会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 111. 发明申请
    • IDENTIFICATION OF READ/WRITE CHAINS DURING STATIC ANALYSIS OF COMPUTER SOFTWARE
    • 计算机软件静态分析期间读/写链的识别
    • US20090300266A1
    • 2009-12-03
    • US12129894
    • 2008-05-30
    • Marco PistoiaTakaaki TateishiOmer TrippOmri Weisman
    • Marco PistoiaTakaaki TateishiOmer TrippOmri Weisman
    • G06F12/00
    • G06F8/433
    • A system for identifying read/write chains in computer software, including a static analysis engine identifying within computer software logical container accesses, a string analyzer configured to at least partly resolve any variables identifying the logical container in any of the accesses by determining a set of potential values of any of the variables, and a Logical Container Access Virtualization component (LCAV) configured to identify the type and scope of any permutations of the accesses, where each of the permutations is defined by substituting any of the potential values for any of the access variables, and identify any read/write chains within the computer software by matching any of the access permutations that read from the logical container with any of the access permutations that write to the logical container if there is an intersection between the scopes of the read and write access permutations.
    • 一种用于识别计算机软件中的读/写链的系统,包括在计算机软件逻辑容器访问内识别的静态分析引擎,串行分析器,其被配置为至少部分地解析任何访问中识别逻辑容器的任何变量, 任何变量的潜在值和逻辑容器访问虚拟化组件(LCAV),其被配置为识别访问的任何排列的类型和范围,其中每个排列通过将任何潜在值替换为任何 访问变量,并通过将从逻辑容器读取的任何访问排列与写入逻辑容器的任何访问排列进行匹配,以识别计算机软件中的任何读/写链,如果读取范围之间存在交集 并写入访问排列。
    • 116. 发明授权
    • Anomaly detection at the level of run time data structures
    • 运行时数据结构水平的异常检测
    • US09009535B2
    • 2015-04-14
    • US13587335
    • 2012-08-16
    • Marco PistoiaOmer Tripp
    • Marco PistoiaOmer Tripp
    • G06F11/00G06F11/07
    • G06F11/0751
    • A useful embodiment of the invention is directed to a method associated with a computer program comprising one or more basic blocks, wherein the program defines and uses multiple data structures, such as the list of all customers of a bank along with their account information. The method includes identifying one or more invariants, wherein each invariant is associated with one of the data structures. The method further includes determining at specified times whether an invariant has been violated. Responsive to detecting a violation of one of the invariants, the detected violation is flagged as an anomaly.
    • 本发明的有用实施例涉及与包括一个或多个基本块的计算机程序相关联的方法,其中该程序定义和使用多个数据结构,诸如银行的所有客户的列表及其帐户信息。 该方法包括识别一个或多个不变量,其中每个不变量与数据结构之一相关联。 该方法还包括在指定时间确定是否违反了不变量。 响应于检测违反其中一个不变量,检测到的违规被标记为异常。
    • 119. 发明授权
    • Generating sound and minimal security reports based on static analysis of a program
    • 基于程序的静态分析生成声音和最小的安全性报告
    • US08850405B2
    • 2014-09-30
    • US13033024
    • 2011-02-23
    • Stephen FinkYinnon A. HavivMarco PistoiaOmer TrippOmri Weisman
    • Stephen FinkYinnon A. HavivMarco PistoiaOmer TrippOmri Weisman
    • G06F9/44
    • G06F8/75G06F8/77
    • A method is disclosed that includes, using a static analysis, analyzing a software program to determine a number of paths from sources accepting information to sinks using that information or a modified version of that information and to determine multiple paths from the number of paths. The determined multiple paths have a same transition from an application portion of the software program to a library portion of the software program and require a same downgrading action to address a vulnerability associated with source-sink pairs in the multiple paths. The analyzing includes determining the multiple paths using a path-sensitive analysis. The method includes, for the determined multiple paths, grouping the determined multiple paths into a single representative indication of the determined multiple paths. The method includes outputting the single representative indication. Computer program products and apparatus are also disclosed.
    • 公开了一种方法,其包括使用静态分析来分析软件程序以使用该信息或该信息的修改版本从接收信息的信源到汇点确定多个路径,并且从路径数确定多条路径。 所确定的多个路径具有从软件程序的应用部分到软件程序的库部分的相同转换,并且需要相同的降级动作来解决与多个路径中的源 - 汇对相关联的漏洞。 分析包括使用路径敏感分析来确定多个路径。 该方法包括对于所确定的多个路径,将所确定的多个路径分组成所确定的多个路径的单个代表性指示。 该方法包括输出单个代表性指示。 还公开了计算机程序产品和装置。
    • 120. 发明授权
    • Eliminating false-positive reports resulting from static analysis of computer software
    • 消除计算机软件的静态分析产生的假阳性报告
    • US08745578B2
    • 2014-06-03
    • US13252229
    • 2011-12-04
    • Marco PistoiaOmer Tripp
    • Marco PistoiaOmer Tripp
    • G06F9/44G06F9/45
    • G06F8/43G06F11/3604
    • A system for eliminating false-positive reports resulting from static analysis of computer software is provided herein. The system includes the following components executed by a processor: a modeler configured to model a computer code into a model that defines sources, sinks, and flows; a static analyzer configured to apply static analysis to the code or the model, to yield reports indicative of at least one issue relating to one or more of the flows; a preconditions generator configured to generate preconditions for eliminating false-positive issues in the reports, based on the model and user-provided input; and a preconditions checker configured to apply the generated preconditions to the reports for eliminating false-positive issues in the reports.
    • 本文提供了一种消除计算机软件静态分析产生的假阳性报告的系统。 该系统包括由处理器执行的以下组件:被配置为将计算机代码建模成定义源,汇和流的模型的建模器; 静态分析器被配置为对代码或模型应用静态分析,以产生指示与一个或多个流相关的至少一个问题的报告; 配置为基于模型和用户提供的输入产生消除报告中的假阳性问题的先决条件的前提条件生成器; 以及一个前提条件检查器,用于将生成的前提条件应用到报告中,以消除报告中的假阳性问题。