String analysis based on three-valued logic
    91.
    发明授权
    String analysis based on three-valued logic 有权
    基于三值逻辑的字符串分析

    公开(公告)号:US08898188B2

    公开(公告)日:2014-11-25

    申请号:US13154986

    申请日:2011-06-07

    IPC分类号: G06F17/30 G06F11/36

    CPC分类号: G06F11/3608 G06F2201/81

    摘要: Performing string analysis based on three-valued logic by including expressing a property of a string in a computer software application as a three-valued logic shape predicate, performing a three-valued logic shape analysis using the shape predicate to reach a fixpoint solution, and evaluating the fixpoint solution to determine a three-valued logic value of the property.

    摘要翻译: 通过将计算机软件应用程序中的字符串的属性表示为三值逻辑形状谓词来执行基于三值逻辑的字符串分析,使用形状谓词执行三值逻辑形状分析以达到固定点解决方案,以及 评估fixpoint解决方案以确定属性的三值逻辑值。

    Eliminating false-positive reports resulting from static analysis of computer software
    92.
    发明授权
    Eliminating false-positive reports resulting from static analysis of computer software 有权
    消除计算机软件的静态分析产生的假阳性报告

    公开(公告)号:US08745578B2

    公开(公告)日:2014-06-03

    申请号:US13252229

    申请日:2011-12-04

    IPC分类号: G06F9/44 G06F9/45

    CPC分类号: G06F8/43 G06F11/3604

    摘要: A system for eliminating false-positive reports resulting from static analysis of computer software is provided herein. The system includes the following components executed by a processor: a modeler configured to model a computer code into a model that defines sources, sinks, and flows; a static analyzer configured to apply static analysis to the code or the model, to yield reports indicative of at least one issue relating to one or more of the flows; a preconditions generator configured to generate preconditions for eliminating false-positive issues in the reports, based on the model and user-provided input; and a preconditions checker configured to apply the generated preconditions to the reports for eliminating false-positive issues in the reports.

    摘要翻译: 本文提供了一种消除计算机软件静态分析产生的假阳性报告的系统。 该系统包括由处理器执行的以下组件:被配置为将计算机代码建模成定义源,汇和流的模型的建模器; 静态分析器被配置为对代码或模型应用静态分析,以产生指示与一个或多个流相关的至少一个问题的报告; 配置为基于模型和用户提供的输入产生消除报告中的假阳性问题的先决条件的前提条件生成器; 以及一个前提条件检查器,用于将生成的前提条件应用到报告中,以消除报告中的假阳性问题。

    Static analysis of validator routines
    93.
    发明授权
    Static analysis of validator routines 失效
    验证程序的静态分析

    公开(公告)号:US08726246B2

    公开(公告)日:2014-05-13

    申请号:US13109170

    申请日:2011-05-17

    IPC分类号: G06F9/44

    摘要: A method includes accessing a validator routine having an input string and one or more return points, each return point returning a return value having two possible values; finding the return points in the validator routine; for each of the return points, performing a backwards traversal from a return point through a code section and determining constraints on the input string based at least on one or both of the two possible return values for the return point; using the determined constraints for the input string, determining whether all of the return values returned from the one or more return points meet validation constraints; and outputting one or more indications of whether all of the returned values returned from the return points meet the validation constraints for the one or both of the two possible return values. Apparatus and computer program products are also disclosed.

    摘要翻译: 一种方法包括访问具有输入字符串和一个或多个返回点的验证器程序,每个返回点返回具有两个可能值的返回值; 找到验证程序的返回点; 对于每个返回点,通过代码部分从返回点执行向后遍历,并且基于返回点的两个可能返回值中的至少一个或两个来确定对输入字符串的约束; 使用确定的输入字符串的约束,确定从一个或多个返回点返回的所有返回值是否满足验证约束; 并且输出一个或多个指示是否从返回点返回的所有返回值是否满足两个可能返回值中的一个或两个的验证约束。 还公开了装置和计算机程序产品。

    Static analysis for verification of software program access to secure resources for computer systems
    94.
    发明授权
    Static analysis for verification of software program access to secure resources for computer systems 有权
    用于验证软件程序访问计算机系统安全资源的静态分析

    公开(公告)号:US08683599B2

    公开(公告)日:2014-03-25

    申请号:US13602549

    申请日:2012-09-04

    IPC分类号: G06F21/00

    CPC分类号: G06F21/577

    摘要: Computer program products and apparatus are disclosed. Using a static analysis, a software program is analyzed to determine whether the software program accesses a secure resource for a computer system without verification that the secure resource can be accessed by the software program. In response to an access by the software program to the secure resource without verification that the secure resource can be accessed by the software program, a result is output indicative of the analyzing. An apparatus is disclosed that includes a user interface providing a security report to a user, the security report indicating a result of an analysis of whether or not a software program accesses a secure resource for a computer system without verification that the secure resource can be accessed by the software program.

    摘要翻译: 公开了计算机程序产品和设备。 使用静态分析,分析软件程序以确定软件程序是否访问计算机系统的安全资源,而不验证软件程序可以访问安全资源。 响应于软件程序对安全资源的访问,而不验证安全资源可以被软件程序访问,则输出指示分析的结果。 公开了一种装置,其包括向用户提供安全报告的用户界面,该安全报告指示软件程序是否访问用于计算机系统的安全资源的分析结果,而无需验证该安全资源可被访问 由软件程序。

    ANOMALY DETECTION AT THE LEVEL OF RUN TIME DATA STRUCTURES
    95.
    发明申请
    ANOMALY DETECTION AT THE LEVEL OF RUN TIME DATA STRUCTURES 有权
    在运行时间数据结构的异常检测

    公开(公告)号:US20140053028A1

    公开(公告)日:2014-02-20

    申请号:US13587335

    申请日:2012-08-16

    IPC分类号: G06F11/07

    CPC分类号: G06F11/0751

    摘要: A useful embodiment of the invention is directed to a method associated with a computer program comprising one or more basic blocks, wherein the program defines and uses multiple data structures, such as the list of all customers of a bank along with their account information. The method includes identifying one or more invariants, wherein each invariant is associated with one of the data structures. The method further includes determining at specified times whether an invariant has been violated. Responsive to detecting a violation of one of the invariants, the detected violation is flagged as an anomaly.

    摘要翻译: 本发明的有用实施例涉及与包括一个或多个基本块的计算机程序相关联的方法,其中该程序定义和使用多个数据结构,诸如银行的所有客户的列表及其帐户信息。 该方法包括识别一个或多个不变量,其中每个不变量与数据结构之一相关联。 该方法还包括在指定时间确定是否违反了不变量。 响应于检测违反其中一个不变量,检测到的违规被标记为异常。

    Static analysis for verification of software program access to secure resources for computer systems
    96.
    发明授权
    Static analysis for verification of software program access to secure resources for computer systems 有权
    用于验证软件程序访问计算机系统安全资源的静态分析

    公开(公告)号:US08381242B2

    公开(公告)日:2013-02-19

    申请号:US12839533

    申请日:2010-07-20

    IPC分类号: G06F21/00

    CPC分类号: G06F21/577

    摘要: A method includes, using a static analysis, analyzing a software program to determine whether the software program accesses a secure resource for a computer system without verification that the secure resource can be accessed by the software program. The method also includes, in response to an access by the software program to the secure resource without verification that the secure resource can be accessed by the software program, outputting a result indicative of the analyzing. Computer program products and apparatus are also disclosed. An apparatus is disclosed that includes a user interface providing a security report to a user, the security report indicating a result of an analysis of whether or not a software program accesses a secure resource for a computer system without verification that the secure resource can be accessed by the software program.

    摘要翻译: 一种方法包括使用静态分析来分析软件程序以确定软件程序是否访问用于计算机系统的安全资源,而无需验证该软件程序可以访问安全资源。 该方法还包括响应于软件程序对安全资源的访问,而不验证安全资源可以由软件程序访问,输出指示分析的结果。 还公开了计算机程序产品和装置。 公开了一种装置,其包括向用户提供安全报告的用户界面,该安全报告指示软件程序是否访问用于计算机系统的安全资源的分析结果,而无需验证该安全资源可被访问 由软件程序。

    LABEL-BASED TAINT ANALYSIS
    97.
    发明申请
    LABEL-BASED TAINT ANALYSIS 失效
    基于标签的分析

    公开(公告)号:US20120210432A1

    公开(公告)日:2012-08-16

    申请号:US13028237

    申请日:2011-02-16

    IPC分类号: G06F11/00 G06F9/44

    CPC分类号: G06F11/3604

    摘要: A computer-implemented method and apparatus, adapted to receive a computer program, and dynamically analyze the computer program to determine flow of untrusted data with respect to a computer resource associated with the computer program. Based on the flow of untrusted data, the method and apparatus determine an abstraction of the computerized resource, and performing static analysis of the computer program with respect to the abstraction, wherein the static analysis is for identifying whether the computer program is susceptible to one or more possible security vulnerabilities.

    摘要翻译: 一种计算机实现的方法和装置,适于接收计算机程序,并且动态分析所述计算机程序以确定相对于与所述计算机程序相关联的计算机资源的不受信任数据的流动。 基于不可信数据的流程,该方法和装置确定计算机化资源的抽象,并且针对抽象执行计算机程序的静态分析,其中静态分析用于识别计算机程序是否易受一个或多个 更多可能的安全漏洞。

    Runtime Enforcement Of Security Checks
    98.
    发明申请
    Runtime Enforcement Of Security Checks 失效
    运行时执行安全检查

    公开(公告)号:US20120174229A1

    公开(公告)日:2012-07-05

    申请号:US12983407

    申请日:2011-01-03

    IPC分类号: G06F11/00

    CPC分类号: H04L63/1441 G06F21/554

    摘要: A method is disclosed that includes tracking untrusted inputs through an executing program into a sink, the tracking including maintaining context of the sink as strings based on the untrusted inputs flow into the sink. The method also includes, while tracking, in response to a string based on an untrusted input being about to flow into the sink and a determination the string could lead to an attack if the string flows into a current context of the sink, endorsing the string using an endorser selected based at least on the current context of the sink, and providing the endorsed string to the sink. Computer program products and apparatus are also disclosed.

    摘要翻译: 公开了一种方法,其包括通过执行程序将不可信任的输入跟踪到宿中,所述跟踪包括基于所述不可信任的输入流入宿来维持宿的上下文作为字符串。 该方法还包括响应于基于不可信输入的字符串的跟踪而被跟踪,并且如果字符串流入接收器的当前上下文,则确定该字符串可能导致攻击,认证字符串 使用至少基于汇的当前上下文选择的支持者,并将批准的字符串提供给汇点。 还公开了计算机程序产品和装置。

    Global Variable Security Analysis
    99.
    发明申请
    Global Variable Security Analysis 失效
    全局变量安全分析

    公开(公告)号:US20120131670A1

    公开(公告)日:2012-05-24

    申请号:US12951435

    申请日:2010-11-22

    IPC分类号: G06F21/00

    摘要: A method includes determining selected global variables in a program for which flow of the selected global variables through the program is to be tracked. The selected global variables are less than all the global variables in the program. The method includes using a static analysis performed on the program, tracking flow through the program for the selected global variables. In response to one or more of the selected global variables being used in security-sensitive operations in the flow, use is analyzed of each one of the selected global variables in a corresponding security-sensitive operation. In response to a determination the use may be a potential security violation, the potential security violation is reported. Apparatus and computer program products are also disclosed.

    摘要翻译: 一种方法包括确定在所述程序中选择的全局变量,通过所述程序,所选择的全局变量的流程将被跟踪。 所选的全局变量小于程序中的所有全局变量。 该方法包括使用对程序执行的静态分析,跟踪所选择的全局变量的程序流程。 响应于在流中的安全敏感操作中使用的一个或多个所选择的全局变量,在相应的安全敏感操作中对所选择的全局变量中的每一个进行分析。 为了回应确定,使用可能是潜在的安全违规,报告潜在的安全违规。 还公开了装置和计算机程序产品。

    Static Analysis For Verification Of Software Program Access To Secure Resources For Computer Systems
    100.
    发明申请
    Static Analysis For Verification Of Software Program Access To Secure Resources For Computer Systems 有权
    静态分析用于验证软件程序访问以确保计算机系统的资源

    公开(公告)号:US20120023553A1

    公开(公告)日:2012-01-26

    申请号:US12839533

    申请日:2010-07-20

    IPC分类号: G06F21/00

    CPC分类号: G06F21/577

    摘要: A method includes, using a static analysis, analyzing a software program to determine whether the software program accesses a secure resource for a computer system without verification that the secure resource can be accessed by the software program. The method also includes, in response to an access by the software program to the secure resource without verification that the secure resource can be accessed by the software program, outputting a result indicative of the analyzing. Computer program products and apparatus are also disclosed. An apparatus is disclosed that includes a user interface providing a security report to a user, the security report indicating a result of an analysis of whether or not a software program accesses a secure resource for a computer system without verification that the secure resource can be accessed by the software program.

    摘要翻译: 一种方法包括使用静态分析来分析软件程序以确定软件程序是否访问用于计算机系统的安全资源,而无需验证该软件程序可以访问安全资源。 该方法还包括响应于软件程序对安全资源的访问,而不验证安全资源可以由软件程序访问,输出指示分析的结果。 还公开了计算机程序产品和装置。 公开了一种装置,其包括向用户提供安全报告的用户界面,该安全报告指示软件程序是否访问用于计算机系统的安全资源的分析结果,而无需验证该安全资源可被访问 由软件程序。