Unchanged Object Management
    71.
    发明申请
    Unchanged Object Management 审中-公开
    不变的对象管理

    公开(公告)号:US20120089962A1

    公开(公告)日:2012-04-12

    申请号:US12900643

    申请日:2010-10-08

    IPC分类号: G06F9/44 G06F9/45

    CPC分类号: G06F8/443 G06F8/24

    摘要: A method includes, using a static analysis performed on code, analyzing the code to determine a set of unchanged objects and modifying the code to exercise a singleton-pattern technique for one or more members of the set of unchanged objects. The method also includes outputting the modified code. Apparatus and program products are also disclosed. Another method includes accessing code from a client, and in response to any of the code being source code, compiling the source code into object code until all the code from the client comprises object code. The method further includes, using a static analysis performed on the object code, analyzing the object code to determine a set of unchanged objects and modifying the object code to exercise a singleton-pattern technique for one or more members of the set of unchanged objects. The method additionally includes returning the modified object code to the client.

    摘要翻译: 一种方法包括:使用对代码执行的静态分析,分析代码以确定一组不变的对象,并修改代码以对该组不变对象的一个​​或多个成员进行单例模式技术。 该方法还包括输出修改的代码。 还公开了装置和程序产品。 另一种方法包括从客户端访问代码,并且响应任何代码是源代码,将源代码编译成目标代码,直到来自客户端的所有代码包括目标代码。 该方法还包括:使用对目标代码执行的静态分析,分析目标代码以确定一组未改变的对象并修改目标代码以对该组不变对象的一个​​或多个成员执行单例模式技术。 该方法还包括将修改的对象代码返回给客户机。

    System and method for the automatic verification of privilege-asserting and subject-executed code
    72.
    发明授权
    System and method for the automatic verification of privilege-asserting and subject-executed code 失效
    用于自动验证特权声明和主体执行代码的系统和方法

    公开(公告)号:US08006233B2

    公开(公告)日:2011-08-23

    申请号:US11677259

    申请日:2007-02-21

    IPC分类号: G06F9/44 G06F9/45

    CPC分类号: G06F21/57 G06F8/75

    摘要: The present relates to a method for verifying privileged and subject-executed code within a program, the method further comprising the steps of constructing a static model of a program, identifying checkPermission nodes that are comprised within the invocation graph, and performing a fixed-point iteration, wherein each determined permission set is propagated backwards across the nodes of the static model until a privilege-asserting code node is reached. The method further comprises the steps of associating each node of the invocation graph with a set of Permission allocation sites, analyzing each identified privilege-asserting code node and subject-executing code node to determine the Permission allocation site set that is associated with each privilege-asserting code node and subject-executing code node, and determining the cardinality of a Permission allocation-site set that is associated with each privilege-asserting code node and subject-executing code node.

    摘要翻译: 本发明涉及一种用于验证程序内的特权和主体执行代码的方法,所述方法还包括以下步骤:构建程序的静态模型,识别包含在调用图中的checkPermission节点,并执行定点 迭代,其中每个确定的权限集合经过静态模型的节点向后传播,直到达到特权确定代码节点。 该方法还包括以下步骤:将调用图的每个节点与一组权限分配站点相关联,分析每个已识别的特权代理节点和主体执行代码节点,以确定与每个权限分配站点相关联的权限分配站点集, 断言代码节点和主体执行代码节点,以及确定与每个特权代理节点和主体执行代码节点相关联的权限分配站点集合的基数。

    System, Method and Apparatus for Simultaneous Definition and Enforcement of Access-control and Integrity Policies
    73.
    发明申请
    System, Method and Apparatus for Simultaneous Definition and Enforcement of Access-control and Integrity Policies 失效
    用于同时定义和执行访问控制和完整性政策的系统,方法和装置

    公开(公告)号:US20110126282A1

    公开(公告)日:2011-05-26

    申请号:US12624172

    申请日:2009-11-23

    IPC分类号: G06F21/00 G06F17/30

    摘要: Access-control and information-flow integrity policies are enforced in a computing system by detecting security-sensitive sinks in software code for an application running on the computing system and retrieving an access-control policy from a database accessible to the computing system. The access-control policy maps a set of access permissions within the computing system to each one of a plurality of principals. For each detected security-sensitive sink, all principals that influence that security-sensitive sink are detected and an overall access permission is assigned to each security-sensitive sink by taking the intersection of the access permission sets for all influencing principals of that security-sensitive sink. If this permission set is inadequate, an integrity violation is reported. In addition, permission labels are assigned to each value of variables used in the security-sensitive sinks. Each permission label is a set of permissions.

