Issued Patents 2016
Showing 1–25 of 28 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9531600 | Automatic extraction, modeling, and code mapping of application user interface display screens and components | Joseph W. Ligman, John Ponzo, Gegi Thomas | 2016-12-27 |
| 9485268 | System, method and apparatus to visually configure an analysis of a program | Joseph W. Ligman, Omer Tripp | 2016-11-01 |
| 9479512 | Social and proximity based access control for mobile applications | Paul C. Castro, Yunwu Huang, Umut Topkara | 2016-10-25 |
| 9471553 | Automatically rendering web or hybrid applications natively | Joseph W. Ligman, John Ponzo, Gegi Thomas | 2016-10-18 |
| 9473507 | Social and proximity based access control for mobile applications | Paul C. Castro, Yunwu Huang, Umut Topkara | 2016-10-18 |
| 9459986 | Automatic generation of analysis-equivalent application constructs | Salvatore A. Guarnieri, Omer Tripp | 2016-10-04 |
| 9460282 | Static security analysis using a hybrid representation of string values | Salvatore A. Guarnieri, Omer Tripp | 2016-10-04 |
| 9459990 | Automatic and transparent application logging | Joseph W. Ligman, John Ponzo, Umut Topkara | 2016-10-04 |
| 9449190 | Method and system for run-time dynamic and interactive identification software authorization requirements and privileged code locations, and for validation of other software program analysis results | Paolina Centonze, Jose Gomes | 2016-09-20 |
| 9443102 | Protecting content displayed on a mobile device | Guy M. Cohen, Lior Horesh, Raya Horesh | 2016-09-13 |
| 9424423 | Static security analysis using a hybrid representation of string values | Salvatore A. Guarnieri, Omer Tripp | 2016-08-23 |
| 9405916 | Automatic correction of security downgraders | Salvatore A. Guarnieri, Omer Tripp | 2016-08-02 |
| 9396336 | Automatic correction of security downgraders | Salvatore A. Guarnieri, Omer Tripp | 2016-07-19 |
| 9384354 | Rule matching in the presence of languages with no types or as an adjunct to current analyses for security vulnerability analysis | Salvatore A. Guarnieri, Stephen D. Teilhet, Omer Tripp | 2016-07-05 |
| 9372779 | System, method, apparatus and computer program for automatic evaluation of user interfaces in software programs | Joseph W. Ligman, John Ponzo, Gegi Thomas | 2016-06-21 |
| 9369349 | Automatic extraction, modeling, and code mapping of application user interface display screens and components | Joseph W. Ligman, John Ponzo, Gegi Thomas | 2016-06-14 |
| 9363284 | Testing web applications for security vulnerabilities with metarequests | Omer Tripp | 2016-06-07 |
| 9336120 | Enhanced string analysis that improves accuracy of static analysis | Salvatore A. Guarnieri, Takaaki Tateishi, Omer Tripp | 2016-05-10 |
| 9338063 | Automatic extraction, modeling, and code mapping of application user interface display screens and components | Joseph W. Ligman, John Ponzo, Gegi Thomas | 2016-05-10 |
| 9326236 | Method, apparatus and computer program product providing performance and energy optimization for mobile computing | Joseph W. Ligman, Gegi Thomas, Omer Tripp | 2016-04-26 |
| 9326237 | Method, apparatus and computer program product providing performance and energy optimization for mobile computing | Joseph W. Ligman, Gegi Thomas, Omer Tripp | 2016-04-26 |
| 9282013 | Transparently tracking provenance information in distributed data systems | Paul C. Castro, John Ponzo | 2016-03-08 |
| 9275246 | System and method for static detection and categorization of information-flow downgraders | Yinnon A. Haviv, Roee Hay, Guy Podjarny, Adi Sharabani, Takaaki Tateishi +2 more | 2016-03-01 |
| 9276829 | Transparently tracking provenance information in distributed data systems | Paul C. Castro, John Ponzo | 2016-03-01 |
| 9256409 | Building reusable function summaries for frequently visited methods to optimize data-flow analysis | Omer Tripp | 2016-02-09 |