loadpatents
name:-0.073730945587158
name:-0.067610025405884
name:-0.026666164398193
Hay; Roee Patent Filings

Hay; Roee

Patent Applications and Registrations

Patent applications and USPTO patent grants for Hay; Roee.The latest application filed is for "identifying whether an application is malicious".

Company Profile
24.77.68
  • Hay; Roee - Singapore SG
  • Hay; Roee - Haifa IL
  • Hay; Roee - Herzliya IL
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Protecting an application via an intra-application firewall
Grant 11,288,344 - Hay , et al. March 29, 2
2022-03-29
Identifying whether an application is malicious
Grant 11,188,645 - Hay , et al. November 30, 2
2021-11-30
Updating taint tags based on runtime behavior profiles
Grant 11,016,874 - Hay , et al. May 25, 2
2021-05-25
Detection of malicious code fragments via data-flow isolation
Grant 11,017,084 - Hay , et al. May 25, 2
2021-05-25
Persistent cross-site scripting vulnerability detection
Grant 11,005,877 - Bronshtein , et al. May 11, 2
2021-05-11
Application testing for security vulnerabilities
Grant 10,956,313 - Hay , et al. March 23, 2
2021-03-23
System and method for static detection and categorization of information-flow downgraders
Grant 10,742,666 - Haviv , et al. A
2020-08-11
Detecting malicious code based on conditional branch asymmetry
Grant 10,657,255 - Hay , et al.
2020-05-19
Identifying Whether An Application Is Malicious
App 20200097654 - Hay; Roee ;   et al.
2020-03-26
Identifying whether an application is malicious
Grant 10,599,843 - Hay , et al.
2020-03-24
Updating Taint Tags Based On Runtime Behavior Profiles
App 20200089595 - Hay; Roee ;   et al.
2020-03-19
Detecting security vulnerabilities on computing devices
Grant 10,528,744 - Hay , et al. J
2020-01-07
Application Testing For Security Vulnerabilities
App 20190317888 - Hay; Roee ;   et al.
2019-10-17
Protecting An Application Via An Intra-application Firewall
App 20190294760 - Hay; Roee ;   et al.
2019-09-26
Application testing for security vulnerabilities
Grant 10,380,006 - Hay , et al. A
2019-08-13
Detecting Third Party Software Elements
App 20190236269 - HAY; ROEE
2019-08-01
Protecting an application via an intra-application firewall
Grant 10,366,213 - Hay , et al. July 30, 2
2019-07-30
Persistent Cross-site Scripting Vulnerability Detection
App 20190215333 - Bronshtein; Emanuel ;   et al.
2019-07-11
Bypassing certificate pinning
Grant 10,305,903 - Bronshtein , et al.
2019-05-28
Detection Of Malicious Code Fragments Via Data-flow Isolation
App 20190156028 - Hay; Roee ;   et al.
2019-05-23
Persistent cross-site scripting vulnerability detection
Grant 10,264,011 - Bronshtein , et al.
2019-04-16
Identifying Whether An Application Is Malicious
App 20190095619 - Hay; Roee ;   et al.
2019-03-28
Bypassing Certificate Pinning
App 20190014115 - Bronshtein; Emanuel ;   et al.
2019-01-10
Identifying whether an application is malicious
Grant 10,169,580 - Hay , et al. J
2019-01-01
Bypassing certificate pinning
Grant 10,091,187 - Bronshtein , et al. October 2, 2
2018-10-02
Bypassing certificate pinning
Grant 10,084,781 - Bronshtein , et al. September 25, 2
2018-09-25
Bypassing certificate pinning
Grant 10,084,772 - Bronshtein , et al. September 25, 2
2018-09-25
Detecting Security Vulnerabilities On Computing Devices
App 20180247060 - Hay; Roee ;   et al.
2018-08-30
Modifying evasive code using correlation analysis
Grant 10,027,692 - Hay , et al. July 17, 2
2018-07-17
Persistent Cross-site Scripting Vulnerability Detection
App 20180198817 - Bronshtein; Emanuel ;   et al.
