Guarnieri
Cristian Guarnieri, Parma IT
Patent application number | Description | Published |
---|---|---|
20120199275 | LABELLING MACHINE - There is described a labeling machine for dispensing labels derivable from a web travelling along a feed path and applying them to articles travelling along an article path. The machine includes a web supply reel; a dispenser to unwind the web off the supply reel and for feeding the web towards an affixing station of the labeling machine, at which the labels are sequentially applied to the articles sequentially arriving thereat. The dispenser including a driver to control the advancement along the feed path of the web from which labels are derivable in accordance with the advancement along the article path of the articles to which the labels are to be applied; and a web tension control selectively actuatable to exert on the supply reel a torque directed against the unwinding sense of the web. | 08-09-2012 |
Davide Guarnieri, Milano IT
Patent application number | Description | Published |
---|---|---|
20130299093 | MACHINE FOR MAKING ABSORBENT SANITARY ARTICLES, SUCH AS NAPPIES FOR BABIES OR INCONTINENCE PADS FOR ADULTS, SANITARY TOWELS OR THE LIKE - In a machine for making absorbent sanitary articles, such as nappies for babies or incontinence pads for adults, sanitary towels or the like, a plurality of operating stations are equipped with cutting and/or sealing devices for the materials of which the articles ( | 11-14-2013 |
Fabio Ariel Guarnieri, Entre Rios AR
Patent application number | Description | Published |
---|---|---|
20100042209 | IMPLANTABLE OCULAR MICROAPPARATUS TO AMELIORATE GLAUCOMA OR AN OCULAR OVERPRESSURE CAUSING DISEASE - A microapparatus ( | 02-18-2010 |
Frank Guarnieri, Brooklyn, NY US
Patent application number | Description | Published |
---|---|---|
20100284969 | Methods and Compositions for Delivery of Medicaments to the Lungs - The disclosure provides a drug composition formulated for inhalation comprising a conjugate of a surface active agent and a pulmonary active drug. The surface active agent has an affinity for the human alveolar/gas interface and comprises at least a portion of a mammalian lung surfactant of a mimic thereof. The disclosure also provides a method of treating a subject suffering from or at risk of suffering from a lung disease comprising administering to the subject a conjugate comprising a drug for lung treatment and a surface active agent by inhalation in an amount effective to induce a drug effect in the lungs. | 11-11-2010 |
20120010145 | Methods and Compositions for Delivery of Medicaments to the Lungs - The disclosure provides a drug composition formulated for inhalation comprising a conjugate of a surface active agent and a pulmonary active drug. The surface active agent has an affinity for the human alveolar/gas interface and comprises at least a portion of a mammalian lung surfactant of a mimic thereof. The disclosure also provides a method of treating a subject suffering from or at risk of suffering from a lung disease comprising administering to the subject a conjugate comprising a drug for lung treatment and a surface active agent by inhalation in an amount effective to induce a drug effect in the lungs. | 01-12-2012 |
20140378383 | METHODS AND COMPOSITIONS FOR DELIVERY OF MEDICAMENTS TO THE LUNGS - The disclosure provides a drug composition formulated for inhalation comprising a conjugate of a surface active agent and a pulmonary active drug. The surface active agent has an affinity for the human alveolar/gas interface and comprises at least a portion of a mammalian lung surfactant of a mimic thereof. The disclosure also provides a method of treating a subject suffering from or at risk of suffering from a lung disease comprising administering to the subject a conjugate comprising a drug for lung treatment and a surface active agent by inhalation in an amount effective to induce a drug effect in the lungs. | 12-25-2014 |
Gerardo Guarnieri, Castel San Pietro Terme IT
Patent application number | Description | Published |
---|---|---|
20160066314 | REMOTE UNIT FOR THE DISTRIBUTION OF RADIO-FREQUENCY SIGNALS AND RELATED METHOD FOR THE MANUFACTURE THEREOF - The remote unit for the distribution of radio-frequency signals comprises: a plurality of electronic devices or modules operatively connected to each other for the processing of a radio-frequency signal to distribute within a coverage area, characterized in that it comprises: a first section having at least one of the electronic devices or modules; a second section having at least one of the electronic devices or modules; a connection element having a first portion associated integral with the first section and a second portion, substantially opposite to the first portion and associated integral with the second section; wherein the first section and the second section are arranged substantially aligned to each other along a longitudinal axis. | 03-03-2016 |
Giacomo Guarnieri, Roma IT
Patent application number | Description | Published |
---|---|---|
20140354498 | SLOTTED WAVEGUIDE ANTENNA FOR NEAR-FIELD FOCALIZATION OF ELECTROMAGNETIC RADIATION - A radial slot antenna ( | 12-04-2014 |
Jack Guarnieri, Jackson, NJ US
Patent application number | Description | Published |
---|---|---|
20110086687 | GAME MACHINE - A game machine comprises a housing, a user access panel having a controller, a money acceptor and a redemption dispenser that dispenses an award, a rotating field having a surface with a plurality of objects situated thereon, a retriever that is movable along a track that is supported by the housing for enabling movement of the retriever relative to the rotating field, an object return path having an object receiving area, a delivery guide, and an outlet, wherein an award is dispensed from the redemption dispenser upon the retriever retrieving an object from the rotating field and delivering it to the object receiving area. | 04-14-2011 |
20110115163 | GAME MACHINE - A game machine comprises a housing, a user access panel having a controller, a money acceptor, a rotating field having a surface for receiving a plurality of objects situated thereon, a retriever that is movable along a track that is supported by the housing for enabling movement of the retriever relative to the rotating field, an object receiving area, and an outlet for access to the object received within the object receiving area. | 05-19-2011 |
20130113161 | PINBALL MACHINE AND REDEMPTION SYSTEM - In one embodiment there is provided a pinball game comprising a play field having a plurality of different achievable objects, a plurality of different reward cards, each reward card associated with one of the achievable objects and capable of being dispensed by a card dispenser in response to the achieving of its associated achievable object, and wherein at least one reward card is dispensed by the card dispenser during or after game play upon at least one of the achievable objects being achieved, and wherein a different reward card is dispensed depending on the achievable object that is achieved. In one embodiment, a networked redemption system is associated with the game and the game further enables connectivity with social media and/or other publishing avenues for communicating information about the player and/or game play. | 05-09-2013 |
20150335994 | PINBALL MACHINE AND REDEMPTION SYSTEM - In one embodiment there is provided a pinball game comprising a play field having a plurality of different achievable objects, a plurality of different reward cards, each reward card associated with one of the achievable objects and capable of being dispensed by a card dispenser in response to the achieving of its associated achievable object, and wherein at least one reward card is dispensed by the card dispenser during or after game play upon at least one of the achievable objects being achieved, and wherein a different reward card is dispensed depending on the achievable object that is achieved. In one embodiment, a networked redemption system is associated with the game and the game further enables connectivity with social media and/or other publishing avenues for communicating information about the player and/or game play. | 11-26-2015 |
Michael Guarnieri, Baltimore, MD US
Patent application number | Description | Published |
---|---|---|
20110287101 | RAPID RELEASE MINI-TABLETS PROVIDE ANALGESIA IN LABORATORY ANIMALS - Pellets containing an analgesic uniformly dispersed in a lipid carrier such as cholesterol mixed with fatty acid esters, can be used to provide long term pain relief. 5 mg cholesterol-tryglyceride-buprenorphine pellets released the majority of drug in 24-48 hours after implant and provide clinically significant plasma levels of analgesia in mice for 3-9 days. Blood levels of analgesia peak at day-1 and are substantially complete by day-5 depending on the level of buprenorphine. These results demonstrate that post surgical implants provide clinically significant levels of analgesia in the 24-48 hour period following surgery and thus obviate the time consuming, expensive, and high-risk need to inject mice post surgery. The pellets are safe and easy to use. Placed in the surgical wound at the end of surgery, they provide 2-3 days of analgesia and obviate the need for subsequent handling of the animal for pain therapy. The implants have no detectable effect on mouse behavior, hematology, or liver chemistry. The unexpected release kinetics of the 5 mg pellet provides an ideal implant for post surgical analgesia. These implants solve a significant problem facing scientists who use rodents in research and abide by international of animal welfare. | 11-24-2011 |
Michele Guarnieri, Tokyo JP
Patent application number | Description | Published |
---|---|---|
20150107485 | IN-PIPE TRAVELING APPARATUS AND TRAVELING MODULE - An object of the invention is to provide an in-pipe traveling apparatus and a traveling module is provided, having a simple structure but capable of operating with a short overall traveling path and setting a large drive force for forward and backward traveling operation. The In one embodiment, the in-pipe traveling apparatus includes at least three traveling modules capable of passing through a pipe. Each of the traveling modules includes a traveling module body, a pair of traveling wheels provided in the traveling module body on one side thereof in a traveling direction, a drive member that drives the pair of traveling wheels in such a way that the traveling wheels rotate, a connection member that connects the traveling module to another traveling module in a bendable manner in a pitching direction, and a swing member that causes the adjacent traveling module to swing in a yawing direction. | 04-23-2015 |
Ricardo Andre Guarnieri, Rio De Janeiro BR
Patent application number | Description | Published |
---|---|---|
20110186515 | PROCESS FOR TREATMENT OF WATER/OIL EMULSIONS - A process for the treatment of water/oil (W/O) emulsions is described which includes the addition of an ionic liquid, under heating, to a water/oil emulsion containing between 0.5% and 85% of water per volume as a dispersion phase, until the concentration of the ionic liquid in the emulsion remains within the range of 0.01 μL/g to 100 μL/g. The ionic liquid used is a salt of a general C | 08-04-2011 |
Salvatore Guarnieri, Yorktown Heights, NY US
Patent application number | Description | Published |
---|---|---|
20140090065 | Method and Apparatus for Paralleling and Distributing Static Source Code Security Analysis Using Loose Synchronization - A method of static source code analysis is provided. A forward search of source code is performed from each of a plurality of source nodes. A backward search of source code is performed from each of a plurality of sink nodes, wherein the forward search and the backward search are performed in parallel simultaneously. The progress of the forward search and the backward search are monitored to determine if the searches intersect at a common node. A vulnerability alert is generated when the monitoring determines that a forward search and a backward search reach a common node. | 03-27-2014 |
20140090068 | METHOD AND APPARATUS FOR PARALLELING AND DISTRIBUTING STATIC SOURCE CODE SECURITY ANALYSIS USING LOOSE SYNCHRONIZATION - A method of static source code analysis is provided. A forward search of source code is performed from each of a plurality of source nodes. A backward search of source code is performed from each of a plurality of sink nodes, wherein the forward search and the backward search are performed in parallel simultaneously. The progress of the forward search and the backward search are monitored to determine if the searches intersect at a common node. A vulnerability alert is generated when the monitoring determines that a forward search and a backward search reach a common node. | 03-27-2014 |
Salvatore Guarnieri, New York, NY US
Patent application number | Description | Published |
---|---|---|
20140052997 | SECURITY MODEL FOR ACTOR-BASED LANGUAGES AND APPARATUS, METHODS, AND COMPUTER PROGRAMMING PRODUCTS USING SAME - An application includes: a programming model including a service provider, first components, second components, and sinks communicating via messages. Each of the second components is assigned a unique capability. A given one of the first components routes a message from the given first component to second component(s) and then to a sink. Each of the second component(s) sends the message to the service provider. The service provider creates a token corresponding at least to a received message and a unique capability assigned to an associated one of the second component(s) and sends the token to the associated one of the second component(s). The selected sink receives the message and a token corresponding to each of the second component(s), verifies each received token, and either accepts the message if each of the received tokens is verified or ignores the message if at least one of the received tokens is not verified. | 02-20-2014 |
20140052998 | SECURITY MODEL FOR ACTOR-BASED LANGUAGES AND APPARATUS, METHODS, AND COMPUTER PROGRAMMING PRODUCTS USING SAME - An application includes: a programming model including a service provider, first components, second components, and sinks communicating via messages. Each of the second components is assigned a unique capability. A given one of the first components routes a message from the given first component to second component(s) and then to a sink. Each of the second component(s) sends the message to the service provider. The service provider creates a token corresponding at least to a received message and a unique capability assigned to an associated one of the second component(s) and sends the token to the associated one of the second component(s). The selected sink receives the message and a token corresponding to each of the second component(s), verifies each received token, and either accepts the message if each of the received tokens is verified or ignores the message if at least one of the received tokens is not verified. | 02-20-2014 |
Salvatore A. Guarnieri, New York, NY US
Patent application number | Description | Published |
---|---|---|
20130290786 | AUTOMATED TESTING OF APPLICATIONS WITH SCRIPTING CODE - A novel system, computer program product, and method are disclosed for feedback-directed automated test generation for programs, such as JavaScript, in which execution is monitored to collect information that directs the test generator towards inputs that yield increased coverage. Several instantiations of the framework are implemented, corresponding to variations on feedback-directed random testing, in a tool called Artemis. | 10-31-2013 |
20140075561 | STATIC SECURITY ANALYSIS USING A HYBRID REPRESENTATION OF STRING VALUES - Methods for creating a hybrid string representations include receiving string information as input; parsing the string information to produce one or more string components; determining string components that may be represented concretely by comparing the one or more components to a set of known concretizations; abstracting all string components that could not be represented concretely; and creating a hybrid string representation that includes at least one concrete string component and at least one abstracted string component. | 03-13-2014 |
20140075562 | STATIC SECURITY ANALYSIS USING A HYBRID REPRESENTATION OF STRING VALUES - Systems for constructing hybrid string representations include a string parser configured to parse received string information to produce one or more string components, a database configured to store a set of known concretizations, and a processor configured to compare the one or more string components to the set of known concretizations to determine string components that may be represented concretely, to abstract all string components that could not be represented concretely, and to create a hybrid string representation that includes at least one concrete string component and at least one abstracted string component. | 03-13-2014 |
20140082734 | CERTIFYING SERVER SIDE WEB APPLICATIONS AGAINST SECURITY VULNERABILITIES - Methods for server security verification include acquiring a public key associated with a received report that includes an indication regarding the presence of a vulnerability for each vulnerability, the report having been generated at a server; decrypting the received report using the public key; determining a level of server-side security based on the decrypted report using a processor; and reconfiguring a browser at the client responsive to the determined level of server-side security. | 03-20-2014 |
20140082736 | CERTIFYING SERVER SIDE WEB APPLICATIONS AGAINST SECURITY VULNERABILITIES - Systems for server security verification include a report validation module configured to acquire a public key associated with a received report, where the received report was generated at a server, to decrypt the received report using the public key, and to determine a level of server-side security based on the decrypted report; and a processor configured to reconfigure a browser responsive to the determined level of server-side security. | 03-20-2014 |
20140115563 | DIFFERENTIAL STATIC PROGRAM ANALYSIS - Systems for program analysis include a high-level scanning tool configured to perform a high-level analysis on a program using a processor to generate one or more high-level findings; one or more low-level scanning tools, each configured to perform a low-level analysis on the program using a processor to generate a low-level finding; and a mapping module configured to map the one or more low-level findings to the high-level findings to generate a concise combination report that categorizes each finding according to the highest-level analysis that produces the finding. | 04-24-2014 |
20140130153 | SOUND AND EFFECTIVE DATA-FLOW ANALYSIS IN THE PRESENCE OF ALIASING - A method is disclosed that includes, using a data flow model of a program suitable for taint analysis of the program, tracking information from sources of taint to entities in a heap using a model of the heap based on the program. The tracking is performed so that the information is relevant for taint propagation and is performed in a manner that is field-sensitive for the entities in the heap. The method includes, based on output of the tracking, performing data-flow analysis to determine taint flow from the sources of the taint through data flow paths to sinks using the taint. | 05-08-2014 |
20140130154 | SOUND AND EFFECTIVE DATA-FLOW ANALYSIS IN THE PRESENCE OF ALIASING - An apparatus is disclosed including one or more memories including computer-readable program code and one or more processors. The one or more processors, in response to execution of the computer-readable program code, cause the apparatus to track, using a data flow model of a program suitable for taint analysis of the program, information from sources of taint to entities in a heap using a model of the heap based on the program. The tracking is performed so that the information is relevant for taint propagation and is performed in a manner that is field-sensitive for the entities in the heap. The one or more processors in response to execution of the computer-readable program code cause the apparatus to perform, based on output of the tracking, the operation of performing data-flow analysis to determine taint flow from the sources of the taint through data flow paths to sinks using the taint. | 05-08-2014 |
20140157419 | DISCOVERY OF APPLICATION VULNERABILITIES INVOLVING MULTIPLE EXECUTION FLOWS - Methods and systems for security analysis of an application are disclosed. In accordance with one method, a flow-insensitive analysis is conducted on the application to obtain a set of potential vulnerabilities in the application. For each of the potential vulnerabilities, a relevant set of control flows that include the respective vulnerability is determined. Further, for each relevant set of control flows, a flow-sensitive analysis of at least one of the control flows in the corresponding relevant set is performed by a hardware processor to assess the validity of the respective vulnerability. | 06-05-2014 |
20140157420 | DISCOVERY OF APPLICATION VULNERABILITIES INVOLVING MULTIPLE EXECUTION FLOWS - Methods and systems for security analysis of an application are disclosed. One system includes a flow-insensitive analyzer, a control flow assessment module and a flow-sensitive analyzer. The flow-insensitive analyzer is configured to conduct a flow-insensitive analysis on the application to obtain a set of potential vulnerabilities in the application. In addition, the control flow assessment module is configured to determine, for each of the potential vulnerabilities, a relevant set of control flows that include the respective vulnerability. Further, the flow-sensitive analyzer is configured to perform, by a hardware processor, for each relevant set of control flows, a flow-sensitive analysis of at least one of the control flows in the corresponding relevant set to assess the validity of the respective vulnerability. | 06-05-2014 |
20140189657 | Enhanced String Analysis That Improves Accuracy Of Static Analysis - A method includes determining, as part of a static analysis of a program, links between functions in the program and performing, as part of the static analysis, string analysis on strings used in the program to determine additional links between the functions in the program. The method further includes outputting, as part of the static analysis, indications of at least the links between the functions and the additional links between the functions. Apparatus, computer programs, and program products are also disclosed. | 07-03-2014 |
20140189658 | Enhanced String Analysis That Improves Accuracy Of Static Analysis - An apparatus and computer program product which are configured for determining, as part of a static analysis of a program, links between functions in the program and performing, as part of the static analysis, string analysis on strings used in the program to determine additional links between the functions in the program. The apparatus and computer program product are further configured for outputting, as part of the static analysis, indications of at least the links between the functions and the additional links between the functions. | 07-03-2014 |
20140208428 | MITIGATING SECURITY RISKS VIA CODE MOVEMENT - A method includes performing on a computing system a source-to-sink reachability analysis of code of an application. The reachability analysis is performed using a static analysis of the code and determines flows from sources of information to sinks that use the information. The method includes determining scopes for corresponding security sensitive operations using the determined flows, each of the security sensitive operations corresponding to statements in the code and one or more flows. A scope for a security sensitive operation includes a block of statements in the code that correspond to a set of one or more flows ending at a sink. The method includes, for each of one or more selected scopes, moving statements in a corresponding block of statements that are independent of a security sensitive operation in the block to code before or after the block. Apparatus and program products are also disclosed. | 07-24-2014 |
20140208430 | Mitigating Security Risks Via Code Movement - A method includes performing on a computing system a source-to-sink reachability analysis of code of an application. The reachability analysis is performed using a static analysis of the code and determines flows from sources of information to sinks that use the information. The method includes determining scopes for corresponding security sensitive operations using the determined flows, each of the security sensitive operations corresponding to statements in the code and one or more flows. A scope for a security sensitive operation includes a block of statements in the code that correspond to a set of one or more flows ending at a sink. The method includes, for each of one or more selected scopes, moving statements in a corresponding block of statements that are independent of a security sensitive operation in the block to code before or after the block. Apparatus and program products are also disclosed. | 07-24-2014 |
20140237602 | AUTOMATIC CORRECTION OF SECURITY DOWNGRADERS - Methods and systems for automatic correction of security downgraders includes performing a security analysis that disregards existing user-provided downgraders to detect flows that are vulnerable; locating candidate downgraders on the flows; determining whether each of the candidate downgraders protects against all vulnerabilities associated with each downgrader's respective flow; and transforming candidate downgraders that do not protect against all of the associated vulnerabilities, such that the transformed downgraders do protect against all of the associated vulnerabilities. | 08-21-2014 |
20140237605 | AUTOMATIC CORRECTION OF SECURITY DOWNGRADERS - Systems for automatic correction of security downgraders include a security analysis module configured to perform a security analysis that disregards existing user-provided downgraders to detect flows that are vulnerable; and an enhancer module configured to locate candidate downgraders on the flows, to determine whether each of the candidate downgraders protects against all vulnerabilities associated with each downgrader's respective flow, and to transform candidate downgraders that do not protect against all of the associated vulnerabilities such that the transformed downgraders do protect against all of the associated vulnerabilities. | 08-21-2014 |
20140259174 | Scalable And Precise String Analysis Using Index-Sensitive Static String Abstractions - A disclosed method includes accessing one or more seeding specifications and a program including computer-readable code and applying the one or more seeding specifications to the program to identify for analysis seeds including strings for corresponding identified string variables. The method includes tracking flows emanating from the identified seeds. The tracking includes computing an integral offset into a tracked string variable for any statements causing such a computation. The tracking also includes providing a string representation based on the computed integral offset, wherein the provided string representation comprises a value of the integral offset and an indication of the corresponding tracked string variable. The tracking further includes modeling string manipulations of the tracked string variables using the string representations. Apparatus and program products are also disclosed. | 09-11-2014 |
20140317747 | Partitioning of Program Analyses into Sub-Analyses Using Dynamic Hints - An exemplary method includes performing a first static analysis to locate elements within a program and instrumenting the program to enable a subsequent dynamic analysis based on the located elements. The method includes executing the instrumented program and performing during execution analysis to determine individual sets of statements in the program affected by a corresponding element. The method includes partitioning the sets of statements into partitions based on one or more considerations, each partition including one or more of the elements. The method includes performing a second static analysis on the partitions of the program to produce results and outputting the results. The method may be performed for, e.g., security (e.g., taint) analysis, buffer overflow analysis, and typestate analysis. Apparatus and program products are also disclosed. | 10-23-2014 |
20140317748 | Partitioning of Program Analyses into Sub-Analyses Using Dynamic Hints - An exemplary apparatus and computer program product are disclosed which employ a method that includes performing a first static analysis to locate elements within a program and instrumenting the program to enable a subsequent dynamic analysis based on the located elements. The method includes executing the instrumented program and performing during execution analysis to determine individual sets of statements in the program affected by a corresponding element. The method includes partitioning the sets of statements into partitions based on one or more considerations, each partition including one or more of the elements. The method includes performing a second static analysis on the partitions of the program to produce results and outputting the results. The method may be performed for, e.g., security (e.g., taint) analysis, buffer overflow analysis, and typestate analysis. | 10-23-2014 |
20140344938 | Progressive Static Security Analysis - A disclosed method includes determining modifications have been made to a program and deriving data flow seeds that are affected by the modifications. The method includes selecting one of the data flow seeds that are affected by the modifications or data flow seeds that are not affected by the modifications but that are part of flows that are affected by the modifications and performing a security analysis on the program. The security analysis includes tracking flows emanating from the selected data flow seeds to sinks terminating the flows. The method includes outputting results of the security analysis. The results comprise one or more indications of security status for one or more of the flows emanating from the selected data flow seeds. At least the deriving, selecting, and performing are performed using a static analysis of the program. Apparatus and program products are also disclosed. | 11-20-2014 |
20140344939 | Progressive Static Security Analysis - A disclosed method includes determining modifications have been made to a program and deriving data flow seeds that are affected by the modifications. The method includes selecting one of the data flow seeds that are affected by the modifications or data flow seeds that are not affected by the modifications but that are part of flows that are affected by the modifications and performing a security analysis on the program. The security analysis includes tracking flows emanating from the selected data flow seeds to sinks terminating the flows. The method includes outputting results of the security analysis. The results comprise one or more indications of security status for one or more of the flows emanating from the selected data flow seeds. At least the deriving, selecting, and performing are performed using a static analysis of the program. Apparatus and program products are also disclosed. | 11-20-2014 |
20140373157 | After-the-Fact Configuration of Static Analysis Tools Able to Reduce User Burden - A method includes mapping, based on a first mapping from possible security findings to possible configuration-related sources of imprecision, actual security findings from a static analysis of a program to corresponding configuration-related sources of imprecision, the mapping of the actual security findings creating a second mapping. A user is requested to configure selected ones of the configuration-related sources of imprecision from the second mapping. Responsive to a user updating configuration corresponding to the selected ones of the configuration-related sources of imprecision, security analysis results are updated for the static analysis of the program at least by determining whether one or more security findings from the security analysis results are no longer considered to be vulnerable based on the updated configuration by the user. The updated security analysis results are output. Apparatus and program products are also disclosed. | 12-18-2014 |
20140373159 | After-The-Fact Configuration Of Static Analysis Tools Able To Reduce User Burden - A method includes mapping, based on a first mapping from possible security findings to possible configuration-related sources of imprecision, actual security findings from a static analysis of a program to corresponding configuration-related sources of imprecision, the mapping of the actual security findings creating a second mapping. A user is requested to configure selected ones of the configuration-related sources of imprecision from the second mapping. Responsive to a user updating configuration corresponding to the selected ones of the configuration-related sources of imprecision, security analysis results are updated for the static analysis of the program at least by determining whether one or more security findings from the security analysis results are no longer considered to be vulnerable based on the updated configuration by the user. The updated security analysis results are output. Apparatus and program products are also disclosed. | 12-18-2014 |
20150067653 | AUTOMATIC GENERATION OF ANALYSIS-EQUIVALENT APPLICATION CONSTRUCTS - A computer program to be subjected to static analysis includes at least one framework, in turn including high-level code and at least one configuration file. A specification which describes run-time behavior of the program, including run-time behavior of the at least one framework including the high-level code and the at least one configuration file, is created from the computer program. Based on the specification, synthetic high-level code which accurately simulates the run-time behavior of the at least one framework including the high-level code and the at least one configuration file, without framework usage, is created. Static analysis of the computer program is carried out based on the synthetic high-level code. | 03-05-2015 |
20150186652 | AUTOMATIC CORRECTION OF SECURITY DOWNGRADERS - Methods and systems for automatic correction of security downgraders. For one or more flows having one or more candidate downgraders, it is determined whether each candidate downgrader protects against all vulnerabilities associated with the candidate downgrader's respective flow. Candidate downgraders that do not protect against all of the associated vulnerabilities are transformed, such that the transformed downgraders do protect against all of the associated vulnerabilities. | 07-02-2015 |
20150317237 | PARTITIONING OF PROGRAM ANALYSES INTO SUB-ANALYSES USING DYNAMIC HINTS - An exemplary method includes performing a first static analysis to locate elements within a program and instrumenting the program to enable a subsequent dynamic analysis based on the located elements. The method includes executing the instrumented program and performing during execution analysis to determine individual sets of statements in the program affected by a corresponding element. The method includes partitioning the sets of statements into partitions based on one or more considerations, each partition including one or more of the elements. The method includes performing a second static analysis on the partitions of the program to produce results and outputting the results. The method may be performed for, e.g., security (e.g., taint) analysis, buffer overflow analysis, and typestate analysis. Apparatus and program products are also disclosed. | 11-05-2015 |
20150317238 | Partitioning of Program Analyses into Sub-Analyses Using Dynamic Hints - An exemplary apparatus and computer program product are disclosed which employ a method that includes performing a first static analysis to locate elements within a program and instrumenting the program to enable a subsequent dynamic analysis based on the located elements. The method includes executing the instrumented program and performing during execution analysis to determine individual sets of statements in the program affected by a corresponding element. The method includes partitioning the sets of statements into partitions based on one or more considerations, each partition including one or more of the elements. The method includes performing a second static analysis on the partitions of the program to produce results and outputting the results. The method may be performed for, e.g., security (e.g., taint) analysis, buffer overflow analysis, and typestate analysis. | 11-05-2015 |
20150347761 | AUTOMATIC CORRECTION OF SECURITY DOWNGRADERS - Systems for automatic correction of security downgraders include a security analysis module configured to perform a security analysis that disregards existing user-provided downgraders to detect flows that are vulnerable; and an enhancer module configured to locate candidate downgraders on the flows, to determine whether each of the candidate downgraders protects against all vulnerabilities associated with each downgrader's respective flow, and to transform candidate downgraders that do not protect against all of the associated vulnerabilities such that the transformed downgraders do protect against all of the associated vulnerabilities. | 12-03-2015 |
Salvatore Angelo Guarnieri, New York, NY US
Patent application number | Description | Published |
---|---|---|
20140115564 | DIFFERENTIAL STATIC PROGRAM ANALYSIS - Methods for program analysis include performing a high-level analysis on a program using a processor to generate one or more high-level findings; performing one or more low-level analyses on the program using a processor to generate one or more low-level findings; mapping the one or more low-level findings to the high-level findings to generate a concise combination report that categorizes each finding according to the highest-level analysis that produces the finding. | 04-24-2014 |
20140237603 | RULE MATCHING IN THE PRESENCE OF LANGUAGES WITH NO TYPES OR AS AN ADJUNCT TO CURRENT ANALYSES FOR SECURITY VULNERABILITY ANALYSIS - A method includes reading by a computing system a rule file including one or more rules having specified paths to methods, each method corresponding to one of a sink, source, or sanitizer. The method includes matching by the computing system the methods to corresponding ones of sinks, sources, or sanitizers determined through a static analysis of an application. The static analysis determines at least flows from sources of information to sinks that use the information. The method includes performing by the computing system, using the sinks, sources, and sanitizers found by the matching, a taint analysis to determine at least tainted flows from sources to sinks, wherein the tainted flows are flows passing information to sinks without the information being endorsed by a sanitizer. Apparatus and program products are also disclosed. | 08-21-2014 |
20140237604 | Rule Matching In The Presence Of Languages With No Types Or As An Adjunct To Current Analyses For Security Vulnerability Analysis - A method includes reading by a computing system a rule file including one or more rules having specified paths to methods, each method corresponding to one of a sink, source, or sanitizer. The method includes matching by the computing system the methods to corresponding ones of sinks, sources, or sanitizers determined through a static analysis of an application. The static analysis determines at least flows from sources of information to sinks that use the information. The method includes performing by the computing system, using the sinks, sources, and sanitizers found by the matching, a taint analysis to determine at least tainted flows from sources to sinks, wherein the tainted flows are flows passing information to sinks without the information being endorsed by a sanitizer. Apparatus and program products are also disclosed. | 08-21-2014 |
20140258992 | Scalable and Precise String Analysis Using Index-Sensitive Static String Abstractions - A disclosed method includes accessing one or more seeding specifications and a program including computer-readable code and applying the one or more seeding specifications to the program to identify for analysis seeds including strings for corresponding identified string variables. The method includes tracking flows emanating from the identified seeds. The tracking includes computing an integral offset into a tracked string variable for any statements causing such a computation. The tracking also includes providing a string representation based on the computed integral offset, wherein the provided string representation comprises a value of the integral offset and an indication of the corresponding tracked string variable. The tracking further includes modeling string manipulations of the tracked string variables using the string representations. Apparatus and program products are also disclosed. | 09-11-2014 |
Stuart Guarnieri, Laramie, WY US
Patent application number | Description | Published |
---|---|---|
20100079815 | Systems and Methods for Luminance Determination - Systems and methods are provided for generating at least one look-up table, wherein the look-up table holds at least one luminance value in a second color space. In some embodiments, the luminance value can be computed for distinct combinations of color component values corresponding to a plurality of color components in a first color space. The method comprises computing at least one luminance value in the second color space based on a portion of the color component value combination; deriving an address in a look-up table based on the portion of the color component combination; and storing the computed luminance value in the look-up table at the derived address. | 04-01-2010 |
20100079817 | Method for optimizing the search for trapping regions - Methods disclosed permit the identification of frame buffer pixels for trapping. In some embodiments, flags associated with pixels in the frame buffer may be used to provide an indication of pixels for trapping. A first bit in a flag associated with a pixel may be set when the pixel is painted. In some embodiments, the method discloses a process for setting the value of a second bit in the flag to determine if the pixel associated with the flag lies on an object boundary. The pixel is identified as a candidate for trapping based on the value of the at least one flag. | 04-01-2010 |
20100149201 | Systems and Methods for Optimizing Pixel Based Raster Trapping - Methods disclosed permit the identification of frame buffer pixels for trapping. In some embodiments, flags associated with pixels in the frame buffer may be used to provide an indication of pixels for trapping. A bit in a flag associated with a pixel may be set when the pixel is painted, if the luminosity value of the pixel does not exceed a luminosity threshold. In some embodiments, the method discloses a process for updating the value of the bit through the rasterization process. The pixel may be identified as a candidate for trapping based on the value of the at least one bit at trapping time. | 06-17-2010 |
20100246948 | Systems and Methods for Enhancing Image Differences - Methods disclosed permit the enhancement of difference images associated with an image pair. In some embodiments, an enhanced difference image may be generated by selecting at least one non-zero target pixel in a thresholded difference image and performing operations on pixels that neighbor the target pixel in the thresholded difference image based on the value associated with the target pixel. In some embodiments, the operations on neighbors of the target pixel may be carried out using a user-specified paintbrush. The enhanced difference image may be rendered using a monitor or a printer. | 09-30-2010 |
20100246979 | Systems and Methods for Outlining Image Differences - Methods disclosed permit the outlining of difference images associated with an image pair. In some embodiments, an outlined difference image may be generated by selecting at least one non-zero pixel in a thresholded difference image and setting the value of the selected pixel to the maximum value permitted for that color space. In some embodiments, each color component of the selected pixel may be set to the maximum value permitted for that color component. The outlined difference image may also be scaled while preserving thresholded difference information. In some embodiments, the outlined difference image may be rendered using a monitor or a printer. | 09-30-2010 |
20120200896 | Method for Optimizing the Search for Trapping Regions - Methods disclosed permit the identification of frame buffer pixels for trapping. In some embodiments, flags associated with pixels in the frame buffer may be used to provide an indication of pixels for trapping. A first bit in a flag associated with a pixel may be set when the pixel is painted. In some embodiments, the method discloses a process for setting the value of a second bit in the flag to determine if the pixel associated with the flag lies on an object boundary. The pixel is identified as a candidate for trapping based on the value of the at least one flag. | 08-09-2012 |
Stuart L. M. Guarnieri, Laramie, WY US
Patent application number | Description | Published |
---|---|---|
20130194623 | PRINTING AN ELECTRONIC DOCUMENT USING A PRINTER AND A MOBILE DEVICE - A method for printing an electronic document (ED) using a printer and a mobile device, including: receiving, by the printer, a request to print; generating, by the printer, a unique identifier (UID) in response to the request, where the mobile device sends a print job associated with the UID and the ED to a print server over a network; sending, by the printer, the UID to the print server; receiving, by the printer, the print job from the print server in response to sending the UID; and printing, by the printer, a hardcopy of the ED based on the print job. | 08-01-2013 |
Tiziana Guarnieri, Bologna IT
Patent application number | Description | Published |
---|---|---|
20100099730 | ANNELLATED PYRROLE COMPOUNDS FOR CANCER MANAGEMENT - The present invention relates to the use of annellated pyrrole compounds and in particular ML3000 (licofelone), salts or derivatives thereof, for cancer management, and in general to the use of a compound of Formula (I): wherein the variables have the meanings given in the present description, for the prevention and/or treatment of neoplasia, in particular neoplasia selected from the group consisting of papilloma, carcinoma, adenoma and adenocarcinoma, e.g. human airway or colorectal carcinoma, preferably fast-growing, multidrug resistant and/or COX-2 negative neoplasia. The invention further relates to pharmaceutical compositions for the aforesaid purposes, comprising annellated pyrrole compounds and in particular ML3000 (licofelone), optical isomers, salts or derivatives thereof, as well as to a method of treating and/or preventing neoplasia and/or restoring the ability to undergo apoptosis in a cell having lost the same. This treatment ameliorates, diminishes, actively treats, reverses or prevents any disease related to insufficient apoptosis, in particular neoplasia, and it may be combined with irradiation, heating and treatment with a cytotoxic agent for preventive and/or curative purposes. | 04-22-2010 |