`By: Matthew A. Argenti (margenti@wsgr.com)
`
`Michael T. Rosato (mrosato@wsgr.com)
`Wesley E. Derryberry (wderryberry@wsgr.com)
`Tasha M. Thomas (tthomas@wsgr.com)
`Joseph M. Baillargeon (jbaillargeon@wsgr.com)
`WILSON SONSINI GOODRICH & ROSATI
`650 Page Mill Road
`Palo Alto, CA 94304
`
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`————————————————
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`————————————————
`
`WIZ, INC.,
`Petitioner,
`
`v.
`
`ORCA SECURITY LTD.,
`Patent Owner.
`
`————————————————
`Case IPR2024-01191
`Patent No. 11,775,326
`————————————————
`
`PETITIONER’S UPDATED EXHIBIT LIST
`
`
`
`
`
`Exhibit
`No.
`1001 U.S. Patent No. 11,775,326 to Shua
`
`Description
`
`1002 Declaration of Dr. Angelos Stavrou
`
`1003 Curriculum Vitae of Dr. Angelos Stavrou
`1004 CORRECTED - File History of U.S. Patent Application No.
`18/055,181 (’326 Pat.)
`
`1005
`
`1006
`
`Scheduling Order (Dkt. No. 33), Orca security ltd. v. Wiz, Inc., No.
`1:23cv-00758-GBW (DDE)
`
`Second Amended Complaint for Patent Infringement (Dkt. No. 15),
`Orca security ltd. v. Wiz, Inc., No. 1:23cv-00758-GBW (DDE)
`
`1007 U.S. Patent No. 11,216,563 B1 to Veselov
`1008 U.S. Publication No. 2013/0191919 A1, published July 25, 2013, to
`Basavapatna
`1009 Wolf, “Virtualization: From the Desktop to the Enterprise” APRESS
`(2005)
`
`1010
`
`Waldspurger, “Memory Resource Management in VMware ESX
`Server,” USENIX, Proceedings of the 5th Symposium on Operating
`Systems Design and Implementation (Dec. 9-11, 2002)
`1011 Goldberg, “Survey of Virtual Machine Research,” COMPUTER, Vol.
`7, No. 6 (June 1974)
`
`1012 U.S. Patent No. 10,944,811 B2 to Doctor
`
`1013
`
`Wood, “Black-box and Gray-box Strategies for Virtual Machine
`Migration” NSDI ’07: 4th USENIX Symposium on Networked
`Systems Design & Implementation, USENIX
`1014 Klemperer, “Efficient Hypervisor Based Malware Detection,”
`Carnegie Mellon University (May 2015)
`
`-1-
`
`
`
`Exhibit
`No.
`
`1015
`
`1016
`
`Description
`
`vSphere Web Services SDK Programming Guide, VMWare, Inc.
`(April 17, 2018)
`
`Souppaya, “Application Container Security Guide,” NIST Special
`Publication 800-190 (Sept. 2017)
`https://doi.org/10.6028/NIST.SP.800-190
`
`1017 U.S. Patent No. 11,106,784 B2 to Rosendahl
`
`1018
`
`Scarfone, “Guide to Security for Full Virtualization Technologies:
`Recommendations of the National Inst. of Standards and Technology,”
`NIST Special Publication 800-125 (Jan. 2011)
`
`1019 U.S. Patent No. 9,881,040 B2 to Rawat
`
`1020 U.S. Patent No. 9,116,633 B2 to Sancheti
`
`1021
`
`“NIST Cloud Computing Standards Roadmap,” NIST Special
`Publication 500-291, Version 2 (July 2013).
`1022 Roberts, “Public Cloud Service Definition,” VMware vCloud®
`Architecture Toolkit™ for Service Providers, VMware, Inc. (2018)
`
`1023
`
`1024
`
`ITL Bulletin, “Security Patches and the CVE Vulnerability Naming
`Scheme: Tools to Address Computer System Vulnerabilities,” NIST
`(Oct. 2002)
`
`ITL Bulletin, “Preventing and Handling Malware Incidents: How to
`Protect Information Technology Systems from Malicious Code and
`Software,” NIST (Dec. 2005)
`
`1025
`
`Cichonski, “Computer Security Incident Handling Guide:
`Recommendations of the National Institute of Standards and
`Technology,” NIST Special Publication 800-61, Rev. 2 (Aug. 2012)
`http://dx.doi.org/10.6028/NIST.SP.800-61r2
`1026 ENISA Threat Landscape Report 2018, “15 top Cyberthreats and
`Trends” V1.0 (Jan. 2019)
`
`-2-
`
`
`
`Exhibit
`No.
`1027 Verizon, “2019 Data Breach Investigations Report” (May 2019)
`
`Description
`
`1028
`
`1029
`
`1030
`
`1031
`
`Di Pietro, “Virtualization Technologies and Cloud Security:
`Advantages, Issues, and Perspectives,” Springer Nature Switzerland
`AG (2018) https://doi.org/10.1007/978-3-030-04834-1_9
`
`Singh, “Overview of Attacks on Cloud Computing, Int’l. J. of Eng.
`And Innovative Technology (IJEIT), Vol. 1, Issue 4 (Apr. 2012)
`
`Bairwa, “Vulnerability Scanners: A Proactive Approach to Assess
`Web Application Security,” Int’l. J. on Computational Sciences &
`Applications (IJSCA), Vol. 4, No. 1 (Feb. 2014)
`
`Stone, “IT Asset Management,” NIST Special Publication 1800-5
`(Sept. 2018) http://doi.org/10.6028/NIST.SP.1800-5
`
`1032 EP Patent No. 3,360,071 B1 to Li
`
`1033
`
`1034
`
`1035
`
`Garfinkel, “A Virtual Machine Introspection Based Architecture for
`Intrusion Detection,” Computer Science Dept., Stanford University
`(2003)
`
`Tang, “VirtAV: An Agentless Runtime Antivirus System for Virtual
`Machines,” KSII Transactions on the Internet and Information
`Systems, Vol. 11, No. 11 (Nov. 2017)
`https://doi.org/10.3837/tiis.2017.11.026
`
`Lengyel, “Scalability, Fidelity and Stealth in the DRAKVUF Dynamic
`Malware Analysis System (2014)
`https://doi.org/10.1145/2664243.2664252
`
`1036 U.S. Patent No. 8,613,080 B2 to Wysopal
`
`1037
`
`Bauman, “A Survey on Hypervisor-Based Monitoring: Approaches,
`Applications, and Evolutions,” ACM Computing Surveys, Vol. 48,
`No. 1, Article 10 (Aug. 2015)
`
`-3-
`
`
`
`Exhibit
`No.
`
`1038
`
`1039
`
`Description
`
`Suneja, “Exploring VM Introspection: Techniques and Trade-offs,”
`ACM, VEE’15 (Mar. 2015)
`http://dx.doi.org/10.1145/2731186.2731196
`
`Payne, “Simplifying Virtual Machine Introspection Using LibVMI,”
`SANDIA Report-SAND2012-7818, Sandia National Labs. (Sep. 2012)
`
`1040 U.S. Publication No. 2013/0111018 A1 to Ammons
`
`1041 U.S. Patent No. 5,893,131 to Kornfeld
`
`1042 U.S. Patent No. 7,975,305 B2 to Rubin
`
`1043
`
`Jiang, “Stealthy Malware Detection and Monitoring Through VMM-
`Based “Out-of-the-Box” Semantic View Reconstruction,” ACM
`Transactions on Information and System Security, Vol. 13, No. 2,
`Article 12 (Feb. 2010)
`
`1044 U.S. Patent No. 9,141,805 B2 to Giakouminakis
`
`1045 U.S. Publication No. 2019/0379700 A1 to Canzanese Jr.
`
`1046 U.S. Patent No. 10,783,241 B2 to Crabtree
`
`1047
`
`Bourquin, “Binslayer: Accurate Comparison of Binary Executables,”
`2nd ACM SIGPLAN Program Protection and Reverse Engineering
`Workshop (2013)
`
`1048 U.S. Publication No. 2013/0247133 A1 to Price
`
`1049 Huseinovic – VM Memory Forensics.
`
`1050
`Intentionally Left Blank
`1051 Using VMware Workstation Pro: VMware Workstation Pro 14.0,
`VMware, Inc. (December 17, 2017)
`1052 VMware VirtualCenter User’s Manual version 1.4, VMware, Inc.
`(July 7, 2006)
`
`-4-
`
`
`
`Exhibit
`No.
`1053 U.S. Publication No.2010/0070725 A1 to Prahlad
`
`Description
`
`1054 U.S. Patent No. 9,830,182 B2 to Ackley
`
`1055
`
`Virtual Disk Programming Guide: vSphere Storage APIs for Data
`Protection (VADP) 6.0 & Virtual Disk Development Kit (VDDK) 6.0,
`VMware, Inc. (March 25, 2016)
`
`1056 U.S. Publication No. 2015/0033221 A1 to Chari
`
`Archived copy of “CWE-200: Information Exposure,” published by
`MITRE and archived on January 26, 2019, by the Internet Archive’s
`“Wayback Machine”
`https://web.archive.org/web/20190126150012/https://cwe.mitre.org/da
`ta/definitions/200.html
`
`Archived copy of “CWE-311: Missing Encryption of Sensitive Data,”
`published by MITRE and archived on January 17, 2019, by the
`Internet Archive’s “Wayback Machine”
`https://web.archive.org/web/20190117150049/https://cwe.mitre.org/da
`ta/definitions/311.html
`
`Archived copy of “CWE-359: Exposure of Private Information
`(‘Privacy Violation’),” published by MITRE and archived on January
`13, 2019, by the Internet Archive’s “Wayback Machine”
`https://web.archive.org/web/20190113052451/https://cwe.mitre.org/da
`ta/definitions/359.html
`
`Intentionally Left Blank
`
`Intentionally Left Blank
`
`Intentionally Left Blank
`
`1057
`
`1058
`
`1059
`
`1060
`
`1061
`
`1062
`
`1063 U.S. Publication No. 2014/0245376 A1 to Hibbert
`
`1064 U.S. Publication No. 2017/0180318 A1 to Lutas
`
`1065 U.S. Patent No. 9,900,333 B2 to Thakar
`
`-5-
`
`
`
`Exhibit
`No.
