×

Method and system for identification of security vulnerabilities

  • US 9,977,905 B2
  • Filed: 10/06/2015
  • Issued: 05/22/2018
  • Est. Priority Date: 10/06/2015
  • Status: Active Grant
First Claim
Patent Images

1. A system for electronic security, comprising:

  • a processor; and

    a memory communicatively coupled to the processor and including instructions, the instructions, when loaded and executed by the processor, cause the processor to;

    analyze an application file structure of an application and an import table of the application to identify, via the at least one of the application file structure of the application and the import table of the application, one or more uniquely identified application components;

    determine vulnerabilities associated with a given application component of the one or more uniquely identified application components, the vulnerabilities including vulnerabilities of one or more additional components to be accessed by the given application component;

    adjust characterizations of the vulnerabilities associated with the given application component based at least upon contextual information from the system in which the given application component resides, the contextual information including security information;

    take remedial action based at least upon adjusted vulnerability characterizations;

    after the remedial action is taken on the given application component;

    repeat a scan of the given application component;

    determine, based at least on the repeat of the scan of the given application component, that the remedial action corrected at least one of the vulnerabilities associated with the given application component, present before the remedial action is taken on the given application component;

    determine, based at least on the repeat of the scan of the given application component, one or more new vulnerabilities associated with the given application component;

    determine from an interplay of the vulnerabilities of the given application component, that includes the one or more new vulnerabilities, that corrective action is necessary; and

    adjust a network security device to defeat at least one of the one or more new vulnerabilities for the corrective action.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×