Functional language source code vulnerability scanner

A code scanning system has a syntax generation component that receives source code and generates an abstract syntax tree file. The system includes a white list of permitted pure functions, and a black list of prohibited impure functions. In addition, the system includes a static code analyzer for pe...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Harrod, William Knight, Knipmeyer, Kevin, Tijerina, Matthew Joshua, Norton, Joseph W, Kimbrel, Paul David, Schwarz, Michael Gregory
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Harrod, William Knight
Knipmeyer, Kevin
Tijerina, Matthew Joshua
Norton, Joseph W
Kimbrel, Paul David
Schwarz, Michael Gregory
description A code scanning system has a syntax generation component that receives source code and generates an abstract syntax tree file. The system includes a white list of permitted pure functions, and a black list of prohibited impure functions. In addition, the system includes a static code analyzer for performing static analysis of the source code. The static code analyzer includes a function analyzer that receives the AST file and identifies the functions. Each function is compared to the white list, and if it is present, marked as permitted in a static analysis file. If the function is not on the white list, it is compared to the black list. If it is present on the black list, it is marked as prohibited in the static analysis file. If the function is not on the white or black list, it is marked as "unknown" and subjected to manual analysis.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US10628584B1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US10628584B1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US10628584B13</originalsourceid><addsrcrecordid>eNrjZDB1K81LLsnMz0vMUchJzEsvTUxPVSjOLy1KTlVIzk9JVSgrzclLLUpMyszJLKlUKE5OzANyeRhY0xJzilN5oTQ3g6Kba4izh25qQX58anFBYnJqXmpJfGiwoYGZkYWphYmToTExagCpMy3p</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Functional language source code vulnerability scanner</title><source>esp@cenet</source><creator>Harrod, William Knight ; Knipmeyer, Kevin ; Tijerina, Matthew Joshua ; Norton, Joseph W ; Kimbrel, Paul David ; Schwarz, Michael Gregory</creator><creatorcontrib>Harrod, William Knight ; Knipmeyer, Kevin ; Tijerina, Matthew Joshua ; Norton, Joseph W ; Kimbrel, Paul David ; Schwarz, Michael Gregory</creatorcontrib><description>A code scanning system has a syntax generation component that receives source code and generates an abstract syntax tree file. The system includes a white list of permitted pure functions, and a black list of prohibited impure functions. In addition, the system includes a static code analyzer for performing static analysis of the source code. The static code analyzer includes a function analyzer that receives the AST file and identifies the functions. Each function is compared to the white list, and if it is present, marked as permitted in a static analysis file. If the function is not on the white list, it is compared to the black list. If it is present on the black list, it is marked as prohibited in the static analysis file. If the function is not on the white or black list, it is marked as "unknown" and subjected to manual analysis.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2020</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20200421&amp;DB=EPODOC&amp;CC=US&amp;NR=10628584B1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25563,76318</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20200421&amp;DB=EPODOC&amp;CC=US&amp;NR=10628584B1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Harrod, William Knight</creatorcontrib><creatorcontrib>Knipmeyer, Kevin</creatorcontrib><creatorcontrib>Tijerina, Matthew Joshua</creatorcontrib><creatorcontrib>Norton, Joseph W</creatorcontrib><creatorcontrib>Kimbrel, Paul David</creatorcontrib><creatorcontrib>Schwarz, Michael Gregory</creatorcontrib><title>Functional language source code vulnerability scanner</title><description>A code scanning system has a syntax generation component that receives source code and generates an abstract syntax tree file. The system includes a white list of permitted pure functions, and a black list of prohibited impure functions. In addition, the system includes a static code analyzer for performing static analysis of the source code. The static code analyzer includes a function analyzer that receives the AST file and identifies the functions. Each function is compared to the white list, and if it is present, marked as permitted in a static analysis file. If the function is not on the white list, it is compared to the black list. If it is present on the black list, it is marked as prohibited in the static analysis file. If the function is not on the white or black list, it is marked as "unknown" and subjected to manual analysis.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2020</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZDB1K81LLsnMz0vMUchJzEsvTUxPVSjOLy1KTlVIzk9JVSgrzclLLUpMyszJLKlUKE5OzANyeRhY0xJzilN5oTQ3g6Kba4izh25qQX58anFBYnJqXmpJfGiwoYGZkYWphYmToTExagCpMy3p</recordid><startdate>20200421</startdate><enddate>20200421</enddate><creator>Harrod, William Knight</creator><creator>Knipmeyer, Kevin</creator><creator>Tijerina, Matthew Joshua</creator><creator>Norton, Joseph W</creator><creator>Kimbrel, Paul David</creator><creator>Schwarz, Michael Gregory</creator><scope>EVB</scope></search><sort><creationdate>20200421</creationdate><title>Functional language source code vulnerability scanner</title><author>Harrod, William Knight ; Knipmeyer, Kevin ; Tijerina, Matthew Joshua ; Norton, Joseph W ; Kimbrel, Paul David ; Schwarz, Michael Gregory</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US10628584B13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2020</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>Harrod, William Knight</creatorcontrib><creatorcontrib>Knipmeyer, Kevin</creatorcontrib><creatorcontrib>Tijerina, Matthew Joshua</creatorcontrib><creatorcontrib>Norton, Joseph W</creatorcontrib><creatorcontrib>Kimbrel, Paul David</creatorcontrib><creatorcontrib>Schwarz, Michael Gregory</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Harrod, William Knight</au><au>Knipmeyer, Kevin</au><au>Tijerina, Matthew Joshua</au><au>Norton, Joseph W</au><au>Kimbrel, Paul David</au><au>Schwarz, Michael Gregory</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Functional language source code vulnerability scanner</title><date>2020-04-21</date><risdate>2020</risdate><abstract>A code scanning system has a syntax generation component that receives source code and generates an abstract syntax tree file. The system includes a white list of permitted pure functions, and a black list of prohibited impure functions. In addition, the system includes a static code analyzer for performing static analysis of the source code. The static code analyzer includes a function analyzer that receives the AST file and identifies the functions. Each function is compared to the white list, and if it is present, marked as permitted in a static analysis file. If the function is not on the white list, it is compared to the black list. If it is present on the black list, it is marked as prohibited in the static analysis file. If the function is not on the white or black list, it is marked as "unknown" and subjected to manual analysis.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US10628584B1
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC DIGITAL DATA PROCESSING
PHYSICS
title Functional language source code vulnerability scanner
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-11T10%3A44%3A59IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Harrod,%20William%20Knight&rft.date=2020-04-21&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS10628584B1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true