| 12255980 |
Homomorphic encryption key management |
Akram Bitar, Ehud Aharoni, Nir Drucker, Omri Soceanu, Ronen Levy |
2025-03-18 |
| 11841982 |
Partitioning circuits for execution of sequential secure computation code on multiple processors |
Hayim Shaul, Ehud Aharoni, Omri Soceanu, Gilad Ezov, Lev Greenberg +1 more |
2023-12-12 |
| 11704119 |
Migrating infrastructure as code between different cloud providers |
Fady Copty, Lev Greenberg, Omer Y. Boehm, Omri Soceanu |
2023-07-18 |
| 11550567 |
User and entity behavior analytics of infrastructure as code in pre deployment of cloud infrastructure |
Fady Copty, Omri Soceanu, Lev Greenberg |
2023-01-10 |
| 11528134 |
Authentication using transformation verification |
Ehud Aharoni, Allon Adir, Ariel Farkash, Omri Soceanu |
2022-12-13 |
| 11308210 |
Automatic malware signature generation for threat detection systems |
Fady Copty, Matan Danos, Orit Edelstein, Benjamin Zeltser |
2022-04-19 |
| 11023362 |
Co-verification of hardware and software |
Fady Copty, Sharon Keidar Barner |
2021-06-01 |
| 11003573 |
Co-verification of hardware and software |
Fady Copty, Sharon Keidar Barner |
2021-05-11 |
| 10762199 |
Compiler assisted protection against arbitrary code execution |
Ayman Jarrous, Omer Y. Boehm, Nitzan Peleg |
2020-09-01 |
| 10657257 |
Feature vector aggregation for malware detection |
Fady Copty, Cynthia Rae Eisner, Tamer Salman |
2020-05-19 |
| 10649887 |
Co-verification of hardware and software |
Fady Copty, Sharon Keidar Barner |
2020-05-12 |
| 10606732 |
Hybrid genetic concolic co-verification of hardware and software |
Fady Copty, Sharon Keidar Barner |
2020-03-31 |