| 11295013 |
Dimensionality reduction based on functionality |
Fady Copty, Tamer Salman, Maksim Shudrak |
2022-04-05 |
| 10798075 |
Interface layer obfuscation and usage thereof |
Fady Copty, Ronen Levy, Sharon Keidar Barner |
2020-10-06 |
| 10762199 |
Compiler assisted protection against arbitrary code execution |
Dov Murik, Omer Y. Boehm, Nitzan Peleg |
2020-09-01 |
| 10742642 |
User authentication based on predictive applications |
Ayelet Avni, Fady Copty, Sharon Keidar-Barner, Shiri Lemel |
2020-08-11 |
| 10599330 |
Challenge generation for verifying users of computing devices |
Alexandra Shulman-Peleg, Eitan Menahem |
2020-03-24 |
| 10417412 |
Protecting computer code against ROP attacks |
Fady Copty, Tamer Salman |
2019-09-17 |
| 10387655 |
Method, system and product for using a predictive model to predict if inputs reach a vulnerability of a program |
Fady Copty, Sharon Keidar-Barner, Tamer Salman |
2019-08-20 |
| 10360402 |
Intercepting sensitive data using hashed candidates |
Ariel Farkash, Micha Moffie, Gal Peretz, Tamer Salman |
2019-07-23 |
| 10223527 |
Protecting computer code against ROP attacks |
Eitan Farchi, Tamer Salman |
2019-03-05 |
| 10082954 |
Challenge generation for verifying users of computing devices |
Alexandra Shulman-Peleg, Eitan Menahem |
2018-09-25 |
| 9984247 |
Password theft protection for controlling access to computer software |
Ariel Farkash, Micha Moffie |
2018-05-29 |
| 9900775 |
On-device authorization of devices for collaboration and association |
Yossi Gilad, Ravid Sagy, Alexandra Shulman-Peleg |
2018-02-20 |
| 9554273 |
User identification on a touchscreen device |
Eitan Menahem, Alexandra Shulman-Peleg |
2017-01-24 |
| 8542886 |
System for secure face identification (SCIFI) and methods useful in conjunction therewith |
Margarita Osadchy, Binyamin Pinkas, Boaz Moskovich |
2013-09-24 |