Patent | Date |
---|
System and method for static detection and categorization of information-flow downgraders Grant 10,742,666 - Haviv , et al. A | 2020-08-11 |
Application-to-application device ID sharing Grant 10,621,337 - Sharabani , et al. | 2020-04-14 |
Selective traffic blockage Grant 10,594,736 - Amit , et al. | 2020-03-17 |
Selective traffic blockage Grant 10,594,732 - Amit , et al. | 2020-03-17 |
Selective Traffic Blockage App 20180131719 - Amit; Yair ;   et al. | 2018-05-10 |
System, method and apparatus for simultaneous definition and enforcement of access-control and integrity policies Grant 9,836,608 - Centonze , et al. December 5, 2 | 2017-12-05 |
Automatic crawling of encoded dynamic URLs Grant 9,785,710 - Brake , et al. October 10, 2 | 2017-10-10 |
Automatic crawling of encoded dynamic URLs Grant 9,754,028 - Brake , et al. September 5, 2 | 2017-09-05 |
Simulating black box test results using information from white box testing Grant 9,747,187 - Fink , et al. August 29, 2 | 2017-08-29 |
Simulating black box test results using information from white box testing Grant 9,720,798 - Fink , et al. August 1, 2 | 2017-08-01 |
System, method and apparatus for simultaneous definition and enforcement of access-control and integrity policies Grant 9,607,154 - Centonze , et al. March 28, 2 | 2017-03-28 |
System, Method And Apparatus For Simultaneous Definition And Enforcement Of Access-control And Integrity Policies App 20170039375 - CENTONZE; Paolina ;   et al. | 2017-02-09 |
Application state detector and inducer Grant 9,396,099 - Podjarny , et al. July 19, 2 | 2016-07-19 |
System And Method For Static Detection And Categorization Of Information-flow Downgraders App 20160156650 - Haviv; Yinnon ;   et al. | 2016-06-02 |
Fixing security vulnerability in a source code Grant 9,298,924 - Abadi , et al. March 29, 2 | 2016-03-29 |
Potential attack detection based on dummy network traffic Grant 9,288,223 - Sharabani , et al. March 15, 2 | 2016-03-15 |
System and method for static detection and categorization of information-flow downgraders Grant 9,275,246 - Haviv , et al. March 1, 2 | 2016-03-01 |
Determining the vulnerability of computer software applications to attacks Grant 9,210,184 - Hay , et al. December 8, 2 | 2015-12-08 |
Hybrid analysis of vulnerable information flows Grant 9,177,155 - Beskrovny , et al. November 3, 2 | 2015-11-03 |
Access control system for a mobile device Grant 9,077,688 - Amit , et al. July 7, 2 | 2015-07-07 |
Dynamic concolic execution of an application Grant 9,037,916 - Kalman , et al. May 19, 2 | 2015-05-19 |
Potential Attack Detection Based On Dummy Network Traffic App 20150106889 - SHARABANI; Adi ;   et al. | 2015-04-16 |
Injection attack mitigation using context sensitive encoding of injected input Grant 9,009,821 - Podjarny , et al. April 14, 2 | 2015-04-14 |
Selective encryption in mobile devices Grant 8,996,856 - Amit , et al. March 31, 2 | 2015-03-31 |
System, Method and Apparatus for Simultaneous Definition and Enforcement of Access-control and Integrity Policies App 20150089637 - Centonze; Paolina ;   et al. | 2015-03-26 |
Dynamic concolic execution of an application Grant 8,909,992 - Kalman , et al. December 9, 2 | 2014-12-09 |
Hybrid analysis of vulnerable information flows Grant 8,869,287 - Beskrovny , et al. October 21, 2 | 2014-10-21 |
Fixing security vulnerability in a source code Grant 8,819,637 - Abadi , et al. August 26, 2 | 2014-08-26 |