    摘要翻译: 访问控制和信息流完整性策略在计算系统中通过检测在计算系统上运行的应用的软件代码中的安全敏感的汇和从计算系统可访问的数据库检索访问控制策略来实施。 访问控制策略将计算系统内的一组访问权限映射到多个主体中的每一个。 对于每个检测到的安全敏感接收器,检测到影响该安全敏感信宿的所有主体,并通过对该安全敏感信宿的所有影响主体的访问权限集合的交集来分配每个安全敏感信宿的总访问权限 水槽。 如果此权限集不足,则会报告完整性违规。 此外,权限标签分配给在安全敏感的接收器中使用的变量的每个值。 每个权限标签都是一组权限。

    DETECTING AND LOCALIZING SECURITY VULNERABILITIES IN CLIENT-SERVER APPLICATION
    74.
    发明申请
    DETECTING AND LOCALIZING SECURITY VULNERABILITIES IN CLIENT-SERVER APPLICATION 失效
    检测和本地化客户端服务器应用程序中的安全漏洞

    公开(公告)号:US20110030061A1

    公开(公告)日:2011-02-03

    申请号:US12902423

    申请日:2010-10-12

    IPC分类号: G06F11/36 G06F11/00 G06F9/44

    CPC分类号: G06F11/3604

    摘要: The present invention provides a system, computer program product, and a computer implemented method for analyzing a set of two or more communicating applications. The method includes executing a first application, such as a client application, and executing a second application, such as a server application. The applications are communicating with each other. A correlation is recorded between the applications and an execution characteristic exhibited on execution. An oracle is used to determine an analysis of the first application that has been executed. The execution of the first application causes a change of state in the second application and/or a change control flow in the second application. Code fragment in the first application and/or the second application are prioritized based on an evaluation produced by the oracle, and based on the correlation between the code fragments that have been executed and the execution characteristic exhibited by the code fragments.

    摘要翻译: 本发明提供了一种系统,计算机程序产品和用于分析一组两个或多个通信应用的计算机实现的方法。 该方法包括执行诸如客户端应用的第一应用,以及执行诸如服务器应用的第二应用。 应用程序正在彼此通信。 应用之间记录相关性,执行时执行特性。 使用oracle来确定已执行的第一个应用程序的分析。 第一应用的执行导致第二应用中的状态改变和/或第二应用中的改变控制流。 第一应用程序和/或第二应用程序中的代码片段基于由oracle生成的评估,并且基于已执行的代码片段与代码片段所呈现的执行特性之间的相关性进行优先级排序。

    Importance-Based Call Graph Construction
    75.
    发明申请
    Importance-Based Call Graph Construction 失效
    基于重要性的调用图构造

    公开(公告)号:US20100284527A1

    公开(公告)日:2010-11-11

    申请号:US12437894

    申请日:2009-05-08

    IPC分类号: H04M15/00 G06T11/20

    摘要: A system and method for importance-based call graph construction, including a) analyzing a computer software application to identify a plurality of calls within the computer software application, b) assigning an importance value to any of the calls in accordance with a predefined importance rule, c) selecting any of the calls for inclusion in a call graph in accordance with a predefined inclusion rule, d) representing the call in the call graph, e) adjusting the importance value of any call represented in the call graph in accordance with a predefined importance adjustment rule, and f) iteratively performing any of steps a)-e) until a predefined termination condition is met.

    摘要翻译: 一种用于基于重要性的呼叫图构造的系统和方法,包括:a)分析计算机软件应用程序以识别所述计算机软件应用程序内的多个呼叫,b)根据预定义的重要性规则向任何呼叫分配重要性值 c)根据预定义的包含规则选择任何呼叫包括在呼叫图中,d)表示呼叫图中的呼叫,e)根据呼叫图表调用在呼叫图表中表示的任何呼叫的重要性值, 预定义的重要性调整规则,以及f)迭代地执行步骤a)-e)中的任何一个,直到满足预定的终止条件。

    METHOD AND SYSTEM FOR RUN-TIME DYNAMIC AND INTERACTIVE IDENTIFICATION OF SOFTWARE AUTHORIZATION REQUIREMENTS AND PRIVILEGED CODE LOCATIONS, AND FOR VALIDATION OF OTHER SOFTWARE PROGRAM ANALYSIS RESULTS
    76.
    发明申请
    METHOD AND SYSTEM FOR RUN-TIME DYNAMIC AND INTERACTIVE IDENTIFICATION OF SOFTWARE AUTHORIZATION REQUIREMENTS AND PRIVILEGED CODE LOCATIONS, AND FOR VALIDATION OF OTHER SOFTWARE PROGRAM ANALYSIS RESULTS 审中-公开
    软件授权要求和特殊代码位置的运行时间动态和交互式标识的方法和系统,以及其他软件程序分析结果的验证

    公开(公告)号:US20090007223A1

    公开(公告)日:2009-01-01

    申请号:US12127298

    申请日:2008-05-27

    IPC分类号: G06F21/00

    摘要: A system, method and computer program product for identifying security authorizations and privileged-code requirements; for validating analyses performed using static analyses; for automatically evaluating existing security policies; for detecting problems in code; in a run-time execution environment in which a software program is executing. The method comprises: implementing reflection objects for identifying program points in the executing program where authorization failures have occurred in response to the program's attempted access of resources requiring authorization; displaying instances of identified program points via a user interface, the identified instances being user selectable; for a selected program point, determining authorization and privileged-code requirements for the access restricted resources in real-time; and, enabling a user to select, via the user interface, whether a required authorization should be granted, wherein local system, fine-grained access of resources requiring authorizations is provided.

    摘要翻译: 用于识别安全授权和特权代码要求的系统,方法和计算机程序产品; 用于验证使用静态分析进行的分析; 用于自动评估现有安全策略; 用于检测代码中的问题; 在执行软件程序的运行时执行环境中。 该方法包括:响应于程序尝试访问需要授权的资源,实施用于识别执行程序中的程序点的反射对象,其中发生授权失败; 经由用户界面显示所识别的节目点的实例,所识别的实例是用户可选择的; 对于选定的程序点,实时地确定访问受限资源的授权和特权代码要求; 并且使得用户能够经由用户界面来选择是否应当授予所需的授权,其中本地系统提供需要授权的资源的细粒度访问。

    SYSTEM AND METHOD FOR THE AUTOMATIC IDENTIFICATION OF SUBJECT-EXECUTED CODE AND SUBJECT-GRANTED ACCESS RIGHTS
    77.
    发明申请
    SYSTEM AND METHOD FOR THE AUTOMATIC IDENTIFICATION OF SUBJECT-EXECUTED CODE AND SUBJECT-GRANTED ACCESS RIGHTS 有权
    自动识别主体执行代码和被授权访问权限的系统和方法

    公开(公告)号:US20080201693A1

    公开(公告)日:2008-08-21

    申请号:US11677272

    申请日:2007-02-21

    IPC分类号: G06F21/20

    摘要: The present invention relates to a method for identifying subject-executed code and subject-granted access rights within a program, the method further comprising the steps of: constructing a static model of a program, and determining a set of access rights that are associated with each subject object that is comprised within the program. The method further comprises the steps of annotating the invocation graph with the set of access right data to generate a subject-rights analysis, wherein each node comprised within the invocation graph is mapped to a set of access rights that represent subject-granted access rights under which a method that corresponds to a respective node will be executed, and utilizing the subject-rights analysis to perform a subject-rights analysis of the program.

    摘要翻译: 本发明涉及一种用于识别程序内的主体执行代码和被授权访问权限的方法,所述方法还包括以下步骤:构建程序的静态模型,以及确定与 包含在程序中的每个主题对象。 该方法还包括以下步骤:利用一组访问权限数据注释调用图,以生成主题权限分析,其中包含在调用图中的每个节点被映射到一组访问权限,这些访问权限表示被授权的访问权限, 将执行对应于相应节点的方法,并且利用主体权利分析来执行节目的主题权限分析。

    Static analysis based error reduction for software applications
    78.
    发明申请
    Static analysis based error reduction for software applications 审中-公开
    基于静态分析的软件应用程序的减少误差

    公开(公告)号:US20050015752A1

    公开(公告)日:2005-01-20

    申请号:US10620078

    申请日:2003-07-15

    IPC分类号: G06F9/44 G06F9/45

    CPC分类号: G06F11/3604

    摘要: A system and method for providing “static analysis” of programs to aid in improving runtime performance, stability, security and privacy characteristics of deployed application code. The method includes performing a set of analyses that sifts through the program code and identifies programming security and/or privacy model coding errors. In particular the invention focuses on identifying coding errors that cause loss of correctness, performance degradation, security, privacy and maintainability vulnerabilities. A deep analysis of the program is performed using detailed control and data flow analyses. These deeper analyses provide a much better perspective of the overall application behavior. This deep analysis is in contrast to shallow analyses in current industry tools, which inspect or model a single or a few classes at a time.

