The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Dec. 08, 2015

Filed:

Dec. 29, 2009
Applicants:

Roee Hay, Haifa, IL;

Roi Saltzman, Rishon Le Zion, IL;

Adi Sharabani, Ramat Gan, IL;

Omer Tripp, Har-Adar, IL;

Inventors:

Roee Hay, Haifa, IL;

Roi Saltzman, Rishon Le Zion, IL;

Adi Sharabani, Ramat Gan, IL;

Omer Tripp, Har-Adar, IL;

Attorneys:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
G06F 11/00 (2006.01); H04L 29/06 (2006.01); G06F 21/57 (2013.01); H04L 29/08 (2006.01);
U.S. Cl.
CPC ...
H04L 63/1433 (2013.01); G06F 21/577 (2013.01); H04L 63/1483 (2013.01); H04L 67/02 (2013.01);
Abstract

Determining the vulnerability of computer software applications to attacks by identifying a defense-related variable within a computer software application that is assigned results of a defense operation defending against a predefined type of attack, identifying a control-flow predicate dominating a security-sensitive operation within the application, identifying a data-flow dependent variable in the application that is data-flow dependent on the defense-related variable, determining whether the control-flow predicate uses the data-flow dependent variable to make a branching decision and whether a control-flow path leading to the security-sensitive operation is taken only if the data-flow dependent variable is compared against a value of a predefined type, determining that the security-sensitive operation is safe from the attack if both control-flow conditions are true, and determining that the application is safe from the attack if all security-sensitive operations in the application are determined to be safe from the attack.


Find Patent Forward Citations

Loading…