1
Daniel Marino, Darren Shou, Bruce McCorkendale: Systems and methods for enforcing data-loss-prevention policies using mobile sensors. Symantec Corporation, ALG Intellectual Property, December 30, 2014: US08925037 (12 worldwide citation)

A computer-implemented method for enforcing data-loss-prevention policies using mobile sensors may include (1) detecting an attempt by a user to access sensitive data on a mobile computing device, (2) collecting, via at least one sensor of the mobile computing device, sensor data that indicates an e ...


2
Sanjay Sawhney, Petros Efstathopoulos, Daniel Marino: Systems and methods for deploying applications included in application containers. Symantec Corporation, ALG Intellectual Property, August 25, 2015: US09116768 (6 worldwide citation)

The disclosed computer-implemented method for deploying applications included in application containers may include (1) identifying an application container that includes an application and facilitates transferring the application to a deployment environment, (2) performing a reconnaissance analysis ...


3
Acar Tamersoy, Kevin A Roundy, Daniel Marino: Systems and methods for detecting malware using file clustering. Symantec Corporation, ALG Intellectual Property, November 10, 2015: US09185119 (2 worldwide citation)

The disclosed computer-implemented method for detecting malware using file clustering may include (1) identifying a file with an unknown reputation, (2) identifying at least one file with a known reputation that co-occurs with the unknown file, (3) identifying a malware classification assigned to th ...


4
Daniel Marino, Petros Efstathopoulos, Mingwei Zhang: Systems and methods for increasing security on computing systems that launch application containers. Symantec Corporation, FisherBroyles, August 8, 2017: US09729579 (1 worldwide citation)

A computer-implemented method for increasing security on computing systems that launch application containers may include (1) authenticating an application container that facilitates launching at least one application on a host computing system by verifying that the application container meets a cer ...


5
Madanlal Musuvathi, Daniel Marino, Satish Narayanasamy: Sampling techniques for dynamic data-race detection. Microsoft Corporation, Lee & Hayes PLLC, April 9, 2013: US08418146 (1 worldwide citation)

This document describes a dynamic data race detector that utilizes adaptive sampling techniques. The adaptive sampling techniques include locating threads during execution of a multi-threaded program and identifying thread-specific hot paths, thread-specific cold paths and lockset paths during execu ...


6
Kevin Roundy, Sandeep Bhatkar, Fanglu Guo, Daniel Marino: Systems and methods for detecting malware-induced crashes. Symantec Corporation, FisherBroyles, May 30, 2017: US09665715

A computer-implemented method for detecting malware-induced crashes may include (1) identifying, by analyzing a health log associated with a previously stable computing device, the occurrence of an unexpected stability problem on the previously stable computing device, (2) identifying, by analyzing ...


7
Madanlal Musuvathi, Daniel Marino, Satish Narayanasamy: SAMPLING TECHNIQUES FOR DYNAMIC DATA-RACE DETECTION. Microsoft Corporation, LEE & HAYES PLLC, May 27, 2010: US20100131931-A1

This document describes a dynamic data race detector that utilizes adaptive sampling techniques. The adaptive sampling techniques include locating threads during execution of a multi-threaded program and identifying thread-specific hot paths, thread-specific cold paths and lockset paths during execu ...


8
Yuqiong Sun, Daniel Marino, Susanta K Nanda, Saurabh Shintre, Brian T Witten, Ronald A Frederick, Qing Li: Decrypting network traffic on a middlebox device using a trusted execution environment. SYMANTEC CORPORATION, Maschoff Brennan, August 7, 2018: US10044691

Decrypting network traffic on a middlebox device using a trusted execution environment (TEE). In one embodiment, a method may include loading a kernel application inside the TEE, loading a logic application outside the TEE, intercepting, by the logic application, encrypted network traffic, forwardin ...