Automated Detection of Flaws and Incompatibility Problems in Information Flow Downgraders
    62.
    发明申请
    Automated Detection of Flaws and Incompatibility Problems in Information Flow Downgraders 有权
    自动检测信息流降级中的缺陷和不兼容性问题

    公开(公告)号:US20130086686A1

    公开(公告)日:2013-04-04

    申请号:US13248724

    申请日:2011-09-29

    IPC分类号: G06F21/00

    摘要: Mechanisms for evaluating downgrader code in application code with regard to a target deployment environment. Downgrader code in the application code is identified. Based on an input string, an output string that the downgrader code outputs in response to receiving the input string is identified. One or more sets of illegal string patterns are retrieved. Each of the one or more sets of illegal string patterns is associated with a corresponding deployment environment. The illegal string patterns are string patterns that a downgrader identifies in the information flow for security purposes. A determination is made as to whether the downgrader code is compatible with the target deployment environment based on the one or more sets of illegal string patterns and the output string. An output indicative of the results of the determining is generated.

    摘要翻译: 评估应用程序代码中关于目标部署环境的降级代码的机制。 识别应用程序代码中的降级代码。 基于输入字符串,识别降级代码响应于输入字符串而输出的输出字符串。 检索一组或多组非法字符串模式。 一组或多组非法字符串模式中的每一个与相应的部署环境相关联。 非法字符串模式是为了安全起见,降级标识在信息流中的字符串模式。 基于一组或多组非法字符串模式和输出字符串,确定降级代码是否与目标部署环境兼容。 产生指示确定结果的输出。

    SELECTIVE DATA FLOW ANALYSIS OF BOUNDED REGIONS OF COMPUTER SOFTWARE APPLICATIONS
    63.
    发明申请
    SELECTIVE DATA FLOW ANALYSIS OF BOUNDED REGIONS OF COMPUTER SOFTWARE APPLICATIONS 有权
    选择性数据流分析计算机软件应用的边界区域

    公开(公告)号:US20130081003A1

    公开(公告)日:2013-03-28

    申请号:US13411771

    申请日:2012-03-05

    IPC分类号: G06F9/44

    摘要: Performing data flow analysis of a computer software application, including, for a data flow analysis type, identifying within a computer software application code base a plurality of seeds relating to the data flow analysis type, for each of the plurality of seeds, defining a portion of the computer software application code base to a predefined depth of calls backward from the seed and to a predefined depth of calls forward from the seed, thereby resulting in a plurality of bounded portions of the computer software application code base, detecting a change in the computer software application code base, and performing, on any of the bounded portions affected by the change, a data flow analysis relating to the data flow analysis type.

    摘要翻译: 执行计算机软件应用的数据流分析,包括对于数据流分析类型,在计算机软件应用程序代码库内识别与数据流分析类型相关的多个种子,为多个种子中的每一个定义一部分 的计算机软件应用程序代码库的预定深度从种子返回到预定义的深度,并且从种子转发到预定义的呼叫深度,从而导致计算机软件应用程序代码库的多个有界部分, 计算机软件应用程序代码库,并在受变更影响的任何有界部分执行与数据流分析类型相关的数据流分析。

    DETECTING SECURITY VULNERABILITIES IN WEB APPLICATIONS

    公开(公告)号:US20130007886A1

    公开(公告)日:2013-01-03

    申请号:US13174628

    申请日:2011-06-30

    IPC分类号: G06F21/00

    CPC分类号: G06F21/577 H04L63/1433

    摘要: Method to detect security vulnerabilities includes: interacting with a web application during its execution to identify a web page exposed by the web application; statically analyzing the web page to identify a parameter within the web page that is constrained by a client-side validation measure and that is to be sent to the web application; determining a server-side validation measure to be applied to the parameter in view of the constraint placed upon the parameter by the client-side validation measure; statically analyzing the web application to identify a location within the web application where the parameter is input into the web application; determining whether the parameter is constrained by the server-side validation measure prior to the parameter being used in a security-sensitive operation; and identifying the parameter as a security vulnerability.

    STRING ANALYSIS BASED ON THREE-VALUED LOGIC
    65.
    发明申请
    STRING ANALYSIS BASED ON THREE-VALUED LOGIC 有权
    基于三值逻辑的STRING分析

    公开(公告)号:US20120317143A1

    公开(公告)日:2012-12-13

    申请号:US13154986

    申请日:2011-06-07

    IPC分类号: G06F17/30

    CPC分类号: G06F11/3608 G06F2201/81

    摘要: Performing string analysis based on three-valued logic by including expressing a property of a string in a computer software application as a three-valued logic shape predicate, performing a three-valued logic shape analysis using the shape predicate to reach a fixpoint solution, and evaluating the fixpoint solution to determine a three-valued logic value of the property.

    摘要翻译: 通过将计算机软件应用程序中的字符串的属性表示为三值逻辑形状谓词来执行基于三值逻辑的字符串分析,使用形状谓词执行三值逻辑形状分析以达到固定点解决方案,以及 评估fixpoint解决方案以确定属性的三值逻辑值。

    Static Analysis Of Validator Routines
    66.
    发明申请
    Static Analysis Of Validator Routines 失效
    验证程序的静态分析

    公开(公告)号:US20120297372A1

    公开(公告)日:2012-11-22

    申请号:US13109170

    申请日:2011-05-17

    IPC分类号: G06F9/44

    摘要: A method includes accessing a validator routine having an input string and one or more return points, each return point returning a return value having two possible values; finding the return points in the validator routine; for each of the return points, performing a backwards traversal from a return point through a code section and determining constraints on the input string based at least on one or both of the two possible return values for the return point; using the determined constraints for the input string, determining whether all of the return values returned from the one or more return points meet validation constraints; and outputting one or more indications of whether all of the returned values returned from the return points meet the validation constraints for the one or both of the two possible return values. Apparatus and computer program products are also disclosed.

    摘要翻译: 一种方法包括访问具有输入字符串和一个或多个返回点的验证器程序,每个返回点返回具有两个可能值的返回值; 找到验证程序的返回点; 对于每个返回点,通过代码部分从返回点执行向后遍历,并且基于返回点的两个可能返回值中的至少一个或两个来确定对输入字符串的约束; 使用确定的输入字符串的约束,确定从一个或多个返回点返回的所有返回值是否满足验证约束; 并且输出一个或多个指示是否从返回点返回的所有返回值是否满足两个可能返回值中的一个或两个的验证约束。 还公开了装置和计算机程序产品。

    Automatic Inference Of Whitelist-Based Validation As Part Of Static Analysis For Security
    67.
    发明申请
    Automatic Inference Of Whitelist-Based Validation As Part Of Static Analysis For Security 失效
    基于白名单的验证的自动推理作为安全性静态分析的一部分

    公开(公告)号:US20120266247A1

    公开(公告)日:2012-10-18

    申请号:US13088711

    申请日:2011-04-18

    IPC分类号: G06F21/00

    摘要: A method includes performing taint analysis of a computer program and determining an original set of paths from sources to sinks. Each path corresponds to a vulnerability. The method includes determining for each variable whose type is a collection and is accessed in one of the paths in the original set of paths whether the variable points to a concrete value whose internal state is not tainted according to the taint analysis. The method further includes, for each of the variables whose type is a collection found not to be tainted according to the taint analysis, determining all points in the computer program where a membership check against the collection is performed. The method also includes, for each of the points, determining corresponding paths and removing those paths from the original set of paths to create a reduced set of paths. Apparatus and computer readable program products are also disclosed.

    摘要翻译: 一种方法包括执行计算机程序的污点分析和确定从源到汇的原始路径集合。 每个路径对应于一个漏洞。 该方法包括为类型是集合的每个变量确定,并且在原始路径集合中的一个路径中访问,无论变量是否根据污点分析指向其内部状态不被污染的具体值。 该方法还包括对于根据污点分析发现其不被污染的类型的每个变量,确定计算机程序中针对集合进行成员资格检查的所有点。 该方法还包括对于每个点,确定相应的路径并且从原始路径集合去除那些路径以创建减少的路径集合。 还公开了装置和计算机可读程序产品。

    WEB CRAWLING USING STATIC ANALYSIS
    68.
    发明申请
    WEB CRAWLING USING STATIC ANALYSIS 审中-公开
    使用静态分析的WEB抓取

    公开(公告)号:US20120215757A1

    公开(公告)日:2012-08-23

    申请号:US13032638

    申请日:2011-02-22

    IPC分类号: G06F17/30

    CPC分类号: G06F16/951

    摘要: A crawler including a document retriever configured to retrieve a first computer-based document, a link identifier configured to identify an actual string within the computer-based document as being a hyperlink-type string, and a static analyzer configured to perform static analysis of an operation on a variable within the first computer-based document to identify a possible string value of the variable as being a hyperlink-type string, where any of the strings indicate a location of at least a second computer-based document.

    摘要翻译: 包括被配置为检索第一基于计算机的文档的文档检索器的爬行器,被配置为将所述基于计算机的文档内的实际字符串标识为超链接字符串的链接标识符和被配置为执行静态分析的静态分析器 操作第一基于计算机的文档中的变量,以将变量的可能字符串值标识为超链接类型的字符串,其中任何字符串指示至少第二基于计算机的文档的位置。

    Answering Security Queries Statically Based On Dynamically-Determined Information
    69.
    发明申请
    Answering Security Queries Statically Based On Dynamically-Determined Information 失效
    基于动态确定的信息静态回答安全查询

    公开(公告)号:US20120144491A1

    公开(公告)日:2012-06-07

    申请号:US12957529

    申请日:2010-12-01

    IPC分类号: G06F21/00 G06F9/44

    CPC分类号: G06F21/57 G06F2221/033

    摘要: A method includes analyzing execution of a software program, the software program having sources returning values, sinks that perform security-sensitive operations on those returned values or modified versions of the returned values, and flows of the returned values to the sinks, the analyzing determining a first set of methods having access to a value returned from a selected one of the sources. A static analysis is performed on the software program, the static analysis using the first set of methods to determine a second set of methods having calling relationships with the selected source, the static analysis determining whether the returned value from the selected source can flow through a flow to a sink that performs a security-sensitive operation without the flow to the sink being endorsed, and in response, indicating a security violation. Apparatus and computer program products are also disclosed.

    摘要翻译: 一种方法包括分析软件程序的执行,具有源返回值的软件程序,对那些返回值执行安全敏感操作的汇集或返回值的修改版本以及返回值的流到汇的分析确定 第一组方法可以访问从选定的一个源返回的值。 对软件程序执行静态分析,静态分析使用第一组方法来确定具有与选择的源的调用关系的第二组方法,静态分析确定来自所选源的返回值是否可以流过 流到进行安全敏感操作的接收器,而不通过接收器的流程被认可,并且作为响应,指示安全性冲突。 还公开了装置和计算机程序产品。

    Determining whether method of computer program is a validator
    70.
    发明申请
    Determining whether method of computer program is a validator 失效
    确定计算机程序的方法是否为验证程序

    公开(公告)号:US20120131669A1

    公开(公告)日:2012-05-24

    申请号:US12950432

    申请日:2010-11-19

    IPC分类号: G06F21/00

    CPC分类号: G06F21/50 G06F21/563

    摘要: An illegal pattern and a computer program having a method are received. The method has one or more return statements, and a number of basic blocks. The method is normalized so that each return statement of the target method relating to the illegal pattern returns a constant Boolean value. A first path condition and a second path condition for one or more corresponding paths is determined such that one or more corresponding basic blocks return a constant Boolean value of true for the first path condition and a constant Boolean value of false for the second path condition. An unsatisfiability of each path condition is determined using a monadic second-order logic (M2L) technique. Where the unsatisfiability of either path condition is false, the method is reported as not being a validator. Where the unsatisfiability of either path condition is true, the method is reported as being a validator.

    摘要翻译: 接收到具有方法的非法模式和计算机程序。 该方法具有一个或多个返回语句和一些基本块。 该方法被归一化,使得与非法模式相关的目标方法的每个返回语句返回一个常量布尔值。 确定用于一个或多个对应路径的第一路径条件和第二路径条件,使得一个或多个对应的基本块返回针对第一路径条件的常数布尔值为true,对于第二路径条件返回常量布尔值为假。 使用一元二阶逻辑(M2L)技术确定每个路径条件的不满足性。 如果任一路径条件的不满足性为假,则将该方法报告为不是验证器。 如果任一路径条件的不满足性为真,则将该方法报告为验证器。