Patents by Inventor Roi Saltzman
Roi Saltzman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11301313Abstract: A method, computer program product, and computer system for performing, at a computing device, an analysis of a web application. A response is annotated by the web application with coverage data based upon, at least in part, the analysis, wherein the coverage data indicates which actions have been performed on the web application and which actions have not been performed on the web application according to results of the analysis. The response that includes the coverage data is shared with one or more users.Type: GrantFiled: August 28, 2019Date of Patent: April 12, 2022Assignee: International Business Machines CorporationInventors: Ory Segal, Roi Saltzman, Omer Tripp
-
Patent number: 11188645Abstract: A first application being presented for installation on a processing system can be detected. The first application can be scanned, via a static analysis, to determine whether a user interface layout of the first application is suspiciously similar to a user interface layout of a second application installed on the processing system. If the static analysis is indeterminate, a runtime analysis of the first application can determine whether the interface layout implemented by the first application is suspiciously similar to the user interface layout of the second application. If the user interface layout implemented by the first application is suspiciously similar to the user interface layout of the second application installed on the processing system, the first application can be identified as being unsafe.Type: GrantFiled: November 27, 2019Date of Patent: November 30, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Roee Hay, Daniel Kalman, Roi Saltzman, Omer Tripp
-
Patent number: 10659543Abstract: Described in detail herein is a usage tracking system. In exemplary embodiments, an usage application executed on a device can transmit a request to a computing system for connecting the device to the Internet. The computing system can include a first server and a second server. The computing system can receive the request for connecting the device to the Internet from the application. The first server can initiate a connection of the device with the Internet. The first server can allocate a range of Internet Protocol (IP) addresses to the at least one device based on a set of selected digital services being executed on the at least one device. Each IP address of the range of IP addresses corresponds to a digital service of selected set of digital services executed on the at least one device.Type: GrantFiled: October 4, 2017Date of Patent: May 19, 2020Assignee: Toluna Israel LimitedInventors: Roi Saltzman, Frank Smadja, Ido Azran, Yizhaq Ben Yosef
-
Publication number: 20200097654Abstract: A first application being presented for installation on a processing system can be detected. The first application can be scanned, via a static analysis, to determine whether a user interface layout of the first application is suspiciously similar to a user interface layout of a second application installed on the processing system. If the static analysis is indeterminate, a runtime analysis of the first application can determine whether the interface layout implemented by the first application is suspiciously similar to the user interface layout of the second application. If the user interface layout implemented by the first application is suspiciously similar to the user interface layout of the second application installed on the processing system, the first application can be identified as being unsafe.Type: ApplicationFiled: November 27, 2019Publication date: March 26, 2020Inventors: Roee Hay, Daniel Kalman, Roi Saltzman, Omer Tripp
-
Patent number: 10599843Abstract: A first application can be presented for installation on a processing system. The first application can be scanned, via a static analysis implemented by a processor, to determine whether a user interface layout of the first application is suspiciously similar to a user interface layout of a second application installed on the processing system. If the user interface layout of the first application is suspiciously similar to the user interface layout of the second application installed on the processing system, the first application can be identified as being unsafe.Type: GrantFiled: November 26, 2018Date of Patent: March 24, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Roee Hay, Daniel Kalman, Roi Saltzman, Omer Tripp
-
Patent number: 10528744Abstract: Identifying security vulnerabilities on computing devices by detecting an inter-process communication on a computing device, determining whether the inter-process communication is consistent with a predefined specification of a security vulnerability, and causing a predefined action to be performed on the computing device responsive to determining that the inter-process communication is consistent with a predefined specification of a security vulnerability.Type: GrantFiled: April 30, 2018Date of Patent: January 7, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Roee Hay, Daniel Kalman, Roi Saltzman, Omer Tripp
-
Patent number: 10521288Abstract: A method, computer program product, and computer system for performing, at a computing device, an analysis of a web application. A response is annotated by the web application with coverage data based upon, at least in part, the analysis, wherein the coverage data indicates which actions have been performed on the web application and which actions have not been performed on the web application according to results of the analysis. The response that includes the coverage data is shared with one or more users.Type: GrantFiled: November 7, 2012Date of Patent: December 31, 2019Assignee: International Business Machines CorporationInventors: Ory Segal, Roi Saltzman, Omer Tripp
-
Publication number: 20190384665Abstract: A method, computer program product, and computer system for performing, at a computing device, an analysis of a web application. A response is annotated by the web application with coverage data based upon, at least in part, the analysis, wherein the coverage data indicates which actions have been performed on the web application and which actions have not been performed on the web application according to results of the analysis. The response that includes the coverage data is shared with one or more users.Type: ApplicationFiled: August 28, 2019Publication date: December 19, 2019Inventors: Ory Segal, Roi Saltzman, Omer Tripp
-
Patent number: 10474558Abstract: A method, computer program product, and computer system for performing, at a computing device, an analysis of a web application. A response is annotated by the web application with coverage data based upon, at least in part, the analysis, wherein the coverage data indicates which actions have been performed on the web application and which actions have not been performed on the web application according to results of the analysis. The response that includes the coverage data is shared with one or more users.Type: GrantFiled: October 4, 2013Date of Patent: November 12, 2019Assignee: International Business Machines CorporationInventors: Ory Segal, Roi Saltzman, Omer Tripp
-
Publication number: 20190104186Abstract: Described in detail herein is a usage tracking system. In exemplary embodiments, an usage application executed on a device can transmit a request to a computing system for connecting the device to the Internet. The computing system can include a first server and a second server. The computing system can receive the request for connecting the device to the Internet from the application. The first server can initiate a connection of the device with the Internet. The first server can allocate a range of Internet Protocol (IP) addresses to the at least one device based on a set of selected digital services being executed on the at least one device. Each IP address of the range of IP addresses corresponds to a digital service of selected set of digital services executed on the at least one device.Type: ApplicationFiled: October 4, 2017Publication date: April 4, 2019Applicant: Toluna IsraelInventors: Roi Saltzman, Frank Smadja, Ido Azran, Yizhaq Ben Yosef
