Log in
Enquire now
‌

US Patent 11836258 Detecting exploitable paths in application software that uses third-party libraries

Patent 11836258 was granted and assigned to Checkmarx on December, 2023 by the United States Patent and Trademark Office.

OverviewStructured DataIssuesContributors

Contents

Is a
Patent
Patent
0

Patent attributes

Patent Applicant
Checkmarx
Checkmarx
0
Current Assignee
Checkmarx
Checkmarx
0
Patent Jurisdiction
United States Patent and Trademark Office
United States Patent and Trademark Office
0
Patent Number
118362580
Patent Inventor Names
Or Chen0
Maty Siman0
Date of Patent
December 5, 2023
0
Patent Application Number
173823900
Date Filed
July 22, 2021
0
Patent Citations
‌
US Patent 7447666 System and method for analyzing a pattern in a time-stamped event sequence
0
‌
US Patent 7565631 Method and system for translating software binaries and assembly code onto hardware
0
‌
US Patent 7647631 Automated user interaction in application assessment
0
‌
US Patent 7860842 Mechanism to detect and analyze SQL injection threats
0
‌
US Patent 7861226 Constraint solver to code based test data generation for improving software reliability and security
0
‌
US Patent 7971193 Methods for performining cross module context-sensitive security analysis
0
‌
US Patent 7975296 Automated security threat testing of web pages
0
‌
US Patent 8230499 Detecting and blocking unauthorized downloads
0
...
Patent Primary Examiner
‌
Meng Li
0
CPC Code
‌
G06F 2221/033
0
‌
G06F 8/75
0
‌
G06F 21/577
0
Patent abstract

A method for software code analysis includes receiving source code of an application program, which includes one or more calls from respective entry points in the source code to a library program. The source code is automatically analyzed in order to generate a first data flow graph (DFG), representing a flow of data to be engendered upon running the application program. One or more vulnerabilities are identified in the library program. The library program is automatically analyzed to generate a second DFG linking at least one of the entry points in the source code to at least one of the vulnerabilities. The first DFG is combined with the second DFG in order to track the flow of data from the application program to the at least one of the vulnerabilities and to report at least one of the vulnerabilities as being exploitable.

Timeline

No Timeline data yet.

Further Resources

Title
Author
Link
Type
Date
No Further Resources data yet.

References

Find more entities like US Patent 11836258 Detecting exploitable paths in application software that uses third-party libraries

Use the Golden Query Tool to find similar entities by any field in the Knowledge Graph, including industry, location, and more.
Open Query Tool
Access by API
Golden Query Tool
Golden logo

Company

  • Home
  • Press & Media
  • Blog
  • Careers
  • WE'RE HIRING

Products

  • Knowledge Graph
  • Query Tool
  • Data Requests
  • Knowledge Storage
  • API
  • Pricing
  • Enterprise
  • ChatGPT Plugin

Legal

  • Terms of Service
  • Enterprise Terms of Service
  • Privacy Policy

Help

  • Help center
  • API Documentation
  • Contact Us
By using this site, you agree to our Terms of Service.