Information security – Monitoring or scanning of software or data including attack... – Vulnerability assessment
Reexamination Certificate
2007-11-27
2007-11-27
Zand, Kambiz (Department: 2134)
Information security
Monitoring or scanning of software or data including attack...
Vulnerability assessment
C726S022000, C713S189000, C713S190000, C713S191000, C705S051000, C705S052000, C705S053000, C705S054000, C717S174000, C717S175000, C717S176000, C717S177000, C717S178000
Reexamination Certificate
active
10342247
ABSTRACT:
Embodiments of the present invention relate to systems and methods for detecting software buffer security vulnerabilities. According to an embodiment, a computer-readable medium stores a plurality of instructions to be executed by a processor for detecting software buffer security vulnerabilities. The plurality of instructions comprise instructions to receive software code associated with a potential buffer vulnerability, generate constraints related to the software code associated with the potential buffer vulnerability, partition the software code into one or more procedures, and generate for each procedure a set of constraints that summarizes the impact of a procedure on buffer variables. The computer-readable medium also stores instructions to receive a system dependence graph corresponding to the software code, traverse back along the system dependence graph to collect constraints related to the potential buffer vulnerability, and reduce the collected constraints to determine a maximum value length that has been assigned to a buffer corresponding to a potential buffer vulnerability. The plurality of instructions also include to compare the maximum value length that has been assigned to a buffer to an amount of memory that has been allocated to the buffer to determine whether there is a buffer vulnerability.
REFERENCES:
patent: 6301699 (2001-10-01), Hollander et al.
patent: 6721721 (2004-04-01), Bates et al.
patent: 6802012 (2004-10-01), Smithson et al.
M. Weber, V. Shah and C. Ren, “A Case Study in Detecting Software Security Vulnerabilities using Constraint Optimization,”IEEE Workshop on Source Code Analysis and Manipulation, Nov. 2001, Florence, Italy.
Ren Chuangang
Shah Viren R.
Weber Michael D.
Cigital, Inc.
Edell Shapiro & Finnan LLC
Tolentino Roderick
Zand Kambiz
LandOfFree
Systems and methods for detecting software buffer security... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Systems and methods for detecting software buffer security..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Systems and methods for detecting software buffer security... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3876843