2018-07-12
Execution of test inputs with applications in computer security assessment
Grant 10,002,253 - Hay , et al. June 19, 2
2018-06-19
Detecting security vulnerabilities on computing devices
Grant 9,977,903 - Hay , et al. May 22, 2
2018-05-22
Security Risk Evaluation
App 20180121657 - HAY; ROEE ;   et al.
2018-05-03
Detecting security vulnerabilities on computing devices
Grant 9,959,411 - Hay , et al. May 1, 2
2018-05-01
Persistent cross-site scripting vulnerability detection
Grant 9,948,665 - Bronshtein , et al. April 17, 2
2018-04-17
Detection Of Ipc-based Mobile Vulnerabilities Due To Insufficient Caller Permissions
App 20180089439 - Hay; Roee ;   et al.
2018-03-29
Detecting social login security flaws using database query features
Grant 9,930,024 - Hay , et al. March 27, 2
2018-03-27
Bypassing Certificate Pinning
App 20180013753 - Bronshtein; Emanuel ;   et al.
2018-01-11
Bypassing Certificate Pinning
App 20180013754 - Bronshtein; Emanuel ;   et al.
2018-01-11
Application modification based on a security vulnerability
Grant 9,858,423 - Hay , et al. January 2, 2
2018-01-02
System, method and apparatus for simultaneous definition and enforcement of access-control and integrity policies
Grant 9,836,608 - Centonze , et al. December 5, 2
2017-12-05
Bypassing Certificate Pinning
App 20170310670 - Bronshtein; Emanuel ;   et al.
2017-10-26
Persistent cross-site scripting vulnerability detection
Grant 9,781,145 - Bronshtein , et al. October 3, 2
2017-10-03
Bypassing certificate pinning
Grant 9,774,590 - Bronshtein , et al. September 26, 2
2017-09-26
Simulating black box test results using information from white box testing
Grant 9,747,187 - Fink , et al. August 29, 2
2017-08-29
Process security validation
Grant 9,734,336 - Bachar , et al. August 15, 2
2017-08-15
Protecting An Application Via An Intra-application Firewall
App 20170228524 - Hay; Roee ;   et al.
2017-08-10
Execution Of Test Inputs With Applications In Computer Security Assessment
App 20170228544 - Hay; Roee ;   et al.
2017-08-10
Simulating black box test results using information from white box testing
Grant 9,720,798 - Fink , et al. August 1, 2
2017-08-01
Determining privacy leaks
Grant 9,721,094 - Bachar , et al. August 1, 2
2017-08-01
Application Modification
App 20170199730 - Hay; Roee ;   et al.
2017-07-13
Application Modification Based on a Security Vulnerability
App 20170200012 - Hay; Roee ;   et al.
2017-07-13
Testing application internal modules with instrumentation
Grant 9,703,676 - Hay , et al. July 11, 2
2017-07-11
Modifying Evasive Code Using Correlation Analysis
App 20170195347 - Hay; Roee ;   et al.
2017-07-06
Detecting Malicious Code Based On Conditional Branch Asymmetry
App 20170177868 - Hay; Roee ;   et al.
2017-06-22
Detecting Social Login Security Flaws Using Database Query Features
App 20170126650 - Hay; Roee ;   et al.
2017-05-04
Process Security Validation
App 20170098075 - Bachar; Ronen ;   et al.
2017-04-06
System, method and apparatus for simultaneous definition and enforcement of access-control and integrity policies
Grant 9,607,154 - Centonze , et al. March 28, 2
2017-03-28
Detecting vulnerability to resource exhaustion
Grant 9,582,667 - Hay , et al. February 28, 2
2017-02-28
System, Method And Apparatus For Simultaneous Definition And Enforcement Of Access-control And Integrity Policies
App 20170039375 - CENTONZE; Paolina ;   et al.
