System and a method for automatically detecting security vulnerabilities in client-server applications

P Bisht, T Hinrichs, VN Venkatakrishnan - US Patent 9,118,713, 2015 - Google Patents
(57) ABSTRACT A method for automatically detecting security vulnerabilities in a client-
server application where a client is connected to a server. The method is implemented by a …

Threat level assessment of applications

D Fortier - US Patent 9,158,919, 2015 - Google Patents
BACKGROUND Users of computer systems acquire software applications from a variety of
sources today. Whereas traditionally soft ware was distributed by selling boxed software with …

Automated testing of applications with scripting code

S Artzi, J Dolby, SA Guarnieri, SH Jensen… - US Patent …, 2015 - Google Patents
JavaScript 6, 13 plays a central role in modern web appli cations. Although originally
designed for simple Scripting, modern JavaScript programs are complex pieces of Software …

Method, system and product for using a predictive model to predict if inputs reach a vulnerability of a program

F Copty, A Jarrous, S Keidar-Barner… - US Patent 10,387,655, 2019 - Google Patents
A method, apparatus and product for using a predictive model to predict if inputs reach a
vulnerability of a program. Given a sample input, which when provided to a program being …

Code instrumentation for runtime application self-protection

S Eshkenazi, M Siman, A Roichman - US Patent 10,120,997, 2018 - Google Patents
A method for runtime self-protection of an application program includes, before running the
application program, identifying input and output points in runtime code (24) of the program …

Prioritizing security findings in a SAST tool based on historical security analysis

B Sharma, KA Duer, RM Goldberg, SD Teilhet… - US Patent …, 2017 - Google Patents
A cloud-based static analysis security tool accessible by a set of application development
environments is augmented to provide for anonymous knowledge sharing to facilitate …

Symbolic execution and test generation for GPU programs

G Li, SP Rajan, I Ghosh - US Patent 8,595,701, 2013 - Google Patents
In particular embodiments, a method includes accessing bytecode generated by a compiler
from a software program for execution by a particular processing unit; accessing con …

Analyzing target software for security vulnerabilities

MJ Schmitt - US Patent 9,892,262, 2018 - Google Patents
A method of analyzing target software for security vulnerabilities comprises, with a
processor, scanning a codebase of a target software using a static analysis scan to identify a …

Scalable methods for analyzing formalized requirements and localizing errors

P Manolios - US Patent 9,639,450, 2017 - Google Patents
According to some embodiments, a system and method are provided for analyzing formal
system requirements for Software and hardware components in a software and hard ware …

Threat and defense evasion modeling system and method

FS Artes, S Frei - US Patent 9,665,721, 2017 - Google Patents
BACKGROUND Currently, when trying to assess a computer/network security risk, key
stakeholders and decision makers are forced to work with non evidentiary data, often relying …