Theo dõi
Roee Hay
Roee Hay
Mục liên kết không xác định
Email được xác minh tại securityresear.ch
Tiêu đề
Trích dẫn bởi
Trích dẫn bởi
Năm
Pinpointing security vulnerabilities in computer software applications
Y Amit, R Hay, R Saltzman, A Sharabani
US Patent 8,510,842, 2013
2662013
Identifying security breaches caused by web-enabled software applications
Y Amit, R Hay, A Sharabani
US Patent 8,370,945, 2013
2332013
Dynamic detection of inter-application communication vulnerabilities in Android
R Hay, O Tripp, M Pistoia
Proceedings of the 2015 International Symposium on Software Testing and …, 2015
1032015
Protection against cache poisoning
R Hay, A Sharabani
US Patent 8,806,133, 2014
742014
One Class to Rule Them All: 0-Day Deserialization Vulnerabilities in Android
O Peles, R Hay
Proceedings of the 9th USENIX conference on Offensive Technologies (WOOT '15), 2015
512015
Security risk evaluation
R Hay, O Tripp, M Pistoia
US Patent App. 15/339,965, 2018
402018
Attacking the Linux PRNG on android: weaknesses in seeding of entropic pools and low boot-time entropy
D Kaplan, S Kedmi, R Hay, A Dayan
Proceedings of the 8th USENIX conference on Offensive Technologies (WOOT '14 …, 2014
372014
Simulating black box test results using information from white box testing
S Fink, YA Haviv, R Hay, M Pistoia, O Segal, A Sharabani, M Sridharan, ...
US Patent 9,747,187, 2017
352017
Injection context based static analysis of computer software applications
YA Haviv, R Hay, M Pistoia, O Segal, A Sharabani, T Tateishi, O Tripp, ...
US Patent 8,528,095, 2013
352013
Bypassing certificate pinning
E Bronshtein, R Hay, S Kedmi
US Patent 9,774,590, 2017
342017
Identifying security vulnerability in computer software
YA Haviv, R Hay, M Pistoia, A Sharabani, T Tateishi, O Tripp, O Weisman
US Patent 8,468,605, 2013
322013
Eliminating false reports of security vulnerabilities when testing computer software
YA Haviv, R Hay, M Pistoia, A Sharabani, T Tateishi, O Tripp, O Weisman
US Patent 8,584,246, 2013
262013
System and method for static detection and categorization of information-flow downgraders
Y Haviv, R Hay, M Pistoia, G Podjarny, A Sharabani, T Tateishi, O Tripp, ...
US Patent 9,275,246, 2016
242016
Verification of information-flow downgraders
YA Haviv, R Hay, M Pistoia, A Sharabani, T Tateishi, O Tripp, O Weisman
US Patent 8,635,602, 2014
242014
fastboot oem vuln: Android bootloader vulnerabilities in vendor customizations
R Hay
11th USENIX Workshop on Offensive Technologies (WOOT 17), 2017
172017
Thwarting cross-site request forgery (CSRF) and clickjacking attacks
Y Amit, R Hay, R Saltzman, A Sharabani
US Patent 8,813,237, 2014
142014
System, method and apparatus for simultaneous definition and enforcement of access-control and integrity policies
P Centonze, YA Haviv, R Hay, M Pistoia, A Sharabani, O Tripp
US Patent 8,572,727, 2013
142013
Identifying whether an application is malicious
R Hay, D Kalman, R Saltzman, O Tripp
US Patent 8,869,274, 2014
122014
Pinpointing security vulnerabilities in computer software applications
Y Amit, R Hay, R Saltzman, A Sharabani
US Patent 8,752,182, 2014
122014
Identifying whether an application is malicious
R Hay, D Kalman, R Saltzman, O Tripp
US Patent 8,990,940, 2015
112015
Hệ thống không thể thực hiện thao tác ngay bây giờ. Hãy thử lại sau.
Bài viết 1–20