Issued Patents All Time
Showing 25 most recent of 44 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 10742666 | System and method for static detection and categorization of information-flow downgraders | Yinnon A. Haviv, Roee Hay, Marco Pistoia, Guy Podjarny, Takaaki Tateishi +2 more | 2020-08-11 |
| 10621337 | Application-to-application device ID sharing | Yair Amit, Daniel Kandel | 2020-04-14 |
| 10594736 | Selective traffic blockage | Yair Amit, Shahar Areli, Daniel Kandel, Elisha Eshed, Roy Iarchy | 2020-03-17 |
| 10594732 | Selective traffic blockage | Yair Amit, Shahar Areli, Daniel Kandel, Elisha Eshed, Roy Iarchy | 2020-03-17 |
| 9836608 | System, method and apparatus for simultaneous definition and enforcement of access-control and integrity policies | Paolina Centonze, Yinnon A. Haviv, Roee Hay, Marco Pistoia, Omer Tripp | 2017-12-05 |
| 9785710 | Automatic crawling of encoded dynamic URLs | Nevon C. Brake, Obidul Islam | 2017-10-10 |
| 9754028 | Automatic crawling of encoded dynamic URLs | Nevon C. Brake, Obidul Islam | 2017-09-05 |
| 9747187 | Simulating black box test results using information from white box testing | Stephen Fink, Yinnon A. Haviv, Roee Hay, Marco Pistoia, Ory Segal +4 more | 2017-08-29 |
| 9720798 | Simulating black box test results using information from white box testing | Stephen Fink, Yinnon A. Haviv, Roee Hay, Marco Pistoia, Ory Segal +4 more | 2017-08-01 |
| 9607154 | System, method and apparatus for simultaneous definition and enforcement of access-control and integrity policies | Paolina Centonze, Yinnon A. Haviv, Roee Hay, Marco Pistoia, Omer Tripp | 2017-03-28 |
| 9396099 | Application state detector and inducer | Guy Podjarny, Ariel Sakin, Ory Segal, Shlomi Shamir | 2016-07-19 |
| 9298924 | Fixing security vulnerability in a source code | Aharon Abadi, Yishai Feldman, Ran Ettinger, Jonathan Bnayahu, Omer Tripp +2 more | 2016-03-29 |
| 9288223 | Potential attack detection based on dummy network traffic | Yair Amit | 2016-03-15 |
| 9275246 | System and method for static detection and categorization of information-flow downgraders | Yinnon A. Haviv, Roee Hay, Marco Pistoia, Guy Podjarny, Takaaki Tateishi +2 more | 2016-03-01 |
| 9210184 | Determining the vulnerability of computer software applications to attacks | Roee Hay, Roi Saltzman, Omer Tripp | 2015-12-08 |
| 9177155 | Hybrid analysis of vulnerable information flows | Evgeny Beskrovny, Omer Tripp | 2015-11-03 |
| 9077688 | Access control system for a mobile device | Yair Amit | 2015-07-07 |
| 9037916 | Dynamic concolic execution of an application | Daniel Kalman, Omer Tripp | 2015-05-19 |
| 9009821 | Injection attack mitigation using context sensitive encoding of injected input | Guy Podjarny | 2015-04-14 |
| 8996856 | Selective encryption in mobile devices | Yair Amit | 2015-03-31 |
| 8909992 | Dynamic concolic execution of an application | Daniel Kalman, Omer Tripp | 2014-12-09 |
| 8869287 | Hybrid analysis of vulnerable information flows | Evgeny Beskrovny, Omer Tripp | 2014-10-21 |
| 8819637 | Fixing security vulnerability in a source code | Aharon Abadi, Yishai Feldman, Ran Ettinger, Jonathan Bnayahu, Omer Tripp +2 more | 2014-08-26 |
| 8813237 | Thwarting cross-site request forgery (CSRF) and clickjacking attacks | Yair Amit, Roee Hay, Roi Saltzman | 2014-08-19 |
| 8806133 | Protection against cache poisoning | Roee Hay | 2014-08-12 |