Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity; Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
SECURITY FOR BINARY SOFTWARE DISTRIBUTIONS
#2CERTIFICATE BASED PROFILE CONFIRMATION
#3METHOD AND SYSTEM FOR FREEDOM FROM INTERFERENCE (FFI)
#4ADVERSE OR MALICIOUS INPUT MITIGATION FOR LARGE LANGUAGE MODELS
#5FINGERPRINTING TECHNIQUES TO SUPPORT FILE HASH GENERATION
#6MULTI-DIMENSIONAL MALWARE ANALYSIS
#7SYSTEM AND METHOD FOR IDENTIFYING INFORMATION SECURITY THREATS
#8CIRCUIT AND METHOD FOR PROTECTING AN APPLICATION AGAINST A SIDE CHANNEL ATTACK
#9METHOD FOR HANDLING THE EXECUTION OF AN APPLET FUNCTION, AND CORRESPONDING LOADING METHOD
#10ELECTRONIC CONTROL DEVICE
#11Complex Application Attack Quantification, Testing, Detection and Prevention
#12FUNCTION ALLOCATION CONTROL APPARATUS, FUNCTION ALLOCATION CONTROL METHOD AND PROGRAM
#13MANAGEMENT APPARATUS, CONTROL METHOD OF MANAGEMENT APPARATUS, AND STORAGE MEDIUM
#14CONTAINER-BASED TASK EXECUTION METHOD AND APPARATUS
#15APPLICATION PROGRAMMING INTERFACE FOR AUTOMATED OPERATIONS MANAGEMENT
#16METHOD AND APPARATUS FOR DETECTING MALWARE VIA ANALYSIS OF A SCREEN CAPTURE
#17DYNAMIC CLOUD CONFIGURATION CHANGES BASED ON ADVANCED PERSISTENT THREAT DETECTION
#18DETECTING STACK PIVOTS USING STACK ARTIFACT VERIFICATION
#19UNLOCKABLE CONTENT CREATION PORTAL
#20SECURE INITIAL PROGRAM LOAD (IPL) CODE LOADING ATTRIBUTES FACILITY
#21SYSTEMS AND METHODS FOR EVENT-BASED APPLICATION CONTROL
#22ENABLING RUNTIME OBSERVABILITY FOR APPLICATIONS HOSTED IN A SECURE WORKSPACE
#23AUTOMATED SECURITY POLICY GENERATION FOR CONTROLLERS
#24Detecting and Preventing Installation and Execution of Malicious Browser Extensions
#25DETECTING RANSOMWARE IN MONITORED DATA
#26INTERNET ACCESS SYSTEMS AND METHODS INVOLVING INTEGRATED SECURITY FEATURES
#27SYSTEMS AND METHODS FOR SUBORDINATE WORKSPACES
#28CLASSIFYING CYBERSECURITY THREATS USING MACHINE LEARNING ON NON-EUCLIDEAN DATA
#29MITIGATING POINTER AUTHENTICATION CODE (PAC) ATTACKS IN PROCESSOR-BASED DEVICES
#30SECURITY INTENTS AND TRUST COORDINATION FOR CLOUD NATIVE WORKLOADS
#31NESTED ISOLATION HOST VIRTUAL MACHINE
#32SYSTEM FOR SECURE AND RELIABLE NODE LIFECYCLE IN ELASTIC WORKLOADS
#33DIAGNOSTIC ONLINE RESULT ASSESSMENT (DORA) IN A CLOUD ENVIRONMENT
#34ELECTRONIC SYSTEM AND SECURITY AUTHORITY DELEGATION METHOD THEREOF
#35SYSTEMS AND METHODS FOR CONTEXTUAL ALERT ENRICHMENT IN COMPUTING INFRASTRUCTURE AND REMEDIATION THEREOF
#36METHOD FOR CONTROL FLOW ISOLATION WITH PROTECTION KEYS AND INDIRECT BRANCH TRACKING
#37COMBINED PROTECTION OF SYMMETRIC-KEY PRIMITIVES AGAINST SIDE-CHANNEL AND FAULT ATTACKS
#38FAULT-ATTACK ANALYSIS DEVICE AND METHOD
#39SECURITY DETECTING METHOD AND APPARATUS, AND DEVICE
#40BMC BASED HROT IMPLEMENTATION ESTABLISHING CHAIN OF TRUST IN A SECURED SERVER SYSTEM
#41METHOD FOR REPROGRAM WITH ENHANCED SECURITY
#42Automatic Generation of Production Security Controls from a Testing Collaboration Platform
#43METHOD AND A SYSTEM FOR DETECTING MALWARE ACTIVITY IN A .NET PLATFORM
#44AUTOMATED COLLECTION OF FORENSIC DATA FROM AN EXPLOIT WITHOUT THE USE OF A HONEY TRAP
#45SYSTEM AND METHOD FOR AUTO REPAIRING VULNERABLE CODE PROGRAM FRAGMENTS OF A SOFTWARE
#46SHIM BASED SECURE MODULE ACCESS
#47PROGRAM FILE MEASUREMENTS FOR CONTEXT-SPECIFIC VALIDATION
#48VULNERABILITY ANALYSIS OF A COMPUTER DRIVER
#49DYNAMIC HARDWARE INTEGRITY AND/OR REPLAY PROTECTION
#50SYSTEM AND METHOD OF HIDING SECURITY SENSITIVE FEATURES IN UNTRUSTED ENVIRONMENTS
#51SYSTEMS AND METHODS FOR EXECUTABLE CODE DETECTION, AUTOMATIC FEATURE EXTRACTION AND POSITION INDEPENDENT CODE DETECTION
#52Security Against Physical Keystroke Simulation
#53THREAT DETECTION USING A MEASURED STORAGE DEVICE
#54Data Processing Method and Related Apparatus
#55KERNEL-BASED PROTECTION OF COMPUTER PROCESSES
#56SELECTIVE IMPORT/EXPORT ADDRESS TABLE FILTERING
#57PRESERVING DLL HOOKS
#58Control Device, Unauthorized Command Detection Method, and Program
#59DEVICE RISK-BASED TRUSTED DEVICE VERIFICATION AND REMOTE ACCESS PROCESSING SYSTEM
#60METHOD AND SYSTEM FOR VERIFYING QUICK RESPONSE CODES
#61MANAGING AND CLASSIFYING COMPUTER PROCESSES
#62APPARATUS AND METHOD FOR INJECTING CONTROL FLOW INTEGRITY SECURITY CODE BASED ON LOCATION
#63SYSTEM AND METHOD FOR AUTOMATED SECURITY TOOL INTEGRATION
#64METHOD AND MODULE FOR INSTALLING A MITIGATION PROGRAM IN THE KERNEL OF A COMPUTING DEVICE
#65SUPPORTING SECURE WORKSPACES IN HETEROGENOUS ENVIRONMENTS
#66SECURE PEER-TO-PEER FILE DISTRIBUTION IN AN ENTERPRISE ENVIRONMENT
#67INSTRUMENTING OBSERVABILITY CONTROLS
#68ENDPOINT INCIDENT RESPONSE FROM A SECURE ENCLAVE THROUGH DYNAMIC INSERTION OF AN INTERRUPT
#69SYSTEM AND METHOD FOR COLLABORATIVE SMART EVIDENCE GATHERING AND INVESTIGATION FOR INCIDENT RESPONSE, ATTACK SURFACE MANAGEMENT, AND FORENSICS IN A COMPUTING ENVIRONMENT
#70INTELLIGENT OBFUSCATION OF MOBILE APPLICATIONS
#71END-TO-END DISTRIBUTED RECOVERY OF A USER COMPUTING DEVICE ON WHICH SECURE WORKSPACES ARE DEPLOYED
#72AUTOMATED GENERATION OF LABELED TRAINING DATA
#73DIAGNOSTIC ONLINE RESULT ASSESSMENT (DORA) IN A CLOUD ENVIRONMENT
#74STEALTHY PROCESS ATTACK DETECTION FOR AUTOMATED MANUFACTURING
#75ELECTRONIC SYSTEM AND SECURITY AUTHORITY DELEGATION METHOD THEREOF
#76SYSTEMS AND METHODS FOR CONTEXTUAL ALERT ENRICHMENT IN COMPUTING INFRASTRUCTURE AND REMEDIATION THEREOF
#77SYSTEMS AND METHODS FOR PREDICTING WHICH SOFTWARE VULNERABILITIES WILL BE EXPLOITED BY MALICIOUS HACKERS TO PRIORITIZE FOR PATCHING
#78TECHNIQUES FOR DATA CLASSIFICATION AND FOR PROTECTING CLOUD ENVIRONMENTS FROM CYBERSECURITY THREATS USING DATA CLASSIFICATION
#79SYSTEMS AND METHODS FOR HARD DELETION OF DATA ACROSS SYSTEMS
#80FIRMWARE GUARD EXTENSION WITH CONVERGED DEFENSE ENGINE
#81SCANNING OF PARTIAL DOWNLOADS
#82SECURITY PROCESSING DEVICE, METHOD AND ELECTRONIC DEVICE FOR HANDLING ATTACKS
#83HUMAN INTERFACE DEVICE FIREWALL
#84DEPLOYING ENCLAVES ON DIFFERENT TEE BACKENDS USING A UNIVERSAL ENCLAVE BINARY
#85Systems and Methods For Protecting Against Malware Attacks
#86METHOD AND APPARATUS FOR ATTESTATION
#87SYSTEMS, METHODS, AND MEDIA FOR PROTECTING APPLICATION PROGRAMMING INTERFACES
#88Mechanism To Secure An Execution Environment In Processor Cores
#89INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM
#90COMPUTER IMPLEMENTED METHOD
#91SOFTWARE INTEGRITY CHECKING SYSTEMS AND METHODS
#92DISABLING FUNCTIONALITY OF AN AUTO-CHECKOUT CLIENT APPLICATION BASED ON ANOMALOUS USER BEHAVIOR
#93MAYA: A HARDWARE-BASED CYBER-DECEPTION FRAMEWORK TO COMBAT MALWARE
#94MITIGATING POINTER AUTHENTICATION CODE (PAC) ATTACKS IN PROCESSOR-BASED DEVICES
#95A METHOD AND SYSTEM FOR LOSSY COMPRESSION OF LOG FILES OF DATA
#96ATTACK DETECTION METHOD, ATTACK RESPONSE METHOD, AND STORAGE DEVICE
#97APPARATUS FOR REINFORCING SECURITY OF MOBILE TRUSTED EXECUTION ENVIRONMENT
#98Secure firewall configurations
#99MULTI-LAYERED GRAPH MODELING FOR SECURITY RISK ASSESSMENT
#100DETECTING A CURRENT ATTACK BASED ON SIGNATURE GENERATION TECHNIQUE IN A COMPUTERIZED ENVIRONMENT
#101SECURING A NEURAL NETWORK RUNTIME ENGINE
#102BACKUP PROTECTION SYSTEM AND METHOD
#103DATA STORAGE DEVICE PERFORMING DATA PROTECTION AND HOST DEVICE SUPPORTING A DATA PROTECTION FUNCTION USING A PROGRAM CONTEXT
#104SECURITY DEFENDING METHOD AND ELECTRONIC APPARATUS
#105SECURING REGISTERS ACROSS SECURITY ZONES
#106Systems and methods for causing nonpredictable environment states for exploit prevention and malicious code neutralization for javascript-enabled applications
#107APPARATUS AND METHOD FOR POWER VIRUS PROTECTION IN A PROCESSOR
#108CRYPTOGRAPHIC HASH CHAIN FOR VEHICLE CONFIGURATION VERIFICATION
#109METHODS AND SYSTEMS FOR HARDWARE AND FIRMWARE SECURITY MONITORING
#110Device, System, and Method for Protecting Machine Learning (ML) Units, Artificial Intelligence (AI) Units, Large Language Model (LLM) Units, and Deep Learning (DL) Units
#111CYBER THREAT INFORMATION PROCESSING APPARATUS, CYBER THREAT INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM STORING CYBER THREAT INFORMATION PROCESSING PROGRAM
#112CYBER THREAT INFORMATION PROCESSING APPARATUS, CYBER THREAT INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM STORING CYBER THREAT INFORMATION PROCESSING PROGRAM
#113Security Monitoring at Operating System Kernel Level
#114PROCESSOR AND MULTI-CORE PROCESSOR
#115SYSTEM ON CHIP AND OPERATION METHOD THEREOF
#116DISARMING MALWARE IN PROTECTED CONTENT
#117Methods and Systems for Analyzing Environment-Sensitive Malware with Coverage-Guided Fuzzing
#118FUNCTION POINTER PROTECTION
#119SYSTEMS AND METHODS FOR POLICY LINKING AND/OR LOADING FOR SECURE INITIALIZATION
#120SYSTEMS AND METHODS FOR MANAGEMENT OF DATA ANALYTICS PLATFORMS USING METADATA
#121WORKFLOWS FOR AUTOMATED OPERATIONS MANAGEMENT
#122Method for control flow isolation with protection keys and indirect branch tracking
#123SYSTEMS, METHODS, AND MEDIA FOR DEFENDING COMPUTING SYSTEMS FROM ATTACK
#124Flash Programming Randomization
#125BOOLEAN FUNCTION CONTROL GATES FOR SECURELY EXECUTING ON A PUBLIC COMPUTER CODE THAT OPERATES ON ENCRYPTED DATA
#126Systems, Methods and Devices for Memory Analysis and Visualization
#127SECURITY-ADAPTIVE CODE EXECUTION
#128PROCESSOR AND ATTACK DETECTION METHOD THEREOF
#129SECURELY BROKERING ACCESS TOKENS TO PARTIALLY TRUSTED CODE
#130PRE-OPERATING SYSTEM EMBEDDED CONTROLLER HARDENING BASED ON OPERATING SYSTEM SECURITY AWARENESS
#131CONTROL FLOW INTEGRITY ENFORCEMENT FOR APPLICATIONS RUNNING ON PLATFORMS
#132HIGHLY SCALABLE PERMISSIONED BLOCK CHAINS
#133METHOD AND APPARATUS FOR DETERMINING WHETHER A PROCESSING UNIT IS COMPLIANT WITH A SECURITY POLICY
#134INLINE CONTROL FLOW MONITOR WITH ENFORCEMENT
#135CONTROL FLOW DIRECTED GRAPH FOR USE WITH PROGRAM DISASSEMBLER
#136Secured communication protocol layer for authenticated hardware data access
#137METHOD FOR EVALUATING THE RISK OF RE-IDENTIFICATION OF ANONYMISED DATA
#138RESOURCE PROTECTION
#139EXECUTION PROTECTION USING DATA COLOURING
#140Computer System And Method For Distributed Privacy-Preserving Shared Execution Of One Or More Processes
#141Methods, Devices, and Systems for Control Flow Integrity
#142ANTIVIRUS SCANNING ARCHITECTURE FOR UPLOADED FILES
#143Privileged Firmware Mode Protection
#144CONTROL FLOW INTEGRITY TO PREVENT POTENTIAL LEAKAGE OF SENSITIVE DATA TO ADVERSARIES
#145SYSTEMS AND METHODS FOR FOLDER AND FILE SEQUESTRATION
#146CLOUD NATIVE VIRTUAL MACHINE RUNTIME PROTECTION
#147SYSTEMS AND METHODS FOR MANAGING STATE
#148SYSTEM AND METHOD FOR PERFORMING HIERARCHICAL AND INCREMENTAL WORKLOAD SCANNING
#149Pre-authorized virtualization engine for dynamic firmware measurement
#150Processor with In-Band Fault-Injection Detection in the Presence of Exceptions
#151UNIFIED LOGGING FOR OPERATING SYSTEMS AND CONNECTED EMBEDDED SYSTEMS
#152Workflows for automated operations management
#153TAMPER DETECTION FEATURE EMBEDDING DEVICE, TAMPER DETECTION FEATURE EMBEDDING METHOD, AND COMPUTER READABLE MEDIUM
#154SECURE FEATURE AND KEY MANAGEMENT IN INTEGRATED CIRCUITS
#155CRYPTOGRAPHICALLY SECURE DYNAMIC THIRD PARTY RESOURCES
#156SYSTEMS AND METHODS FOR FLUSH PLUS RELOAD CACHE SIDE-CHANNEL ATTACK MITIGATION
#157DYNAMIC RUNTIME MICRO-SEGMENTATION OF INTERPRETED LANGUAGES
#158Non-Intrusive Method of Detecting Security Flaws of a Computer Program
#159Online command injection attacks identification
#160System, Device, and Method of Transaction Verification Based on Auxiliary Signals and Modulations
#161DATA SECUREMENT LEVERAGING SECURE QR CODE SCANNER
#162System, Device, and Method of User Authentication and Transaction Verification
#163SECURE SMART NETWORK INTERFACE CONTROLLER FIRMWARE UPDATE
#164METHOD TO PREVENT ROOT LEVEL ACCESS ATTACK AND MEASURABLE SLA SECURITY AND COMPLIANCE PLATFORM
#165SYSTEM AND METHOD FOR CLIENT-SIDE REWRITING OF CODE INCLUDED IN A WEB PAGE
#166SYSTEM AND METHOD FOR INTERACTION OBJECT MANAGEMENT IN A BLOCKCHAIN ENVIRONMENT
#167SECURE BOOT UP OF COMPUTING DEVICES
#168RESTRICTED EXECUTION MODE FOR NETWORK-ACCESSIBLE DEVICES
#169PROGRAM PROCESSING DEVICE AND PROGRAM PROCESSING METHOD
#170Secure distributed execution of jobs
#171MONITORING AND AUDITING SECURE SOFTWARE BUILDS
#172PROVISIONING A SECURITY COMPONENT FROM A CLOUD HOST TO A GUEST VIRTUAL RESOURCE UNIT
#173Mitigating against a persistent consistent threat in a network device based on reducing temporal surface area
#174SYSTEMS AND METHODS FOR REMOTE DETECTION OF SOFTWARE THROUGH BROWSER WEBINJECTS
#175SYSTEM AND METHOD FOR TRANSITIONAL ISOLATION OF APPLICATIONS USING A WORKSPACE ENVIRONMENT
#176STATEFUL MICROSERVICE-AWARE INTRUSION DETECTION
#177SYSTEMS AND METHODS FOR CYBERSECURITY ALERT DEDUPLICATION, GROUPING, AND PRIORITIZATION
#178MICROPROCESSOR THAT PREVENTS STORE-TO-LOAD FORWARDING BETWEEN DIFFERENT TRANSLATION CONTEXTS
#179INLINE FRAME CONTENT DATA MANAGEMENT SYSTEM
#180Computer Security Systems and Methods Using Self-Supervised Consensus-Building Machine Learning
#181Systems and methods for storing and sharing transactional data using distributed computer systems
#182Computer-based systems configured for automated computer script analysis and malware detection and methods thereof
#183COMPUTER-IMPLEMENTED AUTOMATIC SECURITY METHODS AND SYSTEMS
#184Code modification for detecting abnormal activity
#185Method to prevent root level access attack and measurable SLA security and compliance platform
#186Ransomware Countermeasures
#187SYSTEM FOR ELECTRONIC DATA OBFUSCATION AND PROTECTION USING INDEPENDENT DESTRUCTIBLE DATA OBJECTS
#188Updating software elements with different trust levels
#189CYBER THREAT INFORMATION PROCESSING APPARATUS, CYBER THREAT INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM STORING CYBER THREAT INFORMATION PROCESSING PROGRAM
#190Selective import/export address table filtering
#191Process privilege escalation protection in a computing environment
#192Network bound encryption for recovery of trusted execution environments
#193SYSTEMS AND METHODS FOR SAFEGUARDING UPDATES TO A BASIC INPUT/OUTPUT SYSTEM OF AN INFORMATION HANDLING SYSTEM
#194Methods and systems for controlling access to at least one computer program
#195Secure inter-application communication with unmanaged applications using certificate enrollment
#196REMOTE COMMAND EXECUTION OVER AN AIR-GAP SECURED SYSTEM
#197COMPUTE SYSTEMS INCLUDING A SECURITY PROCESSOR
#198SYSTEM AND METHOD FOR STORING SYSTEM STATE DATA IN A HARDWARE REGISTER
#199ROW HAMMER INTERRUPTS TO THE OPERATING SYSTEM
#200Systems and methods for event-based application control
#201Systems and methods for proactive and reactive data security
#202Automatically performing varied security scans on distributed files using machine learning techniques
#203PREVENTION AND REMEDIATION OF MALWARE BASED ON SELECTIVE PRESENTATION OF FILES TO PROCESSES
#204MOBILE DEVICE WITH SECURE PRIVATE MEMORY
#205Method for detecting a fault injection in a data processing system
#206AUTOMATED PERSISTENT CONTEXT-AWARE DEVICE PROVISIONING
#207PLUG-IN MANAGEMENT IN VIRTUALIZED COMPUTING ENVIRONMENT
#208KEY DISTRIBUTION SYSTEM IN A SECURE ENCLAVE
#209MEMORY SCAN-BASED PROCESS MONITORING
#210RUNTIME FILTERING OF COMPUTER SYSTEM VULNERABILITIES
#211STACK PROTECTION
#212UTILIZING MACHINE-LEARNING MODELS TO DETERMINE TAKE-OVER SCORES AND INTELLIGENTLY SECURE DIGITAL ACCOUNT FEATURES
#213Unified workload runtime protection
#214Secure Display of Sensitive Content
#215SYSTEMS AND METHODS FOR VEHICLE CONFIGURATION VERIFICATION WITH FAILSAFE CODE
#216ITERATIVE BOOT QUEUE
#217SPAMMY APP DETECTION SYSTEMS AND METHODS
#218CONTROL INSTRUCTION PROCESSING METHOD, APPARATUS AND DEVICE, AND COMPUTER STORAGE MEDIUM
#219ENDPOINT ISOLATION AND INCIDENT RESPONSE FROM A SECURE ENCLAVE
#220METHOD AND APPARATUS FOR SECURING INDIRECT FUNCTION CALL
#221Virtual machines to install untrusted executable codes
#222APPLICATION IDENTITY ACCOUNT COMPROMISE DETECTION
#223DETECTING MICROSOFT WINDOWS INSTALLER MALWARE USING TEXT CLASSIFICATION MODELS
#224Method and system for freedom from interference (FFI)
#225PROTECTION OF CALL STACK
#226MULTI-PROCESSOR DEVICE WITH SECURE PROCESSOR-CONTROLLED ACCESS TO MEMORY
#227Liveness guarantees in secure enclaves using health tickets
#228Systems and methods for application integrated malicious behavior mitigation
#229Adaptive acceleration of transport layer security
#230SELECTIVE SECURITY SCAN TO REDUCE SIGNATURE CANDIDATES
#231Vulnerability analysis of a computer driver
#232OS-MANAGED BIOS MODULES
#233SOFTWARE ISOLATION USING EVENT DRIVEN MULTI-THREADING
#234Distributed digital security system
#235METHOD FOR APPLICATION SECURITY AND ELECTRONIC DEVICE FOR PERFORMING THE SAME
#236HARDWARE-BASED PROTECTION OF APPLICATION PROGRAMMING INTERFACE (API) KEYS
#237SQL PROXY ANALYZER TO DETECT AND PREVENT UNAUTHORIZED SQL QUERIES
#238Systems and methods for executable code detection, automatic feature extraction and position independent code detection
#239SECURELY EXPOSING AN ACCELERATOR TO PRIVILEGED SYSTEM COMPONENTS
#240METHOD FOR PROVIDING A CLIENT COMPUTER DEVICE WITH ACCESS TO A DATABASE MANAGEMENT SYSTEM
#241SECURE BASE ACTIVATION IMAGE FOR EDGE DAY ZERO SECURE INFRASTRUCTURE PROVISIONING
#242DETECTING SOFTWARE VULNERABILITIES IN A BINARY CODE
#243MEMORY SYSTEM VERIFICATION
#244TRIM CONFIGURATION OF ANALOG MODULES
#245SECURE EXECUTION OF SCRIPTS
#246High-throughput BPF map manipulations with uprobes
#247Securely redirecting system service routines
#248TRANSACTION PROCESS BETWEEN AN APPLICATION AND A DEVICE
#249PROTECTION AGAINST EXECUTING INJECTED MALICIOUS CODE
#250APPLICATION SECURITY THROUGH GLOBAL LOCKOUT AND CAPTURE
#251Automated operations management for computer systems
#252AUTOMATIC OBSCURATION OF A PORTION OF A SCREEN-SHARE VIEW
#253Forensic data collection and analysis utilizing function call stacks
#254SECURED EXECUTION CONTEXT DATA
#255Software integrity checking systems and methods
#256REFLECTION RUNTIME PROTECTION AND AUDITING SYSTEM
#257SECURE EXECUTION FOR MULTIPLE PROCESSOR DEVICES USING TRUSTED EXECUTING ENVIRONMENTS
#258SYSTEMS AND METHODS FOR IDENTIFYING MALICIOUS EVENTS USING DEVIATIONS IN USER ACTIVITY FOR ENHANCED NETWORK AND DATA SECURITY
#259APPARATUS AND METHOD FOR ROLE-BASED REGISTER PROTECTION FOR TDX-IO
#260MEMORY LAYOUT RANDOMIZATION SYSTEMS AND METHODS FOR DEFEATING TRANSLATION LOOKASIDE BUFFER (TLB) POISONING ATTACKS
#261Command classification using active learning
#262Obfuscated And Secured Computer-Executable Source Code
#263SYSTEMS AND METHODS FOR PREDICTING AND IDENTIFYING MALICIOUS EVENTS USING EVENT SEQUENCES FOR ENHANCED NETWORK AND DATA SECURITY
#264OBJECT INSPECTION VIA OPERATING SYSTEM SHARE FUNCTION
#265Systems and methods for causing nonpredictable environment states for exploit prevention and malicious code neutralization for JavaScript-enabled applications
#266TWO-LAYER SIDE-CHANNEL ATTACKS DETECTION METHOD AND DEVICES
#267MONITORING CODE PROVENANCE
#268Providing audio visual privacy controls
#269EXECUTABLE PASSING USING MAILBOX REGISTERS
#270LOGICAL RESOURCE PARTITIONING VIA REALM ISOLATION
#271Logging from user-defined functions
#272METHOD AND SYSTEM FOR SECURE BOOT AND RMA INTERVENTION
#273Systems and methods for exploit prevention and malicious code neutralization using non-predictable results for JavaScript-enabled applications
#274CODE MONITORING AND RESTRICTING OF EGRESS OPERATIONS
#275COMPUTING SYSTEMS EMPLOYING A SECURE BOOT PROCESSING SYSTEM THAT DISALLOWS INBOUND ACCESS WHEN PERFORMING IMMUTABLE BOOT-UP TASKS FOR ENHANCED SECURITY, AND RELATED METHODS
#276Systems and Methods for Self-Adapting Neutralization Against Cyber-Faults
#277RUNTIME-TAILORED SECURITY POLICIES FOR APPLICATIONS
#278Workflows for automated operations management
#279METHOD AND SYSTEM TO PERFORM A SECURE BOOT PROCEDURE USING A MULTI-STAGE SECURITY VERIFICATION IN A MICROCONTROLLER OF A VEHICLE
#280METHOD AND SYSTEM FOR PREVENTING AND DETECTING SECURITY THREATS
#281AUTOMATED SECURITY POLICY GENERATION FOR CONTROLLERS
#282Multi-dimensional malware analysis
#283Security scanning of image for virtual machine creation
#284ANALYSIS SYSTEM, METHOD, AND PROGRAM
#285Obtaining information for security configuration
#286Systems and methods for preventing zero-day attacks
#287PROACTIVELY PROTECTED PROCESSING SYSTEM AND METHOED FOR CYBERSECURITY
#288Method to implement traceability and provability in software development
#289Computer-based systems configured for automated computer script analysis and malware detection and methods thereof
#290First Detection of Potential Harmful Activities
#291Method and apparatus for detecting malware via analysis of a screen capture
#292Systems, methods, and media for defending computing systems from attack
#293Systems and methods for detecting and recovering BIOS configuration deviations
#294NETWORK SECURITY DEFENSE METHOD AND RELATED DEVICE APPLIED TO NETWORK SECURITY DEFENSE SYSTEM
#295Abnormality detection in log entry collection
#296CRYPTOGRAPHIC COMPUTING IN MULTITENANT ENVIRONMENTS
#297COHERENCE-BASED ATTACK DETECTION
#298METHOD FOR SECURE EXECUTING OF A SECURITY RELATED PROCESS
#299METHOD FOR SECURING AN ELECTRONIC DEVICE
#300Apparatus and method for preventing security threat to virtual machine