Issued Patents All Time
Showing 251–275 of 299 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 8726246 | Static analysis of validator routines | Ryan Berg, Takaaki Tateishi, Omer Tripp | 2014-05-13 |
| 8701186 | Formal analysis of the quality and conformance of information flow downgraders | Ryan Berg, Takaaki Tateishi, Stephen D. Teilhet, Omer Tripp | 2014-04-15 |
| 8695056 | Method for information tracking in multiple interdependent dimensions | Anindya Banerjee, Avraham E. Shinnar | 2014-04-08 |
| 8695098 | Detecting security vulnerabilities in web applications | Ori Segal, Omer Tripp | 2014-04-08 |
| 8683599 | Static analysis for verification of software program access to secure resources for computer systems | Ryan Berg, Paolina Centonze, Omer Tripp | 2014-03-25 |
| 8671284 | Security model for actor-based languages and apparatus, methods, and computer programming products using same | Bard Bloom, John H. Field, Salvatore A. Guarnieri | 2014-03-11 |
| 8667584 | Formal analysis of the quality and conformance of information flow downgraders | Ryan Berg, Takaaki Tateishi, Stephen D. Teilhet, Omer Tripp | 2014-03-04 |
| 8661264 | Security model for actor-based languages and apparatus, methods, and computer programming products using same | Bard Bloom, John H. Field, Salvatore A. Guarnieri | 2014-02-25 |
| 8656496 | Global variable security analysis | Shay Artzi, Ryan Berg, John Peyton, Manu Sridharan, Takaaki Tateishi +2 more | 2014-02-18 |
| 8650546 | Static analysis based on observed string values during execution of a computer-based software application | Takaaki Tateishi, Omer Tripp | 2014-02-11 |
| 8646088 | Runtime enforcement of security checks | Omer Tripp, Martin Vechev, Eran Yahav | 2014-02-04 |
| 8635602 | Verification of information-flow downgraders | Yinnon A. Haviv, Roee Hay, Adi Sharabani, Takaaki Tateishi, Omer Tripp +1 more | 2014-01-21 |
| 8627465 | Automatic inference of whitelist-based validation as part of static analysis for security | Lotem Guy, Takaaki Tateishi, Omer Tripp | 2014-01-07 |
| 8584246 | Eliminating false reports of security vulnerabilities when testing computer software | Yinnon A. Haviv, Roee Hay, Adi Sharabani, Takaaki Tateishi, Omer Tripp +1 more | 2013-11-12 |
| 8572748 | Label-based taint analysis | Takaaki Tateishi, Omer Tripp | 2013-10-29 |
| 8572674 | System, method, and apparatus for modular, string-sensitive, access rights analysis with demand-driven precision | Julian Timothy Dolby, Emmanuel Geay, Barbara G. Ryder, Takaaki Tateishi | 2013-10-29 |
| 8572727 | System, method and apparatus for simultaneous definition and enforcement of access-control and integrity policies | Paolina Centonze, Yinnon A. Haviv, Roee Hay, Adi Sharabani, Omer Tripp | 2013-10-29 |
| 8572747 | Policy-driven detection and verification of methods such as sanitizers and validators | Ryan Berg, Takaaki Tateishi, Omer Tripp | 2013-10-29 |
| 8561035 | Method and system to discover possible program variable values by connecting program value extraction with external data sources | Sergej Chicherin, Nikolai A. Joukov, Birgit M. Pfitzmann, Vasily Tarasov, Takaaki Tateishi +1 more | 2013-10-15 |
| 8544104 | Enforcement of data privacy to maintain obfuscation of certain data | Michael G. Burke, Igor Peshansky, Omer Tripp | 2013-09-24 |
| 8533659 | Efficient extraction of software dependencies from program code | Nikolai A. Joukov, Birgit M. Pfitzmann, Vasily Tarasov, Takaaki Tateishi, Norbert G. Vogl | 2013-09-10 |
| 8533694 | Identification of read/write chains during static analysis of computer software | Takaaki Tateishi, Omer Tripp, Omri Weisman | 2013-09-10 |
| 8528095 | Injection context based static analysis of computer software applications | Yinnon A. Haviv, Roee Hay, Ory Segal, Adi Sharabani, Takaaki Tateishi +2 more | 2013-09-03 |
| 8516449 | Detecting and localizing security vulnerabilities in client-server application | Shay Artzi, Julian Timothy Dolby, Frank Tip, Omer Tripp | 2013-08-20 |
| 8490057 | Confidence-based static analysis | Omer Tripp | 2013-07-16 |