Automating trust in software upgrades

    公开(公告)号:US12107896B2

    公开(公告)日:2024-10-01

    申请号:US17560599

    申请日:2021-12-23

    Abstract: A method, computer system, and computer program product are provided for automatically analyzing software packages to identify the degree of differences between compared software packages and to apply security policies. A first software bill of materials for a software package is processed to extract a plurality of components of the software package, wherein the first software bill of materials indicates a first hierarchy of components based on relationships between components. The first hierarchy is compared to a second hierarchy, the second hierarchy corresponding to a second software bill of materials, to determine a degree of difference between the first hierarchy and the second hierarchy. The degree of difference is compared to one or more threshold values. A security policy is applied with respect to the software package according to a comparison of the degree of difference to the one or more threshold values.

    AUTOMATIC GENERATION OF MALWARE DETECTION TRAPS

    公开(公告)号:US20240320339A1

    公开(公告)日:2024-09-26

    申请号:US18735835

    申请日:2024-06-06

    Abstract: A system and method of deployment of malware detection traps by at least one processor may include performing a first interrogation of a first Network Asset (NA) of a specific NA family; determining, based on the interrogation, a value of one or more first NA property data elements of the first NA; obtaining one or more second NA property data elements corresponding to the specific NA family; integrating the one or more first NA property data elements and the one or more second NA property data elements to generate a template data element, corresponding to the specific NA family; producing, from the template data element, a malware detection trap module; and deploying, on one or more computing devices of a computer network, one or more instantiations of the malware detection trap module as decoys of the first NA.

    MANAGING THE LOADING OF SENSITIVE MODULES
    6.
    发明公开

    公开(公告)号:US20240220637A1

    公开(公告)日:2024-07-04

    申请号:US18608098

    申请日:2024-03-18

    Applicant: Open Text Inc.

    CPC classification number: G06F21/577 G06F21/51 G06F21/552 G06F21/604

    Abstract: The present disclosure relates to systems and methods for identifying highly sensitive modules and taking a remediation or preventative action if such modules are accessed by malicious software. For example, the likelihood that a module is used for an exploit, and is thus sensitive, is categorized as high, medium, or low. The likelihood that a module can be used for an exploit can dictate whether, and to what degree, an application accessing the module is “suspicious.” However, in some instances, a sensitive module may have legitimate reasons to load when used in certain non-malicious ways. The system may also consider a trust level when determining what actions to take, such that an application and/or user having a higher trust level may be less suspicious when accessing a sensitive module as compared to an application or user having a lower trust level.

    Techniques for securing network environments by identifying device attributes based on string field conventions

    公开(公告)号:US12026248B2

    公开(公告)日:2024-07-02

    申请号:US17344294

    申请日:2021-06-10

    CPC classification number: G06F21/51 G06F21/552 G06F2221/2141

    Abstract: A system and method for identifying device attributes based on string field conventions. A method includes applying at least one machine learning model to an application data set extracted based on a string indicated in a field of device data corresponding to a device, wherein each of the at least one machine learning model is trained based on a training data set including a plurality of second strings and a plurality of device attribute labels, wherein each device attribute label corresponds to a respective second string of the plurality of second strings, wherein each of the at least one machine learning model is configured to output a predicted device attribute for the device based on the first string; and identifying, based on the output of the at least one machine learning model, a device attribute of the device.

Patent Agency Ranking