US6049609A
(en)
*
|
1997-08-06 |
2000-04-11 |
Intel Corporation |
Cell array providing non-persistent secret storage through a mutation cycle
|
US9219755B2
(en)
|
1996-11-08 |
2015-12-22 |
Finjan, Inc. |
Malicious mobile code runtime monitoring system and methods
|
US8079086B1
(en)
|
1997-11-06 |
2011-12-13 |
Finjan, Inc. |
Malicious mobile code runtime monitoring system and methods
|
US7058822B2
(en)
|
2000-03-30 |
2006-06-06 |
Finjan Software, Ltd. |
Malicious mobile code runtime monitoring system and methods
|
US6802028B1
(en)
|
1996-11-11 |
2004-10-05 |
Powerquest Corporation |
Computer virus detection and removal
|
US5960170A
(en)
*
|
1997-03-18 |
1999-09-28 |
Trend Micro, Inc. |
Event triggered iterative virus detection
|
US5964889A
(en)
*
|
1997-04-16 |
1999-10-12 |
Symantec Corporation |
Method to analyze a program for presence of computer viruses by examining the opcode for faults before emulating instruction in emulator
|
US6016546A
(en)
*
|
1997-07-10 |
2000-01-18 |
International Business Machines Corporation |
Efficient detection of computer viruses and other data traits
|
US6357008B1
(en)
*
|
1997-09-23 |
2002-03-12 |
Symantec Corporation |
Dynamic heuristic method for detecting computer viruses using decryption exploration and evaluation phases
|
US6021510A
(en)
*
|
1997-11-24 |
2000-02-01 |
Symantec Corporation |
Antivirus accelerator
|
US6094731A
(en)
*
|
1997-11-24 |
2000-07-25 |
Symantec Corporation |
Antivirus accelerator for computer networks
|
US6029256A
(en)
*
|
1997-12-31 |
2000-02-22 |
Network Associates, Inc. |
Method and system for allowing computer programs easy access to features of a virus scanning engine
|
US5987610A
(en)
|
1998-02-12 |
1999-11-16 |
Ameritech Corporation |
Computer virus screening methods and systems
|
US6711583B2
(en)
*
|
1998-09-30 |
2004-03-23 |
International Business Machines Corporation |
System and method for detecting and repairing document-infecting viruses using dynamic heuristics
|
US6338141B1
(en)
*
|
1998-09-30 |
2002-01-08 |
Cybersoft, Inc. |
Method and apparatus for computer virus detection, analysis, and removal in real time
|
EP1149339A1
(de)
|
1998-12-09 |
2001-10-31 |
Network Ice Corporation |
Verfahren und vorrichtung zur netzwerk- und computersystem- sicherung
|
US6874087B1
(en)
|
1999-07-13 |
2005-03-29 |
International Business Machines Corporation |
Integrity checking an executable module and associated protected service provider module
|
US7346929B1
(en)
|
1999-07-29 |
2008-03-18 |
International Business Machines Corporation |
Method and apparatus for auditing network security
|
US7089591B1
(en)
|
1999-07-30 |
2006-08-08 |
Symantec Corporation |
Generic detection and elimination of marco viruses
|
US6851057B1
(en)
*
|
1999-11-30 |
2005-02-01 |
Symantec Corporation |
Data driven detection of viruses
|
US6728886B1
(en)
*
|
1999-12-01 |
2004-04-27 |
Trend Micro Incorporated |
Distributed virus scanning arrangements and methods therefor
|
US8006243B2
(en)
|
1999-12-07 |
2011-08-23 |
International Business Machines Corporation |
Method and apparatus for remote installation of network drivers and software
|
US6954858B1
(en)
|
1999-12-22 |
2005-10-11 |
Kimberly Joyce Welborn |
Computer virus avoidance system and mechanism
|
US8176551B1
(en)
*
|
