loadpatents
name:-0.10404491424561
name:-0.04932689666748
name:-0.0037980079650879
Sharabani; Adi Patent Filings

Sharabani; Adi

Patent Applications and Registrations

Patent applications and USPTO patent grants for Sharabani; Adi.The latest application filed is for "selective traffic blockage".

Company Profile
3.71.48
  • Sharabani; Adi - Herzliya IL
  • Sharabani; Adi - Palo Alto CA
  • Sharabani; Adi - Ramat Gan IL
  • Sharabani; Adi - Herzlia N/A IL
  • Sharabani; Adi - Haifa N/A IL
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
System and method for static detection and categorization of information-flow downgraders
Grant 10,742,666 - Haviv , et al. A
2020-08-11
Application-to-application device ID sharing
Grant 10,621,337 - Sharabani , et al.
2020-04-14
Selective traffic blockage
Grant 10,594,736 - Amit , et al.
2020-03-17
Selective traffic blockage
Grant 10,594,732 - Amit , et al.
2020-03-17
Selective Traffic Blockage
App 20180131719 - Amit; Yair ;   et al.
2018-05-10
System, method and apparatus for simultaneous definition and enforcement of access-control and integrity policies
Grant 9,836,608 - Centonze , et al. December 5, 2
2017-12-05
Automatic crawling of encoded dynamic URLs
Grant 9,785,710 - Brake , et al. October 10, 2
2017-10-10
Automatic crawling of encoded dynamic URLs
Grant 9,754,028 - Brake , et al. September 5, 2
2017-09-05
Simulating black box test results using information from white box testing
Grant 9,747,187 - Fink , et al. August 29, 2
2017-08-29
Simulating black box test results using information from white box testing
Grant 9,720,798 - Fink , et al. August 1, 2
2017-08-01
System, method and apparatus for simultaneous definition and enforcement of access-control and integrity policies
Grant 9,607,154 - Centonze , et al. March 28, 2
2017-03-28
System, Method And Apparatus For Simultaneous Definition And Enforcement Of Access-control And Integrity Policies
App 20170039375 - CENTONZE; Paolina ;   et al.
2017-02-09
Application state detector and inducer
Grant 9,396,099 - Podjarny , et al. July 19, 2
2016-07-19
System And Method For Static Detection And Categorization Of Information-flow Downgraders
App 20160156650 - Haviv; Yinnon ;   et al.
2016-06-02
Fixing security vulnerability in a source code
Grant 9,298,924 - Abadi , et al. March 29, 2
2016-03-29
Potential attack detection based on dummy network traffic
Grant 9,288,223 - Sharabani , et al. March 15, 2
2016-03-15
System and method for static detection and categorization of information-flow downgraders
Grant 9,275,246 - Haviv , et al. March 1, 2
2016-03-01
Determining the vulnerability of computer software applications to attacks
Grant 9,210,184 - Hay , et al. December 8, 2
2015-12-08
Hybrid analysis of vulnerable information flows
Grant 9,177,155 - Beskrovny , et al. November 3, 2
2015-11-03
Access control system for a mobile device
Grant 9,077,688 - Amit , et al. July 7, 2
2015-07-07
Dynamic concolic execution of an application
Grant 9,037,916 - Kalman , et al. May 19, 2
2015-05-19
Potential Attack Detection Based On Dummy Network Traffic
App 20150106889 - SHARABANI; Adi ;   et al.
2015-04-16
Injection attack mitigation using context sensitive encoding of injected input
Grant 9,009,821 - Podjarny , et al. April 14, 2
2015-04-14
Selective encryption in mobile devices
Grant 8,996,856 - Amit , et al. March 31, 2
2015-03-31
System, Method and Apparatus for Simultaneous Definition and Enforcement of Access-control and Integrity Policies
App 20150089637 - Centonze; Paolina ;   et al.
2015-03-26
Dynamic concolic execution of an application
Grant 8,909,992 - Kalman , et al. December 9, 2
2014-12-09
Hybrid analysis of vulnerable information flows
Grant 8,869,287 - Beskrovny , et al. October 21, 2
2014-10-21
Fixing security vulnerability in a source code
Grant 8,819,637 - Abadi , et al. August 26, 2
2014-08-26
Thwarting cross-site request forgery (CSRF) and clickjacking attacks
Grant 8,813,237 - Amit , et al. August 19, 2
2014-08-19
Protection against cache poisoning
Grant 8,806,133 - Hay , et al. August 12, 2
2014-08-12
Hybrid Analysis Of Vulnerable Information Flows
App 20140189875 - Beskrovny; Evgeny ;   et al.
2014-07-03
Hybrid Analysis Of Vulnerable Information Flows
App 20140189874 - BESKROVNY; EVGENY ;   et al.
2014-07-03
Crawling browser-accessible applications
Grant 8,756,214 - Ashkanazi , et al. June 17, 2
2014-06-17
Efficient code instrumentation
Grant 8,752,026 - Sharabani , et al. June 10, 2
2014-06-10
Pinpointing security vulnerabilities in computer software applications
Grant 8,752,182 - Amit , et al. June 10, 2
2014-06-10
Dynamic Concolic Execution Of An Application
App 20140149798 - Kalman; Daniel ;   et al.
2014-05-29
Dynamic Concolic Execution Of An Application
App 20140149797 - KALMAN; DANIEL ;   et al.
2014-05-29
Detecting and monitoring server side states during web application scanning
Grant 8,676,966 - Podjarny , et al. March 18, 2
2014-03-18
Verification of information-flow downgraders
Grant 8,635,602 - Haviv , et al. January 21, 2
2014-01-21
Selective Encryption In Mobile Devices
App 20130339724 - AMIT; Yair ;   et al.
2013-12-19
Access Control System For A Mobile Device
App 20130340031 - Amit; Yair ;   et al.
2013-12-19
Eliminating false reports of security vulnerabilities when testing computer software
Grant 8,584,246 - Haviv , et al. November 12, 2
2013-11-12
System, method and apparatus for simultaneous definition and enforcement of access-control and integrity policies
Grant 8,572,727 - Centonze , et al. October 29, 2
2013-10-29
Determining suitable insertion points for string sanitizers in a computer code
Grant 8,539,466 - Abadi , et al. September 17, 2
2013-09-17
Injection context based static analysis of computer software applications
Grant 8,528,095 - Haviv , et al. September 3, 2
2013-09-03
Pinpointing security vulnerabilities in computer software applications
Grant 8,510,842 - Amit , et al. August 13, 2
2013-08-13
Preventing cross-site request forgery attacks on a server
Grant 8,495,137 - Amit , et al. July 23, 2
2013-07-23
Cross-domain access prevention
Grant 8,495,719 - Podjarny , et al. July 23, 2
2013-07-23
Preventing cross-site request forgery attacks on a server
Grant 8,495,135 - Amit , et al. July 23, 2
2013-07-23
Identifying security vulnerability in computer software
Grant 8,468,605 - Haviv , et al. June 18, 2
2013-06-18
Fixing Security Vulnerability In A Source Code
App 20130133075 - Abadi; Aharon ;   et al.
2013-05-23
Automatic Crawling Of Encoded Dynamic Urls
App 20130091114 - Brake; Nevon C. ;   et al.
2013-04-11
Automatic Crawling Of Encoded Dynamic Urls
App 20130091115 - Brake; Nevon C. ;   et al.
2013-04-11
Injection Attack Mitigation Using Context Sensitive Encoding Of Injected Input
App 20130081135 - Podjarny; Guy ;   et al.
2013-03-28
Black box testing optimization using information from white box testing
Grant 8,387,017 - Calendino , et al. February 26, 2
2013-02-26
Identifying security breaches caused by web-enabled software applications
Grant 8,370,945 - Amit , et al. February 5, 2
2013-02-05
