Computing optimal fix locations for security vulnerabilities in computer-readable code
Implementations of the present disclosure include methods, systems, and computer-
readable storage mediums for deter mining optimal fix locations for security vulnerabilities in …
readable storage mediums for deter mining optimal fix locations for security vulnerabilities in …
Software vulnerabilities detection system and methods
JM Daymont - US Patent 9,454,659, 2016 - Google Patents
This invention teaches a system and methods of detecting software vulnerabilities in a
computer program by analyzing the compiled code and optionally the source code of the …
computer program by analyzing the compiled code and optionally the source code of the …
High performance software vulnerabilities detection system and methods
JM Daymont - US Patent 9,824,214, 2017 - Google Patents
(Continued) Primary Examiner—Eric Chen (74) Attorney, Agent, or Firm—Asif Ghias (57)
ABSTRACT This invention teaches a system and methods of detecting software …
ABSTRACT This invention teaches a system and methods of detecting software …
High performance software vulnerabilities detection system and methods
JM Daymont - US Patent 10,599,852, 2020 - Google Patents
(57) ABSTRACT Related US Application Data This invention teaches a system and methods
of detecting (63) Continuation-in-part of application No. 15/014,309, software vulnerabilities …
of detecting (63) Continuation-in-part of application No. 15/014,309, software vulnerabilities …
Software vulnerabilities detection system and methods
JM Daymont - US Patent 9,715,593, 2017 - Google Patents
This invention discloses a system and methods of detecting Software Vulnerabilities in a
computer program. The inven tion models compiled software to examine both control flow …
computer program. The inven tion models compiled software to examine both control flow …
System, method and non-transitory computer readable medium for embedding behavior collection component into application of mobile device automatically
HC Wang, HW Chen, RS Wang, SC Chou - US Patent 9,774,691, 2017 - Google Patents
(57) ABSTRACT A system for automatically embedding behavior collection components into
a mobile device application; the system includes a user interface module, a recording …
a mobile device application; the system includes a user interface module, a recording …
Rule matching in the presence of languages with no types or as an adjunct to current analyses for security vulnerability analysis
(57) ABSTRACT A method includes reading by a computing system a rule file including one
or more rules having specified paths to methods, each method corresponding to one of a …
or more rules having specified paths to methods, each method corresponding to one of a …
Remediation of security vulnerabilities in computer software
O Tripp - US Patent 11,176,248, 2021 - Google Patents
Processing a downgrader specification by constructing a set of candidate downgrader
placement locations found within a computer software application, where each of the candi …
placement locations found within a computer software application, where each of the candi …
Enhanced string analysis that improves accuracy of static analysis
An apparatus and computer program product which are configured for determining, as part
of a static analysis of a program, links between functions in the program and per forming, as …
of a static analysis of a program, links between functions in the program and per forming, as …
Method and apparatus for securing embedded device firmware
Systems and methods for securing embedded devices via both online and offline defensive
strategies. One or more security software components may be injected into firmware binary …
strategies. One or more security software components may be injected into firmware binary …