Penetration test attack tree generator

    公开(公告)号:US09894090B2

    公开(公告)日:2018-02-13

    申请号:US14799176

    申请日:2015-07-14

    Applicant: SAP SE

    Abstract: Implementations of the present disclosure include methods, systems, and computer-readable storage mediums for receiving goal data and start-up information, the goal data indicating a goal to be achieved during a penetration test, the start-up information indicating initial data for beginning the penetration test, receiving tool data from a register of tools, the tool data including one or more tools that can be used during the penetration test, and, for each tool, input data required to execute the tool and output data provided by the tool, processing the goal data, the start-up information and the tool data to automatically generate attack tree data, the attack tree data including a plurality of data sets and links between data sets, and providing the attack tree data to display a graphical representation of an attack tree on a display.

    PENETRATION TEST ATTACK TREE GENERATOR
    2.
    发明申请
    PENETRATION TEST ATTACK TREE GENERATOR 有权
    渗透测试攻击树发电机

    公开(公告)号:US20170019421A1

    公开(公告)日:2017-01-19

    申请号:US14799176

    申请日:2015-07-14

    Applicant: SAP SE

    Abstract: Implementations of the present disclosure include methods, systems, and computer-readable storage mediums for receiving goal data and start-up information, the goal data indicating a goal to be achieved during a penetration test, the start-up information indicating initial data for beginning the penetration test, receiving tool data from a register of tools, the tool data including one or more tools that can be used during the penetration test, and, for each tool, input data required to execute the tool and output data provided by the tool, processing the goal data, the start-up information and the tool data to automatically generate attack tree data, the attack tree data including a plurality of data sets and links between data sets, and providing the attack tree data to display a graphical representation of an attack tree on a display.

    Abstract translation: 本公开的实现包括用于接收目标数据和启动信息的方法,系统和计算机可读存储介质,目标数据指示在穿透测试期间要实现的目标,启动信息指示初始数据开始 穿透测试,从工具寄存器接收工具数据,工具数据包括在穿透测试期间可以使用的一个或多个工具,以及对于每个工具,执行工具所需的输入数据和由工具提供的输出数据 ,处理目标数据,启动信息和工具数据以自动生成攻击树数据,攻击树数据包括多个数据集和数据集之间的链接,并提供攻击树数据以显示图形表示 在显示器上的攻击树。

    Automated security design for internet of things systems

    公开(公告)号:US10027718B2

    公开(公告)日:2018-07-17

    申请号:US15231488

    申请日:2016-08-08

    Applicant: SAP SE

    Abstract: Embodiments are configured for automating security design in IoT systems. The achievable security level for any given IoT system may be assessed based on the capabilities of each of the entities involved in its data path to generate a set of security policies for the IoT system. The capabilities of each entity involved in the IoT data path can be evaluated together with the capabilities of the communication links between entities. Based on these capabilities and user security preferences, the security policies can be generated to achieve a target level security. Based on this approach, security designs of IoT architectures can be developed through automated information collection.

    AUTOMATED SECURITY DESIGN FOR INTERNET OF THINGS SYSTEMS

    公开(公告)号:US20180041546A1

    公开(公告)日:2018-02-08

    申请号:US15231488

    申请日:2016-08-08

    Applicant: SAP SE

    CPC classification number: H04L63/205 H04L63/105 H04L63/20

    Abstract: Embodiments are configured for automating security design in IoT systems. The achievable security level for any given IoT system may be assessed based on the capabilities of each of the entities involved in its data path to generate a set of security policies for the IoT system. The capabilities of each entity involved in the IoT data path can be evaluated together with the capabilities of the communication links between entities. Based on these capabilities and user security preferences, the security policies can be generated to achieve a target level security. Based on this approach, security designs of IoT architectures can be developed through automated information collection.

Patent Agency Ranking