Match Document Document Title
9306960 Systems and methods for unauthorized activity defense  
A computer worm defense system comprises multiple containment systems tied together by a management system. Each containment system is deployed on a separate communication network and contains a...
9106478 System, method and computer program product for scanning portions of data  
A scanning system, method and computer program product are provided. In use, portions of data are scanned. Further, access to a scanned portion of the data is allowed during scanning of another...
9043907 System and methods for control of applications using preliminary file filtering  
Disclosed are systems, methods and computer program products for control of applications using preliminary file filtering. An example method includes intercepting, by a processor, an operation on...
9043902 Apparatus for controlling processor execution in a secure environment  
Various embodiments described herein relate to apparatus for executing software in a secure computing environment. A secure processor can be used and configured to request a context swap from a...
9043915 System and method for detecting malicious executable files based on similarity of their resources  
Disclosed are systems, methods and computer program products for detection of malicious executable files based on the similarity of various types of extractable resources of the executable files....
9043903 Kernel-level security agent  
A kernel-level security agent is described herein. The kernel-level security agent is configured to observe events, filter the observed events using configurable filters, route the filtered events...
9043904 Method and system for dynamic protocol decoding and analysis  
A method for dynamically decoding protocol data on a computer system is provided using a protocol decoder, which inspects and analyzes protocol data received by the computer system. A protocol...
9042252 Inter-packet interval prediction learning algorithm  
An appliance receives packets that are part of a flow pair, each packet sharing an application protocol. The appliance determines the application protocol of the packets by performing deep packet...
9043868 Network security appliance  
Methods, devices, and systems that may be used to secure networked devices are provided. One method includes receiving, at a security device, encrypted configuration data from a management server...
9043923 Virtual machine monitor (VMM) extension for time shared accelerator management and side-channel vulnerability prevention  
Technologies are presented for automatically generating accelerator code for datacenter users, detecting multiple hardware tenants with overlapping accelerator needs, and managing the accelerator...
9043909 System and method for incorporating quality-of-service and reputation in an intrusion detection and prevention system  
An intrusion prevention system includes a processor, processing engines, buffers that are associated with a different range of reputation scores, and a storage device having a database and an...
9043905 System and method for insider threat detection  
Described is a system for detecting insider threats in a network. In detecting the insider threat, the system receives data from the network relevant to network activity and extracts observable...
9043587 Computer security threat data collection and aggregation with user privacy protection  
An endpoint computer in an enterprise network is configured to detect computer security threat events, such as presence of a computer virus. Upon detection of a threat event, the endpoint computer...
9043906 System and method for preventing operation of undetected malware loaded onto a computing device  
Methods and devices for protecting computing devices against the effects of surreptitiously loaded machine language programs from a malware source. The user defines a pattern of disruption of the...
9037854 Privileged cryptographic services in a virtualized environment  
A privileged cryptographic service is described, such as a service running in system management mode (SMM). The privileged service is operable to store and manage cryptographic keys and/or other...
9038186 Malware detection using file names  
Descriptions of files detected at endpoints are submitted to a security server. The descriptions describe the names of the files and unique identifiers of the files. The security server uses the...
9038176 System and method for below-operating system trapping and securing loading of code into memory  
A system for protecting an electronic device against malware includes a memory, an operating system configured to execute on the electronic device, and a below-operating-system security agent. The...
9038180 Using new edges for anomaly detection in computer networks  
Creation of new edges in a network may be used as an indication of a potential attack on the network. Historical data of a frequency with which nodes in a network create and receive new edges may...
9038174 Resisting the spread of unwanted code and data  
A method of processing an electronic file by identifying portions of content data in the electronic file and determining if each portion of content data is passive content data having a fixed...
9037729 SIP server overload control  
There is provided a system, method and computer program product for managing network communications to a Session Initiation Protocol (SIP) server. In the system, a packet limiter receives packets...
9038173 System and method for providing network security  
A method includes receiving an indication of at least one detected security issue at a network device. The indication is received at a security manager processor from a security agent. The method...
9038172 Robust anomaly detection and regularized domain adaptation of classifiers with application to internet packet-flows  
Sound, robust methods identify the most suitable, parsimonious set of tests to use with respect to prioritized, sequential anomaly detection in a collected batch of sample data. While the focus is...
9038175 Providing an automatic electronic fraud network data quality feedback loop  
Methods, apparatus and articles of manufacture for providing an automatic electronic fraud network data quality feedback loop are provided herein. A method includes evaluating an item of input...
9038177 Method and system for implementing multi-level data fusion  
An embodiment of the present invention involves a computer implemented method and system for implementing data fusion comprising aggregating data from a plurality of sources via one or more...
9038179 Secure code verification enforcement in a trusted computing device  
Secure code verification enforcement in a trusted computing device, including: examining, by a secure code validation module, a trusted computing device that is locked in a powered down state in...
