Roee Hay
Roee Hay
Vulnerability researcher
Verified email at securityresear.ch - Homepage
Title
Cited by
Cited by
Year
Pinpointing security vulnerabilities in computer software applications
Y Amit, R Hay, R Saltzman, A Sharabani
US Patent 8,510,842, 2013
2082013
Identifying security breaches caused by web-enabled software applications
Y Amit, R Hay, A Sharabani
US Patent 8,370,945, 2013
1712013
Dynamic detection of inter-application communication vulnerabilities in Android
R Hay, O Tripp, M Pistoia
Proceedings of the 2015 International Symposium on Software Testing and …, 2015
652015
Protection against cache poisoning
R Hay, A Sharabani
US Patent 8,806,133, 2014
522014
Injection context based static analysis of computer software applications
YA Haviv, R Hay, M Pistoia, O Segal, A Sharabani, T Tateishi, O Tripp, ...
US Patent 8,528,095, 2013
332013
One Class to Rule Them All: 0-Day Deserialization Vulnerabilities in Android
O Peles, R Hay
Proceedings of the 9th USENIX conference on Offensive Technologies (WOOT '15), 2015
312015
Identifying security vulnerability in computer software
YA Haviv, R Hay, M Pistoia, A Sharabani, T Tateishi, O Tripp, O Weisman
US Patent 8,468,605, 2013
312013
Simulating black box test results using information from white box testing
S Fink, YA Haviv, R Hay, M Pistoia, O Segal, A Sharabani, M Sridharan, ...
US Patent 9,747,187, 2017
282017
Eliminating false reports of security vulnerabilities when testing computer software
YA Haviv, R Hay, M Pistoia, A Sharabani, T Tateishi, O Tripp, O Weisman
US Patent 8,584,246, 2013
252013
System and method for static detection and categorization of information-flow downgraders
Y Haviv, R Hay, M Pistoia, G Podjarny, A Sharabani, T Tateishi, O Tripp, ...
US Patent 9,275,246, 2016
232016
Attacking the Linux PRNG on android: weaknesses in seeding of entropic pools and low boot-time entropy
D Kaplan, S Kedmi, R Hay, A Dayan
Proceedings of the 8th USENIX conference on Offensive Technologies (WOOT '14 …, 2014
222014
Verification of information-flow downgraders
YA Haviv, R Hay, M Pistoia, A Sharabani, T Tateishi, O Tripp, O Weisman
US Patent 8,635,602, 2014
222014
Process security validation
R Bachar, R Hay, E Rokah, Y Shany
US Patent 9,537,883, 2017
162017
Thwarting cross-site request forgery (CSRF) and clickjacking attacks
Y Amit, R Hay, R Saltzman, A Sharabani
US Patent 8,813,237, 2014
122014
Pinpointing security vulnerabilities in computer software applications
Y Amit, R Hay, R Saltzman, A Sharabani
US Patent 8,752,182, 2014
112014
System, method and apparatus for simultaneous definition and enforcement of access-control and integrity policies
P Centonze, YA Haviv, R Hay, M Pistoia, A Sharabani, O Tripp
US Patent 8,572,727, 2013
112013
Security risk evaluation
R Hay, O Tripp, M Pistoia
US Patent App. 15/339,965, 2018
102018
Identifying whether an application is malicious
R Hay, D Kalman, R Saltzman, O Tripp
US Patent 8,869,274, 2014
92014
Bypassing certificate pinning
E Bronshtein, R Hay, S Kedmi
US Patent 9,774,590, 2017
82017
fastboot oem vuln: Android bootloader vulnerabilities in vendor customizations
R Hay
11th {USENIX} Workshop on Offensive Technologies ({WOOT} 17), 2017
72017
The system can't perform the operation now. Try again later.
Articles 1–20