OT

Omer Tripp

IBM: 324 patents #67 of 70,183Top 1%
AM Amazon: 9 patents #1,674 of 19,158Top 9%
Globalfoundries: 7 patents #504 of 4,424Top 15%
Google: 1 patents #14,769 of 22,993Top 65%
GU Globalfoundries U.S.: 1 patents #22 of 211Top 15%
📍 San Jose, CA: #17 of 32,062 inventorsTop 1%
🗺 California: #171 of 386,348 inventorsTop 1%
Overall (All Time): #937 of 4,157,543Top 1%
342
Patents All Time

Issued Patents All Time

Showing 276–300 of 342 patents

Patent #TitleCo-InventorsDate
8935795 Weighted security analysis 2015-01-13
8935674 Determining correctness conditions for use in static analysis Marco Pistoia 2015-01-13
8935680 Differential static program analysis Salvatore A. Guarnieri, Marco Pistoia 2015-01-13
8925094 Automatic synthesis of unit tests for security testing Daniel Kalman, Ory Segal, Omri Weisman 2014-12-30
8918886 Training classifiers for program analysis Marco Pistoia 2014-12-23
8914890 Determining the vulnerability of computer software applications to privilege-escalation attacks Marco Pistoia, Ori Segal 2014-12-16
8910293 Determining the vulnerability of computer software applications to privilege-escalation attacks Marco Pistoia, Ori Segal 2014-12-09
8910291 Black-box testing of web applications with client-side code evaluation Yinnon A. Haviv, Daniel Kalman, Dmitri Pikus, Omri Weisman 2014-12-09
8909992 Dynamic concolic execution of an application Daniel Kalman, Adi Sharabani 2014-12-09
8904543 Discovery of application vulnerabilities involving multiple execution flows Salvatore A. Guarnieri, Marco Pistoia 2014-12-02
8898188 String analysis based on three-valued logic Marco Pistoia, Takaaki Tateishi 2014-11-25
8893101 Hybrid dependency analysis using dynamic and static analyses 2014-11-18
8881300 Automated detection of flaws and incompatibility problems in information flow downgraders Marco Pistoia, Takaaki Tateishi, Stephen D. Teilhet 2014-11-04
8875297 Interactive analysis of a security specification Marco Pistoia, Takaaki Tateishi 2014-10-28
8869287 Hybrid analysis of vulnerable information flows Evgeny Beskrovny, Adi Sharabani 2014-10-21
8869274 Identifying whether an application is malicious Roee Hay, Daniel Kalman, Roi Saltzman 2014-10-21
8863292 Interactive analysis of a security specification Marco Pistoia, Takaaki Tateishi 2014-10-14
8856764 Distributed static analysis of computer software applications Marco Pistoia, Omri Weisman 2014-10-07
8856935 Automatic synthesis of unit tests for security testing Daniel Kalman, Ory Segal, Omri Weisman 2014-10-07
8850405 Generating sound and minimal security reports based on static analysis of a program Stephen Fink, Yinnon A. Haviv, Marco Pistoia, Omri Weisman 2014-09-30
8850589 Training classifiers for program analysis Marco Pistoia 2014-09-30
8844046 Method and apparatus for paralleling and distributing static source code security analysis using loose synchronization Salvatore A. Guarnieri, Marco Pistoia 2014-09-23
8839348 Effective testing of authorization logic of web components which utilize claims-based authorization Evgeny Beskrovny 2014-09-16
8839351 Effective testing of authorization logic of web components which utilize claims-based authorization Evgeny Beskrovny 2014-09-16
8819644 Selective data flow analysis of bounded regions of computer software applications Daniel Kalman, Dmitri Pikus, Omri Weisman 2014-08-26