Determining Suitable Insertion Points For String Sanitizers In A Computer Code
App 20120304161 - Ahadi; Aharon ;   et al.
2012-11-29
Crawling of object model using transformation graph
Grant 8,296,722 - Yoshihama , et al. October 23, 2
2012-10-23
Pinpointing Security Vulnerabilities In Computer Software Applications
App 20120266246 - AMIT; YAIR ;   et al.
2012-10-18
Pinpointing Security Vulnerabilities In Computer Software Applications
App 20120266248 - Amit; Yair ;   et al.
2012-10-18
Simulating Black Box Test Results Using Information From White Box Testing
App 20120254839 - Fink; Stephen ;   et al.
2012-10-04
Crawling Browser-Accessible Applications
App 20120253778 - ASHKANAZI; Asaf ;   et al.
2012-10-04
Web Crawling Using Static Analysis
App 20120215757 - Weisman; Omri ;   et al.
2012-08-23
Crawling browser-accessible applications
Grant 8,250,059 - Ashkenazi , et al. August 21, 2
2012-08-21
Web browser security
Grant 8,230,060 - Sharabani July 24, 2
2012-07-24
Preventing Cross-Site Request Forgery Attacks on a Server
App 20120180128 - Amit; Yair ;   et al.
2012-07-12
Simulating Black Box Test Results Using Information From White Box Testing
App 20120110551 - Fink; Stephen ;   et al.
2012-05-03
Verification of Information-Flow Downgraders
App 20120023486 - Haviv; Yinnon A. ;   et al.
2012-01-26
Thwarting Cross-site Request Forgery (csrf) And Clickjacking Attacks
App 20110321168 - Amit; Yair ;   et al.
2011-12-29
Injection Context Based Static Analysis Of Computer Software Applications
App 20110321016 - HAVIV; YINNON A. ;   et al.
2011-12-29
Fixing Security Vulnerability In A Source Code
App 20110302566 - Abadi; Aharon ;   et al.
2011-12-08
Preventing Cross-Site Request Forgery Attacks on a Server
App 20110225234 - Amit; Yair ;   et al.
2011-09-15
Determining The Vulnerability Of Computer Software Applications To Attacks
App 20110162072 - Hay; Roee ;   et al.
2011-06-30
Detecting And Monitoring Server Side States During Web Application Scanning
App 20110161486 - Podjarny; Guy ;   et al.
2011-06-30
Identifying Security Vulnerability In Computer Software
App 20110131656 - HAVIV; Yinnon A. ;   et al.
2011-06-02
System, Method and Apparatus for Simultaneous Definition and Enforcement of Access-control and Integrity Policies
App 20110126282 - Centonze; Paolina ;   et al.
2011-05-26
System And Method For Static Detection And Categorization Of Information-flow Downgraders
App 20110088023 - HAVIV; YINNON ;   et al.
2011-04-14
Eliminating False Reports of Security Vulnerabilities when Testing Computer Software
App 20110087892 - HAVIV; Yinnon Avraham ;   et al.
2011-04-14
Crawling Browser-Accessible Applications
App 20110066609 - ASHKENAZI; Asaf ;   et al.
2011-03-17
Protection Against Cache Poisoning
App 20110066807 - Hay; Roee ;   et al.
2011-03-17
Black Box Testing Optimization Using Information from White Box Testing
App 20110055813 - Calendino; Rob ;   et al.
2011-03-03
Efficient Code Instrumentation
App 20100306745 - Sharabani; Adi ;   et al.
2010-12-02
Identifying Security Breaches Caused by Web-Enabled Software Applications
App 20100299754 - Amit; Yair ;   et al.
2010-11-25
Cross-domain Access Prevention
App 20100088761 - Podjarny; Guy ;   et al.
2010-04-08
Crawling of object model using transformation graph
App 20100088668 - Yoshihama; Sachiko ;   et al.
2010-04-08
Web Browser Security
App 20100036938 - Sharabani; Adi
2010-02-11
Application State Detector And Inducer
App 20090320043 - Podjarny; Guy ;   et al.
2009-12-24

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed