Forensic analysis of computing activity

B Ladnai, MD Harris, AJ Thomas, AGP Smith… - US Patent …, 2018 - Google Patents
A data recorder stores endpoint activity on an ongoing basis as sequences of events that
causally relate computer objects such as processes and files. When a security event is …

Behavior profiling for malware detection

W Huang, MJ Idle - US Patent 9,734,332, 2017 - Google Patents
Provided herein are systems and methods for behavior profiling of targets to determine
malware presence. The method includes, in various embodiments, applying a domain …

Endpoint malware detection using an event graph

B Ladnai, MD Harris, AJ Thomas, AGP Smith… - US Patent …, 2018 - Google Patents
A data recorder stores endpoint activity on an ongoing basis as sequences of events that
causally relate computer objects such as processes and files, and patterns within this event …

Modifying web page code to include code to protect output

MSS Ng, A Munoz, O Mirosh - US Patent 10,678,910, 2020 - Google Patents
Examples disclosed herein relate to modifying a web page. In one example, in response to
beginning execution of a process initiating generation of a web page of a web application at …

Security risk identification in a secure software lifecycle

N Bhalla, RK Sethi, R Sivaranjan, E Foroughi… - US Patent …, 2020 - Google Patents
A system and method for security risk identification in a secure software lifecycle. A
knowledge database has a plurality of security elements which are identified for a particular …

Model checking for distributed application validation

L Miao, P Song, L Zhang, MG Tarta - US Patent 9,092,561, 2015 - Google Patents
BACKGROUND The complexity of distributed systems and their testing mechanisms have
been widely explored for many years. There are many challenges inherent in distributed …

Web application exploit mitigation in an information technology environment

A Patel, T Aboualy - US Patent 8,572,750, 2013 - Google Patents
BACKGROUND A web application is a software application coded in a browser-supported
language (such as HTML, JavaScript, Java, and/or other languages). The web application is …

Security systems and methods to reduce data leaks in enterprise networks

AV Ramachandran, YH Mundada, MMB Tariq… - US Patent …, 2014 - Google Patents
Disclosed are embodiments of a security system for reducing data leaks by checking
information flows between resources of a network. When an information flow is attempted …

Endpoint malware detection using an event graph

B Ladnai, MD Harris, AJ Thomas, AGP Smith… - US Patent …, 2020 - Google Patents
A data recorder stores endpoint activity on an ongoing basis as sequences of events that
causally relate computer objects such as processes and files, and patterns within this event …

Automated tools for building secure software programs

MM Archer, CL Heitmeyer, EI Leonard… - US Patent …, 2016 - Google Patents
(57) ABSTRACT A computer implemented tool is described that includes an assertion
generator module that can automatically generate assertions, which are usable to Verify …