The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Jun. 23, 2020

Filed:

Sep. 16, 2019
Applicant:

Fmr Llc, Boston, MA (US);

Inventors:

Jon Augustine Freitag, Chapel Hill, NC (US);

Joseph Scott Yarman, Holly Springs, NC (US);

Stuart Te-Hui Shih, Raleigh, NC (US);

Assignee:

FMR LLC, Boston, MA (US);

Attorney:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
G06F 21/57 (2013.01); G06F 21/54 (2013.01); G06F 8/71 (2018.01); G06F 8/65 (2018.01);
U.S. Cl.
CPC ...
G06F 21/577 (2013.01); G06F 8/65 (2013.01); G06F 8/71 (2013.01); G06F 21/54 (2013.01); G06F 2221/033 (2013.01);
Abstract

Methods and apparatuses are described for detecting vulnerabilities associated with a software application build. A server generates a software application build based upon a source code repository, including determining application dependencies of the software application build. The server identifies vulnerabilities associated with the application dependencies. For each identified vulnerability, the server creates an aspect class based upon a package file associated with the vulnerability, the aspect class comprising vulnerability logging code. The server integrates the created aspect classes into libraries of the application dependencies, generates a new package file based upon the application dependencies, and integrates the new package file into the software application build. The server executes the software application build, including generating log statements by calling the aspect classes in the new package file. The server analyzes the log statements to determine which of the identified vulnerabilities were invoked during execution of the software application build.


Find Patent Forward Citations

Loading…