Issued Patents All Time
Showing 176–200 of 299 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9424423 | Static security analysis using a hybrid representation of string values | Salvatore A. Guarnieri, Omer Tripp | 2016-08-23 |
| 9405916 | Automatic correction of security downgraders | Salvatore A. Guarnieri, Omer Tripp | 2016-08-02 |
| 9396336 | Automatic correction of security downgraders | Salvatore A. Guarnieri, Omer Tripp | 2016-07-19 |
| 9384354 | Rule matching in the presence of languages with no types or as an adjunct to current analyses for security vulnerability analysis | Salvatore A. Guarnieri, Stephen D. Teilhet, Omer Tripp | 2016-07-05 |
| 9372779 | System, method, apparatus and computer program for automatic evaluation of user interfaces in software programs | Joseph W. Ligman, John Ponzo, Gegi Thomas | 2016-06-21 |
| 9369349 | Automatic extraction, modeling, and code mapping of application user interface display screens and components | Joseph W. Ligman, John Ponzo, Gegi Thomas | 2016-06-14 |
| 9363284 | Testing web applications for security vulnerabilities with metarequests | Omer Tripp | 2016-06-07 |
| 9338063 | Automatic extraction, modeling, and code mapping of application user interface display screens and components | Joseph W. Ligman, John Ponzo, Gegi Thomas | 2016-05-10 |
| 9336120 | Enhanced string analysis that improves accuracy of static analysis | Salvatore A. Guarnieri, Takaaki Tateishi, Omer Tripp | 2016-05-10 |
| 9326237 | Method, apparatus and computer program product providing performance and energy optimization for mobile computing | Joseph W. Ligman, Gegi Thomas, Omer Tripp | 2016-04-26 |
| 9326236 | Method, apparatus and computer program product providing performance and energy optimization for mobile computing | Joseph W. Ligman, Gegi Thomas, Omer Tripp | 2016-04-26 |
| 9282013 | Transparently tracking provenance information in distributed data systems | Paul C. Castro, John Ponzo | 2016-03-08 |
| 9276829 | Transparently tracking provenance information in distributed data systems | Paul C. Castro, John Ponzo | 2016-03-01 |
| 9275246 | System and method for static detection and categorization of information-flow downgraders | Yinnon A. Haviv, Roee Hay, Guy Podjarny, Adi Sharabani, Takaaki Tateishi +2 more | 2016-03-01 |
| 9256409 | Building reusable function summaries for frequently visited methods to optimize data-flow analysis | Omer Tripp | 2016-02-09 |
| 9251352 | Quantitative analysis of information leakage vulnerabilities | Omer Tripp | 2016-02-02 |
| 9250876 | Building reusable function summaries for frequently visited methods to optimize data-flow analysis | Omer Tripp | 2016-02-02 |
| 9246885 | System, method, apparatus and computer programs for securely using public services for private or enterprise purposes | Paul C. Castro, John Ponzo, Gregory L. Truty | 2016-01-26 |
| 9223984 | After-the-fact configuration of static analysis tools able to reduce user burden | Salvatore A. Guarnieri, Omer Tripp | 2015-12-29 |
| 9208061 | Partitioning of program analyses into sub-analyses using dynamic hints | Salvatore A. Guarnieri, Omer Tripp | 2015-12-08 |
| 9208055 | Importance-based call graph construction | Stephen Fink, Yinnon A. Haviv, Omer Tripp, Omri Weisman | 2015-12-08 |
| 9178856 | System, method, apparatus and computer programs for securely using public services for private or enterprise purposes | Paul C. Castro, John Ponzo, Gregory L. Truty | 2015-11-03 |
| 9176849 | Partitioning of program analyses into sub-analyses using dynamic hints | Omer Tripp, Salvatore A. Guarnieri | 2015-11-03 |
| 9177143 | Progressive static security analysis | Omer Tripp, Salvatore A. Guarnieri | 2015-11-03 |
| 9166996 | Automatic correction of security downgraders | Salvatore A. Guarnieri, Omer Tripp | 2015-10-20 |