×

Static program analysis of a partial software program

  • US 10,558,550 B2
  • Filed: 11/10/2017
  • Issued: 02/11/2020
  • Est. Priority Date: 11/10/2017
  • Status: Active Grant
First Claim
Patent Images

1. A method, comprising:

  • receiving, by a hardware processor, a first software program, wherein the first software program is designed to execute using a second software program, wherein the first software program comprises a first symbolic value indicating a characteristic of the second software program, the first symbolic value indicating a parameter that the first software program requests from the second software program;

    Analyzing, by the hardware processor, the first software program using a static program analysis, wherein the analyzing the first software program using the static program analysis comprises;

    Determining whether a concrete value exists for the parameter that the first software program requests from the second software program; and

    in response to determining that no concrete value exists for the parameter that the first software program requests from the second software program, generating a second symbolic value based on the first symbolic value, the second symbolic value indicating a characteristic of the first software program, wherein the first software program is analyzed independent of an availability of the second software program;

    wherein the static program analysis generates a plurality of threads, each of the plurality of thread corresponding to a conditional branch of the first software program, wherein the plurality of threads are executed separately by the static program analysis;

    determining, by the hardware processor, that the second symbolic value is associated with a predetermined characteristic indicating private data associated with a security policy and determining that an action associated with the second symbolic value resulting from executing the first software program using the second software program would be a violation of the security policy, wherein the action is exporting the second symbolic value from the first software program to an unauthorized entity;

    In response to the determining, generating, by the hardware processor, a warning signal; and

    sending the warning signal to a user interface.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×