Application Decomposition Using Data Obtained From External Tools For Use In Threat Modeling

An illustrative embodiment of automated application decomposition generates a set of information specific to an application by one or more external tools. Predefined heuristics and corresponding predefined conclusions, categorized corresponding to one or more external tool domains, are applied to th...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: LIU FEI, BISHT KALPANA, CALENDINO ROBERT, IONESCU PAUL, AYOUB KHALIL A, NGUYEN DANIEL H, LEE RICHARD, ONUT IOSIF V
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator LIU FEI
BISHT KALPANA
CALENDINO ROBERT
IONESCU PAUL
AYOUB KHALIL A
NGUYEN DANIEL H
LEE RICHARD
ONUT IOSIF V
description An illustrative embodiment of automated application decomposition generates a set of information specific to an application by one or more external tools. Predefined heuristics and corresponding predefined conclusions, categorized corresponding to one or more external tool domains, are applied to the set of information to produce an intermediate result. The intermediate result is converted into a set of conclusions about factors, representative of the application, used in application decomposition. The set of conclusions is exported and used to generate a model of the application. The model is a starting point for identification of threats and weaknesses specific to the application.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2016188884A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2016188884A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2016188884A13</originalsourceid><addsrcrecordid>eNqNi7EKwjAURbM4iPoPD5wFoyKuxTboIA6mm1Be06cG0ryQZPDzDeIHeJfDgXOn4l6F4KzBbNlDTYbHwMl-rU3WP6HGjHDtM1pPA6jIIzTvTNGjA83sEiiOpSU4e9CvSJjhwgO5cp6LyQNdosWPM7FUjT6eVhS4oxTQkKfctbfNWu7loWxXye1_1Qcu7DvU</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Application Decomposition Using Data Obtained From External Tools For Use In Threat Modeling</title><source>esp@cenet</source><creator>LIU FEI ; BISHT KALPANA ; CALENDINO ROBERT ; IONESCU PAUL ; AYOUB KHALIL A ; NGUYEN DANIEL H ; LEE RICHARD ; ONUT IOSIF V</creator><creatorcontrib>LIU FEI ; BISHT KALPANA ; CALENDINO ROBERT ; IONESCU PAUL ; AYOUB KHALIL A ; NGUYEN DANIEL H ; LEE RICHARD ; ONUT IOSIF V</creatorcontrib><description>An illustrative embodiment of automated application decomposition generates a set of information specific to an application by one or more external tools. Predefined heuristics and corresponding predefined conclusions, categorized corresponding to one or more external tool domains, are applied to the set of information to produce an intermediate result. The intermediate result is converted into a set of conclusions about factors, representative of the application, used in application decomposition. The set of conclusions is exported and used to generate a model of the application. The model is a starting point for identification of threats and weaknesses specific to the application.</description><language>eng</language><subject>CALCULATING ; COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2016</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20160630&amp;DB=EPODOC&amp;CC=US&amp;NR=2016188884A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20160630&amp;DB=EPODOC&amp;CC=US&amp;NR=2016188884A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>LIU FEI</creatorcontrib><creatorcontrib>BISHT KALPANA</creatorcontrib><creatorcontrib>CALENDINO ROBERT</creatorcontrib><creatorcontrib>IONESCU PAUL</creatorcontrib><creatorcontrib>AYOUB KHALIL A</creatorcontrib><creatorcontrib>NGUYEN DANIEL H</creatorcontrib><creatorcontrib>LEE RICHARD</creatorcontrib><creatorcontrib>ONUT IOSIF V</creatorcontrib><title>Application Decomposition Using Data Obtained From External Tools For Use In Threat Modeling</title><description>An illustrative embodiment of automated application decomposition generates a set of information specific to an application by one or more external tools. Predefined heuristics and corresponding predefined conclusions, categorized corresponding to one or more external tool domains, are applied to the set of information to produce an intermediate result. The intermediate result is converted into a set of conclusions about factors, representative of the application, used in application decomposition. The set of conclusions is exported and used to generate a model of the application. The model is a starting point for identification of threats and weaknesses specific to the application.</description><subject>CALCULATING</subject><subject>COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2016</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNi7EKwjAURbM4iPoPD5wFoyKuxTboIA6mm1Be06cG0ryQZPDzDeIHeJfDgXOn4l6F4KzBbNlDTYbHwMl-rU3WP6HGjHDtM1pPA6jIIzTvTNGjA83sEiiOpSU4e9CvSJjhwgO5cp6LyQNdosWPM7FUjT6eVhS4oxTQkKfctbfNWu7loWxXye1_1Qcu7DvU</recordid><startdate>20160630</startdate><enddate>20160630</enddate><creator>LIU FEI</creator><creator>BISHT KALPANA</creator><creator>CALENDINO ROBERT</creator><creator>IONESCU PAUL</creator><creator>AYOUB KHALIL A</creator><creator>NGUYEN DANIEL H</creator><creator>LEE RICHARD</creator><creator>ONUT IOSIF V</creator><scope>EVB</scope></search><sort><creationdate>20160630</creationdate><title>Application Decomposition Using Data Obtained From External Tools For Use In Threat Modeling</title><author>LIU FEI ; BISHT KALPANA ; CALENDINO ROBERT ; IONESCU PAUL ; AYOUB KHALIL A ; NGUYEN DANIEL H ; LEE RICHARD ; ONUT IOSIF V</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2016188884A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2016</creationdate><topic>CALCULATING</topic><topic>COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>LIU FEI</creatorcontrib><creatorcontrib>BISHT KALPANA</creatorcontrib><creatorcontrib>CALENDINO ROBERT</creatorcontrib><creatorcontrib>IONESCU PAUL</creatorcontrib><creatorcontrib>AYOUB KHALIL A</creatorcontrib><creatorcontrib>NGUYEN DANIEL H</creatorcontrib><creatorcontrib>LEE RICHARD</creatorcontrib><creatorcontrib>ONUT IOSIF V</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>LIU FEI</au><au>BISHT KALPANA</au><au>CALENDINO ROBERT</au><au>IONESCU PAUL</au><au>AYOUB KHALIL A</au><au>NGUYEN DANIEL H</au><au>LEE RICHARD</au><au>ONUT IOSIF V</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Application Decomposition Using Data Obtained From External Tools For Use In Threat Modeling</title><date>2016-06-30</date><risdate>2016</risdate><abstract>An illustrative embodiment of automated application decomposition generates a set of information specific to an application by one or more external tools. Predefined heuristics and corresponding predefined conclusions, categorized corresponding to one or more external tool domains, are applied to the set of information to produce an intermediate result. The intermediate result is converted into a set of conclusions about factors, representative of the application, used in application decomposition. The set of conclusions is exported and used to generate a model of the application. The model is a starting point for identification of threats and weaknesses specific to the application.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US2016188884A1
source esp@cenet
subjects CALCULATING
COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
COMPUTING
COUNTING
ELECTRIC DIGITAL DATA PROCESSING
PHYSICS
title Application Decomposition Using Data Obtained From External Tools For Use In Threat Modeling
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-21T13%3A46%3A46IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=LIU%20FEI&rft.date=2016-06-30&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2016188884A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true