RH

Roee Hay

IBM: 57 patents #1,416 of 70,183Top 3%
Globalfoundries: 1 patents #2,221 of 4,424Top 55%
HL Hcl Technologies Limited: 1 patents #81 of 244Top 35%
Overall (All Time): #40,474 of 4,157,543Top 1%
59
Patents All Time

Issued Patents All Time

Showing 26–50 of 59 patents

Patent #TitleCo-InventorsDate
9836608 System, method and apparatus for simultaneous definition and enforcement of access-control and integrity policies Paolina Centonze, Yinnon A. Haviv, Marco Pistoia, Adi Sharabani, Omer Tripp 2017-12-05
9781145 Persistent cross-site scripting vulnerability detection Emanuel Bronshtein, Sagi Kedmi 2017-10-03
9774590 Bypassing certificate pinning Emanuel Bronshtein, Sagi Kedmi 2017-09-26
9747187 Simulating black box test results using information from white box testing Stephen Fink, Yinnon A. Haviv, Marco Pistoia, Ory Segal, Adi Sharabani +4 more 2017-08-29
9734336 Process security validation Ronen Bachar, Erez Rokah, Yoav Shany 2017-08-15
9720798 Simulating black box test results using information from white box testing Stephen Fink, Yinnon A. Haviv, Marco Pistoia, Ory Segal, Adi Sharabani +4 more 2017-08-01
9721094 Determining privacy leaks Ronen Bachar, Yoav Shany, Omer Tripp 2017-08-01
9703676 Testing application internal modules with instrumentation Omer Tripp 2017-07-11
9607154 System, method and apparatus for simultaneous definition and enforcement of access-control and integrity policies Paolina Centonze, Yinnon A. Haviv, Marco Pistoia, Adi Sharabani, Omer Tripp 2017-03-28
9582667 Detecting vulnerability to resource exhaustion Roi Saltzman, Omer Tripp 2017-02-28
9537883 Process security validation Ronen Bachar, Erez Rokah, Yoav Shany 2017-01-03
9519566 Modeling memory use of applications Omer Tripp 2016-12-13
9519788 Identifying security vulnerabilities related to inter-process communications Omri Weisman 2016-12-13
9519789 Identifying security vulnerabilities related to inter-process communications Omri Weisman 2016-12-13
9514025 Modeling memory use of applications Omer Tripp 2016-12-06
9473523 Execution of test inputs with applications in computer security assessment Sagi Kedmi, Omer Tripp 2016-10-18
9275246 System and method for static detection and categorization of information-flow downgraders Yinnon A. Haviv, Marco Pistoia, Guy Podjarny, Adi Sharabani, Takaaki Tateishi +2 more 2016-03-01
9210184 Determining the vulnerability of computer software applications to attacks Roi Saltzman, Adi Sharabani, Omer Tripp 2015-12-08
9087137 Detection of custom parameters in a request URL Yair Amit, Roi Saltzman, Omer Tripp 2015-07-21
9026612 Generating a custom parameter rule based on a comparison of a run-time value to a request URL Yair Amit, Roi Saltzman, Omer Tripp 2015-05-05
9009841 Testing web applications for file upload vulnerabilities Yair Amit, Roi Saltzman 2015-04-14
8990940 Identifying whether an application is malicious Daniel Kalman, Roi Saltzman, Omer Tripp 2015-03-24
8931102 Testing web applications for file upload vulnerabilities Yair Amit, Roi Saltzman 2015-01-06
8869274 Identifying whether an application is malicious Daniel Kalman, Roi Saltzman, Omer Tripp 2014-10-21
8813237 Thwarting cross-site request forgery (CSRF) and clickjacking attacks Yair Amit, Roi Saltzman, Adi Sharabani 2014-08-19