Folgen
Roee Hay
Roee Hay
Zugehörigkeit unbekannt
Bestätigte E-Mail-Adresse bei securityresear.ch
Titel
Zitiert von
Zitiert von
Jahr
Pinpointing security vulnerabilities in computer software applications
Y Amit, R Hay, R Saltzman, A Sharabani
US Patent 8,510,842, 2013
2582013
Identifying security breaches caused by web-enabled software applications
Y Amit, R Hay, A Sharabani
US Patent 8,370,945, 2013
2242013
Dynamic detection of inter-application communication vulnerabilities in Android
R Hay, O Tripp, M Pistoia
Proceedings of the 2015 International Symposium on Software Testing and …, 2015
952015
Protection against cache poisoning
R Hay, A Sharabani
US Patent 8,806,133, 2014
722014
One Class to Rule Them All: 0-Day Deserialization Vulnerabilities in Android
O Peles, R Hay
Proceedings of the 9th USENIX conference on Offensive Technologies (WOOT '15), 2015
452015
Simulating black box test results using information from white box testing
S Fink, YA Haviv, R Hay, M Pistoia, O Segal, A Sharabani, M Sridharan, ...
US Patent 9,747,187, 2017
352017
Injection context based static analysis of computer software applications
YA Haviv, R Hay, M Pistoia, O Segal, A Sharabani, T Tateishi, O Tripp, ...
US Patent 8,528,095, 2013
352013
Attacking the Linux PRNG on android: weaknesses in seeding of entropic pools and low boot-time entropy
D Kaplan, S Kedmi, R Hay, A Dayan
Proceedings of the 8th USENIX conference on Offensive Technologies (WOOT '14 …, 2014
332014
Security risk evaluation
R Hay, O Tripp, M Pistoia
US Patent App. 15/339,965, 2018
322018
Identifying security vulnerability in computer software
YA Haviv, R Hay, M Pistoia, A Sharabani, T Tateishi, O Tripp, O Weisman
US Patent 8,468,605, 2013
322013
Bypassing certificate pinning
E Bronshtein, R Hay, S Kedmi
US Patent 9,774,590, 2017
262017
Eliminating false reports of security vulnerabilities when testing computer software
YA Haviv, R Hay, M Pistoia, A Sharabani, T Tateishi, O Tripp, O Weisman
US Patent 8,584,246, 2013
262013
Verification of information-flow downgraders
YA Haviv, R Hay, M Pistoia, A Sharabani, T Tateishi, O Tripp, O Weisman
US Patent 8,635,602, 2014
252014
System and method for static detection and categorization of information-flow downgraders
Y Haviv, R Hay, M Pistoia, G Podjarny, A Sharabani, T Tateishi, O Tripp, ...
US Patent 9,275,246, 2016
242016
Process security validation
R Bachar, R Hay, E Rokah, Y Shany
US Patent 9,537,883, 2017
192017
fastboot oem vuln: Android bootloader vulnerabilities in vendor customizations
R Hay
11th USENIX Workshop on Offensive Technologies (WOOT 17), 2017
162017
Thwarting cross-site request forgery (CSRF) and clickjacking attacks
Y Amit, R Hay, R Saltzman, A Sharabani
US Patent 8,813,237, 2014
142014
System, method and apparatus for simultaneous definition and enforcement of access-control and integrity policies
P Centonze, YA Haviv, R Hay, M Pistoia, A Sharabani, O Tripp
US Patent 8,572,727, 2013
142013
Identifying whether an application is malicious
R Hay, D Kalman, R Saltzman, O Tripp
US Patent 8,869,274, 2014
122014
Pinpointing security vulnerabilities in computer software applications
Y Amit, R Hay, R Saltzman, A Sharabani
US Patent 8,752,182, 2014
122014
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20