The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
May. 13, 2014

Filed:

Mar. 29, 2012
Applicants:

Bruce Mccorkendale, Manhattan Beach, CA (US);

Xue Feng Tian, Beijing, CN;

Sheng Gong, Beijing, CN;

Xiaole Zhu, Beijing, CN;

Jun Mao, Beijing, CN;

Qingchun Meng, Beijing, CN;

GE Hua Huang, Beijing, CN;

Wei Guo Eric HU, Beijing, CN;

Inventors:

Bruce McCorkendale, Manhattan Beach, CA (US);

Xue Feng Tian, Beijing, CN;

Sheng Gong, Beijing, CN;

Xiaole Zhu, Beijing, CN;

Jun Mao, Beijing, CN;

Qingchun Meng, Beijing, CN;

Ge Hua Huang, Beijing, CN;

Wei Guo Eric Hu, Beijing, CN;

Assignee:

Symantec Corporation, Mountain View, CA (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
G06F 12/14 (2006.01); G06F 11/00 (2006.01); G06F 12/16 (2006.01); G08B 23/00 (2006.01); G06F 11/30 (2006.01);
U.S. Cl.
CPC ...
Abstract

A computer-implemented method for combining static and dynamic code analysis may include 1) identifying executable code that is to be analyzed to determine whether the executable code is capable of leaking sensitive data, 2) performing a static analysis of the executable code to identify one or more objects which the executable code may use to transfer sensitive data, the static analysis being performed by analyzing the executable code without executing the executable code, 3) using a result of the static analysis to tune a dynamic analysis to track the one or more objects identified during the static analysis, and 4) performing the dynamic analysis by, while the executable code is being executed, tracking the one or more objects identified during the static analysis to determine whether the executable code leaks sensitive data via the one or more objects. Various other methods, systems, and computer-readable media are also disclosed.


Find Patent Forward Citations

Loading…