| 11928605 |
Techniques for cyber-attack event log fabrication |
Oleg Blinder, Omri Soceanu |
2024-03-12 |
| 10831474 |
ISA-ported container images |
Alain Azagury, Ilsiyar I. Gaynutdinov, Erez Hadad, Sadek Jbara, Igor Khapov +3 more |
2020-11-10 |
| 10762199 |
Compiler assisted protection against arbitrary code execution |
Ayman Jarrous, Dov Murik, Omer Y. Boehm |
2020-09-01 |
| 10607003 |
Mitigation of code reuse attacks by restricted indirect branch instruction |
— |
2020-03-31 |
| 10210328 |
Mitigation of code reuse attacks by restricted indirect branch instruction |
— |
2019-02-19 |
| 10007787 |
Runtime return-oriented programming detection |
Omer Y. Boehm |
2018-06-26 |
| 9928062 |
ISA-ported container images |
Alain Azagury, Ilsiyar I. Gaynutdinov, Erez Hadad, Sadek Jbara, Igor Khapov +3 more |
2018-03-27 |
| 9710354 |
Basic block profiling using grouping events |
Moshe Klausner |
2017-07-18 |
| 9710350 |
Basic block profiling using grouping events |
Moshe Klausner |
2017-07-18 |
| 9703667 |
Hardware-based edge profiling |
Grigori Chtrasberg, Moshe Klausner, Yaakov Yaari |
2017-07-11 |
| 9223806 |
Restarting a batch process from an execution point |
Grigori Chtrasberg, Ronen I. Kat, Moshe Klausner |
2015-12-29 |
| 8954680 |
Modifying data prefetching operation based on a past prefetching attempt |
— |
2015-02-10 |
| 8214817 |
Detecting change in program behavior for adaptive code optimization |
Bilha Mendelson |
2012-07-03 |
| 7991779 |
Method and apparatus for populating an index table |
Tal Drory, Amir Bar-Or |
2011-08-02 |
| 7945569 |
Method and apparatus for querying spatial data |
Tal Drory, Amir Bar-Or, David Konopnicki |
2011-05-17 |
| 7818297 |
System and method for refreshing a table using epochs |
Yuval Sherman, Hansjorg Zeller |
2010-10-19 |
| 6745174 |
Method of executing before-triggers in an active database |
Eliezer Levy, Yuval Sherman |
2004-06-01 |
| 6721725 |
Method of parallel trigger execution in an active database |
Eliezer Levy, Yuval Sherman, Boaz Ben-Zvi |
2004-04-13 |
| 6711560 |
Method of executing conflicting triggers in an active database |
Eliezer Levy, Yuval Sherman |
2004-03-23 |