$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Methods and systems for providing feedback and suggested programming methods 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-009/44
  • G06F-011/36
출원번호 US-0770487 (2013-02-19)
등록번호 US-9286063 (2016-03-15)
발명자 / 주소
  • Kriegsman, Mark
  • Black, Brian
출원인 / 주소
  • Veracode, Inc.
대리인 / 주소
    Goodwin Procter LLP
인용정보 피인용 횟수 : 0  인용 특허 : 101

초록

The techniques and supporting systems described herein provide a comprehensive and customizable approach to identifying the use of best practices during the design and development of software applications, as well as recommending additional enhancements or courses of action that may be implemented t

대표청구항

1. A software security assessment platform, comprising: a communications server, which in operation, receives technical characteristics of a target software application and business context information relating to the target software application;an analysis engine, which in operation:examines code o

이 특허에 인용된 특허 (101)

  1. Townsend, Timothy J., Adaptive countermeasure selection method and apparatus.
  2. Haley Matthew A. ; Pincus Jonathan D. ; Bush William R., Analysis of the effect of program execution of calling components with data variable checkpointing and resource allocation analysis.
  3. Ju Dz-ching ; Gillies David Mitford ; Sastry A. V. S., Apparatus and method for incrementally update static single assignment form for cloned variable name definitions.
  4. Greenfeld Norton R. (6 Brook Trail Rd. Wayland MA 01778), Apparatus for analyzing source code.
  5. Lou, Vic, Application behavior based malware detection.
  6. Gregory Brent ; Chatterjee Trinanjan ; Lin Jing C. ; Raghvendra Srinivas ; Girczyc Emil ; Estrada Paul ; Seawright Andrew, Architecture and methods for a hardware description language source level analysis and debugging system.
  7. Plum, Thomas S., Automated safe secure techniques for eliminating undefined behavior in computer software.
  8. Brennan, Todd, Centralized timed analysis in a network security system.
  9. Fanton, Andrew F.; Gandee, John J.; Lutton, William H.; Harper, Edwin L.; Godwin, Kurt E.; Rozga, Anthony A., Cloud-based application whitelisting.
  10. Underwood, Roy Aaron, Codes table framework design in an E-commerce architecture.
  11. Martin Paul A.,GBX, Compilation of computer program for execution on single compiling computer and for execution on multiple distributed co.
  12. Ian Carmichael CA; Derek B. Inglis CA; Michael Karasick ; Vincent J. Kruskal ; Harold L. Ossher ; David J. Streeter CA, Compiler for supporting multiple runtime data representations.
  13. McKeeman William M. (Hollis NH) Aki Shota (Weare NH), Compiler using clean lines table with entries indicating unchanged text lines for incrementally compiling only changed s.
  14. Levy Jacob Y. ; Lim Swee Boon ; Kretsch Donald J. ; Mitchell Wesley E. ; Lerner Benjamin, Compiler with generic front end and dynamically loadable back ends.
  15. Archambault, Roch Georges; Cui, Shimin; Gao, Yaoqing; Silvera, Raul Esteban, Compiling source code.
  16. Furgerson Donald F. (Murrysville PA), Computer monitored or controlled system which may be modified and de-bugged on-line by one not skilled in computer progr.
  17. Franssen Frank,BEX ; van Swaaij Michael,BEX ; Nachtergaele Lode,BEX ; Samsom Hans,BEX ; Catthoor Francky,BEX ; De Man Hugo,BEX, Control flow and memory management optimization.
  18. Frieder Gideon (Williamsville NY) Hughes David T. (Amherst NY) Kline Mark H. (Williamsville NY) Liebel ; Jr. John T. (Williamsville NY) Meier David P. (Orchard Park NY) Wolff Edward A. (Tonawanda NY), Data processing system.
  19. Trainer Joshua P. (North Kingstown RI), Data structure extraction, conversion and display tool.
  20. Hammes,Jeffrey; Poznanovic,Daniel; Gliem,Lonnie, Debugging and performance profiling using control-dataflow graph representations with reconfigurable hardware emulation.
  21. Beck, Douglas Reed; Wang, Yi-Min, Detecting user-mode rootkits.
  22. Nistler,John Gerard; Schroeder,Mark Douglas, Determining how many class-type checks to inline.
  23. Chilimbi,Trishul A.; Hirzel,Martin, Dynamic temporal optimization framework.
  24. Tracy, Richard P.; Barrett, Hugh; Catlin, Gary M., Enhanced system, method and medium for certifying and accrediting requirements compliance utilizing continuous risk assessment.
  25. Mir, Talhah M.; Revuru, Anil Kumar; Veney, Shawn G., Enterprise threat modeling.
  26. Gary M. Leask ; Dale L. Huffman, Graphical system and method for debugging computer programs.
  27. Aziz, Ashar; Drzewiecki, Adrian; Radhakrishnan, Ramesh; Manni, Jayaraman; Amin, Muhammad, Heuristic based capture with replay to virtual machine.
  28. Bettini, Anthony John; Watkins, Kevin; Guerra, Domingo J.; Price, Michael, In-line filtering of insecure or unwanted mobile device software components or communications.
