×

Remediation of security vulnerabilities in computer software

  • US 9,298,926 B2
  • Filed: 09/12/2013
  • Issued: 03/29/2016
  • Est. Priority Date: 10/09/2012
  • Status: Active Grant
First Claim
Patent Images

1. A method for processing a downgrader specification, the method comprising:

  • constructing a set of candidate downgrader placement locations found within a computer software application, wherein each of the candidate downgrader placement locations corresponds to a transition between a different pair of instructions within the computer software application, and wherein each of the transitions participates in any of a plurality of data flows in a set of security-sensitive data flows within the computer software application;

    applying a downgrader specification to the set of candidate downgrader placement locations using a processor, wherein applying the downgrader specification comprises eliminating from the set of candidate downgrader placement locations any of the candidate downgrader placement locations whose elimination is indicated by the downgrader specification; and

    determining that the downgrader specification provides full coverage of the set of security-sensitive data flows within the computer software application if at least one candidate downgrader placement location within each of the security-sensitive data flows is a member of the set of candidate downgrader placement locations.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×