Roger Thornton

Roger Thornton

Austin, Texas, United States
8K followers 500 connections

About

Software engineer, entrepreneur, executive and investor with a long history of building…

Services

Activity

Join now to see all activity

Experience

  • Ballistic Ventures Graphic

    Ballistic Ventures

    Austin, Texas, United States

  • -

    Vancouver, British Columbia, Canada

  • -

    San Francisco Bay Area

  • -

    Austin, Texas, United States

  • -

    Austin, Texas, United States

  • -

    Las Vegas, Nevada, United States

  • -

    Dallas, TX

  • -

    Austin, Texas Area

  • -

    Austin, Texas Area

  • -

    Greater Los Angeles Area

  • -

    San Francisco Bay Area

  • -

    San Francisco Bay Area

  • -

    Palo Alto, CA

  • -

    San Francisco Bay Area

  • -

    Palo Alto, CA

  • -

    Cupertino, CA

  • -

    Cupertino, CA

  • -

    Palo Alto, CA

  • -

    San Jose, CA

Education

  • San Jose State University Graphic

    San Jose State University

    -

    Activities and Societies: Tau Beta Pi Engineering honor society

    Graduate education was self-funded through full-time employment. Graduate project: Object Oriented Framework for Computer Integrated Manufacturing (CIM) Application Development

  • -

    Activities and Societies: Chairman, SJSU Student Union Board of Directors

    Undergraduate education funded through full time employment.

Publications

Patents

  • Malware clustering based on function call graph similarity

    Issued 10,990,674

    Techniques are disclosed relating to malware clustering based on function call graph similarity. In some embodiments, a computer system may access information corresponding to a plurality of malware samples and, based on the information, generate a function call graph for each of the malware samples. In some embodiments, generating the function call graph for a given malware sample includes identifying a plurality of function calls included in the information, assigning a label to each of the…

    Techniques are disclosed relating to malware clustering based on function call graph similarity. In some embodiments, a computer system may access information corresponding to a plurality of malware samples and, based on the information, generate a function call graph for each of the malware samples. In some embodiments, generating the function call graph for a given malware sample includes identifying a plurality of function calls included in the information, assigning a label to each of the function calls, identifying relationships between the function calls, and generating the function call graph based on the relationships and the labels. Based on the function call graphs, the computer system may assign each of the plurality of malware samples into one of a plurality of clusters of related malware samples.

    See patent
  • Storage system for network information

    Issued 10,992,519

    Techniques are disclosed relating to storage of network event information for multiple tenants. In some embodiments, one or more host computer systems are configured to maintain a plurality of containers operable to isolate network event information of a plurality of tenants from others of the plurality of tenants. The plurality of containers includes a first container that includes a first database executable to store network event information for a first of the plurality of tenants, and a…

    Techniques are disclosed relating to storage of network event information for multiple tenants. In some embodiments, one or more host computer systems are configured to maintain a plurality of containers operable to isolate network event information of a plurality of tenants from others of the plurality of tenants. The plurality of containers includes a first container that includes a first database executable to store network event information for a first of the plurality of tenants, and a second container that includes a second database executable to store network event information for a second of the plurality of tenants. In some embodiments, a management computer system is configured to receive, from the first tenant, a request to access network event information of the first tenant and route the request to a host computer system maintaining the first container to cause the first database to service the request.

    See patent
  • Detection system for network security threats

    Issued US 10904278

  • Malware clustering based on analysis of execution behavior

    Issued US 10846406

  • Apparatus and method for monitoring secure software

    Issued US 7,975,306

    A computer readable medium includes executable instructions to analyze program instructions for security vulnerabilities. The executable instructions perform a security audit of program instructions. Based upon the security audit, sensors are inserted into the program instructions. The program instructions are executable and the sensors generate a stream of security events. The stream of security events is monitored and security performance results are reported.

    Other inventors
    See patent
  • APPARATUS AND METHOD FOR DEVELOPING SECURE SOFTWARE

    Issued US US 7207065 B2

    A computer readable medium includes executable instructions to analyze program instructions for security vulnerabilities. The executable instructions convert diverse program instruction formats to a common format. A system model is derived from the common format. A static analysis is performed on the system model to identify security vulnerabilities. Security vulnerabilities are then reported.

    Other inventors
    See patent

Honors & Awards

  • 2017 Alumni Award of Distinction

    SJSU Charles W. Davidson College of Engineering

    79th recipient of the Award of Distinction, given annually to SJSU alumni with notable outstanding accomplishments.

Organizations

  • Tau Beta Pi - Engineering Honor Society

    Member

    - Present

More activity by Roger

View Roger’s full profile

  • See who you know in common
  • Get introduced
  • Contact Roger directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Roger Thornton in United States

Add new skills with these courses