2000-01-27 |
2012-05-08 |
Trapware Corporation |
Detection of observer programs and countermeasures against observer programs
|
US7908652B1
(en)
|
2001-12-21 |
2011-03-15 |
Trapware Corporation |
Detection of observers and countermeasures against observers
|
GB2359908B
(en)
*
|
2000-03-04 |
2004-09-15 |
Motorola Inc |
Communication system architecture and method of controlling data download to subscriber equipment
|
US6971019B1
(en)
*
|
2000-03-14 |
2005-11-29 |
Symantec Corporation |
Histogram-based virus detection
|
US7921459B2
(en)
|
2000-04-28 |
2011-04-05 |
International Business Machines Corporation |
System and method for managing security events on a network
|
US7574740B1
(en)
|
2000-04-28 |
2009-08-11 |
International Business Machines Corporation |
Method and system for intrusion detection in a computer network
|
CA2447451C
(en)
*
|
2000-05-12 |
2013-02-12 |
Xtreamlok Pty. Ltd. |
Information security method and system
|
US20040073617A1
(en)
|
2000-06-19 |
2004-04-15 |
Milliken Walter Clark |
Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail
|
US7080407B1
(en)
*
|
2000-06-27 |
2006-07-18 |
Cisco Technology, Inc. |
Virus detection and removal system and method for network-based systems
|
US7162649B1
(en)
|
2000-06-30 |
2007-01-09 |
Internet Security Systems, Inc. |
Method and apparatus for network assessment and authentication
|
US7093239B1
(en)
|
2000-07-14 |
2006-08-15 |
Internet Security Systems, Inc. |
Computer immune system and method for detecting unwanted code in a computer system
|
US7178166B1
(en)
|
2000-09-19 |
2007-02-13 |
Internet Security Systems, Inc. |
Vulnerability assessment and authentication of a computer by a local scanner
|
US9027121B2
(en)
*
|
2000-10-10 |
2015-05-05 |
International Business Machines Corporation |
Method and system for creating a record for one or more computer security incidents
|
US7146305B2
(en)
|
2000-10-24 |
2006-12-05 |
Vcis, Inc. |
Analytical virtual machine
|
US7398553B1
(en)
*
|
2000-10-30 |
2008-07-08 |
Tread Micro, Inc. |
Scripting virus scan engine
|
US7130466B2
(en)
|
2000-12-21 |
2006-10-31 |
Cobion Ag |
System and method for compiling images from a database and comparing the compiled images with known images
|
WO2002062049A2
(en)
|
2001-01-31 |
2002-08-08 |
Timothy David Dodd |
Method and system for calculating risk in association with a security audit of a computer network
|
US20020178375A1
(en)
*
|
2001-01-31 |
2002-11-28 |
Harris Corporation |
Method and system for protecting against malicious mobile code
|
WO2002093334A2
(en)
|
2001-04-06 |
2002-11-21 |
Symantec Corporation |
Temporal access control for computer virus outbreaks
|
CN1147795C
(zh)
*
|
2001-04-29 |
2004-04-28 |
北京瑞星科技股份有限公司 |
检测和清除已知及未知计算机病毒的方法、系统
|
US7328453B2
(en)
*
|
2001-05-09 |
2008-02-05 |
Ecd Systems, Inc. |
Systems and methods for the prevention of unauthorized use and manipulation of digital content
|
US7237264B1
(en)
|
2001-06-04 |
2007-06-26 |
Internet Security Systems, Inc. |
System and method for preventing network misuse
|
US20020188649A1
(en)
*
|
2001-06-12 |
2002-12-12 |
Ron Karim |
Mechanism for safely executing an untrusted program
|
US7657419B2
(en)
|
2001-06-19 |
2010-02-02 |
International Business Machines Corporation |
Analytical virtual machine
|
US7665137B1
(en)
*
|
2001-07-26 |
2010-02-16 |
Mcafee, Inc. |
System, method and computer program product for anti-virus scanning in a storage subsystem
|
US6944775B2
(en)
*
|
2001-07-26 |
2005-09-13 |
Networks Associates Technology, Inc. |
Scanner API for executing multiple scanning engines
|
US7673343B1
(en)
*
|
2001-07-26 |
2010-03-02 |
Mcafee, Inc. |
Anti-virus scanning co-processor
|
US7234167B2
(en)
*
|
2001-09-06 |
2007-06-19 |
Mcafee, Inc. |
Automatic builder of detection and cleaning routines for computer viruses
|
WO2003025722A2
(en)
*
|
2001-09-14 |
2003-03-27 |
Computer Associates Think, Inc. |
Virus detection system
|
US7356736B2
(en)
*
|
2001-09-25 |
2008-04-08 |
Norman Asa |
Simulated computer system for monitoring of software performance
|
FR2830638A1
(fr)
*
|
2001-10-05 |
2003-04-11 |
France Telecom |
Procede de detection generique de programmes d'attaque caches dans des chaines de donnees
|
US20030079142A1
(en)
*
|
2001-10-22 |
2003-04-24 |
Aladdin Knowledge Systems Ltd. |
Classifying digital object security category
|
US20030115479A1
(en)
*
|
2001-12-14 |
2003-06-19 |
Jonathan Edwards |
Method and system for detecting computer malwares by scan of process memory after process initialization
|
WO2003058451A1
(en)
|
2002-01-04 |
2003-07-17 |
Internet Security Systems, Inc. |
System and method for the managed security control of processes on a computer system
|
US9652613B1
(en)
|
2002-01-17 |
2017-05-16 |
Trustwave Holdings, Inc. |
Virus detection by executing electronic message code in a virtual machine
|
US7607171B1
(en)
|
2002-01-17 |
2009-10-20 |
Avinti, Inc. |
Virus detection by executing e-mail code in a virtual machine
|
US7340777B1
(en)
|
2003-03-31 |
2008-03-04 |
Symantec Corporation |
In memory heuristic system and method for detecting viruses
|
US7124438B2
(en)
|
2002-03-08 |
2006-10-17 |
Ciphertrust, Inc. |
Systems and methods for anomaly detection in patterns of monitored communications
|
US8561167B2
(en)
|
2002-03-08 |
2013-10-15 |
Mcafee, Inc. |
Web reputation scoring
|
US7693947B2
(en)
|
2002-03-08 |
2010-04-06 |
Mcafee, Inc. |
Systems and methods for graphically displaying messaging traffic
|
US20060015942A1
(en)
|
2002-03-08 |
2006-01-19 |
Ciphertrust, Inc. |
Systems and methods for classification of messaging entities
|
US7903549B2
(en)
|
2002-03-08 |
2011-03-08 |
Secure Computing Corporation |
Content-based policy compliance systems and methods
|
US7096498B2
(en)
|
2002-03-08 |
2006-08-22 |
Cipher Trust, Inc. |
Systems and methods for message threat management
|
US6941467B2
(en)
|
2002-03-08 |
2005-09-06 |
Ciphertrust, Inc. |
Systems and methods for adaptive message interrogation through multiple queues
|
US8132250B2
(en)
|
2002-03-08 |
2012-03-06 |
Mcafee, Inc. |
Message profiling systems and methods
|
US8578480B2
(en)
|
2002-03-08 |
2013-11-05 |
Mcafee, Inc. |
Systems and methods for identifying potentially malicious messages
|
US7870203B2
(en)
|
2002-03-08 |
2011-01-11 |
Mcafee, Inc. |
Methods and systems for exposing messaging reputation to an end user
|
US7694128B2
(en)
|
2002-03-08 |
2010-04-06 |
Mcafee, Inc. |
Systems and methods for secure communication delivery
|
US7458098B2
(en)
|
2002-03-08 |
2008-11-25 |
Secure Computing Corporation |
Systems and methods for enhancing electronic communication security
