METHOD AND SYSTEM FOR DETECTING VULNERABILITIES IN SOURCE CODE

A method and system of detecting vulnerabilities in source code. Source code is parsed into an intermediate representation. Models (e.g., in the form of lattices) are derived for the variables in the code and for the variables and/or expressions used in conjunction with routine calls. The models are...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: PEYTON JOHN, DANAHY JOHN J, ROSE LARRY, REHBEIN CHRIS, BERG RYAN J, GOTTLIEB ROBERT
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator PEYTON JOHN
DANAHY JOHN J
ROSE LARRY
REHBEIN CHRIS
BERG RYAN J
GOTTLIEB ROBERT
description A method and system of detecting vulnerabilities in source code. Source code is parsed into an intermediate representation. Models (e.g., in the form of lattices) are derived for the variables in the code and for the variables and/or expressions used in conjunction with routine calls. The models are then analyzed in conjunction with pre-specified rules about the routines to determine if the routine call posses one or more of pre-selected vulnerabilities.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2007234304A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2007234304A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2007234304A13</originalsourceid><addsrcrecordid>eNrjZLDzdQ3x8HdRcPRzUQiODA5x9VVw8w9ScHENcXUO8fRzVwgL9fFzDXJ08vTxDPF0DVbw9FMI9g8NcnZVcPZ3ceVhYE1LzClO5YXS3AzKbq4hzh66qQX58anFBYnJqXmpJfGhwUYGBuZGxibGBiaOhsbEqQIA_X0q9w</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>METHOD AND SYSTEM FOR DETECTING VULNERABILITIES IN SOURCE CODE</title><source>esp@cenet</source><creator>PEYTON JOHN ; DANAHY JOHN J ; ROSE LARRY ; REHBEIN CHRIS ; BERG RYAN J ; GOTTLIEB ROBERT</creator><creatorcontrib>PEYTON JOHN ; DANAHY JOHN J ; ROSE LARRY ; REHBEIN CHRIS ; BERG RYAN J ; GOTTLIEB ROBERT</creatorcontrib><description>A method and system of detecting vulnerabilities in source code. Source code is parsed into an intermediate representation. Models (e.g., in the form of lattices) are derived for the variables in the code and for the variables and/or expressions used in conjunction with routine calls. The models are then analyzed in conjunction with pre-specified rules about the routines to determine if the routine call posses one or more of pre-selected vulnerabilities.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2007</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20071004&amp;DB=EPODOC&amp;CC=US&amp;NR=2007234304A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76290</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20071004&amp;DB=EPODOC&amp;CC=US&amp;NR=2007234304A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>PEYTON JOHN</creatorcontrib><creatorcontrib>DANAHY JOHN J</creatorcontrib><creatorcontrib>ROSE LARRY</creatorcontrib><creatorcontrib>REHBEIN CHRIS</creatorcontrib><creatorcontrib>BERG RYAN J</creatorcontrib><creatorcontrib>GOTTLIEB ROBERT</creatorcontrib><title>METHOD AND SYSTEM FOR DETECTING VULNERABILITIES IN SOURCE CODE</title><description>A method and system of detecting vulnerabilities in source code. Source code is parsed into an intermediate representation. Models (e.g., in the form of lattices) are derived for the variables in the code and for the variables and/or expressions used in conjunction with routine calls. The models are then analyzed in conjunction with pre-specified rules about the routines to determine if the routine call posses one or more of pre-selected vulnerabilities.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2007</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZLDzdQ3x8HdRcPRzUQiODA5x9VVw8w9ScHENcXUO8fRzVwgL9fFzDXJ08vTxDPF0DVbw9FMI9g8NcnZVcPZ3ceVhYE1LzClO5YXS3AzKbq4hzh66qQX58anFBYnJqXmpJfGhwUYGBuZGxibGBiaOhsbEqQIA_X0q9w</recordid><startdate>20071004</startdate><enddate>20071004</enddate><creator>PEYTON JOHN</creator><creator>DANAHY JOHN J</creator><creator>ROSE LARRY</creator><creator>REHBEIN CHRIS</creator><creator>BERG RYAN J</creator><creator>GOTTLIEB ROBERT</creator><scope>EVB</scope></search><sort><creationdate>20071004</creationdate><title>METHOD AND SYSTEM FOR DETECTING VULNERABILITIES IN SOURCE CODE</title><author>PEYTON JOHN ; DANAHY JOHN J ; ROSE LARRY ; REHBEIN CHRIS ; BERG RYAN J ; GOTTLIEB ROBERT</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2007234304A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2007</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>PEYTON JOHN</creatorcontrib><creatorcontrib>DANAHY JOHN J</creatorcontrib><creatorcontrib>ROSE LARRY</creatorcontrib><creatorcontrib>REHBEIN CHRIS</creatorcontrib><creatorcontrib>BERG RYAN J</creatorcontrib><creatorcontrib>GOTTLIEB ROBERT</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>PEYTON JOHN</au><au>DANAHY JOHN J</au><au>ROSE LARRY</au><au>REHBEIN CHRIS</au><au>BERG RYAN J</au><au>GOTTLIEB ROBERT</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>METHOD AND SYSTEM FOR DETECTING VULNERABILITIES IN SOURCE CODE</title><date>2007-10-04</date><risdate>2007</risdate><abstract>A method and system of detecting vulnerabilities in source code. Source code is parsed into an intermediate representation. Models (e.g., in the form of lattices) are derived for the variables in the code and for the variables and/or expressions used in conjunction with routine calls. The models are then analyzed in conjunction with pre-specified rules about the routines to determine if the routine call posses one or more of pre-selected vulnerabilities.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US2007234304A1
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC DIGITAL DATA PROCESSING
PHYSICS
title METHOD AND SYSTEM FOR DETECTING VULNERABILITIES IN SOURCE CODE
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-03T10%3A02%3A07IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=PEYTON%20JOHN&rft.date=2007-10-04&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2007234304A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true