Path-and index-sensitive string analysis based on monadic second-order logic T Tateishi, M Pistoia, O Tripp ACM Transactions on Software Engineering and Methodology (TOSEM) 22 (4), 1-33, 2013 | 100 | 2013 |
Systems, methods and computer program products for string analysis with security labels for vulnerability detection K Ono, M Saito, N Tabuchi, T Tateishi US Patent 7,530,107, 2009 | 52 | 2009 |
Automatic smart contract generation using controlled natural language and template T Tateishi, S Yoshihama, N Sato, S Saito IBM Journal of Research and Development 63 (2/3), 6: 1-6: 12, 2019 | 47 | 2019 |
Modular string-sensitive permission analysis with demand-driven precision E Geay, M Pistoia, T Tateishi, BG Ryder, J Dolby 2009 IEEE 31st International Conference on Software Engineering, 177-187, 2009 | 44 | 2009 |
Automatic generation of smart contracts N Sato, T Tateishi, S Amano US Patent 10,896,195, 2021 | 43 | 2021 |
Injection context based static analysis of computer software applications YA Haviv, R Hay, M Pistoia, O Segal, A Sharabani, T Tateishi, O Tripp, ... US Patent 8,528,095, 2013 | 35 | 2013 |
Smart contract input mapping N Sato, T Tateishi, S Amano US Patent 10,901,955, 2021 | 34 | 2021 |
Identifying security vulnerability in computer software YA Haviv, R Hay, M Pistoia, A Sharabani, T Tateishi, O Tripp, O Weisman US Patent 8,468,605, 2013 | 32 | 2013 |
Efficient extraction of software dependencies from program code NA Joukov, BM Pfitzmann, M Pistoia, V Tarasov, T Tateishi, NG Vogl US Patent 8,533,659, 2013 | 30 | 2013 |
Crawling of object model using transformation graph S Yoshihama, S Kawanaka, T Tateishi, O Segal, A Sharabani, M Pistoia, ... US Patent 8,296,722, 2012 | 30 | 2012 |
Blockchain notification board storing blockchain resources F Iwama, T Tateishi, S Amano, S Yoshihama US Patent 10,997,159, 2021 | 29 | 2021 |
Eliminating false reports of security vulnerabilities when testing computer software YA Haviv, R Hay, M Pistoia, A Sharabani, T Tateishi, O Tripp, O Weisman US Patent 8,584,246, 2013 | 26 | 2013 |
System, method, and apparatus for modular, string-sensitive, access rights analysis with demand-driven precision JT Dolby, E Geay, M Pistoia, BG Ryder, T Tateishi US Patent 8,572,674, 2013 | 26 | 2013 |
Verification of information-flow downgraders YA Haviv, R Hay, M Pistoia, A Sharabani, T Tateishi, O Tripp, O Weisman US Patent 8,635,602, 2014 | 25 | 2014 |
System, method, and program for determining validity of string YA Haviv, M Pistoia, N Tabuchi, T Tateishi US Patent 8,365,280, 2013 | 25 | 2013 |
System and method for static detection and categorization of information-flow downgraders Y Haviv, R Hay, M Pistoia, G Podjarny, A Sharabani, T Tateishi, O Tripp, ... US Patent 9,275,246, 2016 | 24 | 2016 |
Automatic optimization of string allocations in a computer program P Centonze, M Mostafa, M Pistoia, T Tateishi US Patent 8,473,899, 2013 | 24 | 2013 |
Performance computer program testing after source code modification using execution conditions T Tateishi, F Kitayama US Patent 7,844,955, 2010 | 23 | 2010 |
Composition operators for smart contract N Sato, T Tateishi, S Amano US Patent 10,896,149, 2021 | 22 | 2021 |
Formal analysis of the quality and conformance of information flow downgraders RJ Berg, M Pistoia, T Tateishi, SD Teilhet, O Tripp US Patent 8,667,584, 2014 | 21 | 2014 |