Issued Patents All Time
Showing 25 most recent of 41 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12386973 | Build process security framework | Trong Nhan Mai, Behnaz Hassanshahi | 2025-08-12 |
| 12326850 | Policy engine for supply chain security analysis | Behnaz Hassanshahi, Alstair Michael, Trong Nhan Mai | 2025-06-10 |
| 12292973 | Query generalization for prevention of injection attacks | Kostyantyn Vorobyov | 2025-05-06 |
| 11860679 | Detecting security vulnerabilities in queries via an information flow graph | Kostyantyn Vorobyov | 2024-01-02 |
| 11847044 | Alias analysis using labelled access paths | Yang Zhao | 2023-12-19 |
| 11734432 | Detecting second-order security vulnerabilities via modelling information flow through persistent storage | Raghavendra Kagalavadi Ramesh, Yi Lu | 2023-08-22 |
| 11698784 | Upgrading an application using boolean satisfiability solving | David Maine, Alexander Jordan, Mahinthan Chandramohan | 2023-07-11 |
| 11593249 | Scalable points-to analysis via multiple slicing | Raghavendra Kagalavadi Ramesh | 2023-02-28 |
| 11580228 | Coverage of web application analysis | Anastasios Antoniadis, Raghavendra Kagalavadi Ramesh, Nicholas John Allen | 2023-02-14 |
| 11494489 | Synthesis of deserialization filters from positive and negative examples | Kostyantyn Vorobyov, Francois Gauthier, Sora Bae | 2022-11-08 |
| 11410081 | Machine learning with differently masked data in secure multi-party computing | Vaibhav Murlidhar Kulkarni, Rakhi S. Arora, Gopikrishnan Varadarajulu | 2022-08-09 |
| 11381543 | Mitigating network/hardware address explosion in network devices | Shyam Kapadia, Naoshad Mehta, Rajesh Babu Nataraja, Nilesh Shah | 2022-07-05 |
| 11288397 | Masking text data for secure multiparty computation | Vaibhav Murlidhar Kulkarni, Gopikrishnan Varadarajulu, Rakhi S. Arora, Samir Katti | 2022-03-29 |
| 11210201 | Scalable incremental analysis using caller and callee summaries | Rebecca Jane O'Donoghue, Nicholas John Allen, Yi Lu | 2021-12-28 |
| 11163888 | Detecting second-order security vulnerabilities via modelling information flow through persistent storage | Raghavendra Kagalavadi Ramesh, Yi Lu | 2021-11-02 |
| 11159381 | Verification of software-defined networking (SDN) policies for specific topologies | Henry John O'Brien, Nathan Robert Albert Keynes, Marius Portmann | 2021-10-26 |
| 11030304 | Buffer overflow detection based on a synthesis of assertions from templates and k-induction | Francois Gauthier, Nathan Robert Albert Keynes, Cristina N. Cifuentes, Trung Quang Ta | 2021-06-08 |
| 10992636 | Mitigating network/hardware address explosion in network devices | Shyam Kapadia, Naoshad Mehta, Rajesh Babu Nataraja, Nilesh Shah | 2021-04-27 |
| 10824538 | Scalable incremental analysis using caller and callee summaries | Rebecca Jane O'Donoghue, Nicholas John Allen, Yi Lu | 2020-11-03 |
| 10754698 | Network-aware workload placement in a data center | Rajesh Babu Nataraja, Shyam Kapadia, Nader Lahouti, Viral Rajeshbhai Barot, Jay Ajaykumar Gheewala | 2020-08-25 |
| 10719424 | Compositional string analysis | Raghavendra Kagalavadi Ramesh, Yang Zhao | 2020-07-21 |
| 10705949 | Evaluation of library test suites using mutation testing | Rebecca Jane O'Donoghue, Jerome Loh | 2020-07-07 |
| 10552408 | Automatic linearizability checking of operations on concurrent data structures | Patrick James Doolan, Chenyi Zhang, Graeme Paul Smith | 2020-02-04 |
| 10540255 | Staged refinement for static analysis | Raghavendra Kagalavadi Ramesh, Francois Gauthier | 2020-01-21 |
| 10528344 | Modular points-to analysis | Johannes Späth, Francois Gauthier | 2020-01-07 |