|
US7162715B1
(en)
|
2002-03-16 |
2007-01-09 |
I-Squared, Inc. |
Method and apparatus for preemptive monitoring of software binaries by instruction interception and dynamic recompilation
|
US7370360B2
(en)
|
2002-05-13 |
2008-05-06 |
International Business Machines Corporation |
Computer immune system and method for detecting unwanted code in a P-code or partially compiled native-code program executing within a virtual machine
|
US7155742B1
(en)
|
2002-05-16 |
2006-12-26 |
Symantec Corporation |
Countering infections to communications modules
|
US7409717B1
(en)
*
|
2002-05-23 |
2008-08-05 |
Symantec Corporation |
Metamorphic computer virus detection
|
US7367056B1
(en)
|
2002-06-04 |
2008-04-29 |
Symantec Corporation |
Countering malicious code infections to computer files that have been infected more than once
|
US7418729B2
(en)
*
|
2002-07-19 |
2008-08-26 |
Symantec Corporation |
Heuristic detection of malicious computer code by page tracking
|
US7380277B2
(en)
*
|
2002-07-22 |
2008-05-27 |
Symantec Corporation |
Preventing e-mail propagation of malicious computer code
|
US7478431B1
(en)
|
2002-08-02 |
2009-01-13 |
Symantec Corporation |
Heuristic detection of computer viruses
|
US7188369B2
(en)
*
|
2002-10-03 |
2007-03-06 |
Trend Micro, Inc. |
System and method having an antivirus virtual scanning processor with plug-in functionalities
|
US7469419B2
(en)
*
|
2002-10-07 |
2008-12-23 |
Symantec Corporation |
Detection of malicious computer code
|
US7159149B2
(en)
*
|
2002-10-24 |
2007-01-02 |
Symantec Corporation |
Heuristic detection and termination of fast spreading network worm attacks
|
US7249187B2
(en)
*
|
2002-11-27 |
2007-07-24 |
Symantec Corporation |
Enforcement of compliance with network security policies
|
US7631353B2
(en)
*
|
2002-12-17 |
2009-12-08 |
Symantec Corporation |
Blocking replication of e-mail worms
|
JP3979285B2
(ja)
*
|
2002-12-17 |
2007-09-19 |
株式会社日立製作所 |
情報処理システム
|
US7296293B2
(en)
*
|
2002-12-31 |
2007-11-13 |
Symantec Corporation |
Using a benevolent worm to assess and correct computer security vulnerabilities
|
US7913303B1
(en)
|
2003-01-21 |
2011-03-22 |
International Business Machines Corporation |
Method and system for dynamically protecting a computer system from attack
|
US7228563B2
(en)
|
2003-02-06 |
2007-06-05 |
Symantec Corporation |
Shell code blocking system and method
|
KR100503387B1
(ko)
*
|
2003-03-14 |
2005-07-26 |
주식회사 안철수연구소 |
악성 암호화 스크립트에 대한 분석 및 해독 방법
|
US7203959B2
(en)
|
2003-03-14 |
2007-04-10 |
Symantec Corporation |
Stream scanning through network proxy servers
|
US20060130016A1
(en)
*
|
2003-03-17 |
2006-06-15 |
Wagner John R |
Method of kernal-mode instruction interception and apparatus therefor
|
US7287281B1
(en)
|
2003-06-17 |
2007-10-23 |
Symantec Corporation |
Send blocking system and method
|
US7392543B2
(en)
*
|
2003-06-30 |
2008-06-24 |
Symantec Corporation |
Signature extraction system and method
|
US8271774B1
(en)
|
2003-08-11 |
2012-09-18 |
Symantec Corporation |
Circumstantial blocking of incoming network traffic containing code
|
US7657938B2
(en)
|
2003-10-28 |
2010-02-02 |
International Business Machines Corporation |
Method and system for protecting computer networks by altering unwanted network data traffic
|
