| 9836608 |
System, method and apparatus for simultaneous definition and enforcement of access-control and integrity policies |
Yinnon A. Haviv, Roee Hay, Marco Pistoia, Adi Sharabani, Omer Tripp |
2017-12-05 |
| 9607154 |
System, method and apparatus for simultaneous definition and enforcement of access-control and integrity policies |
Yinnon A. Haviv, Roee Hay, Marco Pistoia, Adi Sharabani, Omer Tripp |
2017-03-28 |
| 9449190 |
Method and system for run-time dynamic and interactive identification software authorization requirements and privileged code locations, and for validation of other software program analysis results |
Jose Gomes, Marco Pistoia |
2016-09-20 |
| 8793800 |
Static analysis for verification of software program access to secure resources for computer systems |
Ryan Berg, Marco Pistoia, Omer Tripp |
2014-07-29 |
| 8683599 |
Static analysis for verification of software program access to secure resources for computer systems |
Ryan Berg, Marco Pistoia, Omer Tripp |
2014-03-25 |
| 8606621 |
Carbon management for sourcing and logistics |
Mondher Ben-Hamida, Chad Boucher, Mary E. Helander, Kaan K. Katircioglu, Karthik Sourirajan |
2013-12-10 |
| 8572727 |
System, method and apparatus for simultaneous definition and enforcement of access-control and integrity policies |
Yinnon A. Haviv, Roee Hay, Marco Pistoia, Adi Sharabani, Omer Tripp |
2013-10-29 |
| 8473899 |
Automatic optimization of string allocations in a computer program |
Mohammed Mostafa, Marco Pistoia, Takaaki Tateishi |
2013-06-25 |
| 8381242 |
Static analysis for verification of software program access to secure resources for computer systems |
Ryan Berg, Marco Pistoia, Omer Tripp |
2013-02-19 |
| 8346595 |
Carbon management for sourcing and logistics |
Mondhar Ben-Hamida, Chad Boucher, Mary E. Helander, Kaan K. Katircloglu, Karthik Sourirajan |
2013-01-01 |
| 8332939 |
System and method for the automatic identification of subject-executed code and subject-granted access rights |
Marco Pistoia |
2012-12-11 |
| 8230477 |
System and method for the automatic evaluation of existing security policies and automatic creation of new security policies |
Marco Pistoia |
2012-07-24 |
| 8006233 |
System and method for the automatic verification of privilege-asserting and subject-executed code |
Marco Pistoia |
2011-08-23 |