×

Security scan based on dynamic taint

  • US 9,558,355 B2
  • Filed: 08/29/2012
  • Issued: 01/31/2017
  • Est. Priority Date: 08/29/2012
  • Status: Active Grant
First Claim
Patent Images

1. A computing system comprising:

  • an application security scanner including at least one hardware processor and a machine-readable storage medium storing instructions that, when executed by the at least one hardware processor, cause the at least one hardware processor to;

    cause a dynamic taint module associated with the application security scanner to initiate a crawl phase of a security test for an application under test to execute at a server separate from the scanner,wherein the dynamic taint module is executed at the server,wherein the dynamic taint module is to;

    intercept program execution of the application under test during the crawl phase to determine a plurality of security vulnerability candidates, wherein the dynamic taint module is to mark a plurality of untrusted user inputs as taint sources and trace the respective untrusted user inputs to determine whether the respective untrusted user input lead to a function call associated with vulnerability;

    wherein the security test includes the crawl phase and an attack;

    perform a dynamic taint analysis by the dynamic taint module as part of the crawl phase of the security test;

    receive a report including the security vulnerability candidates from the dynamic taint module;

    cause restriction of the dynamic taint module; and

    generate a scanning strategy based on the security vulnerability candidates from the report received from the dynamic taint module to use in the attack.

View all claims
  • 8 Assignments
Timeline View
Assignment View
    ×
    ×