Application Decomposition Using Data Obtained From External Tools For Use In Threat Modeling

An illustrative embodiment of automated application decomposition generates a set of information specific to an application by one or more external tools. Predefined heuristics and corresponding predefined conclusions, categorized corresponding to one or more external tool domains, are applied to th...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: LIU FEI, BISHT KALPANA, CALENDINO ROBERT, IONESCU PAUL, AYOUB KHALIL A, NGUYEN DANIEL H, LEE RICHARD, ONUT IOSIF V
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:An illustrative embodiment of automated application decomposition generates a set of information specific to an application by one or more external tools. Predefined heuristics and corresponding predefined conclusions, categorized corresponding to one or more external tool domains, are applied to the set of information to produce an intermediate result. The intermediate result is converted into a set of conclusions about factors, representative of the application, used in application decomposition. The set of conclusions is exported and used to generate a model of the application. The model is a starting point for identification of threats and weaknesses specific to the application.