 |
2011-11-15 |
Raytheon Bbn Technologies Corp. |
Method for source-spoofed IP packet traceback
|
US8104086B1
(en)
|
2005-03-03 |
2012-01-24 |
Symantec Corporation |
Heuristically detecting spyware/adware registry activity
|
US8719924B1
(en)
*
|
2005-03-04 |
2014-05-06 |
AVG Technologies N.V. |
Method and apparatus for detecting harmful software
|
US7591016B2
(en)
*
|
2005-04-14 |
2009-09-15 |
Webroot Software, Inc. |
System and method for scanning memory for pestware offset signatures
|
US7349931B2
(en)
|
2005-04-14 |
2008-03-25 |
Webroot Software, Inc. |
System and method for scanning obfuscated files for pestware
|
US7571476B2
(en)
*
|
2005-04-14 |
2009-08-04 |
Webroot Software, Inc. |
System and method for scanning memory for pestware
|
US7975303B1
(en)
|
2005-06-27 |
2011-07-05 |
Symantec Corporation |
Efficient file scanning using input-output hints
|
US7895654B1
(en)
|
2005-06-27 |
2011-02-22 |
Symantec Corporation |
Efficient file scanning using secure listing of file modification times
|
GB0513375D0
(en)
|
2005-06-30 |
2005-08-03 |
Retento Ltd |
Computer security
|
US7895651B2
(en)
|
2005-07-29 |
2011-02-22 |
Bit 9, Inc. |
Content tracking in a network security system
|
US8272058B2
(en)
|
2005-07-29 |
2012-09-18 |
Bit 9, Inc. |
Centralized timed analysis in a network security system
|
US8984636B2
(en)
|
2005-07-29 |
2015-03-17 |
Bit9, Inc. |
Content extractor and analysis system
|
US8407785B2
(en)
|
2005-08-18 |
2013-03-26 |
The Trustees Of Columbia University In The City Of New York |
Systems, methods, and media protecting a digital data processing device from attack
|
US20080134326A2
(en)
*
|
2005-09-13 |
2008-06-05 |
Cloudmark, Inc. |
Signature for Executable Code
|
US20070079375A1
(en)
*
|
2005-10-04 |
2007-04-05 |
Drew Copley |
Computer Behavioral Management Using Heuristic Analysis
|
WO2007050667A2
(en)
|
2005-10-25 |
2007-05-03 |
The Trustees Of Columbia University In The City Of New York |
Methods, media and systems for detecting anomalous program executions
|
US7996898B2
(en)
*
|
2005-10-25 |
2011-08-09 |
Webroot Software, Inc. |
System and method for monitoring events on a computer to reduce false positive indication of pestware
|
US10503418B2
(en)
*
|
2005-12-01 |
2019-12-10 |
Drive Sentry Limited |
System and method to secure a computer system by selective control of write access to a data storage medium
|
US8077708B2
(en)
*
|
2006-02-16 |
2011-12-13 |
Techguard Security, Llc |
Systems and methods for determining a flow of data
|
US20070239993A1
(en)
*
|
2006-03-17 |
2007-10-11 |
The Trustees Of The University Of Pennsylvania |
System and method for comparing similarity of computer programs
|
JP5144075B2
(ja)
*
|
2006-03-30 |
2013-02-13 |
日本碍子株式会社 |
ハニカム構造体及びその製造方法
|
US8479174B2
(en)
|
2006-04-05 |
2013-07-02 |
Prevx Limited |
Method, computer program and computer for analyzing an executable computer file
|
EP2011099A4
(de)
|
2006-04-06 |
2013-08-21 |
Juniper Networks Inc |
System und verfahren zur erkennung von schadprogrammen für mobile plattformen mit beschränktem zugang
|
US20080010538A1
(en)
*
|
2006-06-27 |
2008-01-10 |
Symantec Corporation |
Detecting suspicious embedded malicious content in benign file formats
|
US8261344B2
(en)
*
|
2006-06-30 |
2012-09-04 |
Sophos Plc |
Method and system for classification of software using characteristics and combinations of such characteristics
|
US8239915B1
(en)
|
2006-06-30 |
2012-08-07 |
Symantec Corporation |
Endpoint management using trust rating data
|
US8365286B2
(en)
*
|
2006-06-30 |
2013-01-29 |
Sophos Plc |
Method and system for classification of software using characteristics and combinations of such characteristics
|
US8151352B1
(en)
*
|
2006-07-14 |
2012-04-03 |
Bitdefender IPR Managament Ltd. |
Anti-malware emulation systems and methods
|
US8190868B2
(en)
|
2006-08-07 |
2012-05-29 |
Webroot Inc. |
Malware management through kernel detection
|
US7961960B2
(en)
*
|
2006-08-24 |
2011-06-14 |
Dell Products L.P. |
Methods and apparatus for reducing storage size
|
WO2008055156A2
(en)
|
2006-10-30 |
2008-05-08 |