Thwarting cross-site request forgery (CSRF) and clickjacking attacks Grant 8,813,237 - Amit , et al. August 19, 2 | 2014-08-19 |
Protection against cache poisoning Grant 8,806,133 - Hay , et al. August 12, 2 | 2014-08-12 |
Hybrid Analysis Of Vulnerable Information Flows App 20140189875 - Beskrovny; Evgeny ;   et al. | 2014-07-03 |
Hybrid Analysis Of Vulnerable Information Flows App 20140189874 - BESKROVNY; EVGENY ;   et al. | 2014-07-03 |
Crawling browser-accessible applications Grant 8,756,214 - Ashkanazi , et al. June 17, 2 | 2014-06-17 |
Efficient code instrumentation Grant 8,752,026 - Sharabani , et al. June 10, 2 | 2014-06-10 |
Pinpointing security vulnerabilities in computer software applications Grant 8,752,182 - Amit , et al. June 10, 2 | 2014-06-10 |
Dynamic Concolic Execution Of An Application App 20140149798 - Kalman; Daniel ;   et al. | 2014-05-29 |
Dynamic Concolic Execution Of An Application App 20140149797 - KALMAN; DANIEL ;   et al. | 2014-05-29 |
Detecting and monitoring server side states during web application scanning Grant 8,676,966 - Podjarny , et al. March 18, 2 | 2014-03-18 |
Verification of information-flow downgraders Grant 8,635,602 - Haviv , et al. January 21, 2 | 2014-01-21 |
Selective Encryption In Mobile Devices App 20130339724 - AMIT; Yair ;   et al. | 2013-12-19 |
Access Control System For A Mobile Device App 20130340031 - Amit; Yair ;   et al. | 2013-12-19 |
Eliminating false reports of security vulnerabilities when testing computer software Grant 8,584,246 - Haviv , et al. November 12, 2 | 2013-11-12 |
System, method and apparatus for simultaneous definition and enforcement of access-control and integrity policies Grant 8,572,727 - Centonze , et al. October 29, 2 | 2013-10-29 |
Determining suitable insertion points for string sanitizers in a computer code Grant 8,539,466 - Abadi , et al. September 17, 2 | 2013-09-17 |
Injection context based static analysis of computer software applications Grant 8,528,095 - Haviv , et al. September 3, 2 | 2013-09-03 |
Pinpointing security vulnerabilities in computer software applications Grant 8,510,842 - Amit , et al. August 13, 2 | 2013-08-13 |
Preventing cross-site request forgery attacks on a server Grant 8,495,137 - Amit , et al. July 23, 2 | 2013-07-23 |
Cross-domain access prevention Grant 8,495,719 - Podjarny , et al. July 23, 2 | 2013-07-23 |
Preventing cross-site request forgery attacks on a server Grant 8,495,135 - Amit , et al. July 23, 2 | 2013-07-23 |
Identifying security vulnerability in computer software Grant 8,468,605 - Haviv , et al. June 18, 2 | 2013-06-18 |
Fixing Security Vulnerability In A Source Code App 20130133075 - Abadi; Aharon ;   et al. | 2013-05-23 |
Automatic Crawling Of Encoded Dynamic Urls App 20130091114 - Brake; Nevon C. ;   et al. | 2013-04-11 |
Automatic Crawling Of Encoded Dynamic Urls App 20130091115 - Brake; Nevon C. ;   et al. | 2013-04-11 |
Injection Attack Mitigation Using Context Sensitive Encoding Of Injected Input App 20130081135 - Podjarny; Guy ;   et al. | 2013-03-28 |
Black box testing optimization using information from white box testing Grant 8,387,017 - Calendino , et al. February 26, 2 | 2013-02-26 |
Identifying security breaches caused by web-enabled software applications Grant 8,370,945 - Amit , et al. February 5, 2 | 2013-02-05 |
Determining Suitable Insertion Points For String Sanitizers In A Computer Code App 20120304161 - Ahadi; Aharon ;   et al. | 2012-11-29 |
