1. 8,429,745 Systems and methods for data loss prevention on mobile computing systems, Casaburi

  2. 8,321,942 Selecting malware signatures based on malware diversity, Chieuh

  3. 8,312,537 Reputation based identification of false positive malware detections, Nachenberg

  4. 8,312,536 Hygiene-based computer security, Nachenberg

  5. 8,296,848 Control flow redirection and analysis for detecting vulnerability exploitation, Griffin

  6. 8,291,497 Systems and methods for byte-level context diversity-based automatic malware signature generation, Griffin

  7. 8,239,948 Selecting malware signatures to reduce false-positive detections, Griffin

  8. 8,239,944 Reducing malware signature set size through server-side processing, Nachenberg

  9. 8,214,365 Measuring confidence of file clustering and clustering based file classification, Manadhata

  10. 8,037,529 Buffer overflow vulnerability detection and patch generation system and method, Chiueh

  11. 8,028,338 Modeling goodware characteristics to reduce false positive malware signatures, Schneider

  12. 7,962,961 Responding to detected application vulnerability exploits, Griffin

  13. 7,774,470 Load balancing using a distributed hash, Sanders

  14. 6,008,820 Processor for controlling the display of rendered image layers and method for controlling same, Chauvin

  15. 6,005,582 Method and system for texture mapping images with anisotropic filtering , Gabriel

  16. 5,990,904 Method and system for merging pixel fragments in a graphics rendering system, Griffin

  17. 5,886,701 Graphics rendering device and method for operating same, Griffin

  18. 5,880,737 Method and system for accessing texture data in environments with high latency in a graphics rendering system, Griffin

  19. 5,864,342 Method and system for rendering graphical objects to image chunks, Griffin