会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Method of detecting shared vulnerable code
    • US10116681B2
    • 2018-10-30
    • US15387012
    • 2016-12-21
    • Denim Group, Ltd.
    • Dan CornellSinh Nhat Tran
    • H04L29/06G06Q10/06
    • A method of detecting shared vulnerable code across a plurality of applications to efficiently facilitate remediation of such shared vulnerabilities by the appropriate development teams. The method includes the steps of creating a consolidated vulnerability database populated with vulnerability testing results of a plurality of applications; comparing each vulnerability testing result within the consolidated vulnerability database to match vulnerability locations and the number of data/control flow elements; assigning a confidence to each vulnerability within the consolidated vulnerability database based on vulnerability location matches and data/control flow element matches; assigning a severity to each vulnerability within the consolidated vulnerability database; assigning a criticality to each of the plurality of applications; and creating a database of risk-ranked, confidence-scored vulnerabilities based on the confidence assigned to each vulnerability, the severity of each vulnerability, and the criticality of each application.
    • 6. 发明申请
    • Method of Detecting Shared Vulnerable Code
    • US20180176245A1
    • 2018-06-21
    • US15387012
    • 2016-12-21
    • Denim Group, Ltd.
    • Dan CornellSinh Nhat Tran
    • H04L29/06G06Q10/06
    • H04L63/1433G06Q10/06H04L63/1425
    • A method of detecting shared vulnerable code to efficiently facilitate remediation of such vulnerabilities by the appropriate development teams. The method includes the steps of creating a consolidated vulnerability database populated with vulnerability testing results of a plurality of applications; comparing at least one of the filename, the line number, and the line text associated with each vulnerability within the consolidated vulnerability database to the filename, line number, and line text associated with every other vulnerability within the consolidated vulnerability database and recording any filename, line number, and line text matches as vulnerability location matches; comparing the number of data/control flow elements of each of the plurality of applications to the number of data/control flow elements of every other of the plurality of applications and recording any matches as data/control flow element matches; assigning a confidence to each vulnerability within the consolidated vulnerability database based on vulnerability location matches and data/control flow element matches; assigning a severity to each vulnerability within the consolidated vulnerability database; assigning a criticality to each of the plurality of applications; and creating a database of risk-ranked, confidence-scored vulnerabilities based on the confidence assigned to each vulnerability, the severity of each vulnerability, and the criticality of each application.