Security Testing Using Semantic Modeling
7 Assignments
0 Petitions
Accused Products
Abstract
Optimized testing of vulnerabilities in an application implemented by a method includes generating a first probe directed to determine whether an application is vulnerable to a first type of attack; analyzing one or more responses from the application based on the application responding to the first probe; in response to determining that the one or more responses from the application validate a first hypothesis about one or more vulnerabilities associated with the application, and generating at least a second probe to further verify the first hypothesis. The second probe focuses on discovering additional details about the application'"'"'s vulnerabilities to the first type of attack or a second type of attack.
15 Citations
16 Claims
-
1-10. -10. (canceled)
-
11. A system for optimized testing of vulnerabilities in an application, the system comprising:
-
a logic unit for generating a first probe directed to determine whether an application is vulnerable to a first type of attack; a logic unit for analyzing one or more responses from the application based on the application responding to the first probe; and a logic unit that in response to determining that the one or more responses from the application validate a first hypothesis about one or more vulnerabilities associated with the application, generates at least a second probe to further verify the first hypothesis, wherein the second probe focuses on discovering additional details about the application'"'"'s vulnerabilities to the first type of attack or a second type of attack. - View Dependent Claims (12, 13, 14, 15)
-
-
16-20. -20. (canceled)
Specification