Issued Patents All Time
Showing 301–325 of 342 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 8819637 | Fixing security vulnerability in a source code | Aharon Abadi, Yishai Feldman, Ran Ettinger, Jonathan Bnayahu, Yinnon A. Haviv +2 more | 2014-08-26 |
| 8819635 | Confidence-based static analysis | Marco Pistoia | 2014-08-26 |
| 8806648 | Automatic classification of security vulnerabilities in computer software applications | Lotem Guy, Daniel Kalman, Omri Weisman | 2014-08-12 |
| 8799874 | Static analysis of computer software applications | Marco Pistoia | 2014-08-05 |
| 8793800 | Static analysis for verification of software program access to secure resources for computer systems | Ryan Berg, Paolina Centonze, Marco Pistoia | 2014-07-29 |
| 8769696 | Automated detection of flaws and incompatibility problems in information flow downgraders | Marco Pistoia, Takaaki Tateishi, Stephen D. Teilhet | 2014-07-01 |
| 8756587 | Static analysis of computer software applications | Marco Pistoia | 2014-06-17 |
| 8752026 | Efficient code instrumentation | Adi Sharabani | 2014-06-10 |
| 8751422 | Using a heuristically-generated policy to dynamically select string analysis algorithms for client queries | Marco Pistoia, Takaaki Tateishi | 2014-06-10 |
| 8745578 | Eliminating false-positive reports resulting from static analysis of computer software | Marco Pistoia | 2014-06-03 |
| 8726246 | Static analysis of validator routines | Ryan Berg, Marco Pistoia, Takaaki Tateishi | 2014-05-13 |
| 8726245 | Static analysis of computer software applications having a model-view-controller architecture | Yinnon A. Haviv, Omri Weisman | 2014-05-13 |
| 8701186 | Formal analysis of the quality and conformance of information flow downgraders | Ryan Berg, Marco Pistoia, Takaaki Tateishi, Stephen D. Teilhet | 2014-04-15 |
| 8695098 | Detecting security vulnerabilities in web applications | Marco Pistoia, Ori Segal | 2014-04-08 |
| 8683599 | Static analysis for verification of software program access to secure resources for computer systems | Ryan Berg, Paolina Centonze, Marco Pistoia | 2014-03-25 |
| 8683596 | Detection of DOM-based cross-site scripting vulnerabilities | Yair Amit, Yinnon A. Haviv, Daniel Kalman, Omri Weisman | 2014-03-25 |
| 8671397 | Selective data flow analysis of bounded regions of computer software applications | Daniel Kalman, Dmitri Pikus, Omri Weisman | 2014-03-11 |
| 8667584 | Formal analysis of the quality and conformance of information flow downgraders | Ryan Berg, Marco Pistoia, Takaaki Tateishi, Stephen D. Teilhet | 2014-03-04 |
| 8656496 | Global variable security analysis | Shay Artzi, Ryan Berg, John Peyton, Marco Pistoia, Manu Sridharan +2 more | 2014-02-18 |
| 8650546 | Static analysis based on observed string values during execution of a computer-based software application | Marco Pistoia, Takaaki Tateishi | 2014-02-11 |
| 8646087 | Answering security queries statically based on dynamically-determined information | Marco Pistola, Peter K. Malkin | 2014-02-04 |
| 8646088 | Runtime enforcement of security checks | Marco Pistoia, Martin Vechev, Eran Yahav | 2014-02-04 |
| 8635602 | Verification of information-flow downgraders | Yinnon A. Haviv, Roee Hay, Marco Pistoia, Adi Sharabani, Takaaki Tateishi +1 more | 2014-01-21 |
| 8627465 | Automatic inference of whitelist-based validation as part of static analysis for security | Lotem Guy, Marco Pistoia, Takaaki Tateishi | 2014-01-07 |
| 8607352 | Classification of code constructs using string analysis | — | 2013-12-10 |