The Trustees Of Columbia University In The City Of New York |
Methods, media, and systems for detecting an anomalous sequence of function calls
|
US20100011441A1
(en)
*
|
2007-05-01 |
2010-01-14 |
Mihai Christodorescu |
System for malware normalization and detection
|
US8286246B2
(en)
|
2007-08-10 |
2012-10-09 |
Fortinet, Inc. |
Circuits and methods for efficient data transfer in a virus co-processing system
|
US8079084B1
(en)
|
2007-08-10 |
2011-12-13 |
Fortinet, Inc. |
Virus co-processor instructions and methods for using such
|
US8375449B1
(en)
|
2007-08-10 |
2013-02-12 |
Fortinet, Inc. |
Circuits and methods for operating a virus co-processor
|
US7392544B1
(en)
*
|
2007-12-18 |
2008-06-24 |
Kaspersky Lab, Zao |
Method and system for anti-malware scanning with variable scan settings
|
US8806619B2
(en)
*
|
2007-12-20 |
2014-08-12 |
Cybernet Systems Corporation |
System and methods for detecting software vulnerabilities and malicious code
|
US8434151B1
(en)
*
|
2008-01-04 |
2013-04-30 |
International Business Machines Corporation |
Detecting malicious software
|
US8191147B1
(en)
*
|
2008-04-24 |
2012-05-29 |
Symantec Corporation |
Method for malware removal based on network signatures and file system artifacts
|
US8904536B2
(en)
*
|
2008-08-28 |
2014-12-02 |
AVG Netherlands B.V. |
Heuristic method of code analysis
|
US8997219B2
(en)
|
2008-11-03 |
2015-03-31 |
Fireeye, Inc. |
Systems and methods for detecting malicious PDF network content
|
US8850571B2
(en)
|
2008-11-03 |
2014-09-30 |
Fireeye, Inc. |
Systems and methods for detecting malicious network content
|
US8621625B1
(en)
*
|
2008-12-23 |
2013-12-31 |
Symantec Corporation |
Methods and systems for detecting infected files
|
US8291497B1
(en)
*
|
2009-03-20 |
2012-10-16 |
Symantec Corporation |
Systems and methods for byte-level context diversity-based automatic malware signature generation
|
US7603713B1
(en)
*
|
2009-03-30 |
2009-10-13 |
Kaspersky Lab, Zao |
Method for accelerating hardware emulator used for malware detection and analysis
|
US11489857B2
(en)
|
2009-04-21 |
2022-11-01 |
Webroot Inc. |
System and method for developing a risk profile for an internet resource
|
US20110041179A1
(en)
*
|
2009-08-11 |
2011-02-17 |
F-Secure Oyj |
Malware detection
|
US8832829B2
(en)
|
2009-09-30 |
2014-09-09 |
Fireeye, Inc. |
Network-based binary file extraction and analysis for malware detection
|
US8214903B2
(en)
|
2009-10-02 |
2012-07-03 |
International Business Machines Corporation |
Analysis of scripts
|
US8356354B2
(en)
|
2009-11-23 |
2013-01-15 |
Kaspersky Lab, Zao |
Silent-mode signature testing in anti-malware processing
|
US9202048B2
(en)
*
|
2010-01-27 |
2015-12-01 |
Mcafee, Inc. |
Method and system for discrete stateful behavioral analysis
|
US9588829B2
(en)
*
|
2010-03-04 |
2017-03-07 |
F-Secure Oyj |
Security method and apparatus directed at removable storage devices
|
US20110219449A1
(en)
*
|
2010-03-04 |
2011-09-08 |
St Neitzel Michael |
Malware detection method, system and computer program product
|
US10210162B1
(en)
|
2010-03-29 |
2019-02-19 |
Carbonite, Inc. |
Log file management
|
US9098333B1
(en)
|
2010-05-07 |
2015-08-04 |
Ziften Technologies, Inc. |
Monitoring computer process resource usage
|
US9202049B1
(en)
|
2010-06-21 |
2015-12-01 |
Pulse Secure, Llc |
Detecting malware on mobile devices
|
US8533831B2
(en)
*
|
2010-07-02 |
2013-09-10 |
Symantec Corporation |
Systems and methods for alternating malware classifiers in an attempt to frustrate brute-force malware testing
|
CN101924762B
(zh)
*
|
2010-08-18 |
2013-02-27 |
北京奇虎科技有限公司 |
一种基于云安全的主动防御方法
|
EP2609537A1
(de)
*
|
2010-08-26 |
2013-07-03 |
Verisign, Inc. |
Verfahren und system zur automatischen erkennung und analyse von schadprogrammen
|
US20120150887A1
(en)
*
|
2010-12-08 |
2012-06-14 |
Clark Christopher F |
Pattern matching
|
RU2454714C1
(ru)
*
|
2010-12-30 |
2012-06-27 |
Закрытое акционерное общество "Лаборатория Касперского" |
Система и способ повышения эффективности обнаружения неизвестных вредоносных объектов
|
US10574630B2
(en)
|
2011-02-15 |
