Follow
Roee Hay
Roee Hay
Unknown affiliation
Verified email at securityresear.ch
Title
Cited by
Cited by
Year
Pinpointing security vulnerabilities in computer software applications
Y Amit, R Hay, R Saltzman, A Sharabani
US Patent 8,510,842, 2013
2662013
Identifying security breaches caused by web-enabled software applications
Y Amit, R Hay, A Sharabani
US Patent 8,370,945, 2013
2322013
Dynamic detection of inter-application communication vulnerabilities in Android
R Hay, O Tripp, M Pistoia
Proceedings of the 2015 International Symposium on Software Testing and …, 2015
1062015
Protection against cache poisoning
R Hay, A Sharabani
US Patent 8,806,133, 2014
742014
One Class to Rule Them All: 0-Day Deserialization Vulnerabilities in Android
O Peles, R Hay
Proceedings of the 9th USENIX conference on Offensive Technologies (WOOT '15), 2015
502015
Security risk evaluation
R Hay, O Tripp, M Pistoia
US Patent App. 15/339,965, 2018
392018
Attacking the Linux PRNG on android: weaknesses in seeding of entropic pools and low boot-time entropy
D Kaplan, S Kedmi, R Hay, A Dayan
Proceedings of the 8th USENIX conference on Offensive Technologies (WOOT '14 …, 2014
382014
Simulating black box test results using information from white box testing
S Fink, YA Haviv, R Hay, M Pistoia, O Segal, A Sharabani, M Sridharan, ...
US Patent 9,747,187, 2017
352017
Injection context based static analysis of computer software applications
YA Haviv, R Hay, M Pistoia, O Segal, A Sharabani, T Tateishi, O Tripp, ...
US Patent 8,528,095, 2013
352013
Bypassing certificate pinning
E Bronshtein, R Hay, S Kedmi
US Patent 9,774,590, 2017
322017
Identifying security vulnerability in computer software
YA Haviv, R Hay, M Pistoia, A Sharabani, T Tateishi, O Tripp, O Weisman
US Patent 8,468,605, 2013
322013
Eliminating false reports of security vulnerabilities when testing computer software
YA Haviv, R Hay, M Pistoia, A Sharabani, T Tateishi, O Tripp, O Weisman
US Patent 8,584,246, 2013
262013
Verification of information-flow downgraders
YA Haviv, R Hay, M Pistoia, A Sharabani, T Tateishi, O Tripp, O Weisman
US Patent 8,635,602, 2014
252014
System and method for static detection and categorization of information-flow downgraders
Y Haviv, R Hay, M Pistoia, G Podjarny, A Sharabani, T Tateishi, O Tripp, ...
US Patent 9,275,246, 2016
242016
fastboot oem vuln: Android bootloader vulnerabilities in vendor customizations
R Hay
11th USENIX Workshop on Offensive Technologies (WOOT 17), 2017
182017
Thwarting cross-site request forgery (CSRF) and clickjacking attacks
Y Amit, R Hay, R Saltzman, A Sharabani
US Patent 8,813,237, 2014
142014
System, method and apparatus for simultaneous definition and enforcement of access-control and integrity policies
P Centonze, YA Haviv, R Hay, M Pistoia, A Sharabani, O Tripp
US Patent 8,572,727, 2013
142013
Identifying whether an application is malicious
R Hay, D Kalman, R Saltzman, O Tripp
US Patent 8,869,274, 2014
122014
Pinpointing security vulnerabilities in computer software applications
Y Amit, R Hay, R Saltzman, A Sharabani
US Patent 8,752,182, 2014
122014
Identifying whether an application is malicious
R Hay, D Kalman, R Saltzman, O Tripp
US Patent 8,990,940, 2015
112015
The system can't perform the operation now. Try again later.
Articles 1–20