Apparatus and method for testing secure software
First Claim
Patent Images
1. A computer readable medium including executable instructions to analyze program instructions for security vulnerabilities, comprising executable instructions to:
- identify potential security vulnerabilities within program instructions based upon input from an attack database and information derived during a static analysis of said program instructions;
apply vulnerability tests to said program instructions in view of said security vulnerabilities;
analyze performance results from said vulnerability tests; and
report said performance results.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer readable medium includes executable instructions to analyze program instructions for security vulnerabilities. Executable instructions identify potential security vulnerabilities within program instructions based upon input from an attack database and information derived during a static analysis of the program instructions. Vulnerability tests are applied to the program instructions in view of the security vulnerabilities. Performance results from the vulnerability tests are analyzed. The performance results are then reported.
-
Citations
18 Claims
-
1. A computer readable medium including executable instructions to analyze program instructions for security vulnerabilities, comprising executable instructions to:
-
identify potential security vulnerabilities within program instructions based upon input from an attack database and information derived during a static analysis of said program instructions;
apply vulnerability tests to said program instructions in view of said security vulnerabilities;
analyze performance results from said vulnerability tests; and
report said performance results. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method of analyzing program instructions for security vulnerabilities, comprising:
-
identifying potential security vulnerabilities within program instructions based upon input from an attack database and information derived during a static analysis of said program instructions;
applying vulnerability tests to said program instructions in view of said security vulnerabilities;
analyzing performance results from said vulnerability tests; and
reporting said performance results. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
Specification