Issued Patents All Time
Showing 1–23 of 23 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 10460104 | Continuous malicious software identification through responsive machine learning | John J. Danahy, Kirk R. Swidowski, Stephen C. Carlucci, Christopher Baron | 2019-10-29 |
| 10198280 | Method and apparatus for hypervisor based monitoring of system interactions | Kirk R. Swidowski, Stephen C. Carlucci, John J. Danahy | 2019-02-05 |
| 10078752 | Continuous malicious software identification through responsive machine learning | John J. Danahy, Kirk R. Swidowski, Stephen C. Carlucci, Christopher Baron | 2018-09-18 |
| 9977895 | Malicious software identification integrating behavioral analytics and hardware events | John J. Danahy, Kirk R. Swidowski, Stephen C. Carlucci | 2018-05-22 |
| 9733976 | Method and apparatus for SYSRET monitoring of system interactions | Kirk R. Swidowski, Stephen C. Carlucci, John J. Danahy | 2017-08-15 |
| 9589132 | Method and apparatus for hypervisor based monitoring of system interactions | Kirk R. Swidowski, Stephen C. Carlucci, John J. Danahy | 2017-03-07 |
| 9098623 | Static analysis of validator routines | Marco Pistoia, Takaaki Tateishi, Omer Tripp | 2015-08-04 |
| 9075997 | Global variable security analysis | Shay Artzi, John Peyton, Marco Pistoia, Manu Sridharan, Takaaki Tateishi +2 more | 2015-07-07 |
| 8793800 | Static analysis for verification of software program access to secure resources for computer systems | Paolina Centonze, Marco Pistoia, Omer Tripp | 2014-07-29 |
| 8726246 | Static analysis of validator routines | Marco Pistoia, Takaaki Tateishi, Omer Tripp | 2014-05-13 |
| 8701186 | Formal analysis of the quality and conformance of information flow downgraders | Marco Pistoia, Takaaki Tateishi, Stephen D. Teilhet, Omer Tripp | 2014-04-15 |
| 8683599 | Static analysis for verification of software program access to secure resources for computer systems | Paolina Centonze, Marco Pistoia, Omer Tripp | 2014-03-25 |
| 8667584 | Formal analysis of the quality and conformance of information flow downgraders | Marco Pistoia, Takaaki Tateishi, Stephen D. Teilhet, Omer Tripp | 2014-03-04 |
| 8656496 | Global variable security analysis | Shay Artzi, John Peyton, Marco Pistoia, Manu Sridharan, Takaaki Tateishi +2 more | 2014-02-18 |
| 8572747 | Policy-driven detection and verification of methods such as sanitizers and validators | Marco Pistoia, Takaaki Tateishi, Omer Tripp | 2013-10-29 |
| 8434070 | Generating specifications of client-server applications for static analysis | Shay Artzi, John Peyton, Marco Pistoia, Manu Sridharan, Robert Wiener | 2013-04-30 |
| 8381242 | Static analysis for verification of software program access to secure resources for computer systems | Paolina Centonze, Marco Pistoia, Omer Tripp | 2013-02-19 |
| 8365281 | Determining whether method of computer program is a validator | Takaaki Tateishi, Marco Pistoia, Omer Tripp, Robert Wiener | 2013-01-29 |
| 8156483 | Method and system for detecting vulnerabilities in source code | Larry Rose, John Peyton, John J. Danahy, Robert A. Gottlieb, Chris Rehbein | 2012-04-10 |
| 7418734 | Method and system for detecting privilege escalation vulnerabilities in source code | Larry Rose, John Peyton, John J. Danahy, Robert A. Gottlieb, Chris Rehbein | 2008-08-26 |
| 7398516 | Method and system for detecting race condition vulnerabilities in source code | Larry Rose, John Peyton, John J. Danahy, Robert A. Gottlieb, Chris Rehbein | 2008-07-08 |
| 7398517 | Method and system for detecting vulnerabilities in source code | Larry Rose, John Peyton, John J. Danahy, Robert A. Gottlieb, Chris Rehbein | 2008-07-08 |
| 7240332 | Method and system for detecting vulnerabilities in source code | Larry Rose, John Peyton, John J. Danahy, Robert A. Gottlieb, Chris Rehbein | 2007-07-03 |