US7437764B1
(en)
*
|
2003-11-14 |
2008-10-14 |
Symantec Corporation |
Vulnerability assessment of disk images
|
US7437759B1
(en)
|
2004-02-17 |
2008-10-14 |
Symantec Corporation |
Kernel mode overflow attack prevention system and method
|
US7984304B1
(en)
*
|
2004-03-02 |
2011-07-19 |
Vmware, Inc. |
Dynamic verification of validity of executable code
|
US7337327B1
(en)
|
2004-03-30 |
2008-02-26 |
Symantec Corporation |
Using mobility tokens to observe malicious mobile code
|
US7484094B1
(en)
|
2004-05-14 |
2009-01-27 |
Symantec Corporation |
Opening computer files quickly and safely over a network
|
US7373667B1
(en)
|
2004-05-14 |
2008-05-13 |
Symantec Corporation |
Protecting a computer coupled to a network from malicious code infections
|
US20050262567A1
(en)
*
|
2004-05-19 |
2005-11-24 |
Itshak Carmona |
Systems and methods for computer security
|
US7370233B1
(en)
|
2004-05-21 |
2008-05-06 |
Symantec Corporation |
Verification of desired end-state using a virtual machine environment
|
US20060004737A1
(en)
*
|
2004-07-02 |
2006-01-05 |
Grzonka Michael T |
Computer virus protection for automated pharmaceutical processes
|
US7441042B1
(en)
|
2004-08-25 |
2008-10-21 |
Symanetc Corporation |
System and method for correlating network traffic and corresponding file input/output traffic
|
US7690034B1
(en)
|
2004-09-10 |
2010-03-30 |
Symantec Corporation |
Using behavior blocking mobility tokens to facilitate distributed worm detection
|
US7480683B2
(en)
*
|
2004-10-01 |
2009-01-20 |
Webroot Software, Inc. |
System and method for heuristic analysis to identify pestware
|
US7752671B2
(en)
*
|
2004-10-04 |
2010-07-06 |
Promisec Ltd. |
Method and device for questioning a plurality of computerized devices
|
US8635690B2
(en)
|
2004-11-05 |
2014-01-21 |
Mcafee, Inc. |
Reputation based message processing
|
US7565686B1
(en)
|
2004-11-08 |
2009-07-21 |
Symantec Corporation |
Preventing unauthorized loading of late binding code into a process
|
US7698744B2
(en)
|
2004-12-03 |
2010-04-13 |
Whitecell Software Inc. |
Secure system for allowing the execution of authorized computer program code
|
US7810158B2
(en)
*
|
2004-12-16 |
2010-10-05 |
At&T Intellectual Property I, L.P. |
Methods and systems for deceptively trapping electronic worms
|
US8104086B1
(en)
|
2005-03-03 |
2012-01-24 |
Symantec Corporation |
Heuristically detecting spyware/adware registry activity
|
US8046834B2
(en)
*
|
2005-03-30 |
2011-10-25 |
Alcatel Lucent |
Method of polymorphic detection
|
US7571476B2
(en)
*
|
2005-04-14 |
2009-08-04 |
Webroot Software, Inc. |
System and method for scanning memory for pestware
|
US7349931B2
(en)
*
|
2005-04-14 |
2008-03-25 |
Webroot Software, Inc. |
System and method for scanning obfuscated files for pestware
|
US7591016B2
(en)
*
|
2005-04-14 |
2009-09-15 |
Webroot Software, Inc. |
System and method for scanning memory for pestware offset signatures
|
US7937480B2
(en)
|
2005-06-02 |
2011-05-03 |
Mcafee, Inc. |
Aggregation of reputation data
|
US8272058B2
(en)
|
2005-07-29 |
2012-09-18 |
Bit 9, Inc. |
Centralized timed analysis in a network security system
|
US7895651B2
(en)
|
2005-07-29 |
2011-02-22 |
Bit 9, Inc. |
Content tracking in a network security system
|
US8984636B2
(en)
|
2005-07-29 |
2015-03-17 |
Bit9, Inc. |
