Auto-remediation workflow for computer security testing

E Sheridan, H Papaxenopoulos, JT Melton - US Patent 10,282,550, 2019 - Google Patents
Techniques for performing auto-remediation on computer system vulnerabilities in source
code are disclosed herein. An application source code representation is scanned to …

Generating rules to detect security vulnerabilities based on vulnerability primitives with entry point finder

SJ Abraham, PA Artuso - US Patent App. 15/675,969, 2019 - Google Patents
This disclosure relates to computer-based security and, more particularly, to a computer-
based entry point finder (EPF) and associated computer-implemented techniques and, even …

Value based information tracking for security enforcement

M Pistoia, O Tripp, P Ferrara, P Tsankov - US Patent 11,244,057, 2022 - Google Patents
(74) Attorney, Agent, or Firm—Scully, Scott, Murphy & Presser, PC; Daniel P. Morris,
Esq.(57) ABSTRACT An apparatus, method and computer program product for repairing …

Detection system and method thereof

CH Lin, CW Tien, T Huang, T Chin-Wei - US Patent 10,489,591, 2019 - Google Patents
A detection system and method thereof are provided. The detection method comprises the
following steps: decompiling a first application package file to generate a plurality of first …

Entry point finder

SJ Abraham, PA Artuso, AG Burzyn - US Patent 11,443,046, 2022 - Google Patents
A computer-based method of analyzing a business-critical application computer system
includes extracting a plurality of software objects from the business-critical application …

Value-based information flow tracking in software packages

SA Zonouz, G Salles-Loustau, M Srivastava… - US Patent …, 2022 - Google Patents
A computer-implemented method, computer system, and computer program product are
directed to improving computer security of a device using value based information flow …

Information flow tracking using incremental profiling

M Salajegheh, M Kazdagli… - US Patent 10,102,368, 2018 - Google Patents
Various embodiments may include methods, devices, and non-transitory processor-
readable media for performing information flow tracking during execution of a software …

Systems and methods for runtime enforcement of data flow integrity

D McArdle, J Powers - US Patent 11,010,495, 2021 - Google Patents
Disclosed herein are embodiments of systems, methods, and products comprise a
processor, which provides runtime enforcement of data flow integrity. The processor …

Detecting camera access breaches

A Srivastava, P Jain, KH Kim - US Patent 10,572,692, 2020 - Google Patents
Examples disclosed herein relate to detecting camera access breaches by an application
running on a computing device. The examples enable determining, by a computing device …

Applying machine learning techniques to discover security impacts of application programming interfaces

KA Duer, JT Peyton Jr, B Sharma, DE Stewart… - US Patent …, 2023 - Google Patents
(57) ABSTRACT A computer-implemented method includes obtaining, by a processor,
existing security information for static applica tion security testing (SAST). The method also …