Path-and index-sensitive string analysis based on monadic second-order logic T Tateishi, M Pistoia, O Tripp ACM Transactions on Software Engineering and Methodology (TOSEM) 22 (4), 1-33, 2013 | 81 | 2013 |
Systems, methods and computer program products for string analysis with security labels for vulnerability detection K Ono, M Saito, N Tabuchi, T Tateishi US Patent 7,530,107, 2009 | 50 | 2009 |
Modular string-sensitive permission analysis with demand-driven precision E Geay, M Pistoia, T Tateishi, BG Ryder, J Dolby 2009 IEEE 31st International Conference on Software Engineering, 177-187, 2009 | 43 | 2009 |
Injection context based static analysis of computer software applications YA Haviv, R Hay, M Pistoia, O Segal, A Sharabani, T Tateishi, O Tripp, ... US Patent 8,528,095, 2013 | 33 | 2013 |
Identifying security vulnerability in computer software YA Haviv, R Hay, M Pistoia, A Sharabani, T Tateishi, O Tripp, O Weisman US Patent 8,468,605, 2013 | 31 | 2013 |
Efficient extraction of software dependencies from program code NA Joukov, BM Pfitzmann, M Pistoia, V Tarasov, T Tateishi, NG Vogl US Patent 8,533,659, 2013 | 27 | 2013 |
Crawling of object model using transformation graph S Yoshihama, S Kawanaka, T Tateishi, O Segal, A Sharabani, M Pistoia, ... US Patent 8,296,722, 2012 | 26 | 2012 |
Eliminating false reports of security vulnerabilities when testing computer software YA Haviv, R Hay, M Pistoia, A Sharabani, T Tateishi, O Tripp, O Weisman US Patent 8,584,246, 2013 | 25 | 2013 |
System, method, and program for determining validity of string YA Haviv, M Pistoia, N Tabuchi, T Tateishi US Patent 8,365,280, 2013 | 24 | 2013 |
System and method for static detection and categorization of information-flow downgraders Y Haviv, R Hay, M Pistoia, G Podjarny, A Sharabani, T Tateishi, O Tripp, ... US Patent 9,275,246, 2016 | 23 | 2016 |
Performance computer program testing after source code modification using execution conditions T Tateishi, F Kitayama US Patent 7,844,955, 2010 | 23 | 2010 |
Verification of information-flow downgraders YA Haviv, R Hay, M Pistoia, A Sharabani, T Tateishi, O Tripp, O Weisman US Patent 8,635,602, 2014 | 22 | 2014 |
Automatic optimization of string allocations in a computer program P Centonze, M Mostafa, M Pistoia, T Tateishi US Patent 8,473,899, 2013 | 22 | 2013 |
System, method, and apparatus for modular, string-sensitive, access rights analysis with demand-driven precision JT Dolby, E Geay, M Pistoia, BG Ryder, T Tateishi US Patent 8,572,674, 2013 | 21 | 2013 |
Formal analysis of the quality and conformance of information flow downgraders RJ Berg, M Pistoia, T Tateishi, SD Teilhet, O Tripp US Patent 8,667,584, 2014 | 20 | 2014 |
Computer program testing after source code modification using execution conditions T Tateishi, F Kitayama US Patent 8,209,671, 2012 | 17 | 2012 |
Automatic inference of whitelist-based validation as part of static analysis for security L Guy, M Pistoia, T Tateishi, O Tripp US Patent 8,627,465, 2014 | 16 | 2014 |
Modular and/or demand-driven string analysis of a computer program T Tateishi, O Tripp, M Pistoia US Patent 8,381,199, 2013 | 16 | 2013 |
Method and system to discover possible program variable values by connecting program value extraction with external data sources S Chicherin, NA Joukov, B Pfitzmann, M Pistoia, V Tarasov, T Tateishi, ... US Patent 8,561,035, 2013 | 15 | 2013 |
Information-flow-based access control for web browsers S Yoshihama, T Tateishi, N Tabuchi, T Matsumoto IEICE transactions on information and systems 92 (5), 836-850, 2009 | 15 | 2009 |