$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Software analysis framework

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-009/45
출원번호 US-0295691 (2014-06-04)
등록번호 US-9286041 (2016-03-15)
발명자 / 주소
  • Rioux, Christien
출원인 / 주소
  • Veracode, Inc.
대리인 / 주소
    Goodwin Procter LLP
인용정보 피인용 횟수 : 1  인용 특허 : 82

초록

Presently described is a decompilation method of operation and system for parsing executable code, identifying and recursively modeling data flows, identifying and recursively modeling control flow, and iteratively refining these models to provide a complete model at the nanocode level. The nanocode

대표청구항

1. A system for facilitating the analysis of software code, the system comprising: a decompiler and analysis subsystem operating on a processor, the decompiler and analysis subsystem comprising; means for separating the executable software code into a code section and a data section;means for genera

이 특허에 인용된 특허 (82)

  1. Townsend, Timothy J., Adaptive countermeasure selection method and apparatus.
  2. Haley Matthew A. ; Pincus Jonathan D. ; Bush William R., Analysis of the effect of program execution of calling components with data variable checkpointing and resource allocation analysis.
  3. Ju Dz-ching ; Gillies David Mitford ; Sastry A. V. S., Apparatus and method for incrementally update static single assignment form for cloned variable name definitions.
  4. Greenfeld Norton R. (6 Brook Trail Rd. Wayland MA 01778), Apparatus for analyzing source code.
  5. Lou, Vic, Application behavior based malware detection.
  6. Gregory Brent ; Chatterjee Trinanjan ; Lin Jing C. ; Raghvendra Srinivas ; Girczyc Emil ; Estrada Paul ; Seawright Andrew, Architecture and methods for a hardware description language source level analysis and debugging system.
  7. Plum, Thomas S., Automated safe secure techniques for eliminating undefined behavior in computer software.
  8. Brennan, Todd, Centralized timed analysis in a network security system.
  9. Fanton, Andrew F.; Gandee, John J.; Lutton, William H.; Harper, Edwin L.; Godwin, Kurt E.; Rozga, Anthony A., Cloud-based application whitelisting.
  10. Dennison, Larry R.; Chiou, Derek, Compilable, reconfigurable network processor.
  11. Ian Carmichael CA; Derek B. Inglis CA; Michael Karasick ; Vincent J. Kruskal ; Harold L. Ossher ; David J. Streeter CA, Compiler for supporting multiple runtime data representations.
  12. McKeeman William M. (Hollis NH) Aki Shota (Weare NH), Compiler using clean lines table with entries indicating unchanged text lines for incrementally compiling only changed s.
  13. Archambault, Roch Georges; Cui, Shimin; Gao, Yaoqing; Silvera, Raul Esteban, Compiling source code.
  14. Furgerson Donald F. (Murrysville PA), Computer monitored or controlled system which may be modified and de-bugged on-line by one not skilled in computer progr.
  15. Frieder Gideon (Williamsville NY) Hughes David T. (Amherst NY) Kline Mark H. (Williamsville NY) Liebel ; Jr. John T. (Williamsville NY) Meier David P. (Orchard Park NY) Wolff Edward A. (Tonawanda NY), Data processing system.
  16. Trainer Joshua P. (North Kingstown RI), Data structure extraction, conversion and display tool.
  17. Hammes,Jeffrey; Poznanovic,Daniel; Gliem,Lonnie, Debugging and performance profiling using control-dataflow graph representations with reconfigurable hardware emulation.
  18. Beck, Douglas Reed; Wang, Yi-Min, Detecting user-mode rootkits.
  19. Nistler,John Gerard; Schroeder,Mark Douglas, Determining how many class-type checks to inline.
  20. Chilimbi,Trishul A.; Hirzel,Martin, Dynamic temporal optimization framework.
  21. Tracy, Richard P.; Barrett, Hugh; Catlin, Gary M., Enhanced system, method and medium for certifying and accrediting requirements compliance utilizing continuous risk assessment.
  22. Gary M. Leask ; Dale L. Huffman, Graphical system and method for debugging computer programs.
  23. Aziz, Ashar; Drzewiecki, Adrian; Radhakrishnan, Ramesh; Manni, Jayaraman; Amin, Muhammad, Heuristic based capture with replay to virtual machine.
  24. Ansari Amir S. ; Khan Mohammad S. ; Brooks Jeffrey W., Industrial controller decompiler accommodating an expandable instruction set.
