CONFIDENCE-BASED STATIC ANALYSIS
    111.
    发明申请
    CONFIDENCE-BASED STATIC ANALYSIS 失效
    基于信心的静态分析

    公开(公告)号:US20120084755A1

    公开(公告)日:2012-04-05

    申请号:US12895470

    申请日:2010-09-30

    IPC分类号: G06F9/44

    CPC分类号: G06F11/3604

    摘要: Systems, methods and program products are provided for confidence-based static analysis, including initiating a static analysis of computer software, associating a confidence value with a first element of the static analysis, determining a current state of the static analysis, calculating an adjusted confidence value in accordance with a confidence adjustment function as applied to the current state and the confidence value associated with the first element, associating the adjusted confidence value with a second element of the static analysis resulting from a transition from the first element, and eliminating the second element from the static analysis if the adjusted confidence value meets elimination criteria.

    摘要翻译: 提供系统,方法和程序产品用于基于置信度的静态分析,包括启动计算机软件的静态分析,将置信度值与静态分析的第一要素相关联,确定静态分析的当前状态,计算调整后的置信度 根据应用于当前状态的置信度调整函数和与第一元素相关联的置信度值,将调整后的置信度值与由第一元素的转变产生的静态分析的第二元素相关联,并且消除第二元素 如果调整的置信度值符合消除标准,则来自静态分析的元素。

    Enforcement Of Data Privacy To Maintain Obfuscation Of Certain Data
    112.
    发明申请
    Enforcement Of Data Privacy To Maintain Obfuscation Of Certain Data 有权
    执行数据隐私来维护某些数据的混淆

    公开(公告)号:US20110277037A1

    公开(公告)日:2011-11-10

    申请号:US12776465

    申请日:2010-05-10

    IPC分类号: G06F21/24

    摘要: A computer-readable medium is disclosed that tangibly embodies a program of machine-readable instructions executable by a digital processing apparatus to perform operations including determining whether data to be released from a database is associated with one or more confidential mappings between sets of data in the database. The operations also include, in response to the data being associated with the one or more confidential mappings, determining whether release of the data meets one or more predetermined anonymity requirements of an anonymity policy. Methods and apparatus are also disclosed.

    摘要翻译: 公开了一种计算机可读介质,其有形地体现了可由数字处理装置执行的机器可读指令的程序,以执行操作,以执行包括确定要从数据库释放的数据是否与所述数据集中的数据集之间的一个或多个机密映射相关联 数据库。 操作还包括响应于与一个或多个机密映射相关联的数据,确定数据的释放是否符合匿名策略的一个或多个预定匿名要求。 还公开了方法和装置。

    DETERMINING THE VULNERABILITY OF COMPUTER SOFTWARE APPLICATIONS TO ATTACKS
    113.
    发明申请
    DETERMINING THE VULNERABILITY OF COMPUTER SOFTWARE APPLICATIONS TO ATTACKS 有权
    确定计算机软件应用程序的易受攻击性

    公开(公告)号:US20110162072A1

    公开(公告)日:2011-06-30

    申请号:US12648445

    申请日:2009-12-29

    IPC分类号: G06F11/00

    摘要: Determining the vulnerability of computer software applications to attacks by identifying a defense-related variable within a computer software application that is assigned results of a defense operation defending against a predefined type of attack, identifying a control-flow predicate dominating a security-sensitive operation within the application, identifying a data-flow dependent variable in the application that is data-flow dependent on the defense-related variable, determining whether the control-flow predicate uses the data-flow dependent variable to make a branching decision and whether a control-flow path leading to the security-sensitive operation is taken only if the data-flow dependent variable is compared against a value of a predefined type, determining that the security-sensitive operation is safe from the attack if both control-flow conditions are true, and determining that the application is safe from the attack if all security-sensitive operations in the application are determined to be safe from the attack.

    摘要翻译: 通过在计算机软件应用程序中识别防御相关变量来确定计算机软件应用程序对攻击的脆弱性,该计算机软件应用程序分配了针对预定类型攻击的防御操作结果,识别控制安全敏感操作的控制流谓词 该应用程序在应用程序中识别数据流依赖于与防御相关变量的数据流相关变量,确定控制流谓词是否使用数据流依赖变量进行分支决策,以及控制 - 只有当数据流相关变量与预定义类型的值进行比较时,才能获得导致安全敏感操作的流程路径,如果两个控制流条件都为真,则确定安全敏感操作对于攻击是安全的, 并且如果应用程序中的所有安全敏感操作都确定应用程序是否安全 被确定为安全的攻击。

    Detecting Security Vulnerabilities Relating to Cryptographically-Sensitive Information Carriers when Testing Computer Software
    114.
    发明申请
    Detecting Security Vulnerabilities Relating to Cryptographically-Sensitive Information Carriers when Testing Computer Software 有权
    在测试计算机软件时检测与密码敏感信息载体相关的安全漏洞

    公开(公告)号:US20110072517A1

    公开(公告)日:2011-03-24

    申请号:US12564288

    申请日:2009-09-22

    申请人: Omer Tripp

    发明人: Omer Tripp

    IPC分类号: G06F11/36

    CPC分类号: G06F11/3636

    摘要: A system for detecting security vulnerabilities in computer software, including a cryptographic API identifier configured to identify a cryptographic API among the instructions of a computer software application, a path-to-source tracer configured to trace an information flow path among the instructions between the cryptographic API and a source that directly or indirectly provides data that are input to the cryptographic API, where a cryptographically-sensitive information carrier lies along the information flow path, a path-to-sink tracer configured to trace an information flow path among the instructions from the cryptographically-sensitive information carrier to a sink, and a security vulnerability identifier configured to provide a notification that the information flow path between the cryptographically-sensitive information carrier and the sink represents security vulnerability if the information flow path between the cryptographically-sensitive information carrier and the sink does not pass through a cryptographic API.

    摘要翻译: 一种用于检测计算机软件中的安全漏洞的系统,包括被配置为在计算机软件应用程序的指令中识别密码API的密码API标识符,路径到源跟踪器,被配置为在所述加密API之间的指令之间追踪信息流路径 API和源,其直接或间接地提供输入到加密API的数据,其中加密敏感信息载体位于信息流路径上,路径到宿主跟踪器被配置为跟踪指令之间的信息流路径, 密码敏感信息载体到宿,以及安全漏洞标识符,其被配置为提供通知,即如果加密敏感信息载体之间的信息流路径,密码敏感信息载体和宿之间的信息流路径表示安全漏洞 和水槽 不通过加密API。

    Efficient Code Instrumentation
    115.
    发明申请
    Efficient Code Instrumentation 失效
    高效的代码工具

    公开(公告)号:US20100306745A1

    公开(公告)日:2010-12-02

    申请号:US12475739

    申请日:2009-06-01

    IPC分类号: G06F11/36 G06F9/44

    CPC分类号: G06F11/3624 G06F11/3636

    摘要: A method for instrumenting a computer program, the method including identifying a program slice within a computer program, and instrumenting the program slice within the program.

    摘要翻译: 一种用于仪器计算机程序的方法,所述方法包括识别计算机程序内的程序切片,以及在程序内对程序切片进行测量。

    Detecting stored cross-site scripting vulnerabilities in web applications
    117.
    发明授权
    Detecting stored cross-site scripting vulnerabilities in web applications 有权
    检测Web应用程序中存储的跨站点脚本漏洞

    公开(公告)号:US09471787B2

    公开(公告)日:2016-10-18

    申请号:US13217418

    申请日:2011-08-25

    IPC分类号: G06F21/57 H04L29/06

    摘要: A system for detecting security vulnerabilities in web applications, the system including, a black-box tester configured to provide a payload to a web application during a first interaction with the web application at a computer server, where the payload includes a payload instruction and an identifier, and an execution engine configured to detect the identifier within the payload received during an interaction with the web application subsequent to the first interaction, and determine, responsive to detecting the identifier within the payload, whether the payload instruction underwent a security check prior to execution of the payload instruction.

    摘要翻译: 一种用于检测Web应用程序中的安全漏洞的系统,该系统包括:黑盒测试器,被配置为在与计算机服务器处的web应用的第一次交互期间向web应用提供有效载荷,其中所述有效载荷包括有效载荷指令和 标识符和执行引擎,被配置为在第一交互之后与网络应用程序交互期间检测在该有效载荷内接收到的有效载荷内的标识符,并且响应于检测到有效载荷内的标识符,确定有效载荷指令是否在 执行有效载荷指令。

    Anomaly detection at the level of run time data structures
    120.
    发明授权
    Anomaly detection at the level of run time data structures 有权
    运行时数据结构水平的异常检测

    公开(公告)号:US09009535B2

    公开(公告)日:2015-04-14

    申请号:US13587335

    申请日:2012-08-16

    IPC分类号: G06F11/00 G06F11/07

    CPC分类号: G06F11/0751

    摘要: A useful embodiment of the invention is directed to a method associated with a computer program comprising one or more basic blocks, wherein the program defines and uses multiple data structures, such as the list of all customers of a bank along with their account information. The method includes identifying one or more invariants, wherein each invariant is associated with one of the data structures. The method further includes determining at specified times whether an invariant has been violated. Responsive to detecting a violation of one of the invariants, the detected violation is flagged as an anomaly.

    摘要翻译: 本发明的有用实施例涉及与包括一个或多个基本块的计算机程序相关联的方法,其中该程序定义和使用多个数据结构,诸如银行的所有客户的列表及其帐户信息。 该方法包括识别一个或多个不变量,其中每个不变量与数据结构之一相关联。 该方法还包括在指定时间确定是否违反了不变量。 响应于检测违反其中一个不变量,检测到的违规被标记为异常。