-
Publication number: 20190095619Abstract: A first application can be presented for installation on a processing system. The first application can be scanned, via a static analysis implemented by a processor, to determine whether a user interface layout of the first application is suspiciously similar to a user interface layout of a second application installed on the processing system. If the user interface layout of the first application is suspiciously similar to the user interface layout of the second application installed on the processing system, the first application can be identified as being unsafe.Type: ApplicationFiled: November 26, 2018Publication date: March 28, 2019Inventors: Roee Hay, Daniel Kalman, Roi Saltzman, Omer Tripp
-
Patent number: 10169580Abstract: Identifying whether a first application is malicious. The first application can be presented for installation on a processing system. The first application can be scanned, via a static analysis implemented by a processor, to determine whether a user interface layout of the first application is suspiciously similar to a user interface layout of a second application installed on the processing system. When the user interface layout of the first application is suspiciously similar to the user interface layout of the second application installed on the processing system, an alert can be generated indicating that the first application is malicious.Type: GrantFiled: September 16, 2014Date of Patent: January 1, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Roee Hay, Daniel Kalman, Roi Saltzman, Omer Tripp
-
Publication number: 20180247060Abstract: Identifying security vulnerabilities on computing devices by detecting an inter-process communication on a computing device, determining whether the inter-process communication is consistent with a predefined specification of a security vulnerability, and causing a predefined action to be performed on the computing device responsive to determining that the inter-process communication is consistent with a predefined specification of a security vulnerability.Type: ApplicationFiled: April 30, 2018Publication date: August 30, 2018Inventors: Roee Hay, Daniel Kalman, Roi Saltzman, Omer Tripp
-
Patent number: 9977903Abstract: Identifying security vulnerabilities on computing devices by detecting an inter-process communication on a computing device, determining whether the inter-process communication is consistent with a predefined specification of a security vulnerability, and causing a predefined action to be performed on the computing device responsive to determining that the inter-process communication is consistent with a predefined specification of a security vulnerability.Type: GrantFiled: December 5, 2012Date of Patent: May 22, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Roee Hay, Daniel Kalman, Roi Saltzman, Omer Tripp
-
Patent number: 9959411Abstract: Identifying security vulnerabilities on computing devices by detecting an inter-process communication on a computing device, determining whether the inter-process communication is consistent with a predefined specification of a security vulnerability, and causing a predefined action to be performed on the computing device responsive to determining that the inter-process communication is consistent with a predefined specification of a security vulnerability.Type: GrantFiled: September 13, 2013Date of Patent: May 1, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Roee Hay, Daniel Kalman, Roi Saltzman, Omer Tripp
-
Patent number: 9838412Abstract: Testing a computer software application by detecting an arrival of input data provided as input to a computer software application from a source external to the computer software application, modifying the detected input data to include test data configured to test the computer software application in accordance with a predefined test, thereby creating a modified version of the detected input data, and processing the modified version of the detected input data, thereby performing the predefined test on the computer software application using the test data.Type: GrantFiled: October 30, 2015Date of Patent: December 5, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Roi Saltzman, Ory Segal
-
Patent number: 9582667Abstract: In an aspect of managing resource exhaustion, a method includes receiving a program code that is configured for generating a random number. The generating is identified as vulnerable to a resource exhaustion. The method also includes identifying a statement in the program code at which a value of a variable associated with the generating of the random number is affected, inserting a hooking code in the statement for monitoring the variable at the statement, and running the program code in a plurality of iterations. A consumption level of the resource is varied in the plurality of iterations. The method further includes monitoring a plurality of values of the variable in the plurality of iterations. The method also includes executing a regression analysis on the plurality of values and returning a root cause of the vulnerability.Type: GrantFiled: September 30, 2013Date of Patent: February 28, 2017Assignee: GLOBALFOUNDRIES INC.Inventors: Roee Hay, Roi Saltzman, Omer Tripp
-
Publication number: 20160055073Abstract: Testing a computer software application by detecting an arrival of input data provided as input to a computer software application from a source external to the computer software application, modifying the detected input data to include test data configured to test the computer software application in accordance with a predefined test, thereby creating a modified version of the detected input data, and processing the modified version of the detected input data, thereby performing the predefined test on the computer software application using the test data.Type: ApplicationFiled: October 30, 2015Publication date: February 25, 2016Inventors: Roi Saltzman, Ory Segal
-
Patent number: 9256511Abstract: Testing a computer software application by detecting an arrival of input data provided as input to a computer software application from a source external to the computer software application, modifying the detected input data to include test data configured to test the computer software application in accordance with a predefined test, thereby creating a modified version of the detected input data, and processing the modified version of the detected input data, thereby performing the predefined test on the computer software application using the test data.Type: GrantFiled: September 4, 2012Date of Patent: February 9, 2016Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Roi Saltzman, Ory Segal
-
Patent number: 9213832Abstract: Collecting log file data from at least one log file. From the collected log file data, at least one HTTP request can be generated to exercise a web application to perform a security analysis of the web application. The HTTP request can be communicated to the web application. At least one HTTP response to the HTTP request can be received. The HTTP response can be analyzed to perform validation of the web application. Results of the validation can be output.Type: GrantFiled: January 24, 2012Date of Patent: December 15, 2015Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Yair Amit, Ronen Bachar, Lotem Guy, Igal Kreichman, Ron Nordan, Roi Saltzman, Ori Segal