throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`_______________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`_____________
`
`
`PALO ALTO NETWORKS, INC.,
`Petitioner,
`
`v.
`
`FINJAN, INC.,
`Patent Owner.
`
`Case IPR2016-00157
`Patent No. 8,225,408
`
`
`
`____________________________________________________________
`
`PETITIONER'S CORRECTED PETITION EXHIBIT LIST
`
`
`
`
`
`
`
`la-1303912
`
`

`
`IPR2016-00157
`
`
`
`Attorney Docket No. 719712801500
`
`Exhibit No.
`
`Description of Document
`
`1001
`
`1002
`
`1003
`
`1004
`
`1005
`
`1006
`
`1007
`
`1008
`
`1009
`
`1010
`
`1011
`
`1012
`
`1013
`
`1014
`
`1015
`
`1016
`
`1017
`
`1018
`
`1019
`
`1020
`
`U.S. Patent No. 8,225,408 (“the ’408 patent”)
`
`Declaration of Dr. Aviel D. Rubin
`
`U.S. Patent No. 7,636,945 (“Chandnani”)
`
`U.S. Patent No. 5,860,011 (“Kolawa”)
`
`U.S. Patent No. 7,284,274 (“Walls”)
`
`U.S. Patent No. 7,437,362 (“Ben-Natan” or the “Ben-Natan
`Patent”)
`Ron Ben-Natan, “Protecting Your Payload,” SQL Server Magazine,
`Vol. 5, No. 8 (August 2003) (the “Ben-Natan Article”)
`
`U.S. Patent No. 6,697,950 (“Ko”)
`
`U.S. Patent No. 7,210,041 (“Gryaznov”)
`
`Mihai Christodorescu & Somesh Jha, “Static Analysis of
`Executables to Detect Malicious Patterns,” Proc. of the 12th
`USENIX Security Symposium, at 169-86 (Aug. 4-8, 2003)
`(“Christodorescu”)
`
`U.S. Patent No. 7,185,003 (“Bayliss”)
`
`U.S. Patent No. 7,546,234 (“Deb”)
`
`David Wagner and Drew Dean, “Intrusion Detection via Static
`Analysis,” In Proc. IEEE Symposium on Security and Privacy
`(2001) (“Wagner”)
`Microsoft Press, Computer Dictionary, 3rd ed. (1997) (Excerpt)
`
`U.S. Patent No. 7,950,059 (“Aharon”)
`
`Yichen Xie, et al., “ARCHER: Using Symbolic, Path-Sensitive
`Analysis to Detect Memory Access Errors,” Proc. of the 10th ACM
`SIGSOFT International Symposium on Foundations of Software
`Engineering (Sept. 1-5, 2003) (“ARCHER”)
`
`U.S. Patent No. 7,207,065 (“Chess”)
`
`James F. Power and Brian A. Malloy, “Program Annotation in
`XML: A Parse Tree-Based Approach,” 9th IEEE Working
`Conference on Reverse Engineering (Nov. 1, 2002) (“Power”)
`
`U.S. Patent No. 6,061,513 (“Scandura”)
`
`Stephen C. Johnson, “YACC: Yet Another Compiler Computer,”
`Bell Laboratories, Murray Hill, NJ (“YACC”)
`
`la-1303912
`
`1
`
`

`
`IPR2016-00157
`
`
`
`Attorney Docket No. 719712801500
`
`Exhibit No.
`
`1021
`
`1022
`
`1023
`
`1024
`
`1025
`
`1026
`
`1027
`
`1028
`
`1029
`
`1030
`
`1031
`
`1032
`
`1033
`
`1034
`
`1035
`
`1036
`
`1037
`
`1038
`
`1039
`
`Description of Document
`Excerpt of the File History of U.S. Patent No. 8,225,408 (“408 File
`History”)
`
`Curriculum Vitae of Dr. Aviel Rubin
`
`F-SCRIPT, F-Secure Script Viruses Detector and Eliminator,
`Version 1.6, Data Fellows Corp. (1998-99)
`
`U.S. Patent Application Publication No. 2004/0181677 (“Hong”)
`Webster’s New World Computer Dictionary, 9th ed. (2001)
`David M. Chess and Steve R. White, “An Undetectable Computer
`Virus” (“Chess and White”)
`Symantec.com, “Updating virus definitions on a daily basis with
`Symantec AntiVirus”
`
`Wikipedia.org, “Lexical Analysis”
`Computer Desktop Encyclopedia, 2nd ed. (1999)
`David Patterson and John Hennessy, “Computer Organization &
`Design, The Hardware / Software Interface” (1994)
`
`U.S. Patent No. 5,996,059 (“Porten”)
`
`John Lockwood, “Internet Worm and Virus Protection for Very
`High-Speed Networks” (August 1998)
`Sebastian Gerlach and Roger D. Hersch, “DPS – Dynamic Parallel
`Schedules,” IEEE Press (2003)
`B. Ramakrishna Rau and Joseph A. Fisher, “Instruction-Level
`Parallel Processing: History, Overview, and Perspective,” The
`Journal of Supercomputing (1993)
`
`U.S. Patent Application No. 08/964,388
`
`U.S. Patent Application No. 09/539,667
`Webster’s New World Dictionary of Computer Terms, 5th ed.
`(1994)
`
`J. Mark Smith, et al., “Protecting a Private Network: The AltaVista
`Firewall,” Digital Technical Journal (1997)
`
`Martin Hitz and Behzad Montazeri, “Measuring Coupling and
`Cohesion in Object-Oriented Systems” (“Hitz”)
`
`1040
`
`Intentionally Left Blank
`
`la-1303912
`
`2
`
`