Crawling of object model using transformation graph Grant 8,296,722 - Yoshihama , et al. October 23, 2 | 2012-10-23 |
Pinpointing Security Vulnerabilities In Computer Software Applications App 20120266246 - AMIT; YAIR ;   et al. | 2012-10-18 |
Pinpointing Security Vulnerabilities In Computer Software Applications App 20120266248 - Amit; Yair ;   et al. | 2012-10-18 |
Simulating Black Box Test Results Using Information From White Box Testing App 20120254839 - Fink; Stephen ;   et al. | 2012-10-04 |
Crawling Browser-Accessible Applications App 20120253778 - ASHKANAZI; Asaf ;   et al. | 2012-10-04 |
Web Crawling Using Static Analysis App 20120215757 - Weisman; Omri ;   et al. | 2012-08-23 |
Crawling browser-accessible applications Grant 8,250,059 - Ashkenazi , et al. August 21, 2 | 2012-08-21 |
Web browser security Grant 8,230,060 - Sharabani July 24, 2 | 2012-07-24 |
Preventing Cross-Site Request Forgery Attacks on a Server App 20120180128 - Amit; Yair ;   et al. | 2012-07-12 |
Simulating Black Box Test Results Using Information From White Box Testing App 20120110551 - Fink; Stephen ;   et al. | 2012-05-03 |
Verification of Information-Flow Downgraders App 20120023486 - Haviv; Yinnon A. ;   et al. | 2012-01-26 |
Thwarting Cross-site Request Forgery (csrf) And Clickjacking Attacks App 20110321168 - Amit; Yair ;   et al. | 2011-12-29 |
Injection Context Based Static Analysis Of Computer Software Applications App 20110321016 - HAVIV; YINNON A. ;   et al. | 2011-12-29 |
Fixing Security Vulnerability In A Source Code App 20110302566 - Abadi; Aharon ;   et al. | 2011-12-08 |
Preventing Cross-Site Request Forgery Attacks on a Server App 20110225234 - Amit; Yair ;   et al. | 2011-09-15 |
Determining The Vulnerability Of Computer Software Applications To Attacks App 20110162072 - Hay; Roee ;   et al. | 2011-06-30 |
Detecting And Monitoring Server Side States During Web Application Scanning App 20110161486 - Podjarny; Guy ;   et al. | 2011-06-30 |
Identifying Security Vulnerability In Computer Software App 20110131656 - HAVIV; Yinnon A. ;   et al. | 2011-06-02 |
System, Method and Apparatus for Simultaneous Definition and Enforcement of Access-control and Integrity Policies App 20110126282 - Centonze; Paolina ;   et al. | 2011-05-26 |
System And Method For Static Detection And Categorization Of Information-flow Downgraders App 20110088023 - HAVIV; YINNON ;   et al. | 2011-04-14 |
Eliminating False Reports of Security Vulnerabilities when Testing Computer Software App 20110087892 - HAVIV; Yinnon Avraham ;   et al. | 2011-04-14 |
Crawling Browser-Accessible Applications App 20110066609 - ASHKENAZI; Asaf ;   et al. | 2011-03-17 |
Protection Against Cache Poisoning App 20110066807 - Hay; Roee ;   et al. | 2011-03-17 |
Black Box Testing Optimization Using Information from White Box Testing App 20110055813 - Calendino; Rob ;   et al. | 2011-03-03 |
Efficient Code Instrumentation App 20100306745 - Sharabani; Adi ;   et al. | 2010-12-02 |
Identifying Security Breaches Caused by Web-Enabled Software Applications App 20100299754 - Amit; Yair ;   et al. | 2010-11-25 |
Cross-domain Access Prevention App 20100088761 - Podjarny; Guy ;   et al. | 2010-04-08 |
Crawling of object model using transformation graph App 20100088668 - Yoshihama; Sachiko ;   et al. | 2010-04-08 |
Web Browser Security App 20100036938 - Sharabani; Adi | 2010-02-11 |
Application State Detector And Inducer App 20090320043 - Podjarny; Guy ;   et al. | 2009-12-24 |