| 12361142 |
Identifying and addressing potential vulnerabilities in third-party code |
Dimitrios STYLIADIS, Alexandre Wilhelm |
2025-07-15 |
| 12189788 |
Identifying and addressing potential vulnerabilities in third-party code |
Dimitrios STYLIADIS, Alexandre Wilhelm |
2025-01-07 |
| 11853422 |
Detecting malicious components using commit histories |
— |
2023-12-26 |
| 10831899 |
Security-relevant code detection system |
Michele Bezzi, Antonino Sabetta, Serena Ponta |
2020-11-10 |
| 10789159 |
Non-regressive injection of deception decoys |
Cedric Hebert |
2020-09-29 |
| 10474456 |
Software version fingerprint generation and identification |
Michele Bezzi, Antonino Sabetta, Serena Ponta, Francesco Di Cerbo |
2019-11-12 |
| 10360271 |
Mining security vulnerabilities available from social media |
Slim Trabelsi, Gilles Montagnon, Elton Mathias |
2019-07-23 |
| 10338916 |
Software version fingerprint generation and identification |
Michele Bezzi, Antonino Sabetta, Serena Ponta, Francesco Di Cerbo |
2019-07-02 |
| 9959111 |
Prioritization of software patches |
Serena Ponta, Antonino Sabetta |
2018-05-01 |
| 9880832 |
Software patch evaluator |
Serena Ponta, Antonino Sabetta |
2018-01-30 |
| 9792200 |
Assessing vulnerability impact using call graphs |
Serena Ponta, Antonino Sabetta |
2017-10-17 |
| 9558017 |
Software dependency management through declarative constraints |
— |
2017-01-31 |
| 9009534 |
Runtime configuration checks for composite applications |
Serena Ponta, Matteo Maria Casalino, Theodoor Scholte |
2015-04-14 |
| 8819131 |
Tracing of collaborative workflows |
Cedric Hebert, Laurent Gomez, Frederic Montagut, Cedric Ulmer |
2014-08-26 |
| 8782603 |
Standardized configuration checklists for software development |
— |
2014-07-15 |
| 8726151 |
Comparing encrypted documents having structured data |
Mohammad Ashiqur Rahaman, Andreas Schaad, Yves Roudier |
2014-05-13 |