The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Mar. 12, 2024

Filed:

Nov. 29, 2021
Applicant:

Bank of America Corporation, Charlotte, NC (US);

Inventors:

Jack Lawson Bishop, III, Evanston, IL (US);

Anthony Herron, Upper Marlboro, MD (US);

Yao Houkpati, Woodbridge, VA (US);

Carrie E. Gates, Livermore, CA (US);

Assignee:

Bank of America Corporation, Charlotte, NC (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
G06F 21/57 (2013.01); G06F 8/41 (2018.01); G06F 8/75 (2018.01); G06F 21/56 (2013.01); H04L 9/40 (2022.01);
U.S. Cl.
CPC ...
G06F 21/577 (2013.01); G06F 8/427 (2013.01); G06F 8/75 (2013.01); G06F 21/563 (2013.01); H04L 63/1433 (2013.01); G06F 2221/033 (2013.01); G06F 2221/034 (2013.01);
Abstract

A system includes a memory and processor. The memory stores code segment vulnerability findings that were generated through static application security testing (SAST). For a first code segment, a first vulnerability finding has been classified as a real vulnerability, and a second vulnerability finding has been classified as a false positive by external review. The processor generates a code fingerprint for each code segment, which corresponds to an abstract syntax tree that has been augmented by data flow information and flattened. The processor determines that the fingerprint for the first code segment matches the fingerprint for a second code segment and that the vulnerability findings for the first code segment match those for the second. In response, the processor automatically classifies a matching first vulnerability finding for the second code segment as the real vulnerability, and a matching second vulnerability finding for the second code segment as the false positive.


Find Patent Forward Citations

Loading…