| Utility: Detection of credential spearphishing attacks using email analysis Filling date: 8 Sep 2025 Issue date: 24 Mar 2020 | 30 Sep 2015 | 24 Mar 2020 |
| Utility: Secure communications between peers using a verified virtual trusted platform module Filling date: 8 Sep 2025 Issue date: 17 Mar 2020 | 9 Sep 2016 | 17 Mar 2020 |
| Utility: System and method for bot detection Filling date: 8 Sep 2025 Issue date: 10 Mar 2020 | 17 Apr 2017 | 10 Mar 2020 |
| Utility: Technique for malware detection capability comparison of network security devices Filling date: 8 Sep 2025 Issue date: 10 Mar 2020 | 22 Nov 2016 | 10 Mar 2020 |
| Utility: Malicious message analysis system Filling date: 8 Sep 2025 Issue date: 3 Mar 2020 | 13 Aug 2018 | 3 Mar 2020 |
| Utility: Enhanced malware detection for generated objects Filling date: 8 Sep 2025 Issue date: 3 Mar 2020 | 19 Jun 2017 | 3 Mar 2020 |
| Utility: Malware detection system with contextual analysis Filling date: 8 Sep 2025 Issue date: 3 Mar 2020 | 31 Dec 2015 | 3 Mar 2020 |
| Utility: System and method to create a number of breakpoints in a virtual machine via virtual machine trapping events Filling date: 8 Sep 2025 Issue date: 25 Feb 2020 | 24 Apr 2013 | 25 Feb 2020 |
| Utility: System for detecting a presence of malware from behavioral analysis Filling date: 8 Sep 2025 Issue date: 18 Feb 2020 | 1 Aug 2016 | 18 Feb 2020 |
| Utility: Exploit of privilege detection framework Filling date: 8 Sep 2025 Issue date: 18 Feb 2020 | 29 Jun 2016 | 18 Feb 2020 |
| Utility: Multi-level control for enhanced resource and object evaluation management of malware detection system Filling date: 8 Sep 2025 Issue date: 4 Feb 2020 | 29 Sep 2017 | 4 Feb 2020 |
| Utility: Adaptive virtual machine snapshot update framework for malware behavioral analysis Filling date: 8 Sep 2025 Issue date: 4 Feb 2020 | 19 Jun 2017 | 4 Feb 2020 |
| Utility: Detection efficacy of virtual machine-based analysis with application specific events Filling date: 8 Sep 2025 Issue date: 14 Jan 2020 | 12 Mar 2018 | 14 Jan 2020 |
| Utility: Methods and apparatus for graphical user interface environment for creating threat response courses of action for computer networks Filling date: 8 Sep 2025 Issue date: 14 Jan 2020 | 22 Jun 2016 | 14 Jan 2020 |
| Utility: Microvisor-based malware detection appliance architecture Filling date: 8 Sep 2025 Issue date: 7 Jan 2020 | 2 Apr 2018 | 7 Jan 2020 |
| Utility: Multi-vector malware detection and analysis Filling date: 8 Sep 2025 Issue date: 31 Dec 2019 | 27 Dec 2016 | 31 Dec 2019 |
| Utility: System and method for classifying malware within content created during analysis of a specimen Filling date: 8 Sep 2025 Issue date: 24 Dec 2019 | 23 Oct 2015 | 24 Dec 2019 |
| Utility: Subscription based malware detection under management system control Filling date: 8 Sep 2025 Issue date: 17 Dec 2019 | 6 Mar 2017 | 17 Dec 2019 |
| Utility: System and method for detecting malicious links in electronic messages Filling date: 8 Sep 2025 Issue date: 10 Dec 2019 | 5 Feb 2018 | 10 Dec 2019 |
| Utility: Ransomware detection and mitigation Filling date: 8 Sep 2025 Issue date: 10 Dec 2019 | 24 Jul 2017 | 10 Dec 2019 |
| Utility: Dynamic adaptive defense for cyber-security threats Filling date: 8 Sep 2025 Issue date: 10 Dec 2019 | 28 Apr 2017 | 10 Dec 2019 |
| Utility: Advanced malware detection using similarity analysis Filling date: 8 Sep 2025 Issue date: 26 Nov 2019 | 29 Sep 2016 | 26 Nov 2019 |
| Utility: System, apparatus and method for automatically verifying exploits within suspect objects and highlighting the display information associated with the verified exploits Filling date: 8 Sep 2025 Issue date: 12 Nov 2019 | 19 Oct 2016 | 12 Nov 2019 |
| Utility: System and method for managing formation and modification of a cluster within a malware detection system Filling date: 8 Sep 2025 Issue date: 12 Nov 2019 | 30 Sep 2016 | 12 Nov 2019 |
| Utility: Code injection technique for remediation at an endpoint of a network Filling date: 8 Sep 2025 Issue date: 12 Nov 2019 | 23 Oct 2015 | 12 Nov 2019 |
| Utility: System and method for detecting exfiltration content Filling date: 8 Sep 2025 Issue date: 5 Nov 2019 | 2 Apr 2018 | 5 Nov 2019 |
| Utility: System and method for generating a malware identifier Filling date: 8 Sep 2025 Issue date: 5 Nov 2019 | 28 Aug 2017 | 5 Nov 2019 |
| Utility: Optimized resource allocation for virtual machines within a malware content detection system Filling date: 8 Sep 2025 Issue date: 5 Nov 2019 | 14 Nov 2016 | 5 Nov 2019 |
| Utility: Malware detection verification and enhancement by coordinating endpoint and malware detection systems Filling date: 8 Sep 2025 Issue date: 29 Oct 2019 | 26 Jun 2017 | 29 Oct 2019 |
| Utility: System and method for separated packet processing and static analysis Filling date: 8 Sep 2025 Issue date: 22 Oct 2019 | 9 Oct 2017 | 22 Oct 2019 |
| Utility: Centralized aggregation technique for detecting lateral movement of stealthy cyber-attacks Filling date: 8 Sep 2025 Issue date: 22 Oct 2019 | 31 Mar 2016 | 22 Oct 2019 |
| Utility: Susceptible environment detection system Filling date: 8 Sep 2025 Issue date: 15 Oct 2019 | 17 Nov 2017 | 15 Oct 2019 |
| Utility: Technique for protecting guest processes using a layered virtualization architecture Filling date: 8 Sep 2025 Issue date: 15 Oct 2019 | 5 Aug 2016 | 15 Oct 2019 |
| Utility: Methods of identifying heap spray attacks using memory anomaly detection Filling date: 8 Sep 2025 Issue date: 1 Oct 2019 | 7 Sep 2016 | 1 Oct 2019 |
| Utility: System and method for classifying an object based on an aggregated behavior results Filling date: 8 Sep 2025 Issue date: 1 Oct 2019 | 15 Jan 2016 | 1 Oct 2019 |
| Utility: Selective virtualization for security threat detection Filling date: 8 Sep 2025 Issue date: 17 Sep 2019 | 25 Mar 2016 | 17 Sep 2019 |
| Utility: System and method of detecting delivery of malware using cross-customer data Filling date: 8 Sep 2025 Issue date: 3 Sep 2019 | 16 Jul 2018 | 3 Sep 2019 |
| Utility: Virtual system and method with threat protection Filling date: 8 Sep 2025 Issue date: 27 Aug 2019 | 30 Jun 2016 | 27 Aug 2019 |
| Utility: System and method for programmatic runtime de-obfuscation of obfuscated software utilizing virtual machine introspection and manipulation of virtual machine guest memory permissions Filling date: 8 Sep 2025 Issue date: 13 Aug 2019 | 3 Oct 2016 | 13 Aug 2019 |
| Utility: Framework for classifying an object as malicious with machine learning for deploying updated predictive models Filling date: 8 Sep 2025 Issue date: 30 Jul 2019 | 26 Jun 2017 | 30 Jul 2019 |