    摘要翻译: 提供程序的“静态分析”的系统和方法,以帮助提高部署应用程序代码的运行时性能,稳定性,安全性和隐私特性。 该方法包括执行通过程序代码筛选的一组分析,并识别编程安全性和/或隐私模型编码错误。 特别地,本发明着重于识别导致正确性,性能下降,安全性,隐私和可维护性漏洞损失的编码错误。 使用详细的控制和数据流分析对程序进行深入分析。 这些更深入的分析为整体应用行为提供了更好的视角。 这个深刻的分析与当前行业工具中的浅析分析形成对比,该工具一次检查或建立一个或几个类。

    Static security analysis using a hybrid representation of string values
    79.
    发明授权
    Static security analysis using a hybrid representation of string values 有权
    使用字符串值的混合表示形式的静态安全性分析

    公开(公告)号:US09460282B2

    公开(公告)日:2016-10-04

    申请号:US13611792

    申请日:2012-09-12

    IPC分类号: G06F17/27 G06F21/55 H04L29/06

    摘要: Systems for constructing hybrid string representations include a string parser configured to parse received string information to produce one or more string components, a database configured to store a set of known concretizations, and a processor configured to compare the one or more string components to the set of known concretizations to determine string components that may be represented concretely, to abstract all string components that could not be represented concretely, and to create a hybrid string representation that includes at least one concrete string component and at least one abstracted string component.

    摘要翻译: 用于构建混合字符串表示的系统包括:字符串解析器,被配置为解析接收到的字符串信息以产生一个或多个字符串组件;配置为存储一组已知具体化的数据库;以及处理器,被配置为将一个或多个字符串组件与组 已知的具体化以确定可能具体表示的字符串组件,以抽象出不能具体表示的所有字符串组件,并创建包含至少一个具体字符串组件和至少一个抽象字符串组件的混合字符串表示。

    Method and system for run-time dynamic and interactive identification software authorization requirements and privileged code locations, and for validation of other software program analysis results
    80.
    发明授权
    Method and system for run-time dynamic and interactive identification software authorization requirements and privileged code locations, and for validation of other software program analysis results 有权
    用于运行时动态和交互式识别软件授权要求和特权代码位置的方法和系统,以及其他软件程序分析结果的验证

    公开(公告)号:US09449190B2

    公开(公告)日:2016-09-20

    申请号:US12127298

    申请日:2008-05-27

    IPC分类号: G06F21/00 G06F21/62

    摘要: A system, method and computer program product for identifying security authorizations and privileged-code requirements; for validating analyses performed using static analyses; for automatically evaluating existing security policies; for detecting problems in code; in a run-time execution environment in which a software program is executing. The method comprises: implementing reflection objects for identifying program points in the executing program where authorization failures have occurred in response to the program's attempted access of resources requiring authorization; displaying instances of identified program points via a user interface, the identified instances being user selectable; for a selected program point, determining authorization and privileged-code requirements for the access restricted resources in real-time; and, enabling a user to select, via the user interface, whether a required authorization should be granted, wherein local system, fine-grained access of resources requiring authorizations is provided.

    摘要翻译: 用于识别安全授权和特权代码要求的系统,方法和计算机程序产品; 用于验证使用静态分析进行的分析; 用于自动评估现有安全策略; 用于检测代码中的问题; 在执行软件程序的运行时执行环境中。 该方法包括:响应于程序尝试访问需要授权的资源,实施用于识别执行程序中的程序点的反射对象,其中发生授权失败; 经由用户界面显示所识别的节目点的实例,所识别的实例是用户可选择的; 对于选定的程序点,实时地确定访问受限资源的授权和特权代码要求; 并且使得用户能够经由用户界面来选择是否应当授予所需的授权,其中本地系统提供需要授权的资源的细粒度访问。