`_______________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`_____________
`
`
`PALO ALTO NETWORKS, INC.,
`Petitioner,
`
`v.
`
`FINJAN, INC.,
`Patent Owner.
`
`Case IPR2016-00157
`Patent No. 8,225,408
`
`
`
`____________________________________________________________
`
`PETITIONER'S CORRECTED PETITION EXHIBIT LIST
`
`
`
`
`
`
`
`la-1303912
`
`
`
`IPR2016-00157
`
`
`
`Attorney Docket No. 719712801500
`
`Exhibit No.
`
`Description of Document
`
`1001
`
`1002
`
`1003
`
`1004
`
`1005
`
`1006
`
`1007
`
`1008
`
`1009
`
`1010
`
`1011
`
`1012
`
`1013
`
`1014
`
`1015
`
`1016
`
`1017
`
`1018
`
`1019
`
`1020
`
`U.S. Patent No. 8,225,408 (“the ’408 patent”)
`
`Declaration of Dr. Aviel D. Rubin
`
`U.S. Patent No. 7,636,945 (“Chandnani”)
`
`U.S. Patent No. 5,860,011 (“Kolawa”)
`
`U.S. Patent No. 7,284,274 (“Walls”)
`
`U.S. Patent No. 7,437,362 (“Ben-Natan” or the “Ben-Natan
`Patent”)
`Ron Ben-Natan, “Protecting Your Payload,” SQL Server Magazine,
`Vol. 5, No. 8 (August 2003) (the “Ben-Natan Article”)
`
`U.S. Patent No. 6,697,950 (“Ko”)
`
`U.S. Patent No. 7,210,041 (“Gryaznov”)
`
`Mihai Christodorescu & Somesh Jha, “Static Analysis of
`Executables to Detect Malicious Patterns,” Proc. of the 12th
`USENIX Security Symposium, at 169-86 (Aug. 4-8, 2003)
`(“Christodorescu”)
`
`U.S. Patent No. 7,185,003 (“Bayliss”)
`
`U.S. Patent No. 7,546,234 (“Deb”)
`
`David Wagner and Drew Dean, “Intrusion Detection via Static
`Analysis,” In Proc. IEEE Symposium on Security and Privacy
`(2001) (“Wagner”)
`Microsoft Press, Computer Dictionary, 3rd ed. (1997) (Excerpt)
`
`U.S. Patent No. 7,950,059 (“Aharon”)
`
`Yichen Xie, et al., “ARCHER: Using Symbolic, Path-Sensitive
`Analysis to Detect Memory Access Errors,” Proc. of the 10th ACM
`SIGSOFT International Symposium on Foundations of Software
`Engineering (Sept. 1-5, 2003) (“ARCHER”)
`
`U.S. Patent No. 7,207,065 (“Chess”)
`
`James F. Power and Brian A. Malloy, “Program Annotation in
`XML: A Parse Tree-Based Approach,” 9th IEEE Working
`Conference on Reverse Engineering (Nov. 1, 2002) (“Power”)
`
`U.S. Patent No. 6,061,513 (“Scandura”)
`
`Stephen C. Johnson, “YACC: Yet Another Compiler Computer,”
`Bell Laboratories, Murray Hill, NJ (“YACC”)
`
`la-1303912
`
`1
`
`
`
`IPR2016-00157
`
`
`
`Attorney Docket No. 719712801500
`
`Exhibit No.
`
`1021
`
`1022
`
`1023
`
`1024
`
`1025
`
`1026
`
`1027
`
`1028
`
`1029
`
`1030
`
`1031
`
`1032
`
`1033
`
`1034
`
`1035
`
`1036
`
`1037
`
`1038
`
`1039
`
`Description of Document
`Excerpt of the File History of U.S. Patent No. 8,225,408 (“408 File
`History”)
`
`Curriculum Vitae of Dr. Aviel Rubin
`
`F-SCRIPT, F-Secure Script Viruses Detector and Eliminator,
`Version 1.6, Data Fellows Corp. (1998-99)
`
`U.S. Patent Application Publication No. 2004/0181677 (“Hong”)
`Webster’s New World Computer Dictionary, 9th ed. (2001)
`David M. Chess and Steve R. White, “An Undetectable Computer
`Virus” (“Chess and White”)
`Symantec.com, “Updating virus definitions on a daily basis with
`Symantec AntiVirus”
`
`Wikipedia.org, “Lexical Analysis”
`Computer Desktop Encyclopedia, 2nd ed. (1999)
`David Patterson and John Hennessy, “Computer Organization &
`Design, The Hardware / Software Interface” (1994)
`
`U.S. Patent No. 5,996,059 (“Porten”)
`
`John Lockwood, “Internet Worm and Virus Protection for Very
`High-Speed Networks” (August 1998)
`Sebastian Gerlach and Roger D. Hersch, “DPS – Dynamic Parallel
`Schedules,” IEEE Press (2003)
`B. Ramakrishna Rau and Joseph A. Fisher, “Instruction-Level
`Parallel Processing: History, Overview, and Perspective,” The
`Journal of Supercomputing (1993)
`
`U.S. Patent Application No. 08/964,388
`
`U.S. Patent Application No. 09/539,667
`Webster’s New World Dictionary of Computer Terms, 5th ed.
