×

Runtime analysis of software security vulnerabilities

  • US 10,387,658 B2
  • Filed: 10/11/2018
  • Issued: 08/20/2019
  • Est. Priority Date: 06/08/2016
  • Status: Active Grant
First Claim
Patent Images

1. A computer program product comprising a program stored on a non-transitory computer-readable medium containing an executable set of instructions for detecting a vulnerability in a software application in a database system, the set of instructions operable to:

  • store defined vulnerabilities that identify operations in the software application vulnerable to the security risk and are each associated with one or more input tags and one or more sanitization tags;

    receive by the software application in the database system a request from a user system;

    at runtime of the application, assign one or more of the input tags to one or more objects associated with the request, wherein the input tags identify the request as potentially malicious and carrying a security risk;

    at runtime of the application, assign one or more of the sanitization tags to the one or more objects associated with the request to indicate security checks performed on the objects;

    at runtime of the application, identify output responses to the request that include the one or more objects, and compare the input tags assigned to the one or more objects with any of the sanitization tags assigned to the objects;

    responsive to the input tags for the one or more objects not having corresponding assigned ones of the sanitization tags, reporting the software application as vulnerable to the security risk.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×