Systems and methods for evaluating data access signature of third-party applications
A method for evaluating security of third-party applications includes: launching, in an automated test environment, a test instance of a first application; determining a data access pattern for the first application of accessing a protected remote server based on detecting data retrieval operations...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | A method for evaluating security of third-party applications includes: launching, in an automated test environment, a test instance of a first application; determining a data access pattern for the first application of accessing a protected remote server based on detecting data retrieval operations of retrieving data from the protected remote server by the test instance and determining application states of the first application associated with the detected data retrieval operations; and providing the data access pattern for the first application on a client device. |
---|