Detection of vulnerabilities in computer systems
First Claim
1. A method for detecting a presence of at least one vulnerability in an application, the method comprising:
- modifying instructions of the application to include at least one sensor that is configurable to generate an event indicator, wherein the event indicator includes at least some data associated with the event;
storing the event indicator with other stored event indicators generated by the at least one sensor during the execution of the application;
analyzing the stored event indicators;
detecting a presence of at least one vulnerability in the application based on the analysis of the stored event indicators; and
reporting the presence of at least one vulnerability.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems, methods, and apparatus, including computer program products, for detecting a presence of at least one vulnerability in an application. The method is provided that includes modifying instructions of the application to include at least one sensor that is configurable to generate an event indicator, wherein the event indicator includes at least some data associated with the event; storing the event indicator with other stored event indicators generated by the at least one sensor during the execution of the application; analyzing the stored event indicators; detecting a presence of at least one vulnerability in the application based on the analysis of the stored event indicators; and reporting the presence of at least one vulnerability.
128 Citations
23 Claims
-
1. A method for detecting a presence of at least one vulnerability in an application, the method comprising:
-
modifying instructions of the application to include at least one sensor that is configurable to generate an event indicator, wherein the event indicator includes at least some data associated with the event; storing the event indicator with other stored event indicators generated by the at least one sensor during the execution of the application; analyzing the stored event indicators; detecting a presence of at least one vulnerability in the application based on the analysis of the stored event indicators; and reporting the presence of at least one vulnerability. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A system for detecting vulnerabilities in an application, the system comprising:
-
an instrumentation module structured and arranged to modify instructions of the application to include at least one sensor that is configurable to generate an event indicator, wherein the event indicator includes at least some data associated with the event; a tracking module structured and arranged to; store the event indicator with the other stored event indicators generated by the at least one sensor during the execution of the application; analyze the stored event indicators, and detect a presence of at least one vulnerability in the application based on the analysis of the stored event indicators; and a reporting module structured and arranged to report the presence of at least one vulnerability. - View Dependent Claims (19, 20)
-
-
21. A computer readable medium including stored executable instructions for detecting a vulnerability in an application executing on at least one processor, the medium comprising instructions for causing the processor to:
-
modify instructions of the application to include at least one sensor that is configurable to generate an event indicator, wherein the event indicator includes at least some data associated with the event; store the event indicator with other stored event indicators generated by the at least one sensor during the execution of the application; analyze the stored event indicators; detect a presence of at least one vulnerability in the application based on the analysis of the stored event indicators; and report the presence of at least one vulnerability. - View Dependent Claims (22, 23)
-
Specification