-
公开(公告)号:US10452564B2
公开(公告)日:2019-10-22
申请号:US15496287
申请日:2017-04-25
Applicant: EntIT Software LLC
Inventor: Luther Martin , Timothy Roake
Abstract: Format preserving encryption of object code is disclosed. One example is a system including at least one processor and a memory storing instructions executable by the at least one processor to identify object code to be secured, where the object code comprises a list of instructions, each instruction comprising an opcode and zero or more parameters. A format preserving encryption (FPE) is applied to the received object code, where the FPE is applied separately to a sub-plurality of instructions in the list of instructions, to generate an encrypted object code comprising a sub-plurality of encrypted instructions. An encrypted object code is provided to a service provider, where the encrypted object code comprises the sub-plurality of encrypted instructions, and any unencrypted portions of the object code.
-
公开(公告)号:US20190294821A1
公开(公告)日:2019-09-26
申请号:US15926425
申请日:2018-03-20
Applicant: EntIT Software LLC
Inventor: Timothy Roake , Luther Martin
Abstract: A technique includes accessing data that represents a plurality of values that are associated with a plurality of ranges. The technique includes determining a pseudonym value for a given value, where the given value is associated with a given range and determining the pseudonym includes encrypting the given value to provide the pseudonym value; controlling the encryption to cause the pseudonym value to be within the given range; and tweaking the encryption based on an attribute that is associated with the given value.
-
公开(公告)号:US20190238562A1
公开(公告)日:2019-08-01
申请号:US15884988
申请日:2018-01-31
Applicant: EntIT Software LLC
Inventor: Pratyusa K. Manadhata , Kyle Williams , Barak Raz , Martin Arlitt
CPC classification number: H04L63/145 , G06F17/21 , G06F21/56 , H04L61/1511 , H04L63/101 , H04L63/1425
Abstract: In some examples, for a device that transmitted domain names, a system determines a dissimilarity between the domain names, compares a value derived from the determined dissimilarity to a threshold, and identifies the device as malware infected in response to the comparing.
-
公开(公告)号:US10365901B2
公开(公告)日:2019-07-30
申请号:US15752021
申请日:2015-08-14
Applicant: ENTIT Software LLC
Inventor: Qiming Chen , Meichun Hsu , Malu G. Castellanos
Abstract: In one example in accordance with the present disclosure, a method for dynamic lexer object construction includes receiving a grammar rule including a variable and a Boolean function to be performed on a character sequence using the variable. The method includes receiving the character sequence and a value corresponding to the character sequence and constructing a lexer object that includes the value as the variable used by the Boolean function. The method includes parsing the character sequence using the lexer object.
-
公开(公告)号:US10331894B2
公开(公告)日:2019-06-25
申请号:US15500532
申请日:2014-08-29
Applicant: ENTIT SOFTWARE LLC
Inventor: Alvaro Munoz , Yekaterina Tsipenyuk O'Neil
Abstract: Example implementations relate to static program analysis. For example, an apparatus includes a processor to perform static program analysis on a set of processor executable instructions associated with an object-relational mapping (ORM) framework. The first set of processor executable instructions includes an object. The processor is also to generate a propagation path of the object based on an execution flow of the object. The propagation path includes a first node and a second node. The first node corresponds to a first ORM operation to store the object in a database. The second node corresponds to a second ORM operation to retrieve the object from the database. The second node is linked to the first node based on a common attribute of the object. In response to a determination that the propagation path includes a sink, the processor is to output a security risk warning.
-
公开(公告)号:US10324829B2
公开(公告)日:2019-06-18
申请号:US15747297
申请日:2015-07-30
Applicant: ENTIT Software LLC
Inventor: Arnaud Gaston Claude Clement
Abstract: Application testing is disclosed in the present disclosure. An interface structure may be extracted from source code of an application under test (AUT), and the interface structure may be separated into subsections. Then a primary test may be performed for the AUT by using test code to execute the subsections. An assertion strategy in the test code may be evaluated based on a predefined assertion requirement to obtain a first measurement result of the AUT, in which the assertion strategy may be to assert an execution result of the test code executing the subsections.
-
公开(公告)号:US20190102483A1
公开(公告)日:2019-04-04
申请号:US15721157
申请日:2017-09-29
Applicant: ENTIT Software LLC
Inventor: Pramod G. Joisha
Abstract: In one example, a system for a sort function race can include a processor, and a memory resource storing instructions executable by the processor to generate a plurality of variant sort functions that utilize a variant of an input from a parent sort function, that perform the plurality of variant sort functions as a plurality of separate processes, identify a variant sort function from the plurality of variant sort functions that completes a function in a shortest period of time, and receive results from the identified variant sort function.
-
公开(公告)号:US10248548B2
公开(公告)日:2019-04-02
申请号:US15560571
申请日:2015-04-15
Applicant: ENTIT Software LLC
Inventor: Liron Tzabari , Elad Benedict , Nathan Grunzweig
Abstract: A technique includes obtaining code coverage information related to lines of code. The code coverage information indicates how the lines of code are covered by a plurality of tests. The technique includes generating a two-way mapping based on the code coverage information. The two-way mapping includes a first mapping that maps a particular test in the plurality of tests to at least one line in the lines of code, which is covered by the particular test; and a second mapping that maps a particular line of code in the lines of code to at least one test in the plurality of tests, which covers the particular line of code.
-
公开(公告)号:US20190068358A1
公开(公告)日:2019-02-28
申请号:US15693327
申请日:2017-08-31
Applicant: EntIT Software LLC
Inventor: Leslie C. Gutschow , Richard Minner , Terence Spies
Abstract: A technique includes performing element-by-element encryption of a segment of the plaintext string to provide a segment of an encrypted string. Performing the element-by-element encryption includes, for a given string element of the segment of the plaintext string, encrypting the given string element to provide a given string element of the segment of the encrypted string; and tweaking the encryption of the given string element based on a selector that includes multiple string elements of the encrypted string. The technique may include searching an encrypted database based on the encrypted string.
-
公开(公告)号:US20190065742A1
公开(公告)日:2019-02-28
申请号:US15692581
申请日:2017-08-31
Applicant: EntIT Software LLC
Inventor: Darren Humphries
Abstract: A technique includes determining pairwise relationships among entities associated with a first electronic mail organization and entities associated with a second electronic mail organization. The technique includes controlling receipt of an electronic message originating from a sender associated with the first email organization based on the determined pairwise relationships.
-
-
-
-
-
-
-
-
-