`(1994)
`
`J. Mark Smith, et al., “Protecting a Private Network: The AltaVista
`Firewall,” Digital Technical Journal (1997)
`
`Martin Hitz and Behzad Montazeri, “Measuring Coupling and
`Cohesion in Object-Oriented Systems” (“Hitz”)
`
`1040
`
`Intentionally Left Blank
`
`la-1303912
`
`2
`
`
`
`IPR2016-00157
`
`
`
`Attorney Docket No. 719712801500
`
`Exhibit No.
`
`1041
`
`Description of Document
`Testimony of Stephen R. Malphrus, “The ‘I Love You’ computer
`virus and the financial services industry,” Before the Subcommittee
`on Financial Institutions of the Committee on Banking, Housing,
`and Urban Affairs, U.S. Senate, May 18, 2000
`
`1042
`
`Intentionally Left Blank
`
`1043
`
`1044
`
`1045
`
`1046
`
`ccm.net, “The Klez Virus” (September 2015)
`
`Jakob Nielsen, “100 Million Websites”
`
`Margrethe H. Olson, “Remote Office Work: Changing Work
`Patterns In Space and Time” (March 1983)
`
`“Intrusion Detection Systems,” Group Test (Edition 2), An NSS
`Group Report (December 2001)
`
`1047
`
`Carey Nachenberg, “The Evolving Virus Threat” (“Nachenberg”)
`
`1048
`
`1049
`
`1050
`
`1051
`
`1052
`
`1053
`
`1054
`
`1055
`
`Dmitry O. Gryaznov, “Scanners of the Year 2000: Heuristics,”
`Virus Bulletin (1995)
`
`Emin Gun Sirer, et al., “Design and Implementation of a
`Distributed Virtual Machine for Networked Computers,” 33 ACM
`SIGOPS Operating Systems Review 202 (Dec. 5, 1999) (“Sirer”)
`
`Frederick B. Cohen, “A Short Course on Computer Viruses” (1990)
`(Excerpt)
`
`U.S. Patent No. 5,842,002 (“Schnurer”)
`
`Hal Berghel, “The Client Side of the Web” (April 8, 1996)
`
`w3schools.com, “My First JavaScript Tutorial”
`
`Sarah Gordon and David Chess, “Attitude Adjustment: Trojans and
`Malware on the Internet”
`
`Stephane Bressan and Thomas Lee, “Information Brokering on the
`World Wide Web” (June 1997)
`
`1056
`
`David M. Chess, “Security Issues in Mobile Code Systems”
`
`1057
`
`Andrew W. Appel and Jens Palsberg, “Modern Compiler
`Implementation in Java,” 2nd ed. (2002) (Excerpt)
`
`1058
`
`Graham Hutton, “Higher-Order Functions for Parsing” (July 1992)
`
`la-1303912
`
`3
`
`
`
`IPR2016-00157
`
`
`
`Attorney Docket No. 719712801500
`
`Exhibit No.
`
`Description of Document
`
`John Lockwood, et al., “An Extensible, System-On-Programmable-
`Chip, Content-Aware Internet Firewall”
`
`“M86 Security Acquires Finjan,” Reuters Business Wire (Nov. 3,
`2009)
`
`Final Office Action, Ex Parte Reexamination of U.S. Patent No.
`7,647,633 (May 22, 2015)
`
`U.S. Patent No. 6,968,539 (“Huang”)
`
`The Authoritative Dictionary of IEEE Standards Terms (7th ed.)
`(Excerpt)
`John E. Hopcraft et al., Introduction to Automata Theory,
`Languages and Computation § 2.2.1 (2001) (Excerpt)
`
`1059
`
`1060
`
`1061
`
`1062
`
`1063
`
`1064
`
`
`
`la-1303912
`
`4