×

Detection and healing of vulnerabilities in computer code

  • US 10,248,792 B1
  • Filed: 08/10/2017
  • Issued: 04/02/2019
  • Est. Priority Date: 11/24/2014
  • Status: Active Grant
First Claim
Patent Images

1. A method performed by one or more processing devices, comprising:

  • during compilation of computer code by the one or more processing devices;

    performing a static analysis of the computer code to identify a memory instruction in the computer code that constitutes a potential vulnerability in the computer code, the memory instruction comprising a memory store instruction that is repeatable and that uses contiguous memory during a repetition; and

    inserting a healing template into the computer code at a location that is based on the potential vulnerability, the healing template being generic to a class of vulnerabilities; and

    during execution of the computer code by the one or more processing devices;

    updating the healing template based on an attack that occurred at the potential vulnerability, the healing template for inhibiting one or more subsequent attacks that occur at the potential vulnerability; and

    using the healing template to inhibit the one or more subsequent attacks.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×