  29. Brooks Jeffery W. ; Husted Raymond R. ; Rischar Charles M. ; Ansari Amir S., Industrial controller compiler with expandable instruction set.
  30. Ansari Amir S. ; Khan Mohammad S. ; Brooks Jeffrey W., Industrial controller decompiler accommodating an expandable instruction set.
  31. Kitain Eduard ; Karaev Isaak ; Mahoney John J. ; McCarthy Mary Ellen ; Tousignant James M. ; Baird George ; Blazek Paul, Information delivery system and method including on-line entitlements.
  32. O'Connor James Michael ; Tremblay Marc, Instruction folding for a stack-based machine.
  33. Wan, Justin, Malware detection using pattern classification.
  34. Turbell, Henrik; Gokstorp, Mats, Measuring apparatus and method for range inspection.
  35. Miller Annamarie ; Chrulski Christopher Mark, Method and apparatus for a waveform compiler.
  36. O'Brien Stephen Caine ; Maxwell ; III Sidney R., Method and apparatus for analyzing software in a language-independent manner.
  37. Holzle Urs ; Bak Lars, Method and apparatus for dynamically deoptimizing compiled activations.
  38. Holzle Urs ; Bak Lars, Method and apparatus for dynamically deoptimizing compiled activations.
  39. Holzle, Urs; Bak, Lars, Method and apparatus for dynamically deoptimizing compiled activations.
  40. Luc M. Burgun FR; Alain Raynaud FR, Method and apparatus for gate-level simulation of synthesized register transfer level design with source-level debugging.
  41. Raynaud Alain,FRX ; Burgun Luc M.,FRX, Method and apparatus for gate-level simulation of synthesized register transfer level designs with source-level debugging.
  42. Tirumalai,Partha P.; Kalogeropulos,Spiros; Song,Yonghong; Goebel,Kurt J., Method and apparatus for optimizing computer program performance using steered execution.
  43. De Greef Eddy,BEX ; Catthoor Francky,BEX ; De Man Hugo,BEX, Method and apparatus for size optimization of storage units.
  44. Le Pennec, Jean-Francois; Hericourt, Olivier, Method and system for caching virus-free file certificates.
  45. Coskun Nurcan (Austin TX) Tate Bruce A. (Austin TX), Method and system for providing a testing facility in a program development tool.
  46. Doddapaneni, Srinivas P.; Peri, Ramesh V.; Mueller, Gerold P.; Kehrle, Guido, Method and system for setting a breakpoint.
  47. Dumais,Susan T.; Horvitz,Eric J.; Cutrell,Edward B.; Cadiz,Jonathan J.; Jancke,Gavin; Sarin,Raman K.; Robbins,Daniel C.; Gupta,Anoop; Robertson,George G.; Ringel,Meredith J.; Goecks,Jeremy, Method and system for usage analyzer that determines user accessed sources, indexes data subsets, and associated metadata, processing implicit queries based on potential interest to users.
  48. Jong-Deok Choi ; Manish Gupta ; Mauricio J. Serrano ; Vugranam C. Sreedhar ; Samuel Pratt Midkiff, Method for optimizing creation and destruction of objects in computer programs.
  49. Van Praet Johan Roland,BEX ; Lanneer Dirk,BEX ; Theresia Geurts Werner Gustaaf,BEX ; Goossens Gert Lodewijk Huibrecht,BEX, Method for processor modeling in code generation and instruction set simulation.
  50. Humphreys Greg ; Martino Paul J., Method for reconstructing debugging information for a decompiled executable file.
  51. Van Praet Johan Roland,BEX ; Lanneer Dirk,BEX ; Geurts Werner Gustaaf Theresia,BEX ; Goossens Gert Lodewijk Huibrecht,BEX, Method of generating code for programmable processors, code generator and application thereof.
  52. Lundeby Bruce A. (Colorado Springs CO), Method of validating a label translation configuration by parsing a real expression describing the translation configura.
  53. Lo Raymond ; Chow Frederick, Method, system, and computer program product for extending sparse partial redundancy elimination to support speculative code motion within an optimizing compiler.
  54. Kennedy, Mark, Methods and systems for detecting malware.
  55. Mellinger, Philip T.; Degen, Robert G., Methods and systems for performing security risk assessments of internet merchant entities.
  56. Caron Ilan G. (Redmond WA) Carter Alan W. (Bellevue WA) Canady Dennis M. (Redmond WA) Corbett Tom (Eugene OR) Kumar Rajiv (Redmond WA), Module dependency based incremental compiler and method.
  57. Koved, Larry; Mendelson, Bilha; Porat, Sara; Biberstein, Marina, Mutability analysis in Java.
  58. Collberg, Christian Sven; Thomborson, Clark David; Low, Douglas Wai Kok, Obfuscation techniques for enhancing software security.
  59. Nagel Robert H., Object code logic analysis and automated modification system and method.
  60. Callahan, II, Charles David; Shields, Keith Arnett; Briggs, III, Preston Pengra, Parallelism performance analysis based on execution trace information.
  61. Durham, David; Sahita, Ravi; Rajagopal, Priya, Platform-based identification of host software circumvention.
  62. Saulpaugh, Thomas E.; Slaughter, Gregory L.; Duigou, Michael J., