×

Computer system for distributed discovery of vulnerabilities in applications

  • US 9,350,753 B2
  • Filed: 09/09/2015
  • Issued: 05/24/2016
  • Est. Priority Date: 05/06/2014
  • Status: Active Grant
First Claim
Patent Images

1. A method of computer vulnerability discovery comprising:

  • determining a plurality of researcher computers that are to be provided access to control logic, wherein a researcher computer of the plurality of researcher computers is a computer operated by, or to be operated by, an invited researcher, wherein an invited researcher is a person or organization selected to participate in one or more computer vulnerability research projects directed to researching and/or identifying computer vulnerabilities of one or more target systems comprising one or more network component and/or one or more computer component, wherein the control logic is logically interposed between the researcher computer and the one or more target systems;

    providing the plurality of researcher computers with access credentials for a management computer associated with the control logic to allow access to the control logic by particular ones of the plurality of researcher computers;

    tracking assignment of a particular computer vulnerability research project of the one or more computer vulnerability research projects to the researcher computer or to the invited researcher, wherein the particular computer vulnerability research project relates to a particular target system;

    establishing a communications path between the control logic and the particular target system;

    monitoring, using the control logic, networked data communications between the researcher computer and the particular target system, wherein the networked data communications include communications that are usable to identify a candidate vulnerability of the particular target system;

    determining a candidate vulnerability of the particular target system based on a report received from the invited researcher resulting from the invited researcher'"'"'s use of the researcher computer to interact with the particular target system via the control logic;

    validating the report of the candidate vulnerability of the particular target system, wherein validating comprises attempting duplication of the candidate vulnerability after receiving the report; and

    triggering one or more remediation operations on the particular target system based at least in part upon the report.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×