8,429,745 Systems and methods for data loss prevention on mobile computing systems, Casaburi
8,321,942 Selecting malware signatures based on malware diversity, Chieuh
8,312,537 Reputation based identification of false positive malware detections, Nachenberg
8,312,536 Hygiene-based computer security, Nachenberg
8,296,848 Control flow redirection and analysis for detecting vulnerability exploitation, Griffin
8,291,497 Systems and methods for byte-level context diversity-based automatic malware signature generation, Griffin
8,239,948 Selecting malware signatures to reduce false-positive detections, Griffin
8,239,944 Reducing malware signature set size through server-side processing, Nachenberg
8,214,365 Measuring confidence of file clustering and clustering based file classification, Manadhata
8,037,529 Buffer overflow vulnerability detection and patch generation system and method, Chiueh
8,028,338 Modeling goodware characteristics to reduce false positive malware signatures, Schneider
7,962,961 Responding to detected application vulnerability exploits, Griffin
7,774,470 Load balancing using a distributed hash, Sanders
6,008,820 Processor for controlling the display of rendered image layers and method for controlling same, Chauvin
6,005,582 Method and system for texture mapping images with anisotropic filtering , Gabriel
5,990,904 Method and system for merging pixel fragments in a graphics rendering system, Griffin
5,886,701 Graphics rendering device and method for operating same, Griffin
5,880,737 Method and system for accessing texture data in environments with high latency in a graphics rendering system, Griffin
5,864,342 Method and system for rendering graphical objects to image chunks, Griffin