| 10560356 |
Assuring data correctness in non-stable network environment |
Aharon Abadi |
2020-02-11 |
| 10248536 |
Method for static and dynamic configuration verification |
Aharon Abadi, Nili Ifergan-Guy, Oleg Sternberg |
2019-04-02 |
| 10157049 |
Static analysis with input reduction |
Yinnon A. Haviv, Daniel Kalman, Omer Tripp, Omri Weisman |
2018-12-18 |
| 10136282 |
Dynamic download policy for mobile applications |
Aharon Abadi, Idan Ben-Harrush, Samuel Kallner |
2018-11-20 |
| 9830149 |
Automatic extraction of sensitive code fragments to be executed in a sandbox |
Aharon Abadi, Idan Ben-Harrush, Nili Ifergan-Guy |
2017-11-28 |
| 9396170 |
Hyperlink data presentation |
Idan Ben-Harrush, Anat Berkman, Alexander Dvinsky, Nili Guy, Samuel Kallner +4 more |
2016-07-19 |
| 9032528 |
Black-box testing of web applications with client-side code evaluation |
Yinnon A. Haviv, Daniel Kalman, Omer Tripp, Omri Weisman |
2015-05-12 |
| 8910291 |
Black-box testing of web applications with client-side code evaluation |
Yinnon A. Haviv, Daniel Kalman, Omer Tripp, Omri Weisman |
2014-12-09 |
| 8849631 |
Protocol independent telephony call lifecycle management scheme |
Shiri Kremer-Davidson, Alan Hartman, Mila Keren |
2014-09-30 |
| 8819644 |
Selective data flow analysis of bounded regions of computer software applications |
Daniel Kalman, Omer Tripp, Omri Weisman |
2014-08-26 |
| 8671397 |
Selective data flow analysis of bounded regions of computer software applications |
Daniel Kalman, Omer Tripp, Omri Weisman |
2014-03-11 |