Institution Decision: Deny | Jul 25, 2025 | PAPER | BOARD |
Notice: Referral to Board Panel | May 28, 2025 | PAPER | BOARD |
Patent Owner's Preliminary Response | May 27, 2025 | PAPER | PATENT OWNER |
Ex. 2001 Statutory Disclaimer | May 27, 2025 | EXHIBIT | PATENT OWNER |
Notice: Extending Deadline for Discretion Briefing | Apr 24, 2025 | PAPER | BOARD |
Notice filing date accorded to petition | Feb 25, 2025 | PAPER | BOARD |
Notice: Power of Attorney | Feb 7, 2025 | PAPER | PATENT OWNER |
Notice: Mandatory Notice | Feb 7, 2025 | PAPER | PATENT OWNER |
U.S. Patent No. 11,868,798 to Shua | Jan 17, 2025 | EXHIBIT | PETITIONER |
Curriculum Vitae of Dr. Angelos Stavrou | Jan 17, 2025 | EXHIBIT | PETITIONER |
File History of U.S. Patent Application No. 17/821,345 (’798 Pat.) | Jan 17, 2025 | EXHIBIT | PETITIONER |
Second Amended Complaint for Patent Infringement (Dkt. No. 15), Orca | Jan 17, 2025 | EXHIBIT | PETITIONER |
U.S. Publication No. 2013/0191919 A1, published July 25, 2013, to Basavapat | Jan 17, 2025 | EXHIBIT | PETITIONER |
Wolf, “Virtualization: From the Desktop to the Enterprise” APRESS (2005) | Jan 17, 2025 | EXHIBIT | PETITIONER |
Waldspurger, “Memory Resource Management in VMware ESX Server,” USENIX | Jan 17, 2025 | EXHIBIT | PETITIONER |
Goldberg, “Survey of Virtual Machine Research,” COMPUTER, Vol. 7, No. 6 | Jan 17, 2025 | EXHIBIT | PETITIONER |
U.S. Patent No. 10,944,811 B2 to Doctor | Jan 17, 2025 | EXHIBIT | PETITIONER |
Wood, “Black-box and Gray-box Strategies for Virtual Machine Migration” NSD | Jan 17, 2025 | EXHIBIT | PETITIONER |
Klemperer, “Efficient Hypervisor Based Malware Detection,” Carnegie Mellon | Jan 17, 2025 | EXHIBIT | PETITIONER |
Souppaya, “Application Container Security Guide,” NIST Special Publication | Jan 17, 2025 | EXHIBIT | PETITIONER |
U.S. Patent No. 11,106,784 B2 to Rosendahl | Jan 17, 2025 | EXHIBIT | PETITIONER |
Scarfone, “Guide to Security for Full Virtualization Technologies: Recs | Jan 17, 2025 | EXHIBIT | PETITIONER |
U.S. Patent No. 9,881,040 B2 to Rawat | Jan 17, 2025 | EXHIBIT | PETITIONER |
U.S. Patent No. 9,116,633 B2 to Sancheti | Jan 17, 2025 | EXHIBIT | PETITIONER |
“NIST Cloud Computing Standards Roadmap,” NIST Special Publication 500-291 | Jan 17, 2025 | EXHIBIT | PETITIONER |
Roberts, “Public Cloud Service Definition,” VMware vCloud® Architecture Too | Jan 17, 2025 | EXHIBIT | PETITIONER |
ITL Bulletin, “Security Patches and the CVE Vulnerability Naming Scheme: | Jan 17, 2025 | EXHIBIT | PETITIONER |
ITL Bulletin, “Preventing and Handling Malware Incidents: How to Protect | Jan 17, 2025 | EXHIBIT | PETITIONER |
Cichonski, “Computer Security Incident Handling Guide: Recommendations | Jan 17, 2025 | EXHIBIT | PETITIONER |
ENISA Threat Landscape Report 2018, “15 top Cyberthreats and Trends,” V1.0 | Jan 17, 2025 | EXHIBIT | PETITIONER |
Verizon, “2019 Data Breach Investigations Report” (May 2019) | Jan 17, 2025 | EXHIBIT | PETITIONER |
Di Pietro, “Virtualization Technologies and Cloud Security: Advantages, Iss | Jan 17, 2025 | EXHIBIT | PETITIONER |
Singh, “Overview of Attacks on Cloud Computing,” Int’l. J. of Eng. | Jan 17, 2025 | EXHIBIT | PETITIONER |
Bairwa, “Vulnerability Scanners: A Proactive Approach to Assess Web App | Jan 17, 2025 | EXHIBIT | PETITIONER |
Stone, “IT Asset Management,” NIST Special Publication 1800-5 (Sept. 2018) | Jan 17, 2025 | EXHIBIT | PETITIONER |
