Application Decomposition Using Data Obtained From External Tools For Use In Threat Modeling
An illustrative embodiment of automated application decomposition generates a set of information specific to an application by one or more external tools. Predefined heuristics and corresponding predefined conclusions, categorized corresponding to one or more external tool domains, are applied to th...
Gespeichert in:
Hauptverfasser: | , , , , , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | LIU FEI BISHT KALPANA CALENDINO ROBERT IONESCU PAUL AYOUB KHALIL A NGUYEN DANIEL H LEE RICHARD ONUT IOSIF V |
description | An illustrative embodiment of automated application decomposition generates a set of information specific to an application by one or more external tools. Predefined heuristics and corresponding predefined conclusions, categorized corresponding to one or more external tool domains, are applied to the set of information to produce an intermediate result. The intermediate result is converted into a set of conclusions about factors, representative of the application, used in application decomposition. The set of conclusions is exported and used to generate a model of the application. The model is a starting point for identification of threats and weaknesses specific to the application. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2016188884A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2016188884A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2016188884A13</originalsourceid><addsrcrecordid>eNqNi7EKwjAURbM4iPoPD5wFoyKuxTboIA6mm1Be06cG0ryQZPDzDeIHeJfDgXOn4l6F4KzBbNlDTYbHwMl-rU3WP6HGjHDtM1pPA6jIIzTvTNGjA83sEiiOpSU4e9CvSJjhwgO5cp6LyQNdosWPM7FUjT6eVhS4oxTQkKfctbfNWu7loWxXye1_1Qcu7DvU</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Application Decomposition Using Data Obtained From External Tools For Use In Threat Modeling</title><source>esp@cenet</source><creator>LIU FEI ; BISHT KALPANA ; CALENDINO ROBERT ; IONESCU PAUL ; AYOUB KHALIL A ; NGUYEN DANIEL H ; LEE RICHARD ; ONUT IOSIF V</creator><creatorcontrib>LIU FEI ; BISHT KALPANA ; CALENDINO ROBERT ; IONESCU PAUL ; AYOUB KHALIL A ; NGUYEN DANIEL H ; LEE RICHARD ; ONUT IOSIF V</creatorcontrib><description>An illustrative embodiment of automated application decomposition generates a set of information specific to an application by one or more external tools. Predefined heuristics and corresponding predefined conclusions, categorized corresponding to one or more external tool domains, are applied to the set of information to produce an intermediate result. The intermediate result is converted into a set of conclusions about factors, representative of the application, used in application decomposition. The set of conclusions is exported and used to generate a model of the application. The model is a starting point for identification of threats and weaknesses specific to the application.</description><language>eng</language><subject>CALCULATING ; COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2016</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20160630&DB=EPODOC&CC=US&NR=2016188884A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20160630&DB=EPODOC&CC=US&NR=2016188884A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>LIU FEI</creatorcontrib><creatorcontrib>BISHT KALPANA</creatorcontrib><creatorcontrib>CALENDINO ROBERT</creatorcontrib><creatorcontrib>IONESCU PAUL</creatorcontrib><creatorcontrib>AYOUB KHALIL A</creatorcontrib><creatorcontrib>NGUYEN DANIEL H</creatorcontrib><creatorcontrib>LEE RICHARD</creatorcontrib><creatorcontrib>ONUT IOSIF V</creatorcontrib><title>Application Decomposition Using Data Obtained From External Tools For Use In Threat Modeling</title><description>An illustrative embodiment of automated application decomposition generates a set of information specific to an application by one or more external tools. Predefined heuristics and corresponding predefined conclusions, categorized corresponding to one or more external tool domains, are applied to the set of information to produce an intermediate result. The intermediate result is converted into a set of conclusions about factors, representative of the application, used in application decomposition. The set of conclusions is exported and used to generate a model of the application. The model is a starting point for identification of threats and weaknesses specific to the application.</description><subject>CALCULATING</subject><subject>COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2016</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNi7EKwjAURbM4iPoPD5wFoyKuxTboIA6mm1Be06cG0ryQZPDzDeIHeJfDgXOn4l6F4KzBbNlDTYbHwMl-rU3WP6HGjHDtM1pPA6jIIzTvTNGjA83sEiiOpSU4e9CvSJjhwgO5cp6LyQNdosWPM7FUjT6eVhS4oxTQkKfctbfNWu7loWxXye1_1Qcu7DvU</recordid><startdate>20160630</startdate><enddate>20160630</enddate><creator>LIU FEI</creator><creator>BISHT KALPANA</creator><creator>CALENDINO ROBERT</creator><creator>IONESCU PAUL</creator><creator>AYOUB KHALIL A</creator><creator>NGUYEN DANIEL H</creator><creator>LEE RICHARD</creator><creator>ONUT IOSIF V</creator><scope>EVB</scope></search><sort><creationdate>20160630</creationdate><title>Application Decomposition Using Data Obtained From External Tools For Use In Threat Modeling</title><author>LIU FEI ; BISHT KALPANA ; CALENDINO ROBERT ; IONESCU PAUL ; AYOUB KHALIL A ; NGUYEN DANIEL H ; LEE RICHARD ; ONUT IOSIF V</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2016188884A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2016</creationdate><topic>CALCULATING</topic><topic>COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>LIU FEI</creatorcontrib><creatorcontrib>BISHT KALPANA</creatorcontrib><creatorcontrib>CALENDINO ROBERT</creatorcontrib><creatorcontrib>IONESCU PAUL</creatorcontrib><creatorcontrib>AYOUB KHALIL A</creatorcontrib><creatorcontrib>NGUYEN DANIEL H</creatorcontrib><creatorcontrib>LEE RICHARD</creatorcontrib><creatorcontrib>ONUT IOSIF V</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>LIU FEI</au><au>BISHT KALPANA</au><au>CALENDINO ROBERT</au><au>IONESCU PAUL</au><au>AYOUB KHALIL A</au><au>NGUYEN DANIEL H</au><au>LEE RICHARD</au><au>ONUT IOSIF V</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Application Decomposition Using Data Obtained From External Tools For Use In Threat Modeling</title><date>2016-06-30</date><risdate>2016</risdate><abstract>An illustrative embodiment of automated application decomposition generates a set of information specific to an application by one or more external tools. Predefined heuristics and corresponding predefined conclusions, categorized corresponding to one or more external tool domains, are applied to the set of information to produce an intermediate result. The intermediate result is converted into a set of conclusions about factors, representative of the application, used in application decomposition. The set of conclusions is exported and used to generate a model of the application. The model is a starting point for identification of threats and weaknesses specific to the application.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_US2016188884A1 |
source | esp@cenet |
subjects | CALCULATING COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS COMPUTING COUNTING ELECTRIC DIGITAL DATA PROCESSING PHYSICS |
title | Application Decomposition Using Data Obtained From External Tools For Use In Threat Modeling |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-21T13%3A46%3A46IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=LIU%20FEI&rft.date=2016-06-30&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2016188884A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |