会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 5. 发明授权
    • Mining dependencies for testing and risk management
    • 挖掘依赖关系进行测试和风险管理
    • US07496904B2
    • 2009-02-24
    • US10608985
    • 2003-06-26
    • Amitabh SrivastavaJayaraman Thiagarajan
    • Amitabh SrivastavaJayaraman Thiagarajan
    • G06F9/44
    • G06F11/368
    • Programs are rarely self-contained in software environments. They depend on other programs or shared subsystems like language run time and operating system libraries for various functionalities. A change in one of the external subsystems may affect the program and one or more other external subsystems.A method or system collects and propagates information about dependency between logical abstractions within a binary file (e.g., basic block, procedure, etc.), dependency between binary files, and dependency between subsystems (e.g., programs, component libraries, system services, etc,) In one example, such dependency information is exposed to a tool (e.g., test tool, software development tool, etc.) via an application programming interface. A tool mines this information to manage testing, determine risks of change, or manage software development. The tool may also be integrated into the method or system.
    • 程序很少在软件环境中自包含。 它们依赖于其他程序或共享子系统,如语言运行时和各种功能的操作系统库。 一个外部子系统的改变可能会影响程序和一个或多个其他外部子系统。 一种方法或系统收集和传播关于二进制文件(例如,基本块,过程等)之间的逻辑抽象,二进制文件之间的依赖性和子系统之间的依赖关系(例如,程序,组件库,系统服务等)之间的依赖关系的信息 ,)在一个示例中,这种依赖性信息通过应用编程接口暴露于工具(例如,测试工具,软件开发工具等)。 一个工具挖掘这些信息来管理测试,确定变更的风险或管理软件开发。 该工具也可以集成到方法或系统中。
    • 7. 发明申请
    • Detection of security vulnerabilities in computer programs
    • 检测计算机程序中的安全漏洞
    • US20070083933A1
    • 2007-04-12
    • US11246391
    • 2005-10-07
    • Ramanathan VenkatapathyJayaraman ThiagarajanDong Wei
    • Ramanathan VenkatapathyJayaraman ThiagarajanDong Wei
    • G06F11/00
    • G06F21/577
    • Methods and systems for analyzing a computer program use static and interprocedural analysis techniques and engines. A data processing operation, such as a function, is automatically identified within the computer program. It is determined whether the function represents a potential source for entry of untrusted data into the computer program. A course of the untrusted data is modeled through the identified function to produce a validation result, such as a call stack. Based on an attribute of the untrusted data (for example, whether the untrusted data is an unbounded integer or a string), it is determined whether the validation result identifies a security vulnerability of the computer program. A security vulnerability may exist, for example, when the modeled course of an unbounded integer through the function produces a buffer overrun in a call stack. The validation result is provided, via an API, software development tool, or user interface, for example.
    • 用于分析计算机程序的方法和系统使用静态和过程间分析技术和引擎。 在计算机程序内自动识别诸如功能的数据处理操作。 确定该功能是否表示用于将不可信数据输入计算机程序的潜在来源。 不可信数据的过程通过识别的功能进行建模,以产生验证结果,例如调用堆栈。 基于不可信数据的属性(例如,不受信任的数据是否是无界整数或字符串),确定验证结果是否识别计算机程序的安全漏洞。 可能存在安全漏洞,例如,当通过该函数的无界整数的建模过程在调用堆栈中产生缓冲区溢出时。 例如,通过API,软件开发工具或用户界面来提供验证结果。
    • 10. 发明授权
    • Detection of security vulnerabilities in computer programs
    • 检测计算机程序中的安全漏洞
    • US07849509B2
    • 2010-12-07
    • US11246391
    • 2005-10-07
    • Ramanathan N VenkatapathyJayaraman ThiagarajanDong Wei
    • Ramanathan N VenkatapathyJayaraman ThiagarajanDong Wei
    • G06F21/22G06F11/00G06F11/36
    • G06F21/577
    • Methods and systems for analyzing a computer program use static and interprocedural analysis techniques and engines. A data processing operation, such as a function, is automatically identified within the computer program. It is determined whether the function represents a potential source for entry of untrusted data into the computer program. A course of the untrusted data is modeled through the identified function to produce a validation result, such as a call stack. Based on an attribute of the untrusted data (for example, whether the untrusted data is an unbounded integer or a string), it is determined whether the validation result identifies a security vulnerability of the computer program. A security vulnerability may exist, for example, when the modeled course of an unbounded integer through the function produces a buffer overrun in a call stack. The validation result is provided, via an API, software development tool, or user interface, for example.
    • 用于分析计算机程序的方法和系统使用静态和过程间分析技术和引擎。 在计算机程序内自动识别诸如功能的数据处理操作。 确定该功能是否表示用于将不可信数据输入计算机程序的潜在来源。 不可信数据的过程通过识别的功能进行建模,以产生验证结果,例如调用堆栈。 基于不可信数据的属性(例如,不受信任的数据是否是无界整数或字符串),确定验证结果是否识别计算机程序的安全漏洞。 可能存在安全漏洞,例如,当通过该函数的无界整数的建模过程在调用堆栈中产生缓冲区溢出时。 例如,通过API,软件开发工具或用户界面来提供验证结果。