会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 5. 发明授权
    • Managing memory to support large-scale interprocedural static analysis for security problems
    • 管理内存以支持安全问题的大规模过程静态分析
    • US08429633B2
    • 2013-04-23
    • US12275838
    • 2008-11-21
    • Richard TitleBenjamin GreenwaldJohn Peyton
    • Richard TitleBenjamin GreenwaldJohn Peyton
    • G06F9/44G06F9/45
    • G06F21/51
    • Embodiments of the invention describe systems and methods for application level management of virtual address space. A static analysis application can model and analyze a large and complex source code listing to determine whether it has vulnerabilities without exhausting the virtual memory resources provided to it by the operating system. In one embodiment of the invention, the method includes analyzing the source code listing to create a call graph model to represent the expected sequences of routine calls as a result of the inherent control flow of the source code listing. The method also includes monitoring the amount of virtual memory resources consumed by the dynamic state, and swapping out to a storage medium a portion of the dynamic state. The method includes reusing the virtual memory resources corresponding to the swapped out portion of the dynamic state to continue analyzing the source code listing.
    • 本发明的实施例描述了虚拟地址空间的应用级管理的系统和方法。 静态分析应用程序可以对大型和复杂的源代码列表进行建模和分析,以确定它是否存在漏洞,而不会耗尽操作系统提供给它的虚拟内存资源。 在本发明的一个实施例中,该方法包括分析源代码列表以创建调用图模型,以便作为源代码列表的固有控制流程的结果来表示常规调用的预期序列。 该方法还包括监视由动态状态消耗的虚拟内存资源的数量,并将动态状态的一部分交换到存储介质。 该方法包括重新使用与动态状态的交换部分相对应的虚拟存储器资源来继续分析源代码列表。
    • 8. 发明申请
    • MANAGING MEMORY TO SUPPORT LARGE-SCALE INTERPROCEDURAL STATIC ANALYSIS FOR SECURITY PROBLEMS
    • 管理记忆支持安全问题的大规模分析静态分析
    • US20100131721A1
    • 2010-05-27
    • US12275838
    • 2008-11-21
    • Richard TitleBenjamin GreenwaldJohn Peyton
    • Richard TitleBenjamin GreenwaldJohn Peyton
    • G06F21/00G06F12/00
    • G06F21/51
    • Embodiments of the invention describe systems and methods for application level management of virtual address space. A static analysis application can model and analyze a large and complex source code listing to determine whether it has vulnerabilities without exhausting the virtual memory resources provided to it by the operating system. In one embodiment of the invention, the method includes analyzing the source code listing to create a call graph model to represent the expected sequences of routine calls as a result of the inherent control flow of the source code listing. The method also includes monitoring the amount of virtual memory resources consumed by the dynamic state, and swapping out to a storage medium a portion of the dynamic state. The method includes reusing the virtual memory resources corresponding to the swapped out portion of the dynamic state to continue analyzing the source code listing.
    • 本发明的实施例描述了虚拟地址空间的应用级管理的系统和方法。 静态分析应用程序可以对大型和复杂的源代码列表进行建模和分析,以确定它是否存在漏洞,而不会耗尽操作系统提供给它的虚拟内存资源。 在本发明的一个实施例中,该方法包括分析源代码列表以创建调用图模型,以便作为源代码列表的固有控制流程的结果来表示常规调用的预期序列。 该方法还包括监视由动态状态消耗的虚拟内存资源的数量,并将动态状态的一部分交换到存储介质。 该方法包括重新使用与动态状态的交换部分相对应的虚拟存储器资源来继续分析源代码列表。
    • 9. 发明授权
    • Method and system for detecting interprocedural vulnerability by analysis of source code
    • 通过源代码分析检测程序间漏洞的方法和系统
    • US07617489B2
    • 2009-11-10
    • US11522039
    • 2006-09-15
    • John PeytonRobert Gottlieb
    • John PeytonRobert Gottlieb
    • G06F9/44
    • G06F21/577
    • Methods and systems of detecting vulnerabilities in source code using inter-procedural analysis of source code. Vulnerabilities in a pre-existing source code listing are detected. The variables in the source code listing are modeled in the context of at least one of the inherent control flow and inherent data flow. The variable models are used to create models of arguments to routine calls in the source code listing. The source code listing is modeled with a call graph to represent routine call interactions expressed in the source code listing. The arguments to routine calls are modeled to account for inter-procedural effects and dependencies on the arguments as expressed in the source code listing.
    • 使用源代码的程序间分析来检测源代码中的漏洞的方法和系统。 检测到预先存在的源代码列表中的漏洞。 源代码列表中的变量在至少一个固有控制流和固有数据流的上下文中进行建模。 变量模型用于在源代码列表中为常规调用创建参数模型。 源代码列表使用调用图进行建模,以表示在源代码列表中表示的常规调用交互。 常规调用的参数被建模以考虑到程序间的影响,并且依赖于源代码列表中表达的参数。
    • 10. 发明申请
    • Method and system for detecting interprocedural vulnerability by analysis of source code
    • 通过源代码分析检测程序间漏洞的方法和系统
    • US20080072214A1
    • 2008-03-20
    • US11522039
    • 2006-09-15
    • John PeytonRobert Gottlieb
    • John PeytonRobert Gottlieb
    • G06F9/455
    • G06F21/577
    • Methods and systems of detecting vulnerabilities in source code using inter-procedural analysis of source code. Vulnerabilities in a pre-existing source code listing are detected. The variables in the source code listing are modeled in the context of at least one of the inherent control flow and inherent data flow. The variable models are used to create models of arguments to routine calls in the source code listing. The source code listing is modeled with a call graph to represent routine call interactions expressed in the source code listing. The arguments to routine calls are modeled to account for inter-procedural effects and dependencies on the arguments as expressed in the source code listing.
    • 使用源代码的程序间分析来检测源代码中的漏洞的方法和系统。 检测到预先存在的源代码列表中的漏洞。 源代码列表中的变量在至少一个固有控制流和固有数据流的上下文中进行建模。 变量模型用于在源代码列表中为常规调用创建参数模型。 源代码列表使用调用图进行建模,以表示在源代码列表中表示的常规调用交互。 常规调用的参数被建模以考虑到程序间的影响,并且依赖于源代码列表中表达的参数。