RB

Ryan Berg

IBM: 13 patents #8,581 of 70,183Top 15%
BP Barkly Protects: 5 patents #1 of 5Top 20%
OL Ounce Labs: 4 patents #3 of 6Top 50%
AL Alert Logic: 1 patents #8 of 24Top 35%
Overall (All Time): #183,935 of 4,157,543Top 5%
23
Patents All Time

Issued Patents All Time

Patent #TitleCo-InventorsDate
10460104 Continuous malicious software identification through responsive machine learning John J. Danahy, Kirk R. Swidowski, Stephen C. Carlucci, Christopher Baron 2019-10-29
10198280 Method and apparatus for hypervisor based monitoring of system interactions Kirk R. Swidowski, Stephen C. Carlucci, John J. Danahy 2019-02-05
10078752 Continuous malicious software identification through responsive machine learning John J. Danahy, Kirk R. Swidowski, Stephen C. Carlucci, Christopher Baron 2018-09-18
9977895 Malicious software identification integrating behavioral analytics and hardware events John J. Danahy, Kirk R. Swidowski, Stephen C. Carlucci 2018-05-22
9733976 Method and apparatus for SYSRET monitoring of system interactions Kirk R. Swidowski, Stephen C. Carlucci, John J. Danahy 2017-08-15
9589132 Method and apparatus for hypervisor based monitoring of system interactions Kirk R. Swidowski, Stephen C. Carlucci, John J. Danahy 2017-03-07
9098623 Static analysis of validator routines Marco Pistoia, Takaaki Tateishi, Omer Tripp 2015-08-04
9075997 Global variable security analysis Shay Artzi, John Peyton, Marco Pistoia, Manu Sridharan, Takaaki Tateishi +2 more 2015-07-07
8793800 Static analysis for verification of software program access to secure resources for computer systems Paolina Centonze, Marco Pistoia, Omer Tripp 2014-07-29
8726246 Static analysis of validator routines Marco Pistoia, Takaaki Tateishi, Omer Tripp 2014-05-13
8701186 Formal analysis of the quality and conformance of information flow downgraders Marco Pistoia, Takaaki Tateishi, Stephen D. Teilhet, Omer Tripp 2014-04-15
8683599 Static analysis for verification of software program access to secure resources for computer systems Paolina Centonze, Marco Pistoia, Omer Tripp 2014-03-25
8667584 Formal analysis of the quality and conformance of information flow downgraders Marco Pistoia, Takaaki Tateishi, Stephen D. Teilhet, Omer Tripp 2014-03-04
8656496 Global variable security analysis Shay Artzi, John Peyton, Marco Pistoia, Manu Sridharan, Takaaki Tateishi +2 more 2014-02-18
8572747 Policy-driven detection and verification of methods such as sanitizers and validators Marco Pistoia, Takaaki Tateishi, Omer Tripp 2013-10-29
8434070 Generating specifications of client-server applications for static analysis Shay Artzi, John Peyton, Marco Pistoia, Manu Sridharan, Robert Wiener 2013-04-30
8381242 Static analysis for verification of software program access to secure resources for computer systems Paolina Centonze, Marco Pistoia, Omer Tripp 2013-02-19
8365281 Determining whether method of computer program is a validator Takaaki Tateishi, Marco Pistoia, Omer Tripp, Robert Wiener 2013-01-29
8156483 Method and system for detecting vulnerabilities in source code Larry Rose, John Peyton, John J. Danahy, Robert A. Gottlieb, Chris Rehbein 2012-04-10
7418734 Method and system for detecting privilege escalation vulnerabilities in source code Larry Rose, John Peyton, John J. Danahy, Robert A. Gottlieb, Chris Rehbein 2008-08-26
7398516 Method and system for detecting race condition vulnerabilities in source code Larry Rose, John Peyton, John J. Danahy, Robert A. Gottlieb, Chris Rehbein 2008-07-08
7398517 Method and system for detecting vulnerabilities in source code Larry Rose, John Peyton, John J. Danahy, Robert A. Gottlieb, Chris Rehbein 2008-07-08
7240332 Method and system for detecting vulnerabilities in source code Larry Rose, John Peyton, John J. Danahy, Robert A. Gottlieb, Chris Rehbein 2007-07-03