Patent | Date |
---|
Systems And Methods For Providing Transaction Services App 20220129967 - JIN; Rongbo ;   et al. | 2022-04-28 |
System, apparatus and method for automatically verifying exploits within suspect objects and highlighting the display information associated with the verified exploits Grant 11,089,057 - Aziz , et al. August 10, 2 | 2021-08-10 |
Classifying sets of malicious indicators for detecting command and control communications associated with malware Grant 10,637,880 - Islam , et al. | 2020-04-28 |
System, apparatus and method for automatically verifying exploits within suspect objects and highlighting the display information associated with the verified exploits Grant 10,476,909 - Aziz , et al. Nov | 2019-11-12 |
System and method for generating a malware identifier Grant 10,467,411 - Pidathala , et al. No | 2019-11-05 |
System and method for classifying an object based on an aggregated behavior results Grant 10,432,649 - Bennett , et al. O | 2019-10-01 |
System, apparatus and method for classifying a file as malicious using static scanning Grant 10,192,052 - Singh , et al. Ja | 2019-01-29 |
Detection of malicious scripting language code in a network environment Grant 10,140,451 - Xu , et al. Nov | 2018-11-27 |
Zero-day discovery system Grant 10,133,863 - Bu , et al. November 20, 2 | 2018-11-20 |
System and method for detecting malicious activity and classifying a network communication based on different indicator types Grant 10,033,753 - Islam , et al. July 24, 2 | 2018-07-24 |
Generic privilege escalation prevention Grant 9,990,490 - Sun , et al. June 5, 2 | 2018-06-05 |
System and method for IPS and VM-based detection of suspicious objects Grant 9,756,074 - Aziz , et al. September 5, 2 | 2017-09-05 |
System and method for run-time object classification Grant 9,747,446 - Pidathala , et al. August 29, 2 | 2017-08-29 |
Classifying sets of malicious indicators for detecting command and control communications associated with malware Grant 9,635,039 - Islam , et al. April 25, 2 | 2017-04-25 |
System, apparatus and method for automatically verifying exploits within suspect objects and highlighting the display information associated with the verified exploits Grant 9,306,974 - Aziz , et al. April 5, 2 | 2016-04-05 |
Generic Privilege Escalation Prevention App 20160070906 - Sun; Bing ;   et al. | 2016-03-10 |
Detecting bootkits resident on compromised computers Grant 9,251,343 - Vincent , et al. February 2, 2 | 2016-02-02 |
System and method for network behavior detection Grant 9,241,010 - Bennett , et al. January 19, 2 | 2016-01-19 |
Detection Of Malicious Scripting Language Code In A Network Environment App 20150363598 - Xu; Chong ;   et al. | 2015-12-17 |
Generic privilege escalation prevention Grant 9,197,660 - Sun , et al. November 24, 2 | 2015-11-24 |
System and method for protocol fingerprinting and reputation correlation Grant 9,106,680 - Alperovitch , et al. August 11, 2 | 2015-08-11 |
System, Apparatus And Method For Automatically Verifying Exploits Within Suspect Objects And Highlighting The Display Information Associated With The Verified Exploits App 20150186645 - Aziz; Ashar ;   et al. | 2015-07-02 |
System, Method, And Computer Program Product For Preventing Communication Of Unwanted Network Traffic By Holding Only A Last Portion Of The Network Traffic App 20150096030 - Zhu; Ge ;   et al. | 2015-04-02 |
Zero-day Discovery System App 20140380473 - Bu; Zheng ;   et al. | 2014-12-25 |
System, method, and computer program product for preventing communication of unwanted network traffic by holding only a last portion of the network traffic Grant 8,910,269 - Zhu , et al. December 9, 2 | 2014-12-09 |
Generic Privilege Escalation Prevention App 20140351930 - Sun; Bing ;   et al. | 2014-11-27 |
System, method, and computer program product to automate the flagging of obscure flows as at least potentially unwanted Grant 8,560,715 - Mahadik , et al. October 15, 2 | 2013-10-15 |
System, Method, And Computer Program Product For Preventing Communication Of Unwanted Network Traffic By Holding Only A Last Portion Of The Network Traffic App 20130263248 - Zhu; Garrick ;   et al. | 2013-10-03 |
System, method, and computer program product for preventing communication of unwanted network traffic by holding only a last portion of the network traffic Grant 8,448,232 - Zhu , et al. May 21, 2 | 2013-05-21 |
System And Method For Real-time Customized Threat Protection App 20130074143 - Bu; Zheng ;   et al. | 2013-03-21 |
System And Method For Protocol Fingerprinting And Reputation Correlation App 20120331556 - Alperovitch; Dmitri ;   et al. | 2012-12-27 |
Method and apparatus for detecting shellcode Grant 8,051,479 - Bu , et al. November 1, 2 | 2011-11-01 |
System, method, and computer program product to automate the flagging of obscure network flows as at least potentially unwanted Grant 8,024,473 - Mahadik , et al. September 20, 2 | 2011-09-20 |
System, method, and computer program product for preventing communication of unwanted network traffic by holding only a last portion of the network traffic Grant 8,024,462 - Zhu , et al. September 20, 2 | 2011-09-20 |
Method and apparatus for detecting shellcode Grant 7,904,955 - Bu , et al. March 8, 2 | 2011-03-08 |