| 10713069 |
Software and hardware emulation system |
Marat Boshernitsan, Scott McPeak, Andreas Kuehlmann, Roger H. Scott, Kit Transue |
2020-07-14 |
| 10417430 |
Security remediation |
Jon Passki, Romain Gaucher |
2019-09-17 |
| 9317399 |
Policy evaluation based upon dynamic observation, static analysis and code change history |
Marat Boshernitsan, Scott McPeak, Andreas Kuehlmann, Roger H. Scott, Kit Transue |
2016-04-19 |
| 9141807 |
Security remediation |
Jon Passki, Romain Gaucher |
2015-09-22 |
| 9015831 |
Method and apparatus for static taint analysis of computer program code |
Roger H. Scott |
2015-04-21 |
| 8953275 |
In situ sensor based contact detection |
Quan Li, Chee Wee Cheng, Beng Theam Ko, Myint Ngwe |
2015-02-10 |
| 8863093 |
Load-time instrumentation of virtual machine program code |
John Kodumal |
2014-10-14 |
| 8837076 |
In situ sensor based contact detection |
CheeWee Cheng, Subhash Guddati, ShengYuan Lin, SweeChuan Samuel Gan, Stefan Ionescu +3 more |
2014-09-16 |
| 8762961 |
Methods for selectively pruning false paths in graphs that use high-precision state information |
Sumant Kowshik |
2014-06-24 |
| 8413249 |
Threat assessment of software-configured system based upon architecture model and as-built code |
— |
2013-04-02 |
| 8359583 |
Methods for selectively pruning false paths in graphs that use high-precision state information |
Sumant Kowshik |
2013-01-22 |
| 7340726 |
Systems and methods for performing static analysis on source code |
Benjamin E. Chelf, Seth Hallem |
2008-03-04 |