| Number | Name | Date | Kind |
|---|---|---|---|
| 5432932 | Chen et al. | Jul 1995 | A |
| 5655081 | Bonnell et al. | Aug 1997 | A |
| 5781550 | Templin et al. | Jul 1998 | A |
| 5870550 | Wesinger et al. | Feb 1999 | A |
| 5878231 | Baehr et al. | Mar 1999 | A |
| 5913024 | Green et al. | Jun 1999 | A |
| 5924127 | Kawamoto et al. | Jul 1999 | A |
| 5958010 | Agarwal et al. | Sep 1999 | A |
| 6332163 | Bowman-Amuah | Dec 2001 | B1 |
| 6381646 | Zhang et al. | Apr 2002 | B2 |
| Entry |
|---|
| M. Pietrek, “Learn System-Level Win32 coding Techniques by Writing an API Spy Program,” vol. 9, No. 12, Microsoft Systems Journal, Microsoft Press (Dec. 1994). |
| T. Fraser et al., “Hardening COTS Software with Generic Software Wrappers,” Proc. Of the 1999 IEEE Symp. On Security and Privacy, IEEE, Inc. (1999). |
| A. Osborne & J.D. Myers, “A Methodical Approach to Remote IP Stack Identification,” Network Associates, Inc., Santa Clara, California (1999). |