throbber
Filed on behalf of: Wiz, Inc.
`By: Matthew A. Argenti (margenti@wsgr.com)
`
`Michael T. Rosato (mrosato@wsgr.com)
`Wesley E. Derryberry (wderryberry@wsgr.com)
`Tasha M. Thomas (tthomas@wsgr.com)
`Joseph M. Baillargeon (jbaillargeon@wsgr.com)
`WILSON SONSINI GOODRICH & ROSATI
`650 Page Mill Road
`Palo Alto, CA 94304
`
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`————————————————
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`————————————————
`
`WIZ, INC.,
`Petitioner,
`
`v.
`
`ORCA SECURITY LTD.,
`Patent Owner.
`
`————————————————
`Case IPR2024-01191
`Patent No. 11,775,326
`————————————————
`
`PETITIONER’S UPDATED EXHIBIT LIST
`
`

`

`
`
`Exhibit
`No.
`1001 U.S. Patent No. 11,775,326 to Shua
`
`Description
`
`1002 Declaration of Dr. Angelos Stavrou
`
`1003 Curriculum Vitae of Dr. Angelos Stavrou
`1004 CORRECTED - File History of U.S. Patent Application No.
`18/055,181 (’326 Pat.)
`
`1005
`
`1006
`
`Scheduling Order (Dkt. No. 33), Orca security ltd. v. Wiz, Inc., No.
`1:23cv-00758-GBW (DDE)
`
`Second Amended Complaint for Patent Infringement (Dkt. No. 15),
`Orca security ltd. v. Wiz, Inc., No. 1:23cv-00758-GBW (DDE)
`
`1007 U.S. Patent No. 11,216,563 B1 to Veselov
`1008 U.S. Publication No. 2013/0191919 A1, published July 25, 2013, to
`Basavapatna
`1009 Wolf, “Virtualization: From the Desktop to the Enterprise” APRESS
`(2005)
`
`1010
`
`Waldspurger, “Memory Resource Management in VMware ESX
`Server,” USENIX, Proceedings of the 5th Symposium on Operating
`Systems Design and Implementation (Dec. 9-11, 2002)
`1011 Goldberg, “Survey of Virtual Machine Research,” COMPUTER, Vol.
`7, No. 6 (June 1974)
`
`1012 U.S. Patent No. 10,944,811 B2 to Doctor
`
`1013
`
`Wood, “Black-box and Gray-box Strategies for Virtual Machine
`Migration” NSDI ’07: 4th USENIX Symposium on Networked
`Systems Design & Implementation, USENIX
`1014 Klemperer, “Efficient Hypervisor Based Malware Detection,”
`Carnegie Mellon University (May 2015)
`
`-1-
`
`

`

`Exhibit
`No.
`
`1015
`
`1016
`
`Description
`
`vSphere Web Services SDK Programming Guide, VMWare, Inc.
`(April 17, 2018)
`
`Souppaya, “Application Container Security Guide,” NIST Special
`Publication 800-190 (Sept. 2017)
`https://doi.org/10.6028/NIST.SP.800-190
`
`1017 U.S. Patent No. 11,106,784 B2 to Rosendahl
`
`1018
`
`Scarfone, “Guide to Security for Full Virtualization Technologies:
`Recommendations of the National Inst. of Standards and Technology,”
`NIST Special Publication 800-125 (Jan. 2011)
`
`1019 U.S. Patent No. 9,881,040 B2 to Rawat
`
`1020 U.S. Patent No. 9,116,633 B2 to Sancheti
`
`1021
`
`“NIST Cloud Computing Standards Roadmap,” NIST Special
`Publication 500-291, Version 2 (July 2013).
`1022 Roberts, “Public Cloud Service Definition,” VMware vCloud®
`Architecture Toolkit™ for Service Providers, VMware, Inc. (2018)
`
`1023
`
`1024
`
`ITL Bulletin, “Security Patches and the CVE Vulnerability Naming
`Scheme: Tools to Address Computer System Vulnerabilities,” NIST
`(Oct. 2002)
`
`ITL Bulletin, “Preventing and Handling Malware Incidents: How to
`Protect Information Technology Systems from Malicious Code and
`Software,” NIST (Dec. 2005)
`
`1025
`
`Cichonski, “Computer Security Incident Handling Guide:
`Recommendations of the National Institute of Standards and
`Technology,” NIST Special Publication 800-61, Rev. 2 (Aug. 2012)
`http://dx.doi.org/10.6028/NIST.SP.800-61r2
`1026 ENISA Threat Landscape Report 2018, “15 top Cyberthreats and
`Trends” V1.0 (Jan. 2019)
`
`-2-
`
`

`

`Exhibit
`No.
`1027 Verizon, “2019 Data Breach Investigations Report” (May 2019)
`
`Description
`
`1028
`
`1029
`
`1030
`
`1031
`
`Di Pietro, “Virtualization Technologies and Cloud Security:
`Advantages, Issues, and Perspectives,” Springer Nature Switzerland
`AG (2018) https://doi.org/10.1007/978-3-030-04834-1_9
`
`Singh, “Overview of Attacks on Cloud Computing, Int’l. J. of Eng.
`And Innovative Technology (IJEIT), Vol. 1, Issue 4 (Apr. 2012)
`
`Bairwa, “Vulnerability Scanners: A Proactive Approach to Assess
`Web Application Security,” Int’l. J. on Computational Sciences &
`Applications (IJSCA), Vol. 4, No. 1 (Feb. 2014)
`
`Stone, “IT Asset Management,” NIST Special Publication 1800-5
`(Sept. 2018) http://doi.org/10.6028/NIST.SP.1800-5
`
`1032 EP Patent No. 3,360,071 B1 to Li
`
`1033
`
`1034
`
`1035
`
`Garfinkel, “A Virtual Machine Introspection Based Architecture for
`Intrusion Detection,” Computer Science Dept., Stanford University
`(2003)
`
`Tang, “VirtAV: An Agentless Runtime Antivirus System for Virtual
`Machines,” KSII Transactions on the Internet and Information
`Systems, Vol. 11, No. 11 (Nov. 2017)
`https://doi.org/10.3837/tiis.2017.11.026
`
`Lengyel, “Scalability, Fidelity and Stealth in the DRAKVUF Dynamic
`Malware Analysis System (2014)
`https://doi.org/10.1145/2664243.2664252
`
`1036 U.S. Patent No. 8,613,080 B2 to Wysopal
`
`1037
`
`Bauman, “A Survey on Hypervisor-Based Monitoring: Approaches,
`Applications, and Evolutions,” ACM Computing Surveys, Vol. 48,
`No. 1, Article 10 (Aug. 2015)
`
`-3-
`
`

`

`Exhibit
`No.
`
`1038
`
`1039
`
`Description
`
`Suneja, “Exploring VM Introspection: Techniques and Trade-offs,”
`ACM, VEE’15 (Mar. 2015)
`http://dx.doi.org/10.1145/2731186.2731196
`
`Payne, “Simplifying Virtual Machine Introspection Using LibVMI,”
`SANDIA Report-SAND2012-7818, Sandia National Labs. (Sep. 2012)
`
`1040 U.S. Publication No. 2013/0111018 A1 to Ammons
`
`1041 U.S. Patent No. 5,893,131 to Kornfeld
`
`1042 U.S. Patent No. 7,975,305 B2 to Rubin
`
`1043
`
`Jiang, “Stealthy Malware Detection and Monitoring Through VMM-
`Based “Out-of-the-Box” Semantic View Reconstruction,” ACM
`Transactions on Information and System Security, Vol. 13, No. 2,
`Article 12 (Feb. 2010)
`
`1044 U.S. Patent No. 9,141,805 B2 to Giakouminakis
`
`1045 U.S. Publication No. 2019/0379700 A1 to Canzanese Jr.
`
`1046 U.S. Patent No. 10,783,241 B2 to Crabtree
`
`1047
`
`Bourquin, “Binslayer: Accurate Comparison of Binary Executables,”
`2nd ACM SIGPLAN Program Protection and Reverse Engineering
`Workshop (2013)
`
`1048 U.S. Publication No. 2013/0247133 A1 to Price
`
`1049 Huseinovic – VM Memory Forensics.
`
`1050
`Intentionally Left Blank
`1051 Using VMware Workstation Pro: VMware Workstation Pro 14.0,
`VMware, Inc. (December 17, 2017)
`1052 VMware VirtualCenter User’s Manual version 1.4, VMware, Inc.
`(July 7, 2006)
`
`-4-
`
`

`

`Exhibit
`No.
`1053 U.S. Publication No.2010/0070725 A1 to Prahlad
`
`Description
`
`1054 U.S. Patent No. 9,830,182 B2 to Ackley
`
`1055
`
`Virtual Disk Programming Guide: vSphere Storage APIs for Data
`Protection (VADP) 6.0 & Virtual Disk Development Kit (VDDK) 6.0,
`VMware, Inc. (March 25, 2016)
`
`1056 U.S. Publication No. 2015/0033221 A1 to Chari
`
`Archived copy of “CWE-200: Information Exposure,” published by
`MITRE and archived on January 26, 2019, by the Internet Archive’s
`“Wayback Machine”
`https://web.archive.org/web/20190126150012/https://cwe.mitre.org/da
`ta/definitions/200.html
`
`Archived copy of “CWE-311: Missing Encryption of Sensitive Data,”
`published by MITRE and archived on January 17, 2019, by the
`Internet Archive’s “Wayback Machine”
`https://web.archive.org/web/20190117150049/https://cwe.mitre.org/da
`ta/definitions/311.html
`
`Archived copy of “CWE-359: Exposure of Private Information
`(‘Privacy Violation’),” published by MITRE and archived on January
`13, 2019, by the Internet Archive’s “Wayback Machine”
`https://web.archive.org/web/20190113052451/https://cwe.mitre.org/da
`ta/definitions/359.html
`
`Intentionally Left Blank
`
`Intentionally Left Blank
`
`Intentionally Left Blank
`
`1057
`
`1058
`
`1059
`
`1060
`
`1061
`
`1062
`
`1063 U.S. Publication No. 2014/0245376 A1 to Hibbert
`
`1064 U.S. Publication No. 2017/0180318 A1 to Lutas
`
`1065 U.S. Patent No. 9,900,333 B2 to Thakar
`
`-5-
`
`

