Kevin A. Roundy
Kevin A. Roundy
NortonLifeLock Research Group (NRG) - Previously known as Symantec Research Labs
Verified email at nortonlifelock.com - Homepage
Title
Cited by
Cited by
Year
Hybrid analysis and control of malware
KA Roundy, BP Miller
International Workshop on Recent Advances in Intrusion Detection, 317-338, 2010
1802010
Guilt by association: large scale malware detection by mining file-relation graphs
A Tamersoy, K Roundy, DH Chau
Proceedings of the 20th ACM SIGKDD international conference on Knowledge …, 2014
1212014
Binary-code obfuscations in prevalent packer tools
KA Roundy, BP Miller
ACM Computing Surveys (CSUR) 46 (1), 1-32, 2013
1082013
Systems and methods for using event-correlation graphs to detect attacks on computing systems
K Roundy, F Guo, S Bhatkar, T Cheng, J Fu, ZK Li, D Shou, S Sawhney, ...
US Patent 9,141,790, 2015
422015
Systems and methods for using event-correlation graphs to generate remediation procedures
KA Roundy, S Bhatkar
US Patent 9,256,739, 2016
372016
VIGOR: interactive visual exploration of graph query results
R Pienta, F Hohman, A Endert, A Tamersoy, K Roundy, C Gates, ...
IEEE transactions on visualization and computer graphics 24 (1), 215-225, 2017
312017
Systems and methods for classifying security events as targeted attacks
KA Roundy, S Bhatkar
US Patent 9,754,106, 2017
302017
Systems and methods for reducing false positives when using event-correlation graphs to detect attacks on computing systems
F Guo, S Bhatkar, K Roundy
US Patent 9,166,997, 2015
302015
Generating graph snapshots from streaming edge data
S Soundarajan, A Tamersoy, EB Khalil, T Eliassi-Rad, DH Chau, ...
Proceedings of the 25th International Conference Companion on World Wide Web …, 2016
252016
Systems and methods for adjusting suspiciousness scores in event-correlation graphs
A Tamersoy, K Roundy, S Bhatkar, E Khalil
US Patent 9,148,441, 2015
232015
Efficient, sensitivity resistant binary instrumentation
AR Bernat, K Roundy, BP Miller
Proceedings of the 2011 International Symposium on Software Testing and …, 2011
232011
Systems and methods for using user-input information to identify computer security threats
K Roundy
US Patent 9,166,995, 2015
202015
Systems and methods for predicting security threats
C Gates, W Yining, N Vasiloglou, KA Roundy, M Hart
US Patent 9,998,480, 2018
192018
Detection of security incidents with low confidence security events
K Roundy, M Spertus
US Patent 9,888,024, 2018
182018
Systems and methods for predicting security threat attacks
W Yining, C Gates, K Roundy, N Vasiloglou
US Patent 9,948,663, 2018
152018
Large-scale identification of malicious singleton files
B Li, K Roundy, C Gates, Y Vorobeychik
Proceedings of the Seventh ACM on Conference on Data and Application …, 2017
152017
Systems and methods for detecting security threats based on user profiles
F Guo, S Bhatkar, K Roundy
US Patent 9,401,925, 2016
152016
Systems and methods for determining types of malware infections on computing devices
F Guo, K Roundy
US Patent 9,838,405, 2017
112017
Systems and methods for estimating confidence scores of unverified signatures
KA Roundy
US Patent 9,485,272, 2016
92016
Systems and methods for detecting malware using file clustering
A Tamersoy, KA Roundy, D Marino
US Patent 9,185,119, 2015
92015
The system can't perform the operation now. Try again later.
Articles 1–20