US2014053028A1
|
|
Anomaly detection at the level of run time data structures
|
US2014053136A1
|
|
Determining correctness conditions for use in static analysis
|
US2013152204A1
|
|
Interactive analysis of a security specification
|
US2013145215A1
|
|
Eliminating false-positive reports resulting from static analysis of computer software
|
US2013091082A1
|
|
Using a heuristically-generated policy to dynamically select string analysis algorithms for client queries
|
US2013086561A1
|
|
Static analysis of computer software applications
|
US2013086686A1
|
|
Automated detection of flaws and incompatibility problems in information flow downgraders
|
US2013007886A1
|
|
Detecting security vulnerabilities in web applications
|
US2013007529A1
|
|
Static analysis based on observed string values during execution of a computer-based software application
|
US2012317143A1
|
|
String analysis based on three-valued logic
|
US2012210432A1
|
|
Label-based taint analysis
|
US2012198557A1
|
|
Determining the vulnerability of computer software applications to privilege-escalation attacks
|
US2012192161A1
|
|
Distributed static analysis of computer software applications
|
US2012174229A1
|
|
Runtime enforcement of security checks
|
US2012084755A1
|
|
Confidence-based static analysis
|
US2009300266A1
|
|
Identification of read/write chains during static analysis of computer software
|