Please download the dossier by clicking on the dossier button x
×

SYSTEMS AND METHODS FOR AUTOMATED DETECTION OF APPLICATION VULNERABILITIES

  • US 20150242636A1
  • Filed: 02/24/2015
  • Published: 08/27/2015
  • Est. Priority Date: 02/25/2014
  • Status: Active Grant
First Claim
Patent Images

1. A non-transitory computer-readable medium embodying at least one program executable in a computing device, comprising:

  • code that obtains a plurality of mobile applications from a source entity;

    code that identifies an entry point corresponding to a potential vulnerability in the mobile applications;

    code that generates a simulated user input for an element of a user interface associated with the entry point based at least in part on an input type associated with the element of the user interface;

    code that installs and initiates execution of each of the mobile applications in a plurality of emulated mobile computing devices;

    code that provides the simulated user input to each of the mobile applications in response to determining that a state of each of the mobile applications corresponds to the entry point; and

    code that determines that a communication interception obtained from a proxy corresponds to one of the mobile applications in response to obtaining the communication interception from the proxy.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×