Daubner et al., 2023
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| US10664592B2 (en) | Method and system to securely run applications using containers | |
| US10664590B2 (en) | Filesystem action profiling of containers and security enforcement | |
| US10853488B2 (en) | System and method for a security filewall system for protection of an information handling system | |
| KR101626424B1 (en) | System and method for virtual machine monitor based anti-malware security | |
| CN102741824B (en) | Systems and methods for behavioral sandboxing | |
| EP2115653B1 (en) | File conversion in restricted process | |
| JP5809084B2 (en) | Network security system and method | |
| US12197573B2 (en) | Integrated application analysis and endpoint protection | |
| WO2018222766A1 (en) | Real-time detection of and protection from malware and steganography in a kernel mode | |
| US20110239306A1 (en) | Data leak protection application | |
| US9805190B1 (en) | Monitoring execution environments for approved configurations | |
| Daubner et al. | Data loss prevention solution for linux endpoint devices | |
| WO2019217219A1 (en) | Method and system for installing and running untrusted applications | |
| CN110659478B (en) | Method for detecting malicious files preventing analysis in isolated environment | |
| Bagheri et al. | Automated dynamic enforcement of synthesized security policies in android | |
| US20250184352A1 (en) | Detecting malware infection path in a cloud computing environment utilizing a security graph | |
| Li et al. | Lost along the way: Understanding and mitigating path-misresolution threats to container isolation | |
| US20230394146A1 (en) | Analyzing files using a kernel mode of a virtual machine | |
| US20230208862A1 (en) | Detecting malware infection path in a cloud computing environment utilizing a security graph | |
| EP3588346B1 (en) | Method of detecting malicious files resisting analysis in an isolated environment | |
| CN119442282B (en) | Cluster detection method, device, equipment, medium and product | |
| Považanec | Data Loss Prevention in Linux Workstation Environment | |
| Rubio-Medrano et al. | DyPolDroid: Protecting Users and Organizations from Permission-Abuse Attacks in Android | |
| Meng et al. | A Lightweight Defense Scheme Against Usermode Helper Privilege Escalation Using Linux Capability |