Please download the dossier by clicking on the dossier button x
×

Vulnerability analysis of software components

  • US 10,691,808 B2
  • Filed: 12/10/2015
  • Issued: 06/23/2020
  • Est. Priority Date: 12/10/2015
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for monitoring security of an application, the method being executed by one or more processors and comprising:

  • receiving, by the one or more processors, the application developed by a first vendor;

    processing, by the one or more processors, the application using an application analysis system that comprises a plurality of analysis sensors, processing comprising;

    identifying a plurality of software components used by the application that were developed by vendors other than the first vendor using a first sensor of the application analysis system to provide first component information, and a second sensor of the application analysis system to provide second component information, the first sensor comprising a binary analysis sensor configured to de-compose and analyze the application to provide the first component information comprising post-compilation information corresponding to a first portion of the plurality of software components that are included in the application after compilation, the second sensor comprising a deployment sensor configured to monitor a test deployment of the application in an execution environment based on runtime dependencies of the application and to provide the second component information comprising deployment information, andproviding a list of third-party software components associated with the application at least partially by performing a correlation of the post-compilation information and the deployment information, the list comprising each of the identified software components and component information comprising origins of the identified software components, version information, and vulnerability information, wherein the correlation eliminates duplication of the identified software components and avoids missing application components that are visible for only one of the first sensor and the second sensor;

    for each software component included in the list, processing, by the one or more processors, the component information to determine a vulnerability of the software component; and

    correcting the vulnerability of the software component by selectively providing a code to a computing device configured to execute the application, in response to determining the vulnerability of the software component.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×