Directed execution of dynamic programs in isolated environments
First Claim
Patent Images
1. A system comprising:
- at least one hardware device processor;
a receiver that obtains, via the at least one hardware device processor, a test object that includes dynamic executable code;
a transformer that transforms at least a portion of the test object into a transformed format test object that is configured to execute in a hosted isolated computing environment, the transforming including transforming the at least a portion of the test object into a locally stored document object model (DOM) format that is configured to model at least one computer program included in the test object, the transforming including modifying Universal Resource Identifiers (URIs) to reference only items located locally to the hosted isolated computing environment;
an execution engine that initiates, via the at least one hardware device processor, directed execution of the transformed format test object, in the hosted isolated computing environment; and
a detector that detects dynamic code vulnerabilities of the test object, based on the directed execution.
2 Assignments
0 Petitions
Accused Products
Abstract
A test object that includes at least one computer program that includes dynamic executable code is obtained. The at least one computer program is transformed into a format that is configured to execute in a hosted isolated computing environment. Directed execution of the at least one computer program is initiated, in the hosted isolated computing environment. Dynamic code vulnerabilities of the at least one computer program are detected, based on the directed execution.
-
Citations
20 Claims
-
1. A system comprising:
at least one hardware device processor; a receiver that obtains, via the at least one hardware device processor, a test object that includes dynamic executable code; a transformer that transforms at least a portion of the test object into a transformed format test object that is configured to execute in a hosted isolated computing environment, the transforming including transforming the at least a portion of the test object into a locally stored document object model (DOM) format that is configured to model at least one computer program included in the test object, the transforming including modifying Universal Resource Identifiers (URIs) to reference only items located locally to the hosted isolated computing environment; an execution engine that initiates, via the at least one hardware device processor, directed execution of the transformed format test object, in the hosted isolated computing environment; and a detector that detects dynamic code vulnerabilities of the test object, based on the directed execution. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
15. A non-transitory computer readable medium storing executable code that, when executed by one or more processors, cause the one or more processors to:
-
obtain a test object that includes at least one computer program that includes dynamic executable code; transform the at least one computer program into a locally stored document object model (DOM) format that is configured to execute in a hosted isolated computing environment and that is configured to model the at least one computer program, the transformation the at least one computer program including modifying Universal Resource Identifiers (URIs) to reference only items located locally to the hosted isolated computing environment; initiate directed execution of the at least one computer program in the hosted isolated computing environment; and detect dynamic code vulnerabilities of the at least one computer program, via at least one device processor, based on the directed execution. - View Dependent Claims (16, 17)
-
-
18. A method comprising:
-
obtaining a test object that includes dynamic executable code; transforming, via at least one hardware device processor, at least a portion of the test object into a transformed format test object that is configured to execute in a hosted isolated computing environment, the transforming including transforming the at least a portion of the test object into a locally stored document object model (DOM) format that is configured to model at least one computer program included in the test object, the transforming including modifying Universal Resource Identifiers (URIs) to reference only items located locally to the hosted isolated computing environment; initiating, via the at least one hardware device processor, directed execution of the transformed format test object, in the hosted isolated computing environment; and detecting dynamic code vulnerabilities of the test object, based on the directed execution. - View Dependent Claims (19, 20)
-
Specification