The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Jun. 30, 2020

Filed:

Feb. 28, 2013
Applicant:

Hewlett-packard Development Company, L.p., Houston, TX (US);

Inventors:

Kirill Mendelev, Alpharetta, GA (US);

Lu Zhao, Sunnyvale, CA (US);

David John Babcock, Sunnyvale, CA (US);

Ronald Joseph Sechman, Alpharetta, GA (US);

Assignee:

MICRO FOCUS LLC, Santa Clara, CA (US);

Attorney:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
G06F 21/00 (2013.01); G06F 21/57 (2013.01); G06F 21/56 (2013.01); G06F 11/36 (2006.01); H04L 29/06 (2006.01);
U.S. Cl.
CPC ...
G06F 21/577 (2013.01); G06F 11/3668 (2013.01); G06F 21/563 (2013.01); G06F 21/564 (2013.01); G06F 21/566 (2013.01); H04L 63/1433 (2013.01); G06F 2221/033 (2013.01); G06F 2221/2101 (2013.01); H04L 63/1416 (2013.01); H04L 63/168 (2013.01);
Abstract

Example embodiments relate to assessing dynamic security scans using runtime analysis and static code analysis. In example embodiments, a system performs static code analysis of a web application to identify reachable code and/or data entry points, where the data entry points are used to determine an attack surface size for the web application. At this stage, the system may initiate runtime monitoring for a dynamic security scan of the web application, where the runtime monitoring detects invocation of a statement at one of the data entry points. The invocation is logged as an invocation entry that comprises invocation parameters and/or code units that were executed in response to the invocation. The system may then determine an attack surface coverage of the dynamic security scan using the invocation entry and the attack surface size and/or a reachable code coverage using the invocation entry and the reachable code.


Find Patent Forward Citations

Loading…