  25. Kitain Eduard ; Karaev Isaak ; Mahoney John J. ; McCarthy Mary Ellen ; Tousignant James M. ; Baird George ; Blazek Paul, Information delivery system and method including on-line entitlements.
  26. Turbell, Henrik; Gokstorp, Mats, Measuring apparatus and method for range inspection.
  27. Miller Annamarie ; Chrulski Christopher Mark, Method and apparatus for a waveform compiler.
  28. O'Brien Stephen Caine ; Maxwell ; III Sidney R., Method and apparatus for analyzing software in a language-independent manner.
  29. Holzle Urs ; Bak Lars, Method and apparatus for dynamically deoptimizing compiled activations.
  30. Holzle, Urs; Bak, Lars, Method and apparatus for dynamically deoptimizing compiled activations.
  31. Luc M. Burgun FR; Alain Raynaud FR, Method and apparatus for gate-level simulation of synthesized register transfer level design with source-level debugging.
  32. Raynaud Alain,FRX ; Burgun Luc M.,FRX, Method and apparatus for gate-level simulation of synthesized register transfer level designs with source-level debugging.
  33. Gschwind, Michael Karl, Method and apparatus for generating data parallel select operations in a pervasively data parallel system.
  34. Tirumalai,Partha P.; Kalogeropulos,Spiros; Song,Yonghong; Goebel,Kurt J., Method and apparatus for optimizing computer program performance using steered execution.
  35. De Greef Eddy,BEX ; Catthoor Francky,BEX ; De Man Hugo,BEX, Method and apparatus for size optimization of storage units.
  36. Le Pennec, Jean-Francois; Hericourt, Olivier, Method and system for caching virus-free file certificates.
  37. Coskun Nurcan (Austin TX) Tate Bruce A. (Austin TX), Method and system for providing a testing facility in a program development tool.
  38. Dumais,Susan T.; Horvitz,Eric J.; Cutrell,Edward B.; Cadiz,Jonathan J.; Jancke,Gavin; Sarin,Raman K.; Robbins,Daniel C.; Gupta,Anoop; Robertson,George G.; Ringel,Meredith J.; Goecks,Jeremy, Method and system for usage analyzer that determines user accessed sources, indexes data subsets, and associated metadata, processing implicit queries based on potential interest to users.
  39. Van Praet Johan Roland,BEX ; Lanneer Dirk,BEX ; Theresia Geurts Werner Gustaaf,BEX ; Goossens Gert Lodewijk Huibrecht,BEX, Method for processor modeling in code generation and instruction set simulation.
  40. Humphreys Greg ; Martino Paul J., Method for reconstructing debugging information for a decompiled executable file.
  41. Van Praet Johan Roland,BEX ; Lanneer Dirk,BEX ; Geurts Werner Gustaaf Theresia,BEX ; Goossens Gert Lodewijk Huibrecht,BEX, Method of generating code for programmable processors, code generator and application thereof.
  42. Lundeby Bruce A. (Colorado Springs CO), Method of validating a label translation configuration by parsing a real expression describing the translation configura.
  43. Goebel Kurt Joachim, Method, apparatus and computer programmed product for binary re-optimization using a high level language compiler.
  44. Lo Raymond ; Chow Frederick, Method, system, and computer program product for extending sparse partial redundancy elimination to support speculative code motion within an optimizing compiler.
  45. Lethin, Richard A.; Leung, Allen K.; Meister, Benoit J.; Vasilache, Nicolas T., Methods and apparatus for joint parallelism and locality optimization in source code compilation.
  46. Lethin, Richard A.; Leung, Allen K.; Meister, Benoit J.; Vasilache, Nicolas T.; Wohlford, David E., Methods and apparatus for local memory compaction.
  47. Kennedy, Mark, Methods and systems for detecting malware.
  48. Gschwind, Michael Karl; Montoye, Robert Kevin; Olsson, Brett; Wellman, John-David, Methods for generating code for an architecture encoding an extended register specification.
  49. Koved, Larry; Mendelson, Bilha; Porat, Sara; Biberstein, Marina, Mutability analysis in Java.
  50. Nizhegorodov,Dmitry, Native compilation and safe deployment of virtual machine code.
  51. Nagel Robert H., Object code logic analysis and automated modification system and method.
  52. Callahan, II, Charles David; Shields, Keith Arnett; Briggs, III, Preston Pengra, Parallelism performance analysis based on execution trace information.
