US8578345B1
|
|
Malware detection efficacy by identifying installation and uninstallation scenarios
|
US2011055123A1
|
|
Systems and methods for using multiple in-line heuristics to reduce false positives
|
US8635171B1
|
|
Systems and methods for reducing false positives produced by heuristics
|
US2010162395A1
|
|
Methods and systems for detecting malware
|
US8205263B1
|
|
Systems and methods for identifying an executable file obfuscated by an unknown obfuscator program
|
US8209757B1
|
|
Direct call into system DLL detection system and method
|
US9135442B1
|
|
Methods and systems for detecting obfuscated executables
|
US8176554B1
|
|
Malware detection through symbol whitelisting
|
US8065734B1
|
|
Code module operating system (OS) interactions intercepting system and method
|
US2009089814A1
|
|
Methods and systems for configuring a specific-use computing system limited to executing predetermined and pre-approved application programs
|
US9098706B1
|
|
Installer trust chain validation
|
US8104086B1
|
|
Heuristically detecting spyware/adware registry activity
|
GB9809402D0
|
|
Golf shoe spike protector
|