×

VULNERABILITY ANALYSIS OF SOFTWARE COMPONENTS

  • US 20170169229A1
  • Filed: 12/10/2015
  • Published: 06/15/2017
  • Est. Priority Date: 12/10/2015
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for monitoring security of an application, the method being executed by one or more processors and comprising:

  • receiving, by the one or more processors, an application developed by a first vendor;

    processing, by the one or more processors, the application, by performing a byte-code analysis of the application, to;

    identify a plurality of software components used by the application that were developed by vendors other than the first vendor, andprovide a list of third-party software components associated with the application, the list including each of the identified software components; and

    for each software component included in the list, determining, by the one or more processors, whether the software component has a vulnerability and, if so, selectively providing code to correct the vulnerability of the software component.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×