Kevin A. Roundy
Kevin A. Roundy
NortonLifeLock Research Group (NRG) - Previously known as Symantec Research Labs
Verified email at nortonlifelock.com - Homepage
Title
Cited by
Cited by
Year
Hybrid analysis and control of malware
KA Roundy, BP Miller
International Workshop on Recent Advances in Intrusion Detection, 317-338, 2010
1732010
Guilt by association: large scale malware detection by mining file-relation graphs
A Tamersoy, K Roundy, DH Chau
Proceedings of the 20th ACM SIGKDD international conference on Knowledge …, 2014
1152014
Binary-code obfuscations in prevalent packer tools
KA Roundy, BP Miller
ACM Computing Surveys (CSUR) 46 (1), 1-32, 2013
1062013
Systems and methods for using event-correlation graphs to detect attacks on computing systems
K Roundy, F Guo, S Bhatkar, T Cheng, J Fu, ZK Li, D Shou, S Sawhney, ...
US Patent 9,141,790, 2015
412015
Systems and methods for using event-correlation graphs to generate remediation procedures
KA Roundy, S Bhatkar
US Patent 9,256,739, 2016
362016
Systems and methods for reducing false positives when using event-correlation graphs to detect attacks on computing systems
F Guo, S Bhatkar, K Roundy
US Patent 9,166,997, 2015
302015
Systems and methods for classifying security events as targeted attacks
KA Roundy, S Bhatkar
US Patent 9,754,106, 2017
282017
VIGOR: interactive visual exploration of graph query results
R Pienta, F Hohman, A Endert, A Tamersoy, K Roundy, C Gates, ...
IEEE transactions on visualization and computer graphics 24 (1), 215-225, 2017
282017
Generating graph snapshots from streaming edge data
S Soundarajan, A Tamersoy, EB Khalil, T Eliassi-Rad, DH Chau, ...
Proceedings of the 25th International Conference Companion on World Wide Web …, 2016
242016
Efficient, sensitivity resistant binary instrumentation
AR Bernat, K Roundy, BP Miller
Proceedings of the 2011 International Symposium on Software Testing and …, 2011
242011
Systems and methods for adjusting suspiciousness scores in event-correlation graphs
A Tamersoy, K Roundy, S Bhatkar, E Khalil
US Patent 9,148,441, 2015
222015
Systems and methods for using user-input information to identify computer security threats
K Roundy
US Patent 9,166,995, 2015
202015
Detection of security incidents with low confidence security events
K Roundy, M Spertus
US Patent 9,888,024, 2018
142018
Large-scale identification of malicious singleton files
B Li, K Roundy, C Gates, Y Vorobeychik
Proceedings of the Seventh ACM on Conference on Data and Application …, 2017
142017
Systems and methods for detecting security threats based on user profiles
F Guo, S Bhatkar, K Roundy
US Patent 9,401,925, 2016
142016
Systems and methods for predicting security threats
C Gates, W Yining, N Vasiloglou, KA Roundy, M Hart
US Patent 9,998,480, 2018
122018
Systems and methods for determining types of malware infections on computing devices
F Guo, K Roundy
US Patent 9,838,405, 2017
102017
Systems and methods for estimating confidence scores of unverified signatures
KA Roundy
US Patent 9,485,272, 2016
92016
Systems and methods for detecting malware using file clustering
A Tamersoy, KA Roundy, D Marino
US Patent 9,185,119, 2015
92015
Systems and methods for detecting information leakage by an organizational insider
KA Roundy, A Kashyap
US Patent 9,652,597, 2017
72017
The system can't perform the operation now. Try again later.
Articles 1–20