Mitigating program security vulnerabilities: Approaches and challenges

H Shahriar, M Zulkernine - ACM Computing Surveys (CSUR), 2012 - dl.acm.org
Programs are implemented in a variety of languages and contain serious vulnerabilities
which might be exploited to cause security breaches. These vulnerabilities have been …

A systematic mapping study on the combination of static and dynamic quality assurance techniques

F Elberzhager, J Münch, VTN Nha - Information and Software Technology, 2012 - Elsevier
CONTEXT: A lot of different quality assurance techniques exist to ensure high quality
products. However, most often they are applied in isolation. A systematic combination of …

Detection and healing of vulnerabilities in computer code

CA Moritz, K Carver, J Gummeson - US Patent 9,754,112, 2017 - Google Patents
An example process includes: identifying, by one or more processing devices, candidate
code in executable code based on a static analysis of the executable code, where the …

Characterizing, detecting and healing vulnerabilities in computer code

CA Moritz, K Carver, J Gummeson - US Patent 9,411,964, 2016 - Google Patents
An example process includes identifying, by one or more processing devices, a location in
computer code that is subject to vulnerability, where the location corresponds to a memory …

Evolution of evasive malwares: A survey

A Jadhav, D Vidyarthi… - … Techniques in Information …, 2016 - ieeexplore.ieee.org
The threat of malware is perpetual in digital computing systems. To counter the infection,
malware industries and analysts have been coming with cutting-edge solutions and …

Malware detection techniques: a survey

Y Supriya, G Kumar, D Sowjanya… - … , Distributed and Grid …, 2020 - ieeexplore.ieee.org
Malware is derived from malicious software which mitigate to attacks on the computer
systems and collecting private data. The survey is available in huge evidences to suggest its …

Cyber defense with graph theoretical approach

CA Moritz, K Carver, S Khasanvis… - US Patent …, 2020 - Google Patents
An example process that is performed by one or more processing devices uses one or more
system states to detect cyber-attacks. The example process includes the following …

Storage access debugging with disassembly and symbol entries

G Miskelly, MP Foks - US Patent 9,772,925, 2017 - Google Patents
Debugging without reliance on source code includes obtain ing a disassembly of a portion
of an executable code. The disassembly includes a sequence of assembly instructions …

Transmitting content to promote privacy

CA Moritz - US Patent 10,225,075, 2019 - Google Patents
An example process includes breaking content into multiple fragments and transmitting at
least two of the multiple fragments over different physical channels in order to isolate the at …

Detection and healing of vulnerabilities in computer code

CA Moritz, K Carver, J Gummeson - US Patent 10,248,792, 2019 - Google Patents
(57) ABSTRACT 6, 609, 201 B1 8/2003 Folmsbee 6, 970, 985 B2 11/2005 Moritz 7, 493, 607
B2 2/2009 Moritz 7, 996, 671 B2 8/2011 Chheda et al. 8, 327, 249 B2 12/2012 Jorda et al. 8 …