×

Remediation of security vulnerabilities in computer software

  • US 9,589,134 B2
  • Filed: 03/17/2016
  • Issued: 03/07/2017
  • Est. Priority Date: 10/09/2012
  • Status: Active Grant
First Claim
Patent Images

1. A computer hardware system, comprising:

  • a hardware processor configured to initiate the following executable operations;

    constructing, for a computer software application, an initial set of candidate downgrader placement locations;

    identifying, for the computer software application, a set of security-sensitive data flows;

    generating, by reducing the initial set of candidate downgrader placement locations using a downgrader specification, a reduced set of candidate downgrader placement locations; and

    determining, based upon each of the data flows in the security of security-sensitive data flows including at least one candidate downgrader placement location in the reduced set of candidate downgrader placement locations, that the downgrader specification provides full coverage of the set of security-sensitive data flows, whereineach of the candidate downgrader placement locations corresponds to a transition between a different pair of instructions within the computer software application, andeach of the transitions participates in at least one of the data flows in the set of security-sensitive data flows.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×