Issued Patents All Time
Showing 201–225 of 299 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9164869 | Scalable and precise string analysis using index-sensitive static string abstractions | Salvatore A. Guarnieri, Omer Tripp | 2015-10-20 |
| 9158848 | Web testing tools system and method | Evgeny Beskrovny, Salvatore Angelo Guamieri, Omer Tripp | 2015-10-13 |
| 9158923 | Mitigating security risks via code movement | Salvatore A. Guarnieri, Omer Tripp | 2015-10-13 |
| 9141792 | Application-level anomaly detection | Mauro Baluda, Paul C. Castro, John Ponzo | 2015-09-22 |
| 9135147 | Automated testing of applications with scripting code | Shay Artzi, Julian Timothy Dolby, Salvatore A. Guarnieri, Simon H. Jensen, Manu Sridharan +2 more | 2015-09-15 |
| 9135441 | Progressive static security analysis | Omer Tripp, Salvatore A. Guarnieri | 2015-09-15 |
| 9129119 | Enforcement of data privacy to maintain obfuscation of certain data | Michael G. Burke, Igor Peshansky, Omer Tripp | 2015-09-08 |
| 9122734 | Transparent data service suitable for modifying data storage capabilities in applications | Paul C. Castro, John Ponzo | 2015-09-01 |
| 9111091 | Automatic extraction, modeling, and code mapping of application user interface display screens and components | Joseph W. Ligman, John Ponzo, Gegi Thomas | 2015-08-18 |
| 9098623 | Static analysis of validator routines | Ryan Berg, Takaaki Tateishi, Omer Tripp | 2015-08-04 |
| 9092723 | Using a heuristically-generated policy to dynamically select string analysis algorithms for client queries | Takaaki Tateishi, Omer Tripp | 2015-07-28 |
| 9094400 | Authentication in virtual private networks | Eric J. Barkie, Benjamin L. Fletcher, John Ponzo, Andrew P. Wyskida | 2015-07-28 |
| 9081968 | Quantitative analysis of information leakage vulnerabilities | Omer Tripp | 2015-07-14 |
| 9075997 | Global variable security analysis | Shay Artzi, Ryan Berg, John Peyton, Manu Sridharan, Takaaki Tateishi +2 more | 2015-07-07 |
| 9043761 | Fault localization using condition modeling and return value modeling | Shay Artzi, Julian Timothy Dolby, Frank Tip | 2015-05-26 |
| 9021450 | Scalable and precise string analysis using index-sensitive static string abstractions | Salvatore A. Guarnieri, Omer Tripp | 2015-04-28 |
| 9009535 | Anomaly detection at the level of run time data structures | Omer Tripp | 2015-04-14 |
| 8990949 | Automatic correction of security downgraders | Salvatore A. Guarnieri, Omer Tripp | 2015-03-24 |
| 8984642 | Detecting security vulnerabilities in web applications | Ori Segal, Omer Tripp | 2015-03-17 |
| 8984495 | Enhanced string analysis that improves accuracy of static analysis | Salvatore A. Guarnieri, Takaaki Tateishi, Omer Tripp | 2015-03-17 |
| 8984493 | Distributed static analysis of computer software applications | Omer Tripp, Omri Weisman | 2015-03-17 |
| 8972334 | Transparent data service suitable for modifying data storage capabilities in applications | Paul C. Castro, John Ponzo | 2015-03-03 |
| 8955139 | Sound and effective data-flow analysis in the presence of aliasing | Julian Timothy Dolby, Salvatore A. Guarnieri, Omer Tripp | 2015-02-10 |
| 8955058 | Automatically generating challenge questions inferred from user history data for user authentication | Paul C. Castro, Joseph W. Ligman, David M. Lubensky, John Ponzo, Umut Topkara | 2015-02-10 |
| 8949995 | Certifying server side web applications against security vulnerabilities | Salvatore A. Guarnieri, Omer Tripp | 2015-02-03 |