Takaaki Tateishi
Takaaki Tateishi
IBM Research - Tokyo
Verified email at jp.ibm.com
Title
Cited by
Cited by
Year
Path-and index-sensitive string analysis based on monadic second-order logic
T Tateishi, M Pistoia, O Tripp
ACM Transactions on Software Engineering and Methodology (TOSEM) 22 (4), 1-33, 2013
812013
Systems, methods and computer program products for string analysis with security labels for vulnerability detection
K Ono, M Saito, N Tabuchi, T Tateishi
US Patent 7,530,107, 2009
502009
Modular string-sensitive permission analysis with demand-driven precision
E Geay, M Pistoia, T Tateishi, BG Ryder, J Dolby
2009 IEEE 31st International Conference on Software Engineering, 177-187, 2009
432009
Injection context based static analysis of computer software applications
YA Haviv, R Hay, M Pistoia, O Segal, A Sharabani, T Tateishi, O Tripp, ...
US Patent 8,528,095, 2013
332013
Identifying security vulnerability in computer software
YA Haviv, R Hay, M Pistoia, A Sharabani, T Tateishi, O Tripp, O Weisman
US Patent 8,468,605, 2013
312013
Efficient extraction of software dependencies from program code
NA Joukov, BM Pfitzmann, M Pistoia, V Tarasov, T Tateishi, NG Vogl
US Patent 8,533,659, 2013
272013
Crawling of object model using transformation graph
S Yoshihama, S Kawanaka, T Tateishi, O Segal, A Sharabani, M Pistoia, ...
US Patent 8,296,722, 2012
262012
Eliminating false reports of security vulnerabilities when testing computer software
YA Haviv, R Hay, M Pistoia, A Sharabani, T Tateishi, O Tripp, O Weisman
US Patent 8,584,246, 2013
252013
System, method, and program for determining validity of string
YA Haviv, M Pistoia, N Tabuchi, T Tateishi
US Patent 8,365,280, 2013
242013
System and method for static detection and categorization of information-flow downgraders
Y Haviv, R Hay, M Pistoia, G Podjarny, A Sharabani, T Tateishi, O Tripp, ...
US Patent 9,275,246, 2016
232016
Performance computer program testing after source code modification using execution conditions
T Tateishi, F Kitayama
US Patent 7,844,955, 2010
232010
Verification of information-flow downgraders
YA Haviv, R Hay, M Pistoia, A Sharabani, T Tateishi, O Tripp, O Weisman
US Patent 8,635,602, 2014
222014
Automatic optimization of string allocations in a computer program
P Centonze, M Mostafa, M Pistoia, T Tateishi
US Patent 8,473,899, 2013
222013
System, method, and apparatus for modular, string-sensitive, access rights analysis with demand-driven precision
JT Dolby, E Geay, M Pistoia, BG Ryder, T Tateishi
US Patent 8,572,674, 2013
212013
Formal analysis of the quality and conformance of information flow downgraders
RJ Berg, M Pistoia, T Tateishi, SD Teilhet, O Tripp
US Patent 8,667,584, 2014
202014
Computer program testing after source code modification using execution conditions
T Tateishi, F Kitayama
US Patent 8,209,671, 2012
172012
Automatic inference of whitelist-based validation as part of static analysis for security
L Guy, M Pistoia, T Tateishi, O Tripp
US Patent 8,627,465, 2014
162014
Modular and/or demand-driven string analysis of a computer program
T Tateishi, O Tripp, M Pistoia
US Patent 8,381,199, 2013
162013
Method and system to discover possible program variable values by connecting program value extraction with external data sources
S Chicherin, NA Joukov, B Pfitzmann, M Pistoia, V Tarasov, T Tateishi, ...
US Patent 8,561,035, 2013
152013
Information-flow-based access control for web browsers
S Yoshihama, T Tateishi, N Tabuchi, T Matsumoto
IEICE transactions on information and systems 92 (5), 836-850, 2009
152009
The system can't perform the operation now. Try again later.
Articles 1–20