1
William C Arnold, David M Chess, Jeffrey O Kephart, Steven R White: Automatic immune system for computers and computer networks. International Business Machines Corporation, Perman & Green, August 8, 1995: US05440723 (508 worldwide citation)

A method includes the following component steps, or some functional subset of these steps: (A) periodic monitoring of a data processing system (10) for anomalous behavior that may indicate the presence of an undesirable software entity such as a computer virus, worm, or Trojan Horse; (B) automatic s ...


2
William C Arnold, David M Chess, John F Morar, Alla Segal, Morton G Swimmer, Ian N Whalley, Steve R White: Method and apparatus for replicating and analyzing worm programs. International Business Machines Corporation, Rafael Perez Pineiro, Harrington & Smith, December 27, 2005: US06981279 (187 worldwide citation)

A system and a method are disclosed for dynamically analyzing software, some of whose potentially-important behaviors (such as worm-like behavior) may only be displayed when the software is executed in an environment where it has, or appears to have, access to a production network and/or to the glob ...


3
William C Arnold, David M Chess, John F Morar, Alla Segal, Ian N Whalley, Steve R White: Method and apparatus for the automatic determination of potentially worm-like behavior of a program. International Business Machines Corporation, Harrington & Smith PC, February 3, 2009: US07487543 (136 worldwide citation)

A method and system for the automatic determination of the behavioral profile of a program suspected of having worm-like characteristics includes analyzing data processing system resources required by the program and, if the required resources are not indicative of the program having worm-like chara ...


4
William C Arnold, David M Chess, John F Morar, Alla Segal, Ian N Whalley, Steve R White: Method and apparatus for the automatic determination of potentially worm-like behavior of a program. Trend Micro Incorporated, Okamoto & Benedicto, August 9, 2011: US07996905 (130 worldwide citation)

A method and system for the automatic determination of the behavioral profile of a program suspected of having worm-like characteristics includes analyzing data processing system resources required by the program and, if the required resources are not indicative of the program having worm-like chara ...


5
William C Arnold, David M Chess, Jeffrey O Kephart, Gregory B Sorkin, Steve R White: Searching for patterns in encrypted data. International Business Machines Corporation, Robert P Tassinari, Whitham Curtis Whitham & McGinn, August 15, 1995: US05442699 (69 worldwide citation)

A searching method determines, given a specified encryption method (or set of encryption methods) and a specified pattern (or set of patterns), whether a given text contains an encryption, with any key, of anything fitting the pattern or patterns. The procedure detects and locates patterns that are ...


6
Stephen M Matyas, Dennis G Abraham, William C Arnold, Donald B Johnson, Ramesh K Karne, An V Le, Rostislaw Prymak, Steve R White, John D Wilkins: Secure management of keys using extended control vectors. International Business Machines Coprporation, John E Hoel, May 8, 1990: US04924515 (57 worldwide citation)

A method and apparatus are disclosed for use in a data processing system which executes a program which outputs cryptographic service requests for operations with cryptographic keys which are associated with control vectors defining the functions which each key is allowed by its originator to perfor ...


7
William C Arnold, Richard Bealkowski: Method and apparatus for providing enhanced data verification in a computer system. International Business Machines, Robert S Babayi, January 3, 1995: US05379342 (57 worldwide citation)

A personal computer system compatible with application programs and operating system software. The personal computer system includes a microprocessor electrically coupled to a data bus, non-volatile memory electrically coupled to the data bus, volatile memory electrically responsive to the data bus ...


8
William C Arnold, Daniel C Berg, Brad L Blancett, Tamar Eilam, Michael D Elder, Chad Holliday, Michael H Kalantar, Alexander V Konstantinou, Timothy A Pouyer, Narinder Makin, Harm Sluiman, Edward C Snible, John E Swanke, Alexander A Totok, Andrew N Trossman: Simplified deployment modeling. International Business Machines Corporation, Stevens & Showalter, October 16, 2012: US08291378 (27 worldwide citation)

A deployment modeling platform enables a user to model application characteristics of target software and to associate application modeling parameters to the modeled application characteristics. A user may also model environment characteristics of a target deployment environment and to associate env ...


9
William C Arnold, David M Chess, John F Morar, Alla Segal, Ian N Whalley, Steve R White: Method and apparatus for determination of the non-replicative behavior of a malicious program. International Business Machines Corporation, Eustus D Nelson, Harrington & Smith, September 5, 2006: US07103913 (26 worldwide citation)

Disclosed is a method, a computer system and a computer readable media product that contains a set of computer executable software instructions for directing the computer system to execute a process for determining a non-replicative behavior of a program that is suspected of containing an undesirabl ...


10
William C Arnold, Tamar Eilam, Michael H Kalantar, Alexander V Konstantinou, John A Pershing, Edward C Snible, Alexander A Totok: Virtual solution composition and deployment system and method. International Business Machines Corporation, Jose Gutman, Fleit Gibbons Gutman Bongini & Bianco PL, October 2, 2012: US08281307 (23 worldwide citation)

A method and information processing system are provided for creating a virtual part and for composing and deploying a virtual solution with one or more virtual parts. The virtual part includes: a virtual image including a set of compatible software components; a set of configurability points, each c ...