Issued Patents All Time
Showing 326–342 of 342 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 8584246 | Eliminating false reports of security vulnerabilities when testing computer software | Yinnon A. Haviv, Roee Hay, Marco Pistoia, Adi Sharabani, Takaaki Tateishi +1 more | 2013-11-12 |
| 8572727 | System, method and apparatus for simultaneous definition and enforcement of access-control and integrity policies | Paolina Centonze, Yinnon A. Haviv, Roee Hay, Marco Pistoia, Adi Sharabani | 2013-10-29 |
| 8572748 | Label-based taint analysis | Marco Pistoia, Takaaki Tateishi | 2013-10-29 |
| 8572747 | Policy-driven detection and verification of methods such as sanitizers and validators | Ryan Berg, Marco Pistoia, Takaaki Tateishi | 2013-10-29 |
| 8544104 | Enforcement of data privacy to maintain obfuscation of certain data | Michael G. Burke, Igor Peshansky, Marco Pistoia | 2013-09-24 |
| 8533694 | Identification of read/write chains during static analysis of computer software | Marco Pistoia, Takaaki Tateishi, Omri Weisman | 2013-09-10 |
| 8528095 | Injection context based static analysis of computer software applications | Yinnon A. Haviv, Roee Hay, Marco Pistoia, Ory Segal, Adi Sharabani +2 more | 2013-09-03 |
| 8516449 | Detecting and localizing security vulnerabilities in client-server application | Shay Artzi, Julian Timothy Dolby, Marco Pistoia, Frank Tip | 2013-08-20 |
| 8516453 | Partition-based static analysis of computer software applications | — | 2013-08-20 |
| 8490057 | Confidence-based static analysis | Marco Pistoia | 2013-07-16 |
| 8468605 | Identifying security vulnerability in computer software | Yinnon A. Haviv, Roee Hay, Marco Pistoia, Adi Sharabani, Takaaki Tateishi +1 more | 2013-06-18 |
| 8397300 | Detecting security vulnerabilities relating to cryptographically-sensitive information carriers when testing computer software | — | 2013-03-12 |
| 8387017 | Black box testing optimization using information from white box testing | Rob Calendino, Craig Robert Earl Conboy, Guy Podjarny, Ory Segal, Adi Sharabani +1 more | 2013-02-26 |
| 8381242 | Static analysis for verification of software program access to secure resources for computer systems | Ryan Berg, Paolina Centonze, Marco Pistoia | 2013-02-19 |
| 8381199 | Modular and/or demand-driven string analysis of a computer program | Takaaki Tateishi, Marco Pistoia | 2013-02-19 |
| 8375371 | Importance-based call graph construction | Stephen Fink, Yinnon A. Haviv, Marco Pistoia, Omri Weisman | 2013-02-12 |
| 8365281 | Determining whether method of computer program is a validator | Takaaki Tateishi, Marco Pistoia, Ryan Berg, Robert Wiener | 2013-01-29 |