US6282703B1
(en)
*
|
1998-10-29 |
2001-08-28 |
International Business Machines Corporation |
Statically linking an application process with a wrapper library
|
US7085928B1
(en)
*
|
2000-03-31 |
2006-08-01 |
Cigital |
System and method for defending against malicious software
|
US20030005168A1
(en)
*
|
2001-06-29 |
2003-01-02 |
Leerssen Scott Alan |
System and method for auditing system call events with system call wrappers
|
US7103914B2
(en)
|
2002-06-17 |
2006-09-05 |
Bae Systems Information Technology Llc |
Trusted computer system
|
US7353507B2
(en)
*
|
2002-10-30 |
2008-04-01 |
Hewlett-Packard Development, L.P. |
Intercepting function cells
|
US20050108516A1
(en)
*
|
2003-04-17 |
2005-05-19 |
Robert Balzer |
By-pass and tampering protection for application wrappers
|
US20050216895A1
(en)
*
|
2004-03-23 |
2005-09-29 |
Tran Hieu T |
Method and apparatus for remote debugging of kernel and application software
|
JP2008502228A
(en)
*
|
2004-06-01 |
2008-01-24 |
エル‐3 コミュニケーションズ コーポレイション |
Method and system for performing a video flashlight
|
GB2417579A
(en)
*
|
2004-08-26 |
2006-03-01 |
Hewlett Packard Development Co |
Method for dynamically inserting code into a process by enabling taken branch traps to intercept a branch during the execution of the process
|
US7506364B2
(en)
*
|
2004-10-01 |
2009-03-17 |
Microsoft Corporation |
Integrated access authorization
|
US8181219B2
(en)
*
|
2004-10-01 |
2012-05-15 |
Microsoft Corporation |
Access authorization having embedded policies
|
US20070050369A1
(en)
*
|
2005-01-31 |
2007-03-01 |
Stiegler Marc D |
Accessing file under confinement
|
KR100651435B1
(en)
*
|
2005-02-19 |
2006-11-29 |
삼성전자주식회사 |
Adaptive queue mechanism for efficient real-time packet transfer and adaptive queue establishment system thereof
|
US7644271B1
(en)
|
2005-11-07 |
2010-01-05 |
Cisco Technology, Inc. |
Enforcement of security policies for kernel module loading
|
US7685638B1
(en)
*
|
2005-12-13 |
2010-03-23 |
Symantec Corporation |
Dynamic replacement of system call tables
|
US20080022353A1
(en)
|
2006-03-06 |
2008-01-24 |
Tresys Technology, Llc |
Framework to simplify security engineering
|
GB2436627B
(en)
*
|
2006-03-29 |
2011-04-20 |
Bridgeworks Ltd |
Message handling
|
US7992156B1
(en)
*
|
2006-04-03 |
2011-08-02 |
Trend Micro Incorporated |
Determining the address of a system call table to perform antivirus tasks in a computer
|
US7934083B2
(en)
*
|
2007-09-14 |
2011-04-26 |
Kevin Norman Taylor |
Configurable access kernel
|
US8561090B2
(en)
*
|
2009-02-26 |
2013-10-15 |
Red Hat, Inc. |
Method and an apparatus to implement secure system call wrappers
|
US20100250903A1
(en)
*
|
2009-03-26 |
2010-09-30 |
Celio Technology Corporation |
Apparatuses and systems including a software application adaptation layer and methods of operating a data processing apparatus with a software adaptation layer
|
US9189620B2
(en)
*
|
2009-06-30 |
2015-11-17 |
Intel Corporation |
Protecting a software component using a transition point wrapper
|
US8381284B2
(en)
|
2009-08-21 |
2013-02-19 |
Mcafee, Inc. |
System and method for enforcing security policies in a virtual environment
|
US8838644B2
(en)
*
|
2009-11-25 |
2014-09-16 |
International Business Machines Corporation |
Extensible access control list framework
|
US8352797B2
(en)
*
|
2009-12-08 |
2013-01-08 |
Microsoft Corporation |
Software fault isolation using byte-granularity memory protection
|
US8516455B2
(en)
*
|
2011-06-14 |
2013-08-20 |
International Business Machines Corporation |
Dynamic loading of kernel extensions
|
US20130263278A1
(en)
*
|
2012-03-28 |
2013-10-03 |
Ae Squared Ltd. |
Method and apparatus for controlling operations performed by a mobile co
|
DK2680138T3
(en)
*
|
2012-06-28 |
2019-05-13 |
Res Software Dev B V |
Dynamic rule management for kernel mode filter drivers
|
US9047463B2
(en)
*
|
2012-06-29 |
2015-06-02 |
Sri International |
Method and system for protecting data flow at a mobile device
|
US9038075B2
(en)
*
|
2012-11-26 |
2015-05-19 |
Red Hat, Inc. |
Batch execution of system calls in an operating system
|
US9602423B2
(en)
*
|
2013-06-28 |
2017-03-21 |
Pepperdata, Inc. |
Systems, methods, and devices for dynamic resource monitoring and allocation in a cluster system
|