| 9836608 |
System, method and apparatus for simultaneous definition and enforcement of access-control and integrity policies |
Paolina Centonze, Yinnon A. Haviv, Marco Pistoia, Adi Sharabani, Omer Tripp |
2017-12-05 |
| 9781145 |
Persistent cross-site scripting vulnerability detection |
Emanuel Bronshtein, Sagi Kedmi |
2017-10-03 |
| 9774590 |
Bypassing certificate pinning |
Emanuel Bronshtein, Sagi Kedmi |
2017-09-26 |
| 9747187 |
Simulating black box test results using information from white box testing |
Stephen Fink, Yinnon A. Haviv, Marco Pistoia, Ory Segal, Adi Sharabani +4 more |
2017-08-29 |
| 9734336 |
Process security validation |
Ronen Bachar, Erez Rokah, Yoav Shany |
2017-08-15 |
| 9721094 |
Determining privacy leaks |
Ronen Bachar, Yoav Shany, Omer Tripp |
2017-08-01 |
| 9720798 |
Simulating black box test results using information from white box testing |
Stephen Fink, Yinnon A. Haviv, Marco Pistoia, Ory Segal, Adi Sharabani +4 more |
2017-08-01 |
| 9703676 |
Testing application internal modules with instrumentation |
Omer Tripp |
2017-07-11 |
| 9607154 |
System, method and apparatus for simultaneous definition and enforcement of access-control and integrity policies |
Paolina Centonze, Yinnon A. Haviv, Marco Pistoia, Adi Sharabani, Omer Tripp |
2017-03-28 |
| 9582667 |
Detecting vulnerability to resource exhaustion |
Roi Saltzman, Omer Tripp |
2017-02-28 |
| 9537883 |
Process security validation |
Ronen Bachar, Erez Rokah, Yoav Shany |
2017-01-03 |