Pinpointing security vulnerabilities in computer software applications Y Amit, R Hay, R Saltzman, A Sharabani US Patent 8,510,842, 2013 | 266 | 2013 |
Identifying security breaches caused by web-enabled software applications Y Amit, R Hay, A Sharabani US Patent 8,370,945, 2013 | 232 | 2013 |
Dynamic detection of inter-application communication vulnerabilities in Android R Hay, O Tripp, M Pistoia Proceedings of the 2015 International Symposium on Software Testing and …, 2015 | 106 | 2015 |
Protection against cache poisoning R Hay, A Sharabani US Patent 8,806,133, 2014 | 74 | 2014 |
One Class to Rule Them All: 0-Day Deserialization Vulnerabilities in Android O Peles, R Hay Proceedings of the 9th USENIX conference on Offensive Technologies (WOOT '15), 2015 | 50 | 2015 |
Security risk evaluation R Hay, O Tripp, M Pistoia US Patent App. 15/339,965, 2018 | 39 | 2018 |
Attacking the Linux PRNG on android: weaknesses in seeding of entropic pools and low boot-time entropy D Kaplan, S Kedmi, R Hay, A Dayan Proceedings of the 8th USENIX conference on Offensive Technologies (WOOT '14 …, 2014 | 38 | 2014 |
Simulating black box test results using information from white box testing S Fink, YA Haviv, R Hay, M Pistoia, O Segal, A Sharabani, M Sridharan, ... US Patent 9,747,187, 2017 | 35 | 2017 |
Injection context based static analysis of computer software applications YA Haviv, R Hay, M Pistoia, O Segal, A Sharabani, T Tateishi, O Tripp, ... US Patent 8,528,095, 2013 | 35 | 2013 |
Bypassing certificate pinning E Bronshtein, R Hay, S Kedmi US Patent 9,774,590, 2017 | 32 | 2017 |
Identifying security vulnerability in computer software YA Haviv, R Hay, M Pistoia, A Sharabani, T Tateishi, O Tripp, O Weisman US Patent 8,468,605, 2013 | 32 | 2013 |
Eliminating false reports of security vulnerabilities when testing computer software YA Haviv, R Hay, M Pistoia, A Sharabani, T Tateishi, O Tripp, O Weisman US Patent 8,584,246, 2013 | 26 | 2013 |
Verification of information-flow downgraders YA Haviv, R Hay, M Pistoia, A Sharabani, T Tateishi, O Tripp, O Weisman US Patent 8,635,602, 2014 | 25 | 2014 |
System and method for static detection and categorization of information-flow downgraders Y Haviv, R Hay, M Pistoia, G Podjarny, A Sharabani, T Tateishi, O Tripp, ... US Patent 9,275,246, 2016 | 24 | 2016 |
fastboot oem vuln: Android bootloader vulnerabilities in vendor customizations R Hay 11th USENIX Workshop on Offensive Technologies (WOOT 17), 2017 | 18 | 2017 |
Thwarting cross-site request forgery (CSRF) and clickjacking attacks Y Amit, R Hay, R Saltzman, A Sharabani US Patent 8,813,237, 2014 | 14 | 2014 |
System, method and apparatus for simultaneous definition and enforcement of access-control and integrity policies P Centonze, YA Haviv, R Hay, M Pistoia, A Sharabani, O Tripp US Patent 8,572,727, 2013 | 14 | 2013 |
Identifying whether an application is malicious R Hay, D Kalman, R Saltzman, O Tripp US Patent 8,869,274, 2014 | 12 | 2014 |
Pinpointing security vulnerabilities in computer software applications Y Amit, R Hay, R Saltzman, A Sharabani US Patent 8,752,182, 2014 | 12 | 2014 |
Identifying whether an application is malicious R Hay, D Kalman, R Saltzman, O Tripp US Patent 8,990,940, 2015 | 11 | 2015 |