Content extractor and analysis system
|
WO2007022454A2
(en)
|
2005-08-18 |
2007-02-22 |
The Trustees Of Columbia University In The City Of New York |
Systems, methods, and media protecting a digital data processing device from attack
|
EP1952240A2
(de)
|
2005-10-25 |
2008-08-06 |
The Trustees of Columbia University in the City of New York |
Verfahren, medien und systeme zum detektieren anomaler programmausführungen
|
US7996898B2
(en)
*
|
2005-10-25 |
2011-08-09 |
Webroot Software, Inc. |
System and method for monitoring events on a computer to reduce false positive indication of pestware
|
US20070094726A1
(en)
*
|
2005-10-26 |
2007-04-26 |
Wilson Michael C |
System and method for neutralizing pestware that is loaded by a desirable process
|
US9286469B2
(en)
*
|
2005-12-16 |
2016-03-15 |
Cisco Technology, Inc. |
Methods and apparatus providing computer and network security utilizing probabilistic signature generation
|
US8413245B2
(en)
*
|
2005-12-16 |
2013-04-02 |
Cisco Technology, Inc. |
Methods and apparatus providing computer and network security for polymorphic attacks
|
US8495743B2
(en)
*
|
2005-12-16 |
2013-07-23 |
Cisco Technology, Inc. |
Methods and apparatus providing automatic signature generation and enforcement
|
US7882560B2
(en)
*
|
2005-12-16 |
2011-02-01 |
Cisco Technology, Inc. |
Methods and apparatus providing computer and network security utilizing probabilistic policy reposturing
|
US8255992B2
(en)
*
|
2006-01-18 |
2012-08-28 |
Webroot Inc. |
Method and system for detecting dependent pestware objects on a computer
|
US8418245B2
(en)
*
|
2006-01-18 |
2013-04-09 |
Webroot Inc. |
Method and system for detecting obfuscatory pestware in a computer memory
|
EP2035948B1
(de)
*
|
2006-06-27 |
2016-04-13 |
Waterfall Security Solutions Ltd. |
Unidirektionale sichere verbindungen zu und von einem sicherheitsengines
|
US8239915B1
(en)
|
2006-06-30 |
2012-08-07 |
Symantec Corporation |
Endpoint management using trust rating data
|
US20080016573A1
(en)
*
|
2006-07-13 |
2008-01-17 |
Aladdin Knowledge System Ltd. |
Method for detecting computer viruses
|
US8190868B2
(en)
|
2006-08-07 |
2012-05-29 |
Webroot Inc. |
Malware management through kernel detection
|
IL177756A
(en)
*
|
2006-08-29 |
2014-11-30 |
Lior Frenkel |
Encryption-based protection against attacks
|
WO2008055156A2
(en)
|
2006-10-30 |
2008-05-08 |
The Trustees Of Columbia University In The City Of New York |
Methods, media, and systems for detecting an anomalous sequence of function calls
|
IL180748A
(en)
*
|
2007-01-16 |
2013-03-24 |
Waterfall Security Solutions Ltd |
Secure archive
|
US8179798B2
(en)
|
2007-01-24 |
2012-05-15 |
Mcafee, Inc. |
Reputation based connection throttling
|
US7949716B2
(en)
|
2007-01-24 |
2011-05-24 |
Mcafee, Inc. |
Correlation and analysis of entity attributes
|
US8763114B2
(en)
|
2007-01-24 |
2014-06-24 |
Mcafee, Inc. |
Detecting image spam
|
US8214497B2
(en)
|
2007-01-24 |
2012-07-03 |
Mcafee, Inc. |
Multi-dimensional reputation scoring
|
US7779156B2
(en)
|
2007-01-24 |
2010-08-17 |
Mcafee, Inc. |
Reputation based load balancing
|
US7797743B2
(en)
*
|
2007-02-26 |
2010-09-14 |
Microsoft Corporation |
File conversion in restricted process
|
US8856782B2
(en)
|
2007-03-01 |
2014-10-07 |
George Mason Research Foundation, Inc. |
