-
公开(公告)号:US12299134B1
公开(公告)日:2025-05-13
申请号:US17936993
申请日:2022-09-30
Applicant: Amazon Technologies, Inc.
Inventor: Peixuan Li , Yingjun Lyu , Qiang Zhou , Lee Pike , Michael McDougall , Thodoris Sotiropoulos
Abstract: Security vulnerability analysis may be performed using policy inference. Application code may have operations that are labeled according to the respective functions that they perform. Some operations may be labeled according to a knowledge database of known operations while others may be inferred through similarity to known operations. The knowledge database may be associated with libraries of programmatic interfaces. Once components of the application code are labeled, a vulnerability database may be that identifies potential vulnerabilities based on data sources, data sinks and threat mitigation operations. Using the labeled operations, one or more potential vulnerabilities may be identified based on labeled data sources and data sinks. The application may then be evaluated for potential security threats based on the identified potential vulnerabilities.