`
`IPR2016-00157
`
`
`
`Attorney Docket No. 719712801500
`
`Exhibit No.
`
`1041
`
`Description of Document
`Testimony of Stephen R. Malphrus, “The ‘I Love You’ computer
`virus and the financial services industry,” Before the Subcommittee
`on Financial Institutions of the Committee on Banking, Housing,
`and Urban Affairs, U.S. Senate, May 18, 2000
`
`1042
`
`Intentionally Left Blank
`
`1043
`
`1044
`
`1045
`
`1046
`
`ccm.net, “The Klez Virus” (September 2015)
`
`Jakob Nielsen, “100 Million Websites”
`
`Margrethe H. Olson, “Remote Office Work: Changing Work
`Patterns In Space and Time” (March 1983)
`
`“Intrusion Detection Systems,” Group Test (Edition 2), An NSS
`Group Report (December 2001)
`
`1047
`
`Carey Nachenberg, “The Evolving Virus Threat” (“Nachenberg”)
`
`1048
`
`1049
`
`1050
`
`1051
`
`1052
`
`1053
`
`1054
`
`1055
`
`Dmitry O. Gryaznov, “Scanners of the Year 2000: Heuristics,”
`Virus Bulletin (1995)
`
`Emin Gun Sirer, et al., “Design and Implementation of a
`Distributed Virtual Machine for Networked Computers,” 33 ACM
`SIGOPS Operating Systems Review 202 (Dec. 5, 1999) (“Sirer”)
`
`Frederick B. Cohen, “A Short Course on Computer Viruses” (1990)
`(Excerpt)
`
`U.S. Patent No. 5,842,002 (“Schnurer”)
`
`Hal Berghel, “The Client Side of the Web” (April 8, 1996)
`
`w3schools.com, “My First JavaScript Tutorial”
`
`Sarah Gordon and David Chess, “Attitude Adjustment: Trojans and
`Malware on the Internet”
`
`Stephane Bressan and Thomas Lee, “Information Brokering on the
`World Wide Web” (June 1997)
`
`1056
`
`David M. Chess, “Security Issues in Mobile Code Systems”
`
`1057
`
`Andrew W. Appel and Jens Palsberg, “Modern Compiler
`Implementation in Java,” 2nd ed. (2002) (Excerpt)
`
`1058
`
`Graham Hutton, “Higher-Order Functions for Parsing” (July 1992)
`
`la-1303912
`
`3
`
`

`
`IPR2016-00157
`
`
`
`Attorney Docket No. 719712801500
`
`Exhibit No.
`
`Description of Document
`
`John Lockwood, et al., “An Extensible, System-On-Programmable-
`Chip, Content-Aware Internet Firewall”
`
`“M86 Security Acquires Finjan,” Reuters Business Wire (Nov. 3,
`2009)
`
`Final Office Action, Ex Parte Reexamination of U.S. Patent No.
`7,647,633 (May 22, 2015)
`
`U.S. Patent No. 6,968,539 (“Huang”)
`
`The Authoritative Dictionary of IEEE Standards Terms (7th ed.)
`(Excerpt)
`John E. Hopcraft et al., Introduction to Automata Theory,
`Languages and Computation § 2.2.1 (2001) (Excerpt)
`
`1059
`
`1060
`
`1061
`
`1062
`
`1063
`
`1064
`
`
`
`la-1303912
`
`4

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket