Taipei, Taiwan

Fang Yu


Average Co-Inventor Count = 6.0

ph-index = 2

Forward Citations = 50(Granted Patents)


Company Filing History:


Years Active: 2010-2013

Loading Chart...
2 patents (USPTO):Explore Patents

Title: Innovations by Fang Yu in Web Application Security

Introduction

Fang Yu is a notable inventor based in Taipei, Taiwan. He has made significant contributions to the field of software security, particularly in web application code analysis and verification. With a total of 2 patents, his work focuses on enhancing the security and correctness of software applications.

Latest Patents

Fang Yu's latest patents include a system and method for securing web application code and verifying the correctness of software. This innovative approach involves transforming a software application into an abstract representation that preserves its information flow properties. The abstract interpretation is evaluated to identify vulnerabilities, utilizing type qualifiers to associate security levels with variables and functions within the application. Additionally, runtime guards are inserted into the application to secure identified vulnerabilities, ensuring a robust defense against potential threats.

Career Highlights

Fang Yu is currently employed at Armorize Technologies, Inc., where he continues to develop cutting-edge solutions for software security. His expertise in analyzing software applications has positioned him as a key player in the industry, contributing to advancements that protect users from vulnerabilities.

Collaborations

Fang has collaborated with notable colleagues, including Yao-Wen Huang and Chung-Hung Tsai. These partnerships have fostered a collaborative environment that enhances innovation and drives the development of effective security solutions.

Conclusion

Fang Yu's contributions to web application security through his patents and work at Armorize Technologies, Inc. highlight his commitment to improving software safety. His innovative methods and collaborative efforts continue to shape the future of software security.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…