2017-02-09
Process security validation
Grant 9,537,883 - Bachar , et al. January 3, 2
2017-01-03
Identifying security vulnerabilities related to inter-process communications
Grant 9,519,788 - Hay , et al. December 13, 2
2016-12-13
Modeling memory use of applications
Grant 9,519,566 - Hay , et al. December 13, 2
2016-12-13
Identifying security vulnerabilities related to inter-process communications
Grant 9,519,789 - Hay , et al. December 13, 2
2016-12-13
Application Testing For Security Vulnerabilities
App 20160359896 - Hay; Roee ;   et al.
2016-12-08
Modeling memory use of applications
Grant 9,514,025 - Hay , et al. December 6, 2
2016-12-06
Determining Privacy Leaks
App 20160342792 - Bachar; Ronen ;   et al.
2016-11-24
Modeling Memory Use Of Applications
App 20160306731 - Hay; Roee ;   et al.
2016-10-20
Modeling Memory Use Of Applications
App 20160306641 - Hay; Roee ;   et al.
2016-10-20
Execution of test inputs with applications in computer security assessment
Grant 9,473,523 - Hay , et al. October 18, 2
2016-10-18
Testing Application Internal Modules With Instrumentation
App 20160188443 - Hay; Roee ;   et al.
2016-06-30
Process Security Validation
App 20160182549 - Bachar; Ronen ;   et al.
2016-06-23
Determining Privacy Granularity
App 20160171225 - Hay; Roee ;   et al.
2016-06-16
System And Method For Static Detection And Categorization Of Information-flow Downgraders
App 20160156650 - Haviv; Yinnon ;   et al.
2016-06-02
Persistent Cross-site Scripting Vulnerability Detection
App 20160149947 - Bronshtein; Emanuel ;   et al.
2016-05-26
Persistent Cross-site Scripting Vulnerability Detection
App 20160149946 - Bronshtein; Emanuel ;   et al.
2016-05-26
System and method for static detection and categorization of information-flow downgraders
Grant 9,275,246 - Haviv , et al. March 1, 2
2016-03-01
Determining the vulnerability of computer software applications to attacks
Grant 9,210,184 - Hay , et al. December 8, 2
2015-12-08
Comparing Source And Sink Values In Security Analysis
App 20150271196 - Hay; Roee ;   et al.
2015-09-24
Comparing Source And Sink Values In Security Analysis
App 20150271198 - Hay; Roee ;   et al.
2015-09-24
Detection of custom parameters in a request URL
Grant 9,087,137 - Amit , et al. July 21, 2
2015-07-21
Generating a custom parameter rule based on a comparison of a run-time value to a request URL
Grant 9,026,612 - Amit , et al. May 5, 2
2015-05-05
Testing web applications for file upload vulnerabilities
Grant 9,009,841 - Amit , et al. April 14, 2
2015-04-14
Detecting Vulnerability To Resource Exhaustion
App 20150096032 - Hay; Roee ;   et al.
2015-04-02
System, Method and Apparatus for Simultaneous Definition and Enforcement of Access-control and Integrity Policies
App 20150089637 - Centonze; Paolina ;   et al.
2015-03-26
Identifying whether an application is malicious
Grant 8,990,940 - Hay , et al. March 24, 2
2015-03-24
Testing web applications for file upload vulnerabilities
Grant 8,931,102 - Amit , et al. January 6, 2
2015-01-06
Identifying Whether An Application Is Malicious
App 20150007322 - Hay; Roee ;   et al.
2015-01-01
Detecting Security Vulnerabilities On Computing Devices
App 20140373158 - Hay; Roee ;   et al.
2014-12-18
Identifying whether an application is malicious
Grant 8,869,274 - Hay , et al. October 21, 2
2014-10-21
Identifying Security Vulnerabilities Related To Inter-process Communications
App 20140310812 - Hay; Roee ;   et al.
2014-10-16
Identifying Security Vulnerabilities Related To Inter-process Communications
App 20140310814 - Hay; Roee ;   et al.
2014-10-16
Thwarting cross-site request forgery (CSRF) and clickjacking attacks
Grant 8,813,237 - Amit , et al. August 19, 2
2014-08-19
Protection against cache poisoning
Grant 8,806,133 - Hay , et al. August 12, 2
2014-08-12
Pinpointing security vulnerabilities in computer software applications
Grant 8,752,182 - Amit , et al. June 10, 2
2014-06-10
Detecting Security Vulnerabilities On Computing Devices
App 20140157418 - HAY; ROEE ;   et al.
