Issued Patents All Time
Showing 26–50 of 59 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9836608 | System, method and apparatus for simultaneous definition and enforcement of access-control and integrity policies | Paolina Centonze, Yinnon A. Haviv, Marco Pistoia, Adi Sharabani, Omer Tripp | 2017-12-05 |
| 9781145 | Persistent cross-site scripting vulnerability detection | Emanuel Bronshtein, Sagi Kedmi | 2017-10-03 |
| 9774590 | Bypassing certificate pinning | Emanuel Bronshtein, Sagi Kedmi | 2017-09-26 |
| 9747187 | Simulating black box test results using information from white box testing | Stephen Fink, Yinnon A. Haviv, Marco Pistoia, Ory Segal, Adi Sharabani +4 more | 2017-08-29 |
| 9734336 | Process security validation | Ronen Bachar, Erez Rokah, Yoav Shany | 2017-08-15 |
| 9720798 | Simulating black box test results using information from white box testing | Stephen Fink, Yinnon A. Haviv, Marco Pistoia, Ory Segal, Adi Sharabani +4 more | 2017-08-01 |
| 9721094 | Determining privacy leaks | Ronen Bachar, Yoav Shany, Omer Tripp | 2017-08-01 |
| 9703676 | Testing application internal modules with instrumentation | Omer Tripp | 2017-07-11 |
| 9607154 | System, method and apparatus for simultaneous definition and enforcement of access-control and integrity policies | Paolina Centonze, Yinnon A. Haviv, Marco Pistoia, Adi Sharabani, Omer Tripp | 2017-03-28 |
| 9582667 | Detecting vulnerability to resource exhaustion | Roi Saltzman, Omer Tripp | 2017-02-28 |
| 9537883 | Process security validation | Ronen Bachar, Erez Rokah, Yoav Shany | 2017-01-03 |
| 9519566 | Modeling memory use of applications | Omer Tripp | 2016-12-13 |
| 9519788 | Identifying security vulnerabilities related to inter-process communications | Omri Weisman | 2016-12-13 |
| 9519789 | Identifying security vulnerabilities related to inter-process communications | Omri Weisman | 2016-12-13 |
| 9514025 | Modeling memory use of applications | Omer Tripp | 2016-12-06 |
| 9473523 | Execution of test inputs with applications in computer security assessment | Sagi Kedmi, Omer Tripp | 2016-10-18 |
| 9275246 | System and method for static detection and categorization of information-flow downgraders | Yinnon A. Haviv, Marco Pistoia, Guy Podjarny, Adi Sharabani, Takaaki Tateishi +2 more | 2016-03-01 |
| 9210184 | Determining the vulnerability of computer software applications to attacks | Roi Saltzman, Adi Sharabani, Omer Tripp | 2015-12-08 |
| 9087137 | Detection of custom parameters in a request URL | Yair Amit, Roi Saltzman, Omer Tripp | 2015-07-21 |
| 9026612 | Generating a custom parameter rule based on a comparison of a run-time value to a request URL | Yair Amit, Roi Saltzman, Omer Tripp | 2015-05-05 |
| 9009841 | Testing web applications for file upload vulnerabilities | Yair Amit, Roi Saltzman | 2015-04-14 |
| 8990940 | Identifying whether an application is malicious | Daniel Kalman, Roi Saltzman, Omer Tripp | 2015-03-24 |
| 8931102 | Testing web applications for file upload vulnerabilities | Yair Amit, Roi Saltzman | 2015-01-06 |
| 8869274 | Identifying whether an application is malicious | Daniel Kalman, Roi Saltzman, Omer Tripp | 2014-10-21 |
| 8813237 | Thwarting cross-site request forgery (CSRF) and clickjacking attacks | Yair Amit, Roi Saltzman, Adi Sharabani | 2014-08-19 |