SYSTEM, METHOD AND APPARATUS TO VISUALLY CONFIGURE AN ANALYSIS OF A PROGRAM
First Claim
1. A method, comprising:
- extracting views from an application program, where at least some extracted views comprise at least one view component;
presenting the extracted views to a user;
in response to the user selecting a view component in a presented extracted view, presenting a form to the user having a plurality of vulnerability types indicated for the selected view component and, for each vulnerability type, providing an ability for the user to set an indicator in the form to indicate whether the view component is at least one of a source or a sink;
saving the form containing the user'"'"'s input in conjunction with a user-provided label for the selected view component and a unique identification of the selected view component; and
deriving an analysis policy configuration from the saved form that is formatted for use by a program security analyzer.
1 Assignment
0 Petitions
Accused Products
Abstract
A method extracts views from an application program, where at least some extracted views include at least one view component, and presenting the extracted views to a user. In response to the user selecting a view component in a presented extracted view, the method presents a form to the user having a plurality of vulnerability types indicated for the selected view component and, for each vulnerability type, provides an ability for the user to set an indicator in the form as to indicate whether the view component is at least one of a source or a sink. The method further includes saving the form containing the user'"'"'s input in conjunction with a user-provided label for the selected view component and a unique identification of the selected view component, and deriving an analysis policy configuration from the saved form that is formatted for use by a program security analyzer.
15 Citations
20 Claims
-
1. A method, comprising:
-
extracting views from an application program, where at least some extracted views comprise at least one view component; presenting the extracted views to a user; in response to the user selecting a view component in a presented extracted view, presenting a form to the user having a plurality of vulnerability types indicated for the selected view component and, for each vulnerability type, providing an ability for the user to set an indicator in the form to indicate whether the view component is at least one of a source or a sink; saving the form containing the user'"'"'s input in conjunction with a user-provided label for the selected view component and a unique identification of the selected view component; and deriving an analysis policy configuration from the saved form that is formatted for use by a program security analyzer. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system, comprised of at least one data processor connected with at least one memory that stores software instructions, where execution of the software instructions by the at least one data processor causes the system to:
-
extract views from an application program, where at least some extracted views comprise at least one view component; present the extracted views to a user; in response to the user selecting a view component in a presented extracted view, present a form to the user having a plurality of vulnerability types indicated for the selected view component and, for each vulnerability type, provide an ability for the user to set an indicator in the form as to whether the view component is at least one of a source or a sink; save the form containing the user'"'"'s input in conjunction with a user-provided label for the selected view component and a unique identification of the selected view component; and derive an analysis policy configuration from the saved form that is formatted for use by a program security analyzer. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A computer program product comprised of software instructions on a computer-readable medium, where execution of the software instructions using a computer results in performing operations comprising:
-
extracting views from an application program, where at least some extracted views comprise at least one view component; presenting the extracted views to a user; in response to the user selecting a view component in a presented extracted view, presenting a form to the user having a plurality of vulnerability types indicated for the selected view component and, for each vulnerability type, providing an ability for the user to set an indicator in the form to indicate whether the view component is at least one of a source or a sink; saving the form containing the user'"'"'s input in conjunction with a user-provided label for the selected view component and a unique identification of the selected view component; and deriving an analysis policy configuration from the saved form that is formatted for use by a program security analyzer. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification