OT

Omer Tripp

IBM: 324 patents #67 of 70,183Top 1%
AM Amazon: 9 patents #1,674 of 19,158Top 9%
Globalfoundries: 7 patents #504 of 4,424Top 15%
Google: 1 patents #14,769 of 22,993Top 65%
GU Globalfoundries U.S.: 1 patents #22 of 211Top 15%
📍 San Jose, CA: #17 of 32,062 inventorsTop 1%
🗺 California: #171 of 386,348 inventorsTop 1%
Overall (All Time): #937 of 4,157,543Top 1%
342
Patents All Time

Issued Patents All Time

Showing 326–342 of 342 patents

Patent #TitleCo-InventorsDate
8584246 Eliminating false reports of security vulnerabilities when testing computer software Yinnon A. Haviv, Roee Hay, Marco Pistoia, Adi Sharabani, Takaaki Tateishi +1 more 2013-11-12
8572727 System, method and apparatus for simultaneous definition and enforcement of access-control and integrity policies Paolina Centonze, Yinnon A. Haviv, Roee Hay, Marco Pistoia, Adi Sharabani 2013-10-29
8572748 Label-based taint analysis Marco Pistoia, Takaaki Tateishi 2013-10-29
8572747 Policy-driven detection and verification of methods such as sanitizers and validators Ryan Berg, Marco Pistoia, Takaaki Tateishi 2013-10-29
8544104 Enforcement of data privacy to maintain obfuscation of certain data Michael G. Burke, Igor Peshansky, Marco Pistoia 2013-09-24
8533694 Identification of read/write chains during static analysis of computer software Marco Pistoia, Takaaki Tateishi, Omri Weisman 2013-09-10
8528095 Injection context based static analysis of computer software applications Yinnon A. Haviv, Roee Hay, Marco Pistoia, Ory Segal, Adi Sharabani +2 more 2013-09-03
8516449 Detecting and localizing security vulnerabilities in client-server application Shay Artzi, Julian Timothy Dolby, Marco Pistoia, Frank Tip 2013-08-20
8516453 Partition-based static analysis of computer software applications 2013-08-20
8490057 Confidence-based static analysis Marco Pistoia 2013-07-16
8468605 Identifying security vulnerability in computer software Yinnon A. Haviv, Roee Hay, Marco Pistoia, Adi Sharabani, Takaaki Tateishi +1 more 2013-06-18
8397300 Detecting security vulnerabilities relating to cryptographically-sensitive information carriers when testing computer software 2013-03-12
8387017 Black box testing optimization using information from white box testing Rob Calendino, Craig Robert Earl Conboy, Guy Podjarny, Ory Segal, Adi Sharabani +1 more 2013-02-26
8381242 Static analysis for verification of software program access to secure resources for computer systems Ryan Berg, Paolina Centonze, Marco Pistoia 2013-02-19
8381199 Modular and/or demand-driven string analysis of a computer program Takaaki Tateishi, Marco Pistoia 2013-02-19
8375371 Importance-based call graph construction Stephen Fink, Yinnon A. Haviv, Marco Pistoia, Omri Weisman 2013-02-12
8365281 Determining whether method of computer program is a validator Takaaki Tateishi, Marco Pistoia, Ryan Berg, Robert Wiener 2013-01-29