`

`Exhibit
`No.
`
`1066
`
`1067
`
`Description
`
`Zhou, “Always Up-to-date—Scalable Offline Patching of VM Images
`in a Compute Cloud,” 26th annual computer security applications
`conference (2010)
`
`Jeswani, “ImageElves: Rapid and Reliable System Updates in the
`Cloud,” 2013 IEEE 33rd International Conference on Distributed
`Computing Systems (2013)
`
`1068 U.S. Patent No. 8,984.478 B2 to Epstein
`
`
`
`1069 U.S. Patent No. 11,061,682 B2 to Vorbach
`
`1070 U.S. Publication No. 2013/0024940 A1 to Hutchins
`
`1071 U.S. Patent No. 9,875,160 B2 to Bezbaruah
`
`1072 U.S. Patent No. 10,536,471 B1 to Derbeko
`
`1073
`
`Ammons, “Virtual machine images as structured data: the Mirage
`image library,” 3rd USENIX conference on Hot topics in cloud
`computing (2011)
`1074 VMware Infrastructure Architecture Overview White Paper, VMWare,
`Inc. (2006)
`
`1075 U.S. Patent No. 9,692,778 B1 to Mohanty
`
`1076 U.S. Patent No. 10,055,576 B2 to Milner
`
`1077 U.S. Patent No. 9,824,216 B1 to Khalid
`
`1078 U.S. Publication No. 2020/0097662 A1 to Hufsmith
`
`1079
`
`Carroll, “Challenges in Modern Digital Investigative Analysis,”
`published in Forensic Science and Forensic Evidence I, U.S. Att’ys
`Bull. Vol. 65 No. 1 (January 2017)
`
`1080 U.S. Patent No. 7,831,739 B2 to Lambeth
`
`1081 U.S. Publication No. 2010/0169948 A1 to Budko
`
`-6-
`
`

`

`Exhibit
`No.
`
`Description
`
`1082
`
`United States District Courts—National Judicial Caseload Profile
`(December 31, 2023)
`https://www.uscourts.gov/sites/default/files/fcms_na_distprofile1231.2
`023_0.pdf
`1083 Amended Scheduling Order (Dkt. No. 90), Orca security ltd. v. Wiz,
`Inc., No. 1:23cv-00758-GBW (DDE)
`
`1084 U.S. Patent No. 9,749,349 B2 to Czarny
`
`1085 U.S. Publication No. 2017/004826 A1 to Hovor
`
`1086
`
`1087
`
`1088
`
`1089
`
`1090
`
`1091
`
`1092
`
`1093
`
`1094
`
`Intentionally Left Blank
`
`Intentionally Left Blank
`
`Intentionally Left Blank
`
`Intentionally Left Blank
`
`Intentionally Left Blank
`
`Intentionally Left Blank
`
`Federal Information Processing Standards Publication 180-4, “Secure
`Hash Standard (SHS),” NIST (August 2015)
`https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf
`
`Intentionally Left Blank
`
`Intentionally Left Blank
`
`1095 U.S. Publication No. 2017 / 0372070 A1 to Burdett
`
`1096
`
`1097
`
`1098
`
`Intentionally Left Blank
`
`Intentionally Left Blank
`
`Intentionally Left Blank
`
`-7-
`
`

`

`Exhibit
`No.
`1099
`
`1100
`
`1101
`
`1102
`
`1103
`
`1104
`
`1105
`
`1106
`
`
`
`Description
`
`Intentionally Left Blank
`
`Intentionally Left Blank
`
`Intentionally Left Blank
`
`Intentionally Left Blank
`
`Intentionally Left Blank
`
`Intentionally Left Blank
`
`Intentionally Left Blank
`
`International Telecommunication Union, “Common vulnerability
`scoring system 3.0,” Recommendation ITU-T X.1521 (Mar. 2016)
`https://www.itu.int/rec/dologin_pub.asp?lang=e&id=T-REC-X.1521-
`201603-I!!PDF-E&type=items
`
`
`
`
`
`-8-
`
`

`

`CERTIFICATE OF SERVICE
`
`Pursuant to 37 C.F.R. §42.6(e), I certify that I caused to be served true and
`
`correct copies of the foregoing: Petitioner’s Updated Exhibit List and
`
`Corrected Exhibit 1004 by Federal Express Next Business Day Delivery on
`
`August 8, 2024, on the Patent Owner’s correspondence address of record for the
`
`subject patent as follows:
`
`Finnegan, Henderson, Farabow,
`Garrett & Dunner LLP
`Attn: Christopher C. Johns
`901 New York Avenue, N.W.
`Washington, DC 20001-4413
`
`
`
`Dated: August 8, 2024
`
`
`
`
`
`
`
`/Matthew A. Argenti/
`Matthew A. Argenti, Lead Counsel
`Reg. No. 61,836
`
`
`
`
`-9-
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket