×

Hierarchical runtime analysis framework for defining vulnerabilities

  • US 10,380,347 B2
  • Filed: 06/08/2016
  • Issued: 08/13/2019
  • Est. Priority Date: 06/08/2016
  • Status: Active Grant
First Claim
Patent Images

1. A computer program product comprising a non-transitory computer-readable medium containing an executable set of instructions for detecting potential vulnerabilities in a software application in a database system, the set of instructions operable to:

  • receive a hierarchical list of input tags defining a hierarchy of requests received by the software application, wherein at least some of the input tags have hierarchical relationships, wherein the hierarchical list of input tags includes a parent hypertext transfer protocol (HTTP) input tag and child sibling page, header, and universal resource locator (URL) input tags;

    receive a hierarchical list of output tags defining a hierarchy of outputs generated by the software application, wherein at least some of the output tags have hierarchical relationships, wherein the hierarchical list of output tags includes a parent hypertext transfer protocol (HTTP) output tag and child sibling page, header, and universal resource locator (URL) output tags;

    receive defined vulnerabilities wherein the defined vulnerabilities include at least one associated input tag and at least one associated output tag;

    receive a request in the database system from a user system;

    assign an input tag from the hierarchical list of input tags to an object associated with the request, the input tag identifying the request as carrying a security risk and identifying a type of data within object and a particular type of user input, including a URL input;

    assign an output tag from the hierarchical list of output tags to an output method generating a response to the request; and

    identify one of the defined vulnerabilities as a candidate vulnerability when the assigned output tag and output tag associated the defined vulnerability are within a same subtree in the hierarchical list of output tags; and

    identify the candidate vulnerability as a potential vulnerability when the assigned input tag and the input tag associated with the candidate vulnerability are within a same subtree in the hierarchical list of input tags.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×