On-demand disposable virtual work system
|
US8321936B1
(en)
|
2007-05-30 |
2012-11-27 |
M86 Security, Inc. |
System and method for malicious software detection in multiple protocols
|
US20080307397A1
(en)
*
|
2007-06-08 |
2008-12-11 |
Bill Angell |
Program Analysis by Partial Emulation
|
US8286246B2
(en)
*
|
2007-08-10 |
2012-10-09 |
Fortinet, Inc. |
Circuits and methods for efficient data transfer in a virus co-processing system
|
US9100319B2
(en)
|
2007-08-10 |
2015-08-04 |
Fortinet, Inc. |
Context-aware pattern matching accelerator
|
US8375449B1
(en)
|
2007-08-10 |
2013-02-12 |
Fortinet, Inc. |
Circuits and methods for operating a virus co-processor
|
US8079084B1
(en)
|
2007-08-10 |
2011-12-13 |
Fortinet, Inc. |
Virus co-processor instructions and methods for using such
|
US8082584B1
(en)
*
|
2007-10-16 |
2011-12-20 |
Mcafee, Inc. |
System, method, and computer program product for conditionally performing a scan on data based on an associated data structure
|
US8223205B2
(en)
|
2007-10-24 |
2012-07-17 |
Waterfall Solutions Ltd. |
Secure implementation of network-based sensors
|
US8185930B2
(en)
|
2007-11-06 |
2012-05-22 |
Mcafee, Inc. |
Adjusting filter or classification control settings
|
US8045458B2
(en)
|
2007-11-08 |
2011-10-25 |
Mcafee, Inc. |
Prioritizing network traffic
|
US8160975B2
(en)
|
2008-01-25 |
2012-04-17 |
Mcafee, Inc. |
Granular support vector machine with random granularity
|
US8589503B2
(en)
|
2008-04-04 |
2013-11-19 |
Mcafee, Inc. |
Prioritizing network traffic
|
US9098698B2
(en)
|
2008-09-12 |
2015-08-04 |
George Mason Research Foundation, Inc. |
Methods and apparatus for application isolation
|
GB0822619D0
(en)
*
|
2008-12-11 |
2009-01-21 |
Scansafe Ltd |
Malware detection
|
US11489857B2
(en)
|
2009-04-21 |
2022-11-01 |
Webroot Inc. |
System and method for developing a risk profile for an internet resource
|
US8839422B2
(en)
|
2009-06-30 |
2014-09-16 |
George Mason Research Foundation, Inc. |
Virtual browsing environment
|
US8621638B2
(en)
|
2010-05-14 |
2013-12-31 |
Mcafee, Inc. |
Systems and methods for classification of messaging entities
|
EP2492833A1
(de)
*
|
2011-02-28 |
2012-08-29 |
British Telecommunications Public Limited Company |
Verfahren und Vorrichtung zur Erkennung schädlicher Software
|
JP2014526751A
(ja)
|
2011-09-15 |
2014-10-06 |
ザ・トラスティーズ・オブ・コロンビア・ユニバーシティ・イン・ザ・シティ・オブ・ニューヨーク |
リターン指向プログラミングのペイロードを検出するためのシステム、方法、および、非一時的コンピュータ可読媒体
|
US9081959B2
(en)
|
2011-12-02 |
2015-07-14 |
Invincea, Inc. |
Methods and apparatus for control and detection of malicious content using a sandbox environment
|
US8510841B2
(en)
*
|
2011-12-06 |
2013-08-13 |
Raytheon Company |
Detecting malware using patterns
|
US9384349B2
(en)
*
|
2012-05-21 |
2016-07-05 |
Mcafee, Inc. |
Negative light-weight rules
|
US9635037B2
(en)
|
2012-09-06 |
2017-04-25 |
Waterfall Security Solutions Ltd. |
Remote control of secure installations
|
US10127379B2
(en)
|
2013-03-13 |
2018-11-13 |
Mcafee, Llc |
Profiling code execution
|
US9419975B2
(en)
|
2013-04-22 |
2016-08-16 |
Waterfall Security Solutions Ltd. |
Bi-directional communication over a one-way link
|
RU2606559C1
(ru)
|
2015-10-22 |
2017-01-10 |
Акционерное общество "Лаборатория Касперского" |
Система и способ оптимизации антивирусной проверки файлов
|