2020-02-25 |
Webroot Inc. |
Methods and apparatus for malware threat research
|
EP2492833A1
(de)
*
|
2011-02-28 |
2012-08-29 |
British Telecommunications Public Limited Company |
Verfahren und Vorrichtung zur Erkennung schädlicher Software
|
US9032526B2
(en)
|
2011-05-12 |
2015-05-12 |
Microsoft Technology Licensing, Llc |
Emulating mixed-code programs using a virtual machine instance
|
CN103617069B
(zh)
*
|
2011-09-14 |
2017-07-04 |
北京奇虎科技有限公司 |
恶意程序检测方法和虚拟机
|
JP2014526751A
(ja)
|
2011-09-15 |
2014-10-06 |
ザ・トラスティーズ・オブ・コロンビア・ユニバーシティ・イン・ザ・シティ・オブ・ニューヨーク |
リターン指向プログラミングのペイロードを検出するためのシステム、方法、および、非一時的コンピュータ可読媒体
|
US20130117006A1
(en)
*
|
2011-11-07 |
2013-05-09 |
Microsoft Corporation |
Simulated boot process to detect introduction of unauthorized information
|
EP2795521A4
(de)
*
|
2011-12-22 |
2015-08-26 |
Intel Corp |
Systeme und verfahren zur bereitstellung von schutz vor schadprogrammen und schadprogrammforensik auf speichervorrichtungen
|
EP2795513A4
(de)
*
|
2011-12-22 |
2015-12-16 |
Intel Corp |
Systeme und verfahren zur bereitstellung von anti-malware-schutz in speichervorrichtungen
|
WO2013095573A1
(en)
|
2011-12-22 |
2013-06-27 |
Intel Corporation |
Activation and monetization of features built into storage subsystems using a trusted connect service back end infrastructure
|
US8726338B2
(en)
|
2012-02-02 |
2014-05-13 |
Juniper Networks, Inc. |
Dynamic threat protection in mobile networks
|
US9519782B2
(en)
|
2012-02-24 |
2016-12-13 |
Fireeye, Inc. |
Detecting malicious network content
|
RU2491615C1
(ru)
*
|
2012-02-24 |
2013-08-27 |
Закрытое акционерное общество "Лаборатория Касперского" |
Система и способ формирования записей для обнаружения программного обеспечения
|
US9715325B1
(en)
|
2012-06-21 |
2017-07-25 |
Open Text Corporation |
Activity stream based interaction
|
US9754105B1
(en)
|
2012-09-25 |
2017-09-05 |
Malwarebytes Corporation |
Preventing the successful exploitation of software application vulnerability for malicious purposes
|
RU2514142C1
(ru)
|
2012-12-25 |
2014-04-27 |
Закрытое акционерное общество "Лаборатория Касперского" |
Способ повышения эффективности работы аппаратного ускорения эмуляции приложений
|
US10572665B2
(en)
|
2012-12-28 |
2020-02-25 |
Fireeye, Inc. |
System and method to create a number of breakpoints in a virtual machine via virtual machine trapping events
|
US9332028B2
(en)
*
|
2013-01-25 |
2016-05-03 |
REMTCS Inc. |
System, method, and apparatus for providing network security
|
US9525700B1
(en)
|
2013-01-25 |
2016-12-20 |
REMTCS Inc. |
System and method for detecting malicious activity and harmful hardware/software modifications to a vehicle
|
AU2014213584B2
(en)
*
|
2013-02-10 |
2018-01-18 |
Paypal, Inc. |
Method and product for providing a predictive security product and evaluating existing security products
|
US9176843B1
(en)
|
2013-02-23 |
2015-11-03 |
Fireeye, Inc. |
Framework for efficient security coverage of mobile software applications
|
US9824209B1
(en)
|
2013-02-23 |
2017-11-21 |
Fireeye, Inc. |
Framework for efficient security coverage of mobile software applications that is usable to harden in the field code
|
US9367681B1
(en)
|
2013-02-23 |
2016-06-14 |
Fireeye, Inc. |
Framework for efficient security coverage of mobile software applications using symbolic execution to reach regions of interest within an application
|
US9009823B1
(en)
|
2013-02-23 |
2015-04-14 |
Fireeye, Inc. |
Framework for efficient security coverage of mobile software applications installed on mobile devices
|
US9195829B1
(en)
|
2013-02-23 |
2015-11-24 |
Fireeye, Inc. |
User interface with real-time visual playback along with synchronous textual analysis log display and event/time index for anomalous behavior detection in applications
|
US9009822B1
(en)
|
2013-02-23 |
2015-04-14 |
Fireeye, Inc. |
Framework for multi-phase analysis of mobile applications
|
US9159035B1
(en)
|
2013-02-23 |
2015-10-13 |
Fireeye, Inc. |
Framework for computer application analysis of sensitive information tracking
|
US8990944B1
(en)
|
2013-02-23 |
2015-03-24 |
Fireeye, Inc. |