9038170 Logging access system events  
A system is disclosed that logs access system events. When an access system event occurs, a log entry is created for the access system event. Information from an identity profile is stored in the...
9038187 Insider threat correlation tool  
Systems and methods for calculating threat scores for individuals within an organization or domain are provided. Aspects of the invention relate to computer-implemented methods that form a...
9038171 Visual display of website trustworthiness to a user  
Website trustworthiness is automatically displayed to a user by pre-establishing a user-defined good list identifying one or more known good website addresses. Each known good website address in...
9037872 Hardware based return pointer encryption  
A processor, a method and a computer-readable storage medium for encrypting a return address are provided. The processor comprises hardware logic configured to encrypt an instruction pointer and...
9032536 System and method for incapacitating a hardware keylogger  
A system, device and method for incapacitating a keylogger. An inactivity of an input device may be detected. A flow of information from an input device to a computing device may be manipulated. A...
9032514 Potential data leakage reporting system, method, and computer program product  
A reporting system, method, and computer program product are provided with respect to occurrences of potential data leakage. In use, a plurality of occurrences of potential data leakage is...
9032520 Remote security self-assessment framework  
A system for security self-assessment for a computer platform. The system comprises a memory, a processor, and an application stored in the memory. When executed by the processor, the application...
9032503 Diversity string based pattern matching  
Diversity string based pattern matching is disclosed. In one embodiment, a method for inspecting multiple data patterns in a data block includes scanning the data block for a diversity string of...
9032515 Method for detecting attacks to multimedia systems and multimedia system with attack detection functionality  
A method for detecting attacks to multimedia systems, wherein a communication path (1) is established within the multimedia system by a multimedia communication flow between a communication source...
9032516 System and method for detecting malicious script  
Provided are a system and method for detecting a malicious script. The system includes a script decomposition module for decomposing a web page into scripts, a static analysis module for...
9032546 Enforcing conditions of use associated with disparate data sets  
Techniques are described herein that are capable of enforcing conditions of use associated with disparate data sets. For example, content may be published. Conditions of use that are associated...
9032518 Internet monitoring and alerting system  
A monitoring and alerting system for detecting a disruptive event on the Internet includes a data collection and wrapping module configured to process input data that includes messages produced by...
9032502 System and method for distributed multi-processing security gateway  
A system and method for a distributed multi-processing security gateway establishes a host side session, selects a proxy network address for a server based on network information, and using the...
9032529 Detecting vulnerabilities in web applications  
A method, computer program product, and system for detecting vulnerabilities in web applications is described. A method may comprise determining one or more values associated with a web...
9032521 Adaptive cyber-security analytics  
Performing adaptive cyber-security analytics including a computer implemented method that includes receiving a report on a network activity. A score responsive to the network activity and to a...
9032519 Protecting websites from cross-site scripting  
Methods and systems for protecting websites from cross-site scripting are disclosed. A request for a web page comprising a web page element is received from a client. It is determined if the web...
9031536 Method for mitigating the unauthorized use of a device  
The invention is directed to systems and methods for detecting the loss, theft or unauthorized use of a device and/or altering the functionality of the device in response. In one embodiment, a...
9032525 System and method for below-operating system trapping of driver filter attachment  
A system for protecting an electronic system against malware includes an operating system configured to execute on the electronic device, a driver coupled to the operating system, and a...
9032530 Correcting workflow security vulnerabilities via static analysis and virtual patching  
A computer program can be statically analyzed to determine an order in which client side workflows are intended to be implemented by the computer program. A virtual patch can be generated. When...
9032517 Malicious code detection  
A device includes a pipeline and a detector that are both implemented at least in hardware. Data is moved through the pipeline to perform processing of the data unrelated to detection of malicious...
9026720 Non-volatile memory monitoring  
The invention provides a technique for managing write operations issued to a non-volatile memory included in a wireless device. A monitor software application executes on the wireless device and...
9027128 Automatic identification of malicious budget codes and compromised websites that are employed in phishing attacks  
Uniform resource locators (URLs) that include strings matching known malicious budget codes are deemed to be malicious URLs. Compromised websites and compromised IP addresses are identified from...
9027121 Method and system for creating a record for one or more computer security incidents  
A security management system can log, investigate, respond, and track computer security incidents that can occur in a networked computer system. In other words, the security management system can...
9027127 Methods for detecting machine-generated attacks based on the IP address size  
A system and method is disclosed for affecting action associated with machine-generated traffic. First historical information associated with Internet traffic to an Internet service at a first...
9027120 Hierarchical architecture in a network security system  
A network security system having a hierarchical configuration is provided. In one embodiment the present invention includes a plurality of subsystems, where each subsystem includes a plurality of...