EP Patent No. 3,360,071 B1 to Li | Jan 17, 2025 | EXHIBIT | PETITIONER |
Garfinkel, “A Virtual Machine Introspection Based Architecture for Intr | Jan 17, 2025 | EXHIBIT | PETITIONER |
Tang, “VirtAV: An Agentless Runtime Antivirus System for Virtual Machines,” | Jan 17, 2025 | EXHIBIT | PETITIONER |
Lengyel, “Scalability, Fidelity and Stealth in the DRAKVUF Dynamic Malware | Jan 17, 2025 | EXHIBIT | PETITIONER |
U.S. Patent No. 8,613,080 B2 to Wysopal | Jan 17, 2025 | EXHIBIT | PETITIONER |
Bauman, “A Survey on Hypervisor-Based Monitoring: Approaches, Applications | Jan 17, 2025 | EXHIBIT | PETITIONER |
Suneja, “Exploring VM Introspection: Techniques and Trade-offs,” ACM, VEE’1 | Jan 17, 2025 | EXHIBIT | PETITIONER |
Payne, “Simplifying Virtual Machine Introspection Using LibVMI,” SANDIA Rep | Jan 17, 2025 | EXHIBIT | PETITIONER |
U.S. Patent No. 5,893,131 to Kornfeld | Jan 17, 2025 | EXHIBIT | PETITIONER |
U.S. Patent No. 7,975,305 B2 to Rubin | Jan 17, 2025 | EXHIBIT | PETITIONER |
Jiang, “Stealthy Malware Detection and Monitoring Through VMM-Based | Jan 17, 2025 | EXHIBIT | PETITIONER |
Bourquin, “Binslayer: Accurate Comparison of Binary Executables,” 2nd ACM S | Jan 17, 2025 | EXHIBIT | PETITIONER |
U.S. Publication No. 2013/0247133 A1 to Price | Jan 17, 2025 | EXHIBIT | PETITIONER |
Huseinović, “Virtual machine memory forensics,” 2013 21st Telecommunication | Jan 17, 2025 | EXHIBIT | PETITIONER |
Using VMware Workstation Pro: VMware Workstation Pro 14.0, VMware, Inc. | Jan 17, 2025 | EXHIBIT | PETITIONER |
U.S. Publication No.2010/0070725 A1 to Prahlad | Jan 17, 2025 | EXHIBIT | PETITIONER |
U.S. Patent No. 9,830,182 B2 to Ackley | Jan 17, 2025 | EXHIBIT | PETITIONER |
Virtual Disk Programming Guide: vSphere Storage APIs for Data Protection | Jan 17, 2025 | EXHIBIT | PETITIONER |
U.S. Publication No. 2015/0033221 A1 to Chari | Jan 17, 2025 | EXHIBIT | PETITIONER |
Archived copy of “CWE-200: Information Exposure,” archived on January 26 | Jan 17, 2025 | EXHIBIT | PETITIONER |
Archived copy of “CWE-311: Missing Encryption of Sensitive Data,” | Jan 17, 2025 | EXHIBIT | PETITIONER |
Archived copy of “CWE-359: Exposure of Private Information | Jan 17, 2025 | EXHIBIT | PETITIONER |
U.S. Publication No. 2014/0245376 A1 to Hibbert | Jan 17, 2025 | EXHIBIT | PETITIONER |
U.S. Publication No. 2017/0180318 A1 to Lutas | Jan 17, 2025 | EXHIBIT | PETITIONER |
U.S. Patent No. 9,900,333 B2 to Thakar | Jan 17, 2025 | EXHIBIT | PETITIONER |
Zhou, “Always Up-to-date—Scalable Offline Patching of VM Images | Jan 17, 2025 | EXHIBIT | PETITIONER |
Jeswani, “ImageElves: Rapid and Reliable System Updates in the Cloud,” 2013 | Jan 17, 2025 | EXHIBIT | PETITIONER |
U.S. Patent No. 8,984,478 B2 to Epstein | Jan 17, 2025 | EXHIBIT | PETITIONER |
U.S. Patent No. 11,061,682 B2 to Vorbach | Jan 17, 2025 | EXHIBIT | PETITIONER |
U.S. Publication No. 2013/0024940 A1 to Hutchins | Jan 17, 2025 | EXHIBIT | PETITIONER |
U.S. Patent No. 9,875,160 B2 to Bezbaruah | Jan 17, 2025 | EXHIBIT | PETITIONER |
U.S. Patent No. 10,536,471 B1 to Derbeko | Jan 17, 2025 | EXHIBIT | PETITIONER |
Ammons, “Virtual machine images as structured data: the Mirage | Jan 17, 2025 | EXHIBIT | PETITIONER |
VMware Infrastructure Architecture Overview White Paper, VMWare, Inc. (2006 | Jan 17, 2025 | EXHIBIT | PETITIONER |
U.S. Patent No. 9,692,778 B1 to Mohanty | Jan 17, 2025 | EXHIBIT | PETITIONER |
U.S. Patent No. 10,055,576 B2 to Milner | Jan 17, 2025 | EXHIBIT | PETITIONER |
U.S. Patent No. 9,824,216 B1 to Khalid | Jan 17, 2025 | EXHIBIT | PETITIONER |
U.S. Publication No. 2020/0097662 A1 to Hufsmith | Jan 17, 2025 | EXHIBIT | PETITIONER |
Carroll, “Challenges in Modern Digital Investigative Analysis,” | Jan 17, 2025 | EXHIBIT | PETITIONER |
U.S. Patent No. 7,831,739 B2 to Lambeth | Jan 17, 2025 | EXHIBIT | PETITIONER |
U.S. Publication No. 2010/0169948 A1 to Budko | Jan 17, 2025 | EXHIBIT | PETITIONER |
U.S. Patent No. 9,749,349 B2 to Czarny | Jan 17, 2025 | EXHIBIT | PETITIONER |
U.S. Publication No. 2017/0048266 A1 to Hovor | Jan 17, 2025 | EXHIBIT | PETITIONER |
Archived copy of “Vulnerability Details: CVE-2006-2923,” | Jan 17, 2025 | EXHIBIT | PETITIONER |
Archived copy of “Vulnerability Details: CVE-2007-0018,” published by CVE | Jan 17, 2025 | EXHIBIT | PETITIONER |
U.S. Publication No. 2017/0372070 A1 to Burdett | Jan 17, 2025 | EXHIBIT | PETITIONER |
Archived copy of “Vulnerability Details: CVE-2018-6954,” published by CVE | Jan 17, 2025 | EXHIBIT | PETITIONER |
Archived copy of “CVE-ID: CVE-2018-15687,” published by MITRE Corp. and arc | Jan 17, 2025 | EXHIBIT | PETITIONER |
Archived copy of “CVE-ID: CVE-2018-1312,” published by MITRE Corp. | Jan 17, 2025 | EXHIBIT | PETITIONER |
Archived copy of “Vulnerability Details: CVE-2013-2765,” published by CVE D | Jan 17, 2025 | EXHIBIT | PETITIONER |
U.S. Patent No. 10,498,845 B2 to Kapoor | Jan 17, 2025 | EXHIBIT | PETITIONER |
Archived copy of “Linux Programmer’s Manual: proc–process information | Jan 17, 2025 | EXHIBIT | PETITIONER |
Archived copy of “PID Definition,” published by The Linux Information | Jan 17, 2025 | EXHIBIT | PETITIONER |
Archived copy of “Unix/Linux–Processes Management,” published by Tutorials | Jan 17, 2025 | EXHIBIT | PETITIONER |
U.S. Patent No. 9,524,389 B2 to Roth | Jan 17, 2025 | EXHIBIT | PETITIONER |
Archived copy of “20 Log Files that are located under /var/log Directory,” | Jan 17, 2025 | EXHIBIT | PETITIONER |
Archived copy of “Linux YUM Tutorial,” archived on November 10, 2017 | Jan 17, 2025 | EXHIBIT | PETITIONER |
U.S. Patent No. 11,093,629 B2 to Hiltgen | Jan 17, 2025 | EXHIBIT | PETITIONER |
U.S. Publication No. 2020/0026527 A1 to XUE | Jan 17, 2025 | EXHIBIT | PETITIONER |
U.S. Patent No. 10,579,355 B2 to Bo | Jan 17, 2025 | EXHIBIT | PETITIONER |
Notice: Power of Attorney | Jan 17, 2025 | PAPER | PETITIONER |
U.S. Patent No. 11,216,563 B1 to Veselov | Jan 17, 2025 | EXHIBIT | PETITIONER |
Archived copy of “Defense Privacy, Civil Liberties | Jan 17, 2025 | EXHIBIT | PETITIONER |
vSphere Web Services SDK Programming Guide, VMWare, Inc. (April 17, 2018) | Jan 17, 2025 | EXHIBIT | PETITIONER |
U.S. Patent No. 9,141,805 B2 to Giakouminakis | Jan 17, 2025 | EXHIBIT | PETITIONER |
U.S. Publication No. 2019/0379700 A1 to Canzanese Jr. | Jan 17, 2025 | EXHIBIT | PETITIONER |
U.S. Patent No. 10,783,241 B2 to Crabtree | Jan 17, 2025 | EXHIBIT | PETITIONER |
VMware VirtualCenter User’s Manual version 1.4, VMware, Inc. (July 7, 2006) | Jan 17, 2025 | EXHIBIT | PETITIONER |
Petition: as filed | Jan 17, 2025 | PAPER | PETITIONER |
Declaration of Dr. Angelos Stavrou | Jan 17, 2025 | EXHIBIT | PETITIONER |
U.S. Publication No. 2013/0111018 A1 to Ammons | Jan 17, 2025 | EXHIBIT | PETITIONER |