  53. Saulpaugh, Thomas E.; Slaughter, Gregory L.; Duigou, Michael J., Pre-generated message endpoints.
  54. Guignet Jean-Bruce,FRX ; Barbier Denis,FRX, Process for analyzing complex structures and system for implementing a process of this type.
  55. Tremblay Marc ; O'Connor James Michael, Process of executing a method on a stack-based processor.
  56. Kataoka Yoshio,JPX, Program analysis system and program analysis method.
  57. Gounares, Alexander G.; Garrett, Charles D., Recompiling with generic to specific replacement.
  58. Newman, Gary H.; DeFuria, Richard M., Security control verification and monitoring subsystem for use in a computer information database system.
  59. Tseng Ping-Sheng ; Lin Sharon Sheau-Pyng ; Shen Quincy Kun-Hsu ; Sun Richard Yachyang ; Tsai Mike Mon Yen ; Tsay Ren-Song ; Wang Steven, Simulation/emulation system and method.
  60. Rioux, Christien, Software analysis framework.
  61. Rioux,Christien R., Software analysis framework.
  62. Grover, Vinod K.; Mitchell, Charles L.; Gillies, David Mitford; Roberts, Mark Leslie; Plesko, Mark Ronald; Tarditi, Jr., David Read; Edwards, Andrew James; Burger, Julian; Ayers, Andrew Edward; Sastry, Akella V. S., Software development infrastructure.
  63. Homing, James J.; Sibert, W. Olin; Tarjan, Robert E.; Maheshwari, Umesh; Home, William G.; Wright, Andrew K.; Matheson, Lesley R.; Owicki, Susan, Software self-defense systems and methods.
  64. Estep, James L.; Dehlin, Mark A., Software suitability testing system.
  65. Guenter Brian K. ; Knoblock Todd B. ; Ruf Erik S., Specialized shaders for shading objects in computer generated images.
  66. Rickel David ; McBeath James B., Static debugging tool and method.
  67. Mahaffey, Kevin, System and method for attack and malware prevention.
  68. Rozenberg, Boris; Gudes, Ehud; Elovici, Yuval, System and method for detecting new malicious executables, based on discovering and monitoring characteristic system call sequences.
  69. Solinsky,James C., System and method for dynamic knowledge construction.
  70. Walls,Thomas J.; Shah,Viren; Ghosh,Anup K., System and method for identifying and eliminating vulnerabilities in computer software applications.
  71. Mahaffey, Kevin Patrick; Burgess, James David; Golombek, David; Wyatt, Timothy Micheal; Lineberry, Anthony McKay; Barton, Kyle; Evans, Daniel Lee; Richardson, David Luke; Salomon, Ariel, System and method for server-coupled malware prevention.
  72. Fleehart, Timothy G.; Pincus, Jonathan D.; Wallace, Jeffrey S., System and method for whole-system program analysis.
  73. Kukol Peter (Aptos CA), System and methods for optimizing object-oriented compilations.
  74. Nayak,Anshuman; Haldar,Malay; Choudhary,Alok; Saxena,Vikram; Banerjee,Prithviraj, System for architecture and resource specification and methods to compile the specification onto hardware.
  75. Bastoul, Cedric; Lethin, Richard A.; Leung, Allen K.; Meister, Benoit J.; Szilagyi, Peter; Vasilache, Nicolas T.; Wohlford, David E., System, methods and apparatus for program optimization for multi-threaded processor architectures.
  76. Judge,Paul; Rajan,Guru, Systems and methods for adaptive message interrogation through multiple queues.
  77. Papakipos, Matthew N.; Grant, Brian K.; McGuire, Morgan S.; Demetriou, Christopher G., Systems and methods for determining compute kernels for an application in a parallel-processing computer system.
  78. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  79. Chow, Stanley T.; Johnson, Harold J.; Gu, Yuan, Tamper resistant software encoding.
  80. Chow, Stanley T.; Johnson, Harold J.; Gu, Yuan, Tamper resistant software-control flow encoding.
  81. Parvathala, Praveen K.; Maneparambil, Kailasnath; Lindsay, William C.; Jayaraman, Kamalnayan; Zhou, Geliang, Tool for generating a re-generative functional test.
  82. Nair,Sreekumar R.; Abraham,Santosh G., Using value speculation to break constraining dependencies in iterative control flow structures.

이 특허를 인용한 특허 (1)

  1. Freed, Andrew R.; Howard, Curtiss J.; Margolis, Saul B.; Miller, Dorian B., Automatic discovery of code and data stores that populate a user interface element.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트