Omer Tripp
Cited by
Cited by
TAJ: effective taint analysis of web applications
O Tripp, M Pistoia, SJ Fink, M Sridharan, O Weisman
ACM Sigplan Notices 44 (6), 87-97, 2009
Andromeda: Accurate and Scalable Security Analysis of Web Applications
O Tripp, M Pistoia, P Cousot, R Cousot, S Guarnieri
Fundamental Approaches to Software Engineering: 16th International …, 2013
Saving the world wide web from vulnerable JavaScript
S Guarnieri, M Pistoia, O Tripp, J Dolby, S Teilhet, R Berg
Proceedings of the 2011 International Symposium on Software Testing and …, 2011
F4F: taint analysis of framework-based web applications
M Sridharan, S Artzi, M Pistoia, S Guarnieri, O Tripp, R Berg
Proceedings of the 2011 ACM international conference on Object oriented …, 2011
A bayesian approach to privacy enforcement in smartphones
O Tripp, J Rubin
23rd USENIX Security Symposium (USENIX Security 14), 175-190, 2014
Path-and index-sensitive string analysis based on monadic second-order logic
T Tateishi, M Pistoia, O Tripp
ACM Transactions on Software Engineering and Methodology (TOSEM) 22 (4), 1-33, 2013
Aletheia: Improving the usability of static security analysis
O Tripp, S Guarnieri, M Pistoia, A Aravkin
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
Dynamic detection of inter-application communication vulnerabilities in Android
R Hay, O Tripp, M Pistoia
Proceedings of the 2015 International Symposium on Software Testing and …, 2015
Grail: Context-aware fixing of concurrency bugs
P Liu, O Tripp, C Zhang
Proceedings of the 22nd ACM SIGSOFT international symposium on foundations …, 2014
Hybrid security analysis of web javascript code via dynamic partial evaluation
O Tripp, P Ferrara, M Pistoia
Proceedings of the 2014 International Symposium on Software Testing and …, 2014
Z3str2: an efficient solver for strings, regular expressions, and length constraints
Y Zheng, V Ganesh, S Subramanian, O Tripp, M Berzish, J Dolby, ...
Formal Methods in System Design 50, 249-288, 2017
Effective search-space pruning for solvers of string equations, regular expressions and length constraints
Y Zheng, V Ganesh, S Subramanian, O Tripp, J Dolby, X Zhang
Computer Aided Verification: 27th International Conference, CAV 2015, San …, 2015
Learning minimal abstractions
P Liang, O Tripp, M Naik
Proceedings of the 38th annual ACM SIGPLAN-SIGACT symposium on Principles of …, 2011
Automated testing of applications with scripting code
S Artzi, J Dolby, SA Guarnieri, SH Jensen, M Pistoia, M Sridharan, F Tip, ...
US Patent 9,135,147, 2015
Detecting and localizing security vulnerabilities in client-server application
S Artzi, J Dolby, M Pistoia, F Tip, O Tripp
US Patent 8,516,449, 2013
Finding your way in the testing jungle: A learning approach to web security testing
O Tripp, O Weisman, L Guy
Proceedings of the 2013 International Symposium on Software Testing and …, 2013
Detecting persistent vulnerabilities in web applications
Y Amit, O Tripp
US Patent 8,949,994, 2015
Enforcement of data privacy to maintain obfuscation of certain data
MG Burke, I Peshansky, M Pistoia, O Tripp
US Patent 8,544,104, 2013
Security risk evaluation
R Hay, O Tripp, M Pistoia
US Patent App. 15/339,965, 2018
Simulating black box test results using information from white box testing
S Fink, YA Haviv, R Hay, M Pistoia, O Segal, A Sharabani, M Sridharan, ...
US Patent 9,747,187, 2017
The system can't perform the operation now. Try again later.
Articles 1–20