APPLICATION SECURITY TESTING
First Claim
Patent Images
1. A processor-readable medium storing code representing instructions that when executed at a processor cause the processor to:
- access an attack description;
access a data set from an application, the data set based on an attack data set;
correlate the data set with the attack description; and
report a security vulnerability for the application if the data set satisfies the attack description.
8 Assignments
0 Petitions
Accused Products
Abstract
In one implementation, an application security system accesses an attack description and a data set from an application. The data set based on an attack data set. The application security system correlates the data set with the attack description, and reports a security vulnerability for the application if the data set satisfies the attack description.
-
Citations
20 Claims
-
1. A processor-readable medium storing code representing instructions that when executed at a processor cause the processor to:
-
access an attack description; access a data set from an application, the data set based on an attack data set; correlate the data set with the attack description; and report a security vulnerability for the application if the data set satisfies the attack description. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for application security testing, comprising;
-
a communications module to receive an attack description; an intercept module to access a data set at an application, the data set based on an attack data set; and a correlation module to determine whether the data set satisfies the attack description. - View Dependent Claims (13, 14, 15)
-
-
12. The system of 11, further comprising:
a report module to report a security vulnerability for the application if the data set satisfies the attack description.
-
16. A processor-readable medium storing code representing instructions that when executed at a processor cause the processor to:
-
provide an attack data set to an application via a communications channel; and provide an attack description to an observer via the communications channel. - View Dependent Claims (17, 18, 19, 20)
-
Specification