会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 7. 发明授权
    • Method and system for detecting interprocedural vulnerability by analysis of source code
    • 通过源代码分析检测程序间漏洞的方法和系统
    • US07617489B2
    • 2009-11-10
    • US11522039
    • 2006-09-15
    • John PeytonRobert Gottlieb
    • John PeytonRobert Gottlieb
    • G06F9/44
    • G06F21/577
    • Methods and systems of detecting vulnerabilities in source code using inter-procedural analysis of source code. Vulnerabilities in a pre-existing source code listing are detected. The variables in the source code listing are modeled in the context of at least one of the inherent control flow and inherent data flow. The variable models are used to create models of arguments to routine calls in the source code listing. The source code listing is modeled with a call graph to represent routine call interactions expressed in the source code listing. The arguments to routine calls are modeled to account for inter-procedural effects and dependencies on the arguments as expressed in the source code listing.
    • 使用源代码的程序间分析来检测源代码中的漏洞的方法和系统。 检测到预先存在的源代码列表中的漏洞。 源代码列表中的变量在至少一个固有控制流和固有数据流的上下文中进行建模。 变量模型用于在源代码列表中为常规调用创建参数模型。 源代码列表使用调用图进行建模,以表示在源代码列表中表示的常规调用交互。 常规调用的参数被建模以考虑到程序间的影响,并且依赖于源代码列表中表达的参数。
    • 8. 发明申请
    • Method and system for detecting interprocedural vulnerability by analysis of source code
    • 通过源代码分析检测程序间漏洞的方法和系统
    • US20080072214A1
    • 2008-03-20
    • US11522039
    • 2006-09-15
    • John PeytonRobert Gottlieb
    • John PeytonRobert Gottlieb
    • G06F9/455
    • G06F21/577
    • Methods and systems of detecting vulnerabilities in source code using inter-procedural analysis of source code. Vulnerabilities in a pre-existing source code listing are detected. The variables in the source code listing are modeled in the context of at least one of the inherent control flow and inherent data flow. The variable models are used to create models of arguments to routine calls in the source code listing. The source code listing is modeled with a call graph to represent routine call interactions expressed in the source code listing. The arguments to routine calls are modeled to account for inter-procedural effects and dependencies on the arguments as expressed in the source code listing.
    • 使用源代码的程序间分析来检测源代码中的漏洞的方法和系统。 检测到预先存在的源代码列表中的漏洞。 源代码列表中的变量在至少一个固有控制流和固有数据流的上下文中进行建模。 变量模型用于在源代码列表中为常规调用创建参数模型。 源代码列表使用调用图进行建模,以表示在源代码列表中表示的常规调用交互。 常规调用的参数被建模以考虑到程序间的影响,并且依赖于源代码列表中表达的参数。