AS

Adi Sharabani

IBM: 38 patents #2,506 of 70,183Top 4%
CA Ca: 3 patents #240 of 1,424Top 20%
Overall (All Time): #68,042 of 4,157,543Top 2%
44
Patents All Time

Issued Patents All Time

Showing 25 most recent of 44 patents

Patent #TitleCo-InventorsDate
10742666 System and method for static detection and categorization of information-flow downgraders Yinnon A. Haviv, Roee Hay, Marco Pistoia, Guy Podjarny, Takaaki Tateishi +2 more 2020-08-11
10621337 Application-to-application device ID sharing Yair Amit, Daniel Kandel 2020-04-14
10594736 Selective traffic blockage Yair Amit, Shahar Areli, Daniel Kandel, Elisha Eshed, Roy Iarchy 2020-03-17
10594732 Selective traffic blockage Yair Amit, Shahar Areli, Daniel Kandel, Elisha Eshed, Roy Iarchy 2020-03-17
9836608 System, method and apparatus for simultaneous definition and enforcement of access-control and integrity policies Paolina Centonze, Yinnon A. Haviv, Roee Hay, Marco Pistoia, Omer Tripp 2017-12-05
9785710 Automatic crawling of encoded dynamic URLs Nevon C. Brake, Obidul Islam 2017-10-10
9754028 Automatic crawling of encoded dynamic URLs Nevon C. Brake, Obidul Islam 2017-09-05
9747187 Simulating black box test results using information from white box testing Stephen Fink, Yinnon A. Haviv, Roee Hay, Marco Pistoia, Ory Segal +4 more 2017-08-29
9720798 Simulating black box test results using information from white box testing Stephen Fink, Yinnon A. Haviv, Roee Hay, Marco Pistoia, Ory Segal +4 more 2017-08-01
9607154 System, method and apparatus for simultaneous definition and enforcement of access-control and integrity policies Paolina Centonze, Yinnon A. Haviv, Roee Hay, Marco Pistoia, Omer Tripp 2017-03-28
9396099 Application state detector and inducer Guy Podjarny, Ariel Sakin, Ory Segal, Shlomi Shamir 2016-07-19
9298924 Fixing security vulnerability in a source code Aharon Abadi, Yishai Feldman, Ran Ettinger, Jonathan Bnayahu, Omer Tripp +2 more 2016-03-29
9288223 Potential attack detection based on dummy network traffic Yair Amit 2016-03-15
9275246 System and method for static detection and categorization of information-flow downgraders Yinnon A. Haviv, Roee Hay, Marco Pistoia, Guy Podjarny, Takaaki Tateishi +2 more 2016-03-01
9210184 Determining the vulnerability of computer software applications to attacks Roee Hay, Roi Saltzman, Omer Tripp 2015-12-08
9177155 Hybrid analysis of vulnerable information flows Evgeny Beskrovny, Omer Tripp 2015-11-03
9077688 Access control system for a mobile device Yair Amit 2015-07-07
9037916 Dynamic concolic execution of an application Daniel Kalman, Omer Tripp 2015-05-19
9009821 Injection attack mitigation using context sensitive encoding of injected input Guy Podjarny 2015-04-14
8996856 Selective encryption in mobile devices Yair Amit 2015-03-31
8909992 Dynamic concolic execution of an application Daniel Kalman, Omer Tripp 2014-12-09
8869287 Hybrid analysis of vulnerable information flows Evgeny Beskrovny, Omer Tripp 2014-10-21
8819637 Fixing security vulnerability in a source code Aharon Abadi, Yishai Feldman, Ran Ettinger, Jonathan Bnayahu, Omer Tripp +2 more 2014-08-26
8813237 Thwarting cross-site request forgery (CSRF) and clickjacking attacks Yair Amit, Roee Hay, Roi Saltzman 2014-08-19
8806133 Protection against cache poisoning Roee Hay 2014-08-12