Systems and methods for automatically detecting backdoors
|
US9626509B1
(en)
|
2013-03-13 |
2017-04-18 |
Fireeye, Inc. |
Malicious content analysis with multi-version application support within single operating environment
|
US9104867B1
(en)
|
2013-03-13 |
2015-08-11 |
Fireeye, Inc. |
Malicious content analysis using simulated user interaction without user involvement
|
US9565202B1
(en)
|
2013-03-13 |
2017-02-07 |
Fireeye, Inc. |
System and method for detecting exfiltration content
|
US9355247B1
(en)
|
2013-03-13 |
2016-05-31 |
Fireeye, Inc. |
File extraction from memory dump for malicious content analysis
|
US9430646B1
(en)
|
2013-03-14 |
2016-08-30 |
Fireeye, Inc. |
Distributed systems and methods for automatically detecting unknown bots and botnets
|
US9311479B1
(en)
|
2013-03-14 |
2016-04-12 |
Fireeye, Inc. |
Correlation and consolidation of analytic data for holistic view of a malware attack
|
US9251343B1
(en)
|
2013-03-15 |
2016-02-02 |
Fireeye, Inc. |
Detecting bootkits resident on compromised computers
|
US10713358B2
(en)
|
2013-03-15 |
2020-07-14 |
Fireeye, Inc. |
System and method to extract and utilize disassembly features to classify software intent
|
US9413781B2
(en)
|
2013-03-15 |
2016-08-09 |
Fireeye, Inc. |
System and method employing structured intelligence to verify and contain threats at endpoints
|
US9495180B2
(en)
|
2013-05-10 |
2016-11-15 |
Fireeye, Inc. |
Optimized resource allocation for virtual machines within a malware content detection system
|
US9635039B1
(en)
|
2013-05-13 |
2017-04-25 |
Fireeye, Inc. |
Classifying sets of malicious indicators for detecting command and control communications associated with malware
|
US10133863B2
(en)
|
2013-06-24 |
2018-11-20 |
Fireeye, Inc. |
Zero-day discovery system
|
US9536091B2
(en)
*
|
2013-06-24 |
2017-01-03 |
Fireeye, Inc. |
System and method for detecting time-bomb malware
|
US9300686B2
(en)
|
2013-06-28 |
2016-03-29 |
Fireeye, Inc. |
System and method for detecting malicious links in electronic messages
|
US9888016B1
(en)
|
2013-06-28 |
2018-02-06 |
Fireeye, Inc. |
System and method for detecting phishing using password prediction
|
US10192054B2
(en)
*
|
2013-09-13 |
2019-01-29 |
Intel Corporation |
Automatic pairing of IO devices with hardware secure elements
|
US9736179B2
(en)
|
2013-09-30 |
2017-08-15 |
Fireeye, Inc. |
System, apparatus and method for using malware analysis results to drive adaptive instrumentation of virtual machines to improve exploit detection
|
US10515214B1
(en)
|
2013-09-30 |
2019-12-24 |
Fireeye, Inc. |
System and method for classifying malware within content created during analysis of a specimen
|
US10192052B1
(en)
|
2013-09-30 |
2019-01-29 |
Fireeye, Inc. |
System, apparatus and method for classifying a file as malicious using static scanning
|
US9690936B1
(en)
|
2013-09-30 |
2017-06-27 |
Fireeye, Inc. |
Multistage system and method for analyzing obfuscated content for malware
|
US9628507B2
(en)
|
2013-09-30 |
2017-04-18 |
Fireeye, Inc. |
Advanced persistent threat (APT) detection center
|
US9294501B2
(en)
|
2013-09-30 |
2016-03-22 |
Fireeye, Inc. |
Fuzzy hash of behavioral results
|
US10089461B1
(en)
|
2013-09-30 |
2018-10-02 |
Fireeye, Inc. |
Page replacement code injection
|
US9171160B2
(en)
|
2013-09-30 |
2015-10-27 |
Fireeye, Inc. |
Dynamically adaptive framework and method for classifying malware using intelligent static, emulation, and dynamic analyses
|
US10075460B2
(en)
|
2013-10-16 |
2018-09-11 |
REMTCS Inc. |
Power grid universal detection and countermeasure overlay intelligence ultra-low latency hypervisor
|
US9921978B1
(en)
|
2013-11-08 |
2018-03-20 |
Fireeye, Inc. |
System and method for enhanced security of storage devices
|
US9189627B1
(en)
|
2013-11-21 |
2015-11-17 |
Fireeye, Inc. |
System, apparatus and method for conducting on-the-fly decryption of encrypted objects for malware detection
|
US9747446B1
(en)
|
2013-12-26 |
2017-08-29 |
Fireeye, Inc. |
System and method for run-time object classification
|
US9756074B2
(en)
|
2013-12-26 |
2017-09-05 |
Fireeye, Inc. |
