Patents

System level user behavior biometrics using feature extraction and modeling, March 1, 2016.
9,275,345
Systems, methods, and media protecting a digital data processing device from attack, September 22, 2015.
9,143,518
Methods, systems, and media for baiting inside attackers, April 14, 2015.
9,009,829
System methods, and media for outputting data based upon anomaly detection, April 7, 2015.
9,003,523
Systems, methods, and media for detecting network anomalies using a trained probabilistic model, September 23, 2014
8,884,033
Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems, March 4, 2014
8,667,588
Methods, media and systems for detecting anomalous program executions, December 3, 2013
8,601,322
Methods of unsupervised anomaly detection using a geometric framework, September 24, 2013
8,544,087
Methods, systems, and media for detecting covert malware, September 3, 2013
8,528,091
Systems, methods and media for outputting data based upon anomaly detection, May 21, 2013.
8,448,242
System and Methods for Detecting Malicious Email Transmission, May 14, 2013.
8,443,441
Systems, methods, and media for outputting a dataset based upon anomaly detection, February 19, 2013
8,381,299
Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems
8,381,295
Methods, media, and systems for detecting an anomalous sequence of function calls
8,135,994
Systems, methods, and media for generating sanitized data, sanitizing anomaly detection models, and/or generating sanitized anomaly detection models
8,407,160
Systems, methods, and media protecting a digital data processing device from attack
8,407,785
Apparatus method and medium for tracing the original of network transmissions using n-gram distribution of data
8,239,687
Methods, media, and systems for detecting an anomalous sequence of function calls
8,135,994
Methods, media and systems for detecting anomalous program executions
8,074,115
Effective method for detecting malicious binary programs
7,979,907
System and Methods for detecting intrusions in a computer system by monitoring operating system registry accesses
7,913,306
Methods for cost-sensitive modeling for intrusion detection and response
7,818,797
Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems
7,784,097
Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems
7,779,463,
System and methods for detecting malicious email transmission
7,657,935
Detecting Probes and scans over high-bandwidth, long-term incomplete network traffic information using limited memory
7,752,665
System and methods for detecting malicious email transmission
7,657,935
Apparatus method and medium for detecting payload anomaly using n-gram distribution of n data
7,639,714
System and methods for detection of new malicious executables
7,487,544
System and methods for detecting intrusions in a computer system by monitoring operating system registry accesses.
7,448,084
System and methods for anomaly detection and adaptive learning
7,424,619
System and methods for adaptive model generation for detecting intrusions in computer systems
7,225,343
System and methods for intrusion detection with dynamic window sizes
7,162,741

Spin-outs

Professors Stolfo and Keromytis are co-founders of, and have financial interests in, Allure Security Technology, Inc.


Ang Cui and Professor Stolfo are co-founders of, and have financial interests in, Red Balloon Security, Inc.