Issued Patents 2018
Showing 25 most recent of 42 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 10157049 | Static analysis with input reduction | Yinnon A. Haviv, Daniel Kalman, Dmitri Pikus, Omri Weisman | 2018-12-18 |
| 10135856 | Auto-tuning program analysis tools using machine learning | — | 2018-11-20 |
| 10133870 | Customizing a security report using static analysis | — | 2018-11-20 |
| 10127132 | Optimizing automated interactions with web applications | Igal Kreichman | 2018-11-13 |
| 10108525 | Optimizing automated interactions with web applications | Igal Kreichman | 2018-10-23 |
| 10102100 | Optimizing automated interactions with computer software applications | Igal Kreichman, Ariel Sakin | 2018-10-16 |
| 10095490 | System, method and apparatus for preventing vulnerable interleavings in web applications at compile time | Marco Pistoia | 2018-10-09 |
| 10097574 | Auto-tuning program analysis tools based on user feedback | Salvatore A. Guarnieri | 2018-10-09 |
| 10091232 | Solution-centric reporting of security warnings | Stephen D. Teilhet, Kristofer A. Duer, John Peyton | 2018-10-02 |
| 10080248 | System, method and apparatus for sensor virtualization in mobile devices | Marco Pistoia, Gegi Thomas | 2018-09-18 |
| 10079848 | Auto-tuning security analysis tool configuration via correlation analysis | Paul Ionescu, Iosif V. Onut | 2018-09-18 |
| 10078698 | Identifying client states | Gregor von Bochmann, Paul Ionescu, Guy-Vincent Jourdan, Seyed Ali Moosavi Byooki, Iosif V. Onut | 2018-09-18 |
| 10073975 | Application integrity verification in multi-tier architectures | Pietro Ferrara, Marco Pistoia, John Ponzo | 2018-09-11 |
| 10061682 | Detecting race condition vulnerabilities in computer software applications | — | 2018-08-28 |
| 10055590 | Rule matching in the presence of languages with no types or as an adjunct to current analyses for security vulnerability analysis | Salvatore A. Guarnieri, Marco Pistoia, Stephen D. Teilhet | 2018-08-21 |
| 10055329 | Detection of antipatterns through statistical analysis | Aharon Abadi, Moria Abadi | 2018-08-21 |
| 10027692 | Modifying evasive code using correlation analysis | Roee Hay, Sagi Kedmi | 2018-07-17 |
| 10019581 | Identifying stored security vulnerabilities in computer software applications | Omri Weisman | 2018-07-10 |
| 10015181 | Using natural language processing for detection of intended or unexpected application behavior | Lior Horesh, Raya Horesh, Marco Pistoia | 2018-07-03 |
| 10002253 | Execution of test inputs with applications in computer security assessment | Roee Hay, Sagi Kedmi | 2018-06-19 |
| 9996619 | Optimizing web crawling through web page pruning | Shahar Sperling, Omri Weisman | 2018-06-12 |
| 9996324 | Cooperative creation of dataflow models using sparse random instrumentation | Pietro Ferrara, Marco Pistoia | 2018-06-12 |
| 9977903 | Detecting security vulnerabilities on computing devices | Roee Hay, Daniel Kalman, Roi Saltzman | 2018-05-22 |
| 9959411 | Detecting security vulnerabilities on computing devices | Roee Hay, Daniel Kalman, Roi Saltzman | 2018-05-01 |
| 9946629 | System, method and apparatus for deriving root cause for software test failure | Lior Horesh, Raya Horesh, Marco Pistoia | 2018-04-17 |