Computing optimal fix locations for security vulnerabilities in computer-readable code

AD Brucker, H Petritsch - US Patent 10,318,739, 2019 - Google Patents
Implementations of the present disclosure include methods, systems, and computer-
readable storage mediums for deter mining optimal fix locations for security vulnerabilities in …

Software vulnerabilities detection system and methods

JM Daymont - US Patent 9,454,659, 2016 - Google Patents
This invention teaches a system and methods of detecting software vulnerabilities in a
computer program by analyzing the compiled code and optionally the source code of the …

High performance software vulnerabilities detection system and methods

JM Daymont - US Patent 9,824,214, 2017 - Google Patents
(Continued) Primary Examiner—Eric Chen (74) Attorney, Agent, or Firm—Asif Ghias (57)
ABSTRACT This invention teaches a system and methods of detecting software …

High performance software vulnerabilities detection system and methods

JM Daymont - US Patent 10,599,852, 2020 - Google Patents
(57) ABSTRACT Related US Application Data This invention teaches a system and methods
of detecting (63) Continuation-in-part of application No. 15/014,309, software vulnerabilities …

Software vulnerabilities detection system and methods

JM Daymont - US Patent 9,715,593, 2017 - Google Patents
This invention discloses a system and methods of detecting Software Vulnerabilities in a
computer program. The inven tion models compiled software to examine both control flow …

System, method and non-transitory computer readable medium for embedding behavior collection component into application of mobile device automatically

HC Wang, HW Chen, RS Wang, SC Chou - US Patent 9,774,691, 2017 - Google Patents
(57) ABSTRACT A system for automatically embedding behavior collection components into
a mobile device application; the system includes a user interface module, a recording …

Rule matching in the presence of languages with no types or as an adjunct to current analyses for security vulnerability analysis

SA Guarnieri, M Pistoia, SD Teilhet, O Tripp - US Patent 10,055,590, 2018 - Google Patents
(57) ABSTRACT A method includes reading by a computing system a rule file including one
or more rules having specified paths to methods, each method corresponding to one of a …

Remediation of security vulnerabilities in computer software

O Tripp - US Patent 11,176,248, 2021 - Google Patents
Processing a downgrader specification by constructing a set of candidate downgrader
placement locations found within a computer software application, where each of the candi …

Enhanced string analysis that improves accuracy of static analysis

SA Guarnieri, M Pistoia, T Tateishi, O Tripp - US Patent 10,372,582, 2019 - Google Patents
An apparatus and computer program product which are configured for determining, as part
of a static analysis of a program, links between functions in the program and per forming, as …

Method and apparatus for securing embedded device firmware

A Cui, SJ Stolfo - US Patent 11,361,083, 2022 - Google Patents
Systems and methods for securing embedded devices via both online and offline defensive
strategies. One or more security software components may be injected into firmware binary …