System and method for IPS and VM-based detection of suspicious objects
|
US9292686B2
(en)
|
2014-01-16 |
2016-03-22 |
Fireeye, Inc. |
Micro-virtualization architecture for threat-aware microvisor deployment in a node of a network environment
|
US9262635B2
(en)
|
2014-02-05 |
2016-02-16 |
Fireeye, Inc. |
Detection efficacy of virtual machine-based analysis with application specific events
|
US9241010B1
(en)
|
2014-03-20 |
2016-01-19 |
Fireeye, Inc. |
System and method for network behavior detection
|
US10242185B1
(en)
|
2014-03-21 |
2019-03-26 |
Fireeye, Inc. |
Dynamic guest image creation and rollback
|
US9591015B1
(en)
|
2014-03-28 |
2017-03-07 |
Fireeye, Inc. |
System and method for offloading packet processing and static analysis operations
|
US9432389B1
(en)
|
2014-03-31 |
2016-08-30 |
Fireeye, Inc. |
System, apparatus and method for detecting a malicious attack based on static analysis of a multi-flow object
|
US9223972B1
(en)
|
2014-03-31 |
2015-12-29 |
Fireeye, Inc. |
Dynamically remote tuning of a malware content detection system
|
US9973531B1
(en)
|
2014-06-06 |
2018-05-15 |
Fireeye, Inc. |
Shellcode detection
|
US9438623B1
(en)
|
2014-06-06 |
2016-09-06 |
Fireeye, Inc. |
Computer exploit detection using heap spray pattern matching
|
US9594912B1
(en)
|
2014-06-06 |
2017-03-14 |
Fireeye, Inc. |
Return-oriented programming detection
|
US10084813B2
(en)
|
2014-06-24 |
2018-09-25 |
Fireeye, Inc. |
Intrusion prevention and remedy system
|
US9398028B1
(en)
|
2014-06-26 |
2016-07-19 |
Fireeye, Inc. |
System, device and method for detecting a malicious attack based on communcations between remotely hosted virtual machines and malicious web servers
|
US10805340B1
(en)
|
2014-06-26 |
2020-10-13 |
Fireeye, Inc. |
Infection vector and malware tracking with an interactive user display
|
US10002252B2
(en)
|
2014-07-01 |
2018-06-19 |
Fireeye, Inc. |
Verification of trusted threat-aware microvisor
|
US9363280B1
(en)
|
2014-08-22 |
2016-06-07 |
Fireeye, Inc. |
System and method of detecting delivery of malware using cross-customer data
|
US10671726B1
(en)
|
2014-09-22 |
2020-06-02 |
Fireeye Inc. |
System and method for malware analysis using thread-level event monitoring
|
US10027689B1
(en)
|
2014-09-29 |
2018-07-17 |
Fireeye, Inc. |
Interactive infection visualization for improved exploit detection and signature generation for malware and malware families
|
US9773112B1
(en)
|
2014-09-29 |
2017-09-26 |
Fireeye, Inc. |
Exploit detection of malware and malware families
|
US10044675B1
(en)
|
2014-09-30 |
2018-08-07 |
Palo Alto Networks, Inc. |
Integrating a honey network with a target network to counter IP and peer-checking evasion techniques
|
US9860208B1
(en)
|
2014-09-30 |
2018-01-02 |
Palo Alto Networks, Inc. |
Bridging a virtual clone of a target device in a honey network to a suspicious device in an enterprise network
|
US9716727B1
(en)
|
2014-09-30 |
2017-07-25 |
Palo Alto Networks, Inc. |
Generating a honey network configuration to emulate a target network environment
|
US9882929B1
(en)
|
2014-09-30 |
2018-01-30 |
Palo Alto Networks, Inc. |
Dynamic selection and generation of a virtual clone for detonation of suspicious content within a honey network
|
US9495188B1
(en)
|
2014-09-30 |
2016-11-15 |
Palo Alto Networks, Inc. |
Synchronizing a honey network configuration to reflect a target network environment
|
US9690933B1
(en)
|
2014-12-22 |
2017-06-27 |
Fireeye, Inc. |
Framework for classifying an object as malicious with machine learning for deploying updated predictive models
|
US10075455B2
(en)
|
2014-12-26 |
2018-09-11 |
Fireeye, Inc. |
Zero-day rotating guest image profile
|
US9934376B1
(en)
|
2014-12-29 |
2018-04-03 |
Fireeye, Inc. |
Malware detection appliance architecture
|
US9838417B1
(en)
|
2014-12-30 |
2017-12-05 |
Fireeye, Inc. |
Intelligent context aware user interaction for malware detection
|
US9690606B1
(en)
|
2015-03-25 |
2017-06-27 |
Fireeye, Inc. |
Selective system call monitoring
|
US10148693B2
(en)
|
2015-03-25 |
2018-12-04 |
Fireeye, Inc. |
Exploit detection system
|
US9438613B1
(en)
|
2015-03-30 |
2016-09-06 |
Fireeye, Inc. |
Dynamic content activation for automated analysis of embedded objects
|
US10417031B2
(en)
|
2015-03-31 |
2019-09-17 |
Fireeye, Inc. |
Selective virtualization for security threat detection
|
US10474813B1
(en)
|
2015-03-31 |
2019-11-12 |
Fireeye, Inc. |
Code injection technique for remediation at an endpoint of a network
|
US9483644B1
(en)
|
2015-03-31 |
2016-11-01 |
Fireeye, Inc. |
Methods for detecting file altering malware in VM based analysis
|
US9654485B1
(en)
|
2015-04-13 |
2017-05-16 |
Fireeye, Inc. |
Analytics-based security monitoring system and method
|
US9594904B1
(en)
|
2015-04-23 |
2017-03-14 |
Fireeye, Inc. |
Detecting malware based on reflection
|
US10726127B1
(en)
|
2015-06-30 |
2020-07-28 |
Fireeye, Inc. |
System and method for protecting a software component running in a virtual machine through virtual interrupts by the virtualization layer
|
US10642753B1
(en)
|
2015-06-30 |
2020-05-05 |
Fireeye, Inc. |
System and method for protecting a software component running in virtual machine using a virtualization layer
|
US10289686B1
(en)
|
2015-06-30 |
2019-05-14 |
Open Text Corporation |
Method and system for using dynamic content types
|
US10454950B1
(en)
|
2015-06-30 |
2019-10-22 |
Fireeye, Inc. |
Centralized aggregation technique for detecting lateral movement of stealthy cyber-attacks
|
US11113086B1
(en)
|
2015-06-30 |
2021-09-07 |
Fireeye, Inc. |
Virtual system and method for securing external network connectivity
|
US10715542B1
(en)
|
2015-08-14 |
2020-07-14 |
Fireeye, Inc. |
Mobile application risk analysis
|
US10176321B2
(en)
|
2015-09-22 |
2019-01-08 |
Fireeye, Inc. |
Leveraging behavior-based rules for malware family classification
|
US10033747B1
(en)
|
2015-09-29 |
2018-07-24 |
Fireeye, Inc. |
System and method for detecting interpreter-based exploit attacks
|
US10817606B1
(en)
|
2015-09-30 |
2020-10-27 |
Fireeye, Inc. |
Detecting delayed activation malware using a run-time monitoring agent and time-dilation logic
|
US9825976B1
(en)
|
2015-09-30 |
2017-11-21 |
Fireeye, Inc. |
Detection and classification of exploit kits
|
US10601865B1
(en)
|
2015-09-30 |
2020-03-24 |
Fireeye, Inc. |
Detection of credential spearphishing attacks using email analysis
|
US9825989B1
(en)
|
2015-09-30 |
2017-11-21 |
Fireeye, Inc. |
Cyber attack early warning system
|
US10706149B1
(en)
|
2015-09-30 |
2020-07-07 |
Fireeye, Inc. |
Detecting delayed activation malware using a primary controller and plural time controllers
|
US10210329B1
(en)
|
2015-09-30 |
2019-02-19 |
Fireeye, Inc. |
Method to detect application execution hijacking using memory protection
|
US10284575B2
(en)
|
2015-11-10 |
2019-05-07 |
Fireeye, Inc. |
Launcher for setting analysis environment variations for malware detection
|
US10846117B1
(en)
|
2015-12-10 |
2020-11-24 |
Fireeye, Inc. |
Technique for establishing secure communication between host and guest processes of a virtualization architecture
|
US10447728B1
(en)
|
2015-12-10 |
2019-10-15 |
Fireeye, Inc. |
Technique for protecting guest processes using a layered virtualization architecture
|
US10108446B1
(en)
|
2015-12-11 |
2018-10-23 |
Fireeye, Inc. |
Late load technique for deploying a virtualization layer underneath a running operating system
|
US10050998B1
(en)
|
2015-12-30 |
2018-08-14 |
Fireeye, Inc. |
Malicious message analysis system
|
US10621338B1
(en)
|
2015-12-30 |
2020-04-14 |
Fireeye, Inc. |
Method to detect forgery and exploits using last branch recording registers
|
US10133866B1
(en)
|
2015-12-30 |
2018-11-20 |
Fireeye, Inc. |
System and method for triggering analysis of an object for malware in response to modification of that object
|
US10565378B1
(en)
|
2015-12-30 |
2020-02-18 |
Fireeye, Inc. |
Exploit of privilege detection framework
|
US9824216B1
(en)
|
2015-12-31 |
2017-11-21 |
Fireeye, Inc. |
Susceptible environment detection system
|
US11552986B1
(en)
|
2015-12-31 |
2023-01-10 |
Fireeye Security Holdings Us Llc |
Cyber-security framework for application of virtual features