2014-06-05
Detecting Security Vulnerabilities On Computing Devices
App 20140157421 - Hay; Roee ;   et al.
2014-06-05
Identifying Whether An Application Is Malicious
App 20140096240 - HAY; Roee ;   et al.
2014-04-03
Identifying Whether An Application Is Malicious
App 20140096248 - Hay; Roee ;   et al.
2014-04-03
Verification of information-flow downgraders
Grant 8,635,602 - Haviv , et al. January 21, 2
2014-01-21
Eliminating false reports of security vulnerabilities when testing computer software
Grant 8,584,246 - Haviv , et al. November 12, 2
2013-11-12
System, method and apparatus for simultaneous definition and enforcement of access-control and integrity policies
Grant 8,572,727 - Centonze , et al. October 29, 2
2013-10-29
Injection context based static analysis of computer software applications
Grant 8,528,095 - Haviv , et al. September 3, 2
2013-09-03
Pinpointing security vulnerabilities in computer software applications
Grant 8,510,842 - Amit , et al. August 13, 2
2013-08-13
Detection Of Custom Parameters In A Request Url
App 20130166676 - AMIT; YAIR ;   et al.
2013-06-27
Detection Of Custom Parameters In A Request Url
App 20130167124 - AMIT; YAIR ;   et al.
2013-06-27
Identifying security vulnerability in computer software
Grant 8,468,605 - Haviv , et al. June 18, 2
2013-06-18
Identifying security breaches caused by web-enabled software applications
Grant 8,370,945 - Amit , et al. February 5, 2
2013-02-05
Testing Web Applications For File Upload Vulnerabilities
App 20120311712 - Amit; Yair ;   et al.
2012-12-06
Testing Web Applications For File Upload Vulnerabilities
App 20120311714 - Amit; Yair ;   et al.
2012-12-06
Pinpointing Security Vulnerabilities In Computer Software Applications
App 20120266246 - AMIT; YAIR ;   et al.
2012-10-18
Pinpointing Security Vulnerabilities In Computer Software Applications
App 20120266248 - Amit; Yair ;   et al.
2012-10-18
Simulating Black Box Test Results Using Information From White Box Testing
App 20120254839 - Fink; Stephen ;   et al.
2012-10-04
Simulating Black Box Test Results Using Information From White Box Testing
App 20120110551 - Fink; Stephen ;   et al.
2012-05-03
Verification of Information-Flow Downgraders
App 20120023486 - Haviv; Yinnon A. ;   et al.
2012-01-26
Injection Context Based Static Analysis Of Computer Software Applications
App 20110321016 - HAVIV; YINNON A. ;   et al.
2011-12-29
Thwarting Cross-site Request Forgery (csrf) And Clickjacking Attacks
App 20110321168 - Amit; Yair ;   et al.
2011-12-29
Determining The Vulnerability Of Computer Software Applications To Attacks
App 20110162072 - Hay; Roee ;   et al.
2011-06-30
Identifying Security Vulnerability In Computer Software
App 20110131656 - HAVIV; Yinnon A. ;   et al.
2011-06-02
System, Method and Apparatus for Simultaneous Definition and Enforcement of Access-control and Integrity Policies
App 20110126282 - Centonze; Paolina ;   et al.
2011-05-26
Eliminating False Reports of Security Vulnerabilities when Testing Computer Software
App 20110087892 - HAVIV; Yinnon Avraham ;   et al.
2011-04-14
System And Method For Static Detection And Categorization Of Information-flow Downgraders
App 20110088023 - HAVIV; YINNON ;   et al.
2011-04-14
Protection Against Cache Poisoning
App 20110066807 - Hay; Roee ;   et al.
2011-03-17
Identifying Security Breaches Caused by Web-Enabled Software Applications
App 20100299754 - Amit; Yair ;   et al.
2010-11-25

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed