Patents by Inventor Omri Weisman
Omri Weisman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240330393Abstract: Systems and methods for matching media items of a first type to media items of a second type are provided. A data store comprising first media items of a first type is accessed. A first media item of the first media items is associated with a first media item characteristic. A second media item of a second type is identified. The second media item includes a second media item characteristic. A matching first media item of the first media items that matches the second media item is determined based on the first media item characteristic and the second media item characteristic. Ranking of the second media item or the matching first media item is adjusted to reflect the correspondence between the second media item and the matching first media item. Information associated with the matching first media item is provided to a first user device based on the adjusted ranking.Type: ApplicationFiled: May 6, 2024Publication date: October 3, 2024Inventors: Omri Weisman, Yonit Halperin Worzel, Ron Zeitouny, Erez Bixon
-
Patent number: 11977599Abstract: Systems and methods for matching videos to podcast episodes are provided. A data store comprising podcast episode identifiers is accessed. The podcast episode identifiers are associated with one or more podcast episode attributes. A video content item is identified. The video content item includes one or more video content item attributes. A matching podcast episode identifier that matches the video content item is determined based on the one or more podcast episode attributes and the one or more video content item attributes. A ranking of one of the video content item or the matching podcast episode identifier is caused to be adjusted to reflect the correspondence between the video content item and the matching podcast episode identifier. Information associated with the matching podcast episode identifier is provided to a first user device.Type: GrantFiled: October 4, 2021Date of Patent: May 7, 2024Assignee: Google LLCInventors: Omri Weisman, Yonit Halperin Worzel, Ron Zeitouny, Erez Bixon
-
Publication number: 20230105830Abstract: Systems and methods for matching videos to podcast episodes are provided. A data store comprising podcast episode identifiers is accessed. The podcast episode identifiers are associated with one or more podcast episode attributes. A video content item is identified. The video content item includes one or more video content item attributes. A matching podcast episode identifier that matches the video content item is determined based on the one or more podcast episode attributes and the one or more video content item attributes. A ranking of one of the video content item or the matching podcast episode identifier is caused to be adjusted to reflect the correspondence between the video content item and the matching podcast episode identifier. Information associated with the matching podcast episode identifier is provided to a first user device.Type: ApplicationFiled: October 4, 2021Publication date: April 6, 2023Inventors: Omri Weisman, Yonit Halperin Worzel, Ron Zeitouny, Erez Bixon
-
Patent number: 10742666Abstract: A system and method for static detection and categorization of information-flow downgraders includes transforming a program stored in a memory device by statically analyzing program variables to yield a single assignment to each variable in an instruction set. The instruction set is translated to production rules with string operations. A context-free grammar is generated from the production rules to identify a finite set of strings. An information-flow downgrader function is identified by checking the finite set of strings against one or more function specifications.Type: GrantFiled: February 4, 2016Date of Patent: August 11, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Yinnon Haviv, Roee Hay, Marco Pistoia, Guy Podjarny, Adi Sharabani, Takaaki Tateishi, Omer Tripp, Omri Weisman
-
Patent number: 10157049Abstract: Statically analyzing a computer software application can include identifying a plurality of objects within the instructions of a computer software application, where the objects in the plurality of objects are of the same object type, and preparing a modified version of the instructions in which any of the objects in the plurality of objects determined to be extraneous is omitted.Type: GrantFiled: October 26, 2011Date of Patent: December 18, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Yinnon A. Haviv, Daniel Kalman, Dmitri Pikus, Omer Tripp, Omri Weisman
-
Patent number: 10049167Abstract: A computer system includes a master controller that receives an HTTP request for a first URL. The URL indicates a first state of a first mobile application. A navigation controller navigates to the first state of the first mobile application within a device. A content scraper extracts content from the first state and identifies forward links to corresponding additional states of the first mobile application. The computer system includes an output formatter configured to package the content and the forward links into an HTTP response and transmit the HTTP response to a source of the first HTTP request. The HTTP response includes a forward URL for each additional state of the first mobile application reachable from the first state. For each additional state, the forward URL includes an indicator of the first mobile application and a path to reach the additional state within the first mobile application.Type: GrantFiled: December 31, 2015Date of Patent: August 14, 2018Assignee: Samsung Electronics Co., Ltd.Inventors: Omri Weisman, Manikandan Sankaranarasimhan, Benny Zilberstein, Yehuda Rajuan, Idan Elad, Ran Nozik, Kalyan Desineni, Eli Cohen
-
Patent number: 10019581Abstract: Identifying stored security vulnerabilities in computer software applications by providing via a first interface of a computer software application during execution of the computer software application, test data having a characteristic of a malicious payload, where an interaction performed with the first interface resulted in data being written to a location within a persistent data store, and where an interaction performed with a second interface of the computer software application resulted in data being read from the location within the persistent data store, and identifying a stored security vulnerability associated with the computer software application if the test data are written to the persistent data store at the location.Type: GrantFiled: November 26, 2017Date of Patent: July 10, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Omer Tripp, Omri Weisman
-
Patent number: 9996619Abstract: Crawling computer-based documents by performing static analysis on a computer-based document to identify within the computer-based document one or more execution vectors, where each execution vector includes a computer program segment including a call to an entity that is external to the computer-based document, and one or more additional computer program segments whose execution precedes and leads ultimately to execution of the computer program segment that includes the call to the entity, and causing any of the computer program segments in any of the execution vectors to be executed during a crawling of the computer-based document, and any computer program segment within the computer-based document that is excluded from the execution vectors to be excluded from execution during the crawling of the computer-based document.Type: GrantFiled: August 28, 2017Date of Patent: June 12, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Shahar Sperling, Omer Tripp, Omri Weisman
-
Patent number: 9971897Abstract: Source code of a plurality of web pages including script code is statically analyzed. A page including a potential vulnerability is identified based on the static analysis. A page not including a potential vulnerability is identified based on the static analysis. The web page including the potential vulnerability is dynamically analyzed using a set of test payloads. The page not including the potential vulnerability is dynamically analyzed using a subset of the set of test payloads, the subset including fewer test payloads than the set of test payloads.Type: GrantFiled: March 27, 2012Date of Patent: May 15, 2018Assignee: International Business Machines CorporationInventors: Yair Amit, Lotem Guy, Daniel Kalman, Ori Segal, Omri Weisman
-
Patent number: 9971896Abstract: Source code of a plurality of web pages including script code is statically analyzed. A page including a potential vulnerability is identified based on the static analysis. A page not including a potential vulnerability is identified based on the static analysis. The web page including the potential vulnerability is dynamically analyzed using a set of test payloads. The page not including the potential vulnerability is dynamically analyzed using a subset of the set of test payloads, the subset including fewer test payloads than the set of test payloads.Type: GrantFiled: December 30, 2011Date of Patent: May 15, 2018Assignee: International Business Machines CorporationInventors: Yair Amit, Lotem Guy, Daniel Kalman, Ori Segal, Omri Weisman
-
Patent number: 9935997Abstract: A computer system includes a master controller that receives an HTTP request for a first URL. The URL indicates a first state of a first mobile application. A navigation controller navigates to the first state of the first mobile application within a device. A content scraper extracts content from the first state and identifies forward links to corresponding additional states of the first mobile application. The computer system includes an output formatter configured to package the content and the forward links into an HTTP response and transmit the HTTP response to a source of the first HTTP request. The HTTP response includes a forward URL for each additional state of the first mobile application reachable from the first state. For each additional state, the forward URL includes an indicator of the first mobile application and a path to reach the additional state within the first mobile application.Type: GrantFiled: August 24, 2016Date of Patent: April 3, 2018Assignee: Samsung Electronics Co., Ltd.Inventors: Omri Weisman, Manikandan Sankaranarasimhan, Benny Zilberstein, Yehuda Rajuan, Idan Elad, Ran Nozik, Kalyan Desineni, Eli Cohen
-
Publication number: 20180075245Abstract: Identifying stored security vulnerabilities in computer software applications by providing via a first interface of a computer software application during execution of the computer software application, test data having a characteristic of a malicious payload, where an interaction performed with the first interface resulted in data being written to a location within a persistent data store, and where an interaction performed with a second interface of the computer software application resulted in data being read from the location within the persistent data store, and identifying a stored security vulnerability associated with the computer software application if the test data are written to the persistent data store at the location.Type: ApplicationFiled: November 26, 2017Publication date: March 15, 2018Inventors: Omer Tripp, Omri Weisman
-
Patent number: 9904787Abstract: Identifying stored security vulnerabilities in computer software applications by providing via a first interface of a computer software application during execution of the computer software application, test data having a characteristic of a malicious payload, where an interaction performed with the first interface resulted in data being written to a location within a persistent data store, and where an interaction performed with a second interface of the computer software application resulted in data being read from the location within the persistent data store, and identifying a stored security vulnerability associated with the computer software application if the test data are written to the persistent data store at the location.Type: GrantFiled: October 30, 2013Date of Patent: February 27, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Omer Tripp, Omri Weisman
-
Patent number: 9904786Abstract: Identifying stored security vulnerabilities in computer software applications by providing via a first interface of a computer software application during execution of the computer software application, test data having a characteristic of a malicious payload, where an interaction performed with the first interface resulted in data being written to a location within a persistent data store, and where an interaction performed with a second interface of the computer software application resulted in data being read from the location within the persistent data store, and identifying a stored security vulnerability associated with the computer software application if the test data are written to the persistent data store at the location.Type: GrantFiled: January 17, 2013Date of Patent: February 27, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Omer Tripp, Omri Weisman
-
Patent number: 9892258Abstract: Performing security analysis on a computer program under test (CPUT). The CPUT can be analyzed to identify data pertinent to potential security vulnerabilities of the CPUT. At least a first unit test configured to test a particular unit of program code within the CPUT can be automatically synthesized. The first unit test can be configured to initialize at least one parameter used by the particular unit of program code within the CPUT, and can be provided at least a first test payload configured to exploit at least one potential security vulnerability of the CPUT. The first unit test can be dynamically processed to communicate the first test payload to the particular unit of program code within the CPUT. Whether the first test payload exploits an actual security vulnerability of the CPUT can be determined, and a security analysis report can be output.Type: GrantFiled: June 16, 2014Date of Patent: February 13, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Daniel Kalman, Ory Segal, Omer Tripp, Omri Weisman
-
Publication number: 20170351761Abstract: Crawling computer-based documents by performing static analysis on a computer-based document to identify within the computer-based document one or more execution vectors, where each execution vector includes a computer program segment including a call to an entity that is external to the computer-based document, and one or more additional computer program segments whose execution precedes and leads ultimately to execution of the computer program segment that includes the call to the entity, and causing any of the computer program segments in any of the execution vectors to be executed during a crawling of the computer-based document, and any computer program segment within the computer-based document that is excluded from the execution vectors to be excluded from execution during the crawling of the computer-based document.Type: ApplicationFiled: August 28, 2017Publication date: December 7, 2017Inventors: Shahar Sperling, Omer Tripp, Omri Weisman
-
Patent number: 9754033Abstract: Crawling computer-based documents by performing static analysis on a computer-based document to identify within the computer-based document one or more execution vectors, where each execution vector includes a computer program segment including a call to an entity that is external to the computer-based document, and one or more additional computer program segments whose execution precedes and leads ultimately to execution of the computer program segment that includes the call to the entity, and causing any of the computer program segments in any of the execution vectors to be executed during a crawling of the computer-based document, and any computer program segment within the computer-based document that is excluded from the execution vectors to be excluded from execution during the crawling of the computer-based document.Type: GrantFiled: August 23, 2016Date of Patent: September 5, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Shahar Sperling, Omer Tripp, Omri Weisman
-
Patent number: 9747187Abstract: Systems, methods are program products for simulating black box test results using information obtained from white box testing, including analyzing computer software (e.g., an application) to identify a potential vulnerability within the computer software application and a plurality of milestones associated with the potential vulnerability, where each of the milestones indicates a location within the computer software application, tracing a path from a first one of the milestones to an entry point into the computer software application, identifying an input to the entry point that would result in a control flow from the entry point and through each of the milestones, describing the potential vulnerability in a description indicating the entry point and the input, and presenting the description via a computer-controlled output medium.Type: GrantFiled: October 27, 2010Date of Patent: August 29, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Stephen Fink, Yinnon A. Haviv, Roee Hay, Marco Pistoia, Ory Segal, Adi Sharabani, Manu Sridharan, Frank Tip, Omer Tripp, Omri Weisman
-
Patent number: 9720798Abstract: Systems, methods are program products for simulating black box test results using information obtained from white box testing, including analyzing computer software (e.g., an application) to identify a potential vulnerability within the computer software application and a plurality of milestones associated with the potential vulnerability, where each of the milestones indicates a location within the computer software application, tracing a path from a first one of the milestones to an entry point into the computer software application, identifying an input to the entry point that would result in a control flow from the entry point and through each of the milestones, describing the potential vulnerability in a description indicating the entry point and the input, and presenting the description via a computer-controlled output medium.Type: GrantFiled: June 11, 2012Date of Patent: August 1, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Stephen Fink, Yinnon A. Haviv, Roee Hay, Marco Pistoia, Ory Segal, Adi Sharabani, Manu Sridharan, Frank Tip, Omer Tripp, Omri Weisman
-
Publication number: 20170193125Abstract: A computer system includes a master controller that receives an HTTP request for a first URL. The URL indicates a first state of a first mobile application. A navigation controller navigates to the first state of the first mobile application within a device. A content scraper extracts content from the first state and identifies forward links to corresponding additional states of the first mobile application. The computer system includes an output formatter configured to package the content and the forward links into an HTTP response and transmit the HTTP response to a source of the first HTTP request. The HTTP response includes a forward URL for each additional state of the first mobile application reachable from the first state. For each additional state, the forward URL includes an indicator of the first mobile application and a path to reach the additional state within the first mobile application.Type: ApplicationFiled: December 31, 2015Publication date: July 6, 2017Inventors: Omri WEISMAN, Manikandan SANKARANARASIMHAN, Benny ZILBERSTEIN, Yehuda RAJUAN, Idan ELAD, Ran NOZIK, Kalyan DESINENI, Eli COHEN