|
US10581874B1
(en)
|
2015-12-31 |
2020-03-03 |
Fireeye, Inc. |
Malware detection system with contextual analysis
|
US10785255B1
(en)
|
2016-03-25 |
2020-09-22 |
Fireeye, Inc. |
Cluster configuration within a scalable malware detection system
|
US10671721B1
(en)
|
2016-03-25 |
2020-06-02 |
Fireeye, Inc. |
Timeout management services
|
US10616266B1
(en)
|
2016-03-25 |
2020-04-07 |
Fireeye, Inc. |
Distributed malware detection system and submission workflow thereof
|
US10601863B1
(en)
|
2016-03-25 |
2020-03-24 |
Fireeye, Inc. |
System and method for managing sensor enrollment
|
US10893059B1
(en)
|
2016-03-31 |
2021-01-12 |
Fireeye, Inc. |
Verification and enhancement using detection systems located at the network periphery and endpoint devices
|
US10826933B1
(en)
|
2016-03-31 |
2020-11-03 |
Fireeye, Inc. |
Technique for verifying exploit/malware at malware detection appliance through correlation with endpoints
|
US10169585B1
(en)
|
2016-06-22 |
2019-01-01 |
Fireeye, Inc. |
System and methods for advanced malware detection through placement of transition events
|
US10462173B1
(en)
|
2016-06-30 |
2019-10-29 |
Fireeye, Inc. |
Malware detection verification and enhancement by coordinating endpoint and malware detection systems
|
US10592678B1
(en)
|
2016-09-09 |
2020-03-17 |
Fireeye, Inc. |
Secure communications between peers using a verified virtual trusted platform module
|
US10491627B1
(en)
|
2016-09-29 |
2019-11-26 |
Fireeye, Inc. |
Advanced malware detection using similarity analysis
|
US10795991B1
(en)
|
2016-11-08 |
2020-10-06 |
Fireeye, Inc. |
Enterprise search
|
US10587647B1
(en)
|
2016-11-22 |
2020-03-10 |
Fireeye, Inc. |
Technique for malware detection capability comparison of network security devices
|
US10552610B1
(en)
|
2016-12-22 |
2020-02-04 |
Fireeye, Inc. |
Adaptive virtual machine snapshot update framework for malware behavioral analysis
|
US10581879B1
(en)
|
2016-12-22 |
2020-03-03 |
Fireeye, Inc. |
Enhanced malware detection for generated objects
|
US10523609B1
(en)
|
2016-12-27 |
2019-12-31 |
Fireeye, Inc. |
Multi-vector malware detection and analysis
|
US10904286B1
(en)
|
2017-03-24 |
2021-01-26 |
Fireeye, Inc. |
Detection of phishing attacks using similarity analysis
|
US10798112B2
(en)
|
2017-03-30 |
2020-10-06 |
Fireeye, Inc. |
Attribute-controlled malware detection
|
US10902119B1
(en)
|
2017-03-30 |
2021-01-26 |
Fireeye, Inc. |
Data extraction system for malware analysis
|
US10791138B1
(en)
|
2017-03-30 |
2020-09-29 |
Fireeye, Inc. |
Subscription-based malware detection
|
US10554507B1
(en)
|
2017-03-30 |
2020-02-04 |
Fireeye, Inc. |
Multi-level control for enhanced resource and object evaluation management of malware detection system
|
US10503904B1
(en)
|
2017-06-29 |
2019-12-10 |
Fireeye, Inc. |
Ransomware detection and mitigation
|
US10601848B1
(en)
|
2017-06-29 |
2020-03-24 |
Fireeye, Inc. |
Cyber-security system and method for weak indicator detection and correlation to generate strong indicators
|
US10855700B1
(en)
|
2017-06-29 |
2020-12-01 |
Fireeye, Inc. |
Post-intrusion detection of cyber-attacks during lateral movement within networks
|
US10893068B1
(en)
|
2017-06-30 |
2021-01-12 |
Fireeye, Inc. |
Ransomware file modification prevention technique
|
US10747872B1
(en)
|
2017-09-27 |
2020-08-18 |
Fireeye, Inc. |
System and method for preventing malware evasion
|
US10805346B2
(en)
|
2017-10-01 |
2020-10-13 |
Fireeye, Inc. |
Phishing attack detection
|
US11108809B2
(en)
|
2017-10-27 |
2021-08-31 |
Fireeye, Inc. |
System and method for analyzing binary code for malware classification using artificial neural network techniques
|
US11271955B2
(en)
|
2017-12-28 |
2022-03-08 |
Fireeye Security Holdings Us Llc |
Platform and method for retroactive reclassification employing a cybersecurity-based global data store
|
US11005860B1
(en)
|
2017-12-28 |
2021-05-11 |
Fireeye, Inc. |
Method and system for efficient cybersecurity analysis of endpoint events
|
US11240275B1
(en)
|
2017-12-28 |
2022-02-01 |
Fireeye Security Holdings Us Llc |
Platform and method for performing cybersecurity analyses employing an intelligence hub with a modular architecture
|
US10728034B2
(en)
|
2018-02-23 |
2020-07-28 |
Webroot Inc. |
Security privilege escalation exploit detection and mitigation
|
US10826931B1
(en)
|
2018-03-29 |
2020-11-03 |
Fireeye, Inc. |
System and method for predicting and mitigating cybersecurity system misconfigurations
|
US11558401B1
(en)
|
2018-03-30 |
2023-01-17 |
Fireeye Security Holdings Us Llc |
Multi-vector malware detection data sharing system for improved detection
|
US11003773B1
(en)
|
2018-03-30 |
2021-05-11 |
Fireeye, Inc. |
System and method for automatically generating malware detection rule recommendations
|
US10956477B1
(en)
|
2018-03-30 |
2021-03-23 |
Fireeye, Inc. |
System and method for detecting malicious scripts through natural language processing modeling
|
US11075930B1
(en)
|
2018-06-27 |
2021-07-27 |
Fireeye, Inc. |
System and method for detecting repetitive cybersecurity attacks constituting an email campaign
|
US11314859B1
(en)
|
2018-06-27 |
2022-04-26 |
FireEye Security Holdings, Inc. |
Cyber-security system and method for detecting escalation of privileges within an access token
|
US11228491B1
(en)
|
2018-06-28 |
2022-01-18 |
Fireeye Security Holdings Us Llc |
System and method for distributed cluster configuration monitoring and management
|
US11316900B1
(en)
|
2018-06-29 |
2022-04-26 |
FireEye Security Holdings Inc. |
System and method for automatically prioritizing rules for cyber-threat detection and mitigation
|
US11182473B1
(en)
|
2018-09-13 |
2021-11-23 |
Fireeye Security Holdings Us Llc |
System and method for mitigating cyberattacks against processor operability by a guest process
|
US11763004B1
(en)
|
2018-09-27 |
2023-09-19 |
Fireeye Security Holdings Us Llc |
System and method for bootkit detection
|
US12074887B1
(en)
|
2018-12-21 |
2024-08-27 |
Musarubra Us Llc |
System and method for selectively processing content after identification and removal of malicious content
|
US11368475B1
(en)
|
2018-12-21 |
2022-06-21 |
Fireeye Security Holdings Us Llc |
System and method for scanning remote services to locate stored objects with malware
|
US11258806B1
(en)
|
2019-06-24 |
2022-02-22 |
Mandiant, Inc. |
System and method for automatically associating cybersecurity intelligence to cyberthreat actors
|
US11556640B1
(en)
|
2019-06-27 |
2023-01-17 |
Mandiant, Inc. |
Systems and methods for automated cybersecurity analysis of extracted binary string sets
|
US11392700B1
(en)
|
2019-06-28 |
2022-07-19 |
Fireeye Security Holdings Us Llc |
System and method for supporting cross-platform data verification
|
US11886585B1
(en)
|
2019-09-27 |
2024-01-30 |
Musarubra Us Llc |
System and method for identifying and mitigating cyberattacks through malicious position-independent code execution
|
US11637862B1
(en)
|
2019-09-30 |
2023-04-25 |
Mandiant, Inc. |
System and method for surfacing cyber-security threats with a self-learning recommendation engine
|
US11271907B2
(en)
|
2019-12-19 |
2022-03-08 |
Palo Alto Networks, Inc. |
Smart proxy for a large scale high-interaction honeypot farm
|
US11265346B2
(en)
|
2019-12-19 |
2022-03-01 |
Palo Alto Networks, Inc. |
Large scale high-interactive honeypot farm
|
US11307975B2
(en)
|
2020-02-20 |
2022-04-19 |
International Business Machines Corporation |
Machine code analysis for identifying software defects
|
US11663113B2
(en)
|
2020-02-20 |
2023-05-30 |
International Business Machines Corporation |
Real time fault localization using combinatorial test design techniques and test case priority selection
|
US11176026B2
(en)
|
2020-02-20 |
2021-11-16 |
International Business Machines Corporation |
Assignment of test case priorities based on combinatorial test design model analysis
|
US11086768B1
(en)
|
2020-02-20 |
2021-08-10 |
International Business Machines Corporation |
Identifying false positives in test case failures using combinatorics
|
US11886584B2
(en)
*
|
2021-05-28 |
2024-01-30 |
AO Kaspersky Lab |
System and method for detecting potentially malicious changes in applications
|