METHOD AND SYSTEM FOR DETECTING VULNERABILITIES IN SOURCE CODE
A method and system of detecting vulnerabilities in source code. Source code is parsed into an intermediate representation. Models (e.g., in the form of lattices) are derived for the variables in the code and for the variables and/or expressions used in conjunction with routine calls. The models are...
Gespeichert in:
Hauptverfasser: | , , , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | PEYTON JOHN DANAHY JOHN J ROSE LARRY REHBEIN CHRIS BERG RYAN J GOTTLIEB ROBERT |
description | A method and system of detecting vulnerabilities in source code. Source code is parsed into an intermediate representation. Models (e.g., in the form of lattices) are derived for the variables in the code and for the variables and/or expressions used in conjunction with routine calls. The models are then analyzed in conjunction with pre-specified rules about the routines to determine if the routine call posses one or more of pre-selected vulnerabilities. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2007234304A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2007234304A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2007234304A13</originalsourceid><addsrcrecordid>eNrjZLDzdQ3x8HdRcPRzUQiODA5x9VVw8w9ScHENcXUO8fRzVwgL9fFzDXJ08vTxDPF0DVbw9FMI9g8NcnZVcPZ3ceVhYE1LzClO5YXS3AzKbq4hzh66qQX58anFBYnJqXmpJfGhwUYGBuZGxibGBiaOhsbEqQIA_X0q9w</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>METHOD AND SYSTEM FOR DETECTING VULNERABILITIES IN SOURCE CODE</title><source>esp@cenet</source><creator>PEYTON JOHN ; DANAHY JOHN J ; ROSE LARRY ; REHBEIN CHRIS ; BERG RYAN J ; GOTTLIEB ROBERT</creator><creatorcontrib>PEYTON JOHN ; DANAHY JOHN J ; ROSE LARRY ; REHBEIN CHRIS ; BERG RYAN J ; GOTTLIEB ROBERT</creatorcontrib><description>A method and system of detecting vulnerabilities in source code. Source code is parsed into an intermediate representation. Models (e.g., in the form of lattices) are derived for the variables in the code and for the variables and/or expressions used in conjunction with routine calls. The models are then analyzed in conjunction with pre-specified rules about the routines to determine if the routine call posses one or more of pre-selected vulnerabilities.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2007</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20071004&DB=EPODOC&CC=US&NR=2007234304A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76290</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20071004&DB=EPODOC&CC=US&NR=2007234304A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>PEYTON JOHN</creatorcontrib><creatorcontrib>DANAHY JOHN J</creatorcontrib><creatorcontrib>ROSE LARRY</creatorcontrib><creatorcontrib>REHBEIN CHRIS</creatorcontrib><creatorcontrib>BERG RYAN J</creatorcontrib><creatorcontrib>GOTTLIEB ROBERT</creatorcontrib><title>METHOD AND SYSTEM FOR DETECTING VULNERABILITIES IN SOURCE CODE</title><description>A method and system of detecting vulnerabilities in source code. Source code is parsed into an intermediate representation. Models (e.g., in the form of lattices) are derived for the variables in the code and for the variables and/or expressions used in conjunction with routine calls. The models are then analyzed in conjunction with pre-specified rules about the routines to determine if the routine call posses one or more of pre-selected vulnerabilities.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2007</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZLDzdQ3x8HdRcPRzUQiODA5x9VVw8w9ScHENcXUO8fRzVwgL9fFzDXJ08vTxDPF0DVbw9FMI9g8NcnZVcPZ3ceVhYE1LzClO5YXS3AzKbq4hzh66qQX58anFBYnJqXmpJfGhwUYGBuZGxibGBiaOhsbEqQIA_X0q9w</recordid><startdate>20071004</startdate><enddate>20071004</enddate><creator>PEYTON JOHN</creator><creator>DANAHY JOHN J</creator><creator>ROSE LARRY</creator><creator>REHBEIN CHRIS</creator><creator>BERG RYAN J</creator><creator>GOTTLIEB ROBERT</creator><scope>EVB</scope></search><sort><creationdate>20071004</creationdate><title>METHOD AND SYSTEM FOR DETECTING VULNERABILITIES IN SOURCE CODE</title><author>PEYTON JOHN ; DANAHY JOHN J ; ROSE LARRY ; REHBEIN CHRIS ; BERG RYAN J ; GOTTLIEB ROBERT</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2007234304A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2007</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>PEYTON JOHN</creatorcontrib><creatorcontrib>DANAHY JOHN J</creatorcontrib><creatorcontrib>ROSE LARRY</creatorcontrib><creatorcontrib>REHBEIN CHRIS</creatorcontrib><creatorcontrib>BERG RYAN J</creatorcontrib><creatorcontrib>GOTTLIEB ROBERT</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>PEYTON JOHN</au><au>DANAHY JOHN J</au><au>ROSE LARRY</au><au>REHBEIN CHRIS</au><au>BERG RYAN J</au><au>GOTTLIEB ROBERT</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>METHOD AND SYSTEM FOR DETECTING VULNERABILITIES IN SOURCE CODE</title><date>2007-10-04</date><risdate>2007</risdate><abstract>A method and system of detecting vulnerabilities in source code. Source code is parsed into an intermediate representation. Models (e.g., in the form of lattices) are derived for the variables in the code and for the variables and/or expressions used in conjunction with routine calls. The models are then analyzed in conjunction with pre-specified rules about the routines to determine if the routine call posses one or more of pre-selected vulnerabilities.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_US2007234304A1 |
source | esp@cenet |
subjects | CALCULATING COMPUTING COUNTING ELECTRIC DIGITAL DATA PROCESSING PHYSICS |
title | METHOD AND SYSTEM FOR DETECTING VULNERABILITIES IN SOURCE CODE |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-03T10%3A02%3A07IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=PEYTON%20JOHN&rft.date=2007-10-04&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2007234304A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |