System and a method for automatically detecting security vulnerabilities in client-server applications
(57) ABSTRACT A method for automatically detecting security vulnerabilities in a client-
server application where a client is connected to a server. The method is implemented by a …
server application where a client is connected to a server. The method is implemented by a …
Threat level assessment of applications
D Fortier - US Patent 9,158,919, 2015 - Google Patents
BACKGROUND Users of computer systems acquire software applications from a variety of
sources today. Whereas traditionally soft ware was distributed by selling boxed software with …
sources today. Whereas traditionally soft ware was distributed by selling boxed software with …
Automated testing of applications with scripting code
JavaScript 6, 13 plays a central role in modern web appli cations. Although originally
designed for simple Scripting, modern JavaScript programs are complex pieces of Software …
designed for simple Scripting, modern JavaScript programs are complex pieces of Software …
Method, system and product for using a predictive model to predict if inputs reach a vulnerability of a program
F Copty, A Jarrous, S Keidar-Barner… - US Patent 10,387,655, 2019 - Google Patents
A method, apparatus and product for using a predictive model to predict if inputs reach a
vulnerability of a program. Given a sample input, which when provided to a program being …
vulnerability of a program. Given a sample input, which when provided to a program being …
Code instrumentation for runtime application self-protection
S Eshkenazi, M Siman, A Roichman - US Patent 10,120,997, 2018 - Google Patents
A method for runtime self-protection of an application program includes, before running the
application program, identifying input and output points in runtime code (24) of the program …
application program, identifying input and output points in runtime code (24) of the program …
Prioritizing security findings in a SAST tool based on historical security analysis
B Sharma, KA Duer, RM Goldberg, SD Teilhet… - US Patent …, 2017 - Google Patents
A cloud-based static analysis security tool accessible by a set of application development
environments is augmented to provide for anonymous knowledge sharing to facilitate …
environments is augmented to provide for anonymous knowledge sharing to facilitate …
Symbolic execution and test generation for GPU programs
In particular embodiments, a method includes accessing bytecode generated by a compiler
from a software program for execution by a particular processing unit; accessing con …
from a software program for execution by a particular processing unit; accessing con …
Analyzing target software for security vulnerabilities
MJ Schmitt - US Patent 9,892,262, 2018 - Google Patents
A method of analyzing target software for security vulnerabilities comprises, with a
processor, scanning a codebase of a target software using a static analysis scan to identify a …
processor, scanning a codebase of a target software using a static analysis scan to identify a …
Scalable methods for analyzing formalized requirements and localizing errors
P Manolios - US Patent 9,639,450, 2017 - Google Patents
According to some embodiments, a system and method are provided for analyzing formal
system requirements for Software and hardware components in a software and hard ware …
system requirements for Software and hardware components in a software and hard ware …
Threat and defense evasion modeling system and method
FS Artes, S Frei - US Patent 9,665,721, 2017 - Google Patents
BACKGROUND Currently, when trying to assess a computer/network security risk, key
stakeholders and decision makers are forced to work with non evidentiary data, often relying …
stakeholders and decision makers are forced to work with non evidentiary data, often relying …