`
`1066
`
`1067
`
`Description
`
`Zhou, “Always Up-to-date—Scalable Offline Patching of VM Images
`in a Compute Cloud,” 26th annual computer security applications
`conference (2010)
`
`Jeswani, “ImageElves: Rapid and Reliable System Updates in the
`Cloud,” 2013 IEEE 33rd International Conference on Distributed
`Computing Systems (2013)
`
`1068 U.S. Patent No. 8,984.478 B2 to Epstein
`
`
`
`1069 U.S. Patent No. 11,061,682 B2 to Vorbach
`
`1070 U.S. Publication No. 2013/0024940 A1 to Hutchins
`
`1071 U.S. Patent No. 9,875,160 B2 to Bezbaruah
`
`1072 U.S. Patent No. 10,536,471 B1 to Derbeko
`
`1073
`
`Ammons, “Virtual machine images as structured data: the Mirage
`image library,” 3rd USENIX conference on Hot topics in cloud
`computing (2011)
`1074 VMware Infrastructure Architecture Overview White Paper, VMWare,
`Inc. (2006)
`
`1075 U.S. Patent No. 9,692,778 B1 to Mohanty
`
`1076 U.S. Patent No. 10,055,576 B2 to Milner
`
`1077 U.S. Patent No. 9,824,216 B1 to Khalid
`
`1078 U.S. Publication No. 2020/0097662 A1 to Hufsmith
`
`1079
`
`Carroll, “Challenges in Modern Digital Investigative Analysis,”
`published in Forensic Science and Forensic Evidence I, U.S. Att’ys
`Bull. Vol. 65 No. 1 (January 2017)
`
`1080 U.S. Patent No. 7,831,739 B2 to Lambeth
`
`1081 U.S. Publication No. 2010/0169948 A1 to Budko
`
`-6-
`
`
`
`Exhibit
`No.
`
`Description
`
`1082
`
`United States District Courts—National Judicial Caseload Profile
`(December 31, 2023)
`https://www.uscourts.gov/sites/default/files/fcms_na_distprofile1231.2
`023_0.pdf
`1083 Amended Scheduling Order (Dkt. No. 90), Orca security ltd. v. Wiz,
`Inc., No. 1:23cv-00758-GBW (DDE)
`
`1084 U.S. Patent No. 9,749,349 B2 to Czarny
`
`1085 U.S. Publication No. 2017/004826 A1 to Hovor
`
`1086
`
`1087
`
`1088
`
`1089
`
`1090
`
`1091
`
`1092
`
`1093
`
`1094
`
`Intentionally Left Blank
`
`Intentionally Left Blank
`
`Intentionally Left Blank
`
`Intentionally Left Blank
`
`Intentionally Left Blank
`
`Intentionally Left Blank
`
`Federal Information Processing Standards Publication 180-4, “Secure
`Hash Standard (SHS),” NIST (August 2015)
`https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf
`
`Intentionally Left Blank
`
`Intentionally Left Blank
`
`1095 U.S. Publication No. 2017 / 0372070 A1 to Burdett
`
`1096
`
`1097
`
`1098
`
`Intentionally Left Blank
`
`Intentionally Left Blank
`
`Intentionally Left Blank
`
`-7-
`
`
`
`Exhibit
`No.
`1099
`
`1100
`
`1101
`
`1102
`
`1103
`
`1104
`
`1105
`
`1106
`
`
`
`Description
`
`Intentionally Left Blank
`
`Intentionally Left Blank
`
`Intentionally Left Blank
`
`Intentionally Left Blank
`
`Intentionally Left Blank
`
`Intentionally Left Blank
`
`Intentionally Left Blank
`
`International Telecommunication Union, “Common vulnerability
`scoring system 3.0,” Recommendation ITU-T X.1521 (Mar. 2016)
`https://www.itu.int/rec/dologin_pub.asp?lang=e&id=T-REC-X.1521-
`201603-I!!PDF-E&type=items
`
`
`
`
`
`-8-
`
`
`
`CERTIFICATE OF SERVICE
`
`Pursuant to 37 C.F.R. §42.6(e), I certify that I caused to be served true and
`
`correct copies of the foregoing: Petitioner’s Updated Exhibit List and
`
`Corrected Exhibit 1004 by Federal Express Next Business Day Delivery on
`
`August 8, 2024, on the Patent Owner’s correspondence address of record for the
`
`subject patent as follows:
`
`Finnegan, Henderson, Farabow,
`Garrett & Dunner LLP
`Attn: Christopher C. Johns
`901 New York Avenue, N.W.
`Washington, DC 20001-4413
`
`
`
`Dated: August 8, 2024
`
`
`
`
`
`
`
`/Matthew A. Argenti/
`Matthew A. Argenti, Lead Counsel
`Reg. No. 61,836
`
`
`
`
`-9-
`
`