会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 74. 发明授权
    • Anomaly detection at the level of run time data structures
    • 运行时数据结构水平的异常检测
    • US09009535B2
    • 2015-04-14
    • US13587335
    • 2012-08-16
    • Marco PistoiaOmer Tripp
    • Marco PistoiaOmer Tripp
    • G06F11/00G06F11/07
    • G06F11/0751
    • A useful embodiment of the invention is directed to a method associated with a computer program comprising one or more basic blocks, wherein the program defines and uses multiple data structures, such as the list of all customers of a bank along with their account information. The method includes identifying one or more invariants, wherein each invariant is associated with one of the data structures. The method further includes determining at specified times whether an invariant has been violated. Responsive to detecting a violation of one of the invariants, the detected violation is flagged as an anomaly.
    • 本发明的有用实施例涉及与包括一个或多个基本块的计算机程序相关联的方法,其中该程序定义和使用多个数据结构,诸如银行的所有客户的列表及其帐户信息。 该方法包括识别一个或多个不变量,其中每个不变量与数据结构之一相关联。 该方法还包括在指定时间确定是否违反了不变量。 响应于检测违反其中一个不变量,检测到的违规被标记为异常。
    • 76. 发明授权
    • Generating sound and minimal security reports based on static analysis of a program
    • 基于程序的静态分析生成声音和最小的安全性报告
    • US08850405B2
    • 2014-09-30
    • US13033024
    • 2011-02-23
    • Stephen FinkYinnon A. HavivMarco PistoiaOmer TrippOmri Weisman
    • Stephen FinkYinnon A. HavivMarco PistoiaOmer TrippOmri Weisman
    • G06F9/44
    • G06F8/75G06F8/77
    • A method is disclosed that includes, using a static analysis, analyzing a software program to determine a number of paths from sources accepting information to sinks using that information or a modified version of that information and to determine multiple paths from the number of paths. The determined multiple paths have a same transition from an application portion of the software program to a library portion of the software program and require a same downgrading action to address a vulnerability associated with source-sink pairs in the multiple paths. The analyzing includes determining the multiple paths using a path-sensitive analysis. The method includes, for the determined multiple paths, grouping the determined multiple paths into a single representative indication of the determined multiple paths. The method includes outputting the single representative indication. Computer program products and apparatus are also disclosed.
    • 公开了一种方法,其包括使用静态分析来分析软件程序以使用该信息或该信息的修改版本从接收信息的信源到汇点确定多个路径,并且从路径数确定多条路径。 所确定的多个路径具有从软件程序的应用部分到软件程序的库部分的相同转换,并且需要相同的降级动作来解决与多个路径中的源 - 汇对相关联的漏洞。 分析包括使用路径敏感分析来确定多个路径。 该方法包括对于所确定的多个路径,将所确定的多个路径分组成所确定的多个路径的单个代表性指示。 该方法包括输出单个代表性指示。 还公开了计算机程序产品和装置。
    • 77. 发明授权
    • Eliminating false-positive reports resulting from static analysis of computer software
    • 消除计算机软件的静态分析产生的假阳性报告
    • US08745578B2
    • 2014-06-03
    • US13252229
    • 2011-12-04
    • Marco PistoiaOmer Tripp
    • Marco PistoiaOmer Tripp
    • G06F9/44G06F9/45
    • G06F8/43G06F11/3604
    • A system for eliminating false-positive reports resulting from static analysis of computer software is provided herein. The system includes the following components executed by a processor: a modeler configured to model a computer code into a model that defines sources, sinks, and flows; a static analyzer configured to apply static analysis to the code or the model, to yield reports indicative of at least one issue relating to one or more of the flows; a preconditions generator configured to generate preconditions for eliminating false-positive issues in the reports, based on the model and user-provided input; and a preconditions checker configured to apply the generated preconditions to the reports for eliminating false-positive issues in the reports.
    • 本文提供了一种消除计算机软件静态分析产生的假阳性报告的系统。 该系统包括由处理器执行的以下组件:被配置为将计算机代码建模成定义源,汇和流的模型的建模器; 静态分析器被配置为对代码或模型应用静态分析,以产生指示与一个或多个流相关的至少一个问题的报告; 配置为基于模型和用户提供的输入产生消除报告中的假阳性问题的先决条件的前提条件生成器; 以及一个前提条件检查器,用于将生成的前提条件应用到报告中,以消除报告中的假阳性问题。
    • 78. 发明申请
    • ANOMALY DETECTION AT THE LEVEL OF RUN TIME DATA STRUCTURES
    • 在运行时间数据结构的异常检测
    • US20140053028A1
    • 2014-02-20
    • US13587335
    • 2012-08-16
    • Marco PistoiaOmer Tripp
    • Marco PistoiaOmer Tripp
    • G06F11/07
    • G06F11/0751
    • A useful embodiment of the invention is directed to a method associated with a computer program comprising one or more basic blocks, wherein the program defines and uses multiple data structures, such as the list of all customers of a bank along with their account information. The method includes identifying one or more invariants, wherein each invariant is associated with one of the data structures. The method further includes determining at specified times whether an invariant has been violated. Responsive to detecting a violation of one of the invariants, the detected violation is flagged as an anomaly.
    • 本发明的有用实施例涉及与包括一个或多个基本块的计算机程序相关联的方法,其中该程序定义和使用多个数据结构,诸如银行的所有客户的列表及其帐户信息。 该方法包括识别一个或多个不变量,其中每个不变量与数据结构之一相关联。 该方法还包括在指定时间确定是否违反了不变量。 响应于检测违反其中一个不变量,检测到的违规被标记为异常。
    • 80. 发明申请
    • Runtime Enforcement Of Security Checks
    • 运行时执行安全检查
    • US20120174229A1
    • 2012-07-05
    • US12983407
    • 2011-01-03
    • Marco PistoiaOmer TrippMartin Vechev
    • Marco PistoiaOmer TrippMartin Vechev
    • G06F11/00
    • H04L63/1441G06F21/554
    • A method is disclosed that includes tracking untrusted inputs through an executing program into a sink, the tracking including maintaining context of the sink as strings based on the untrusted inputs flow into the sink. The method also includes, while tracking, in response to a string based on an untrusted input being about to flow into the sink and a determination the string could lead to an attack if the string flows into a current context of the sink, endorsing the string using an endorser selected based at least on the current context of the sink, and providing the endorsed string to the sink. Computer program products and apparatus are also disclosed.
    • 公开了一种方法,其包括通过执行程序将不可信任的输入跟踪到宿中,所述跟踪包括基于所述不可信任的输入流入宿来维持宿的上下文作为字符串。 该方法还包括响应于基于不可信输入的字符串的跟踪而被跟踪,并且如果字符串流入接收器的当前上下文,则确定该字符串可能导致攻击,认证字符串 使用至少基于汇的当前上下文选择的支持者,并将批准的字符串提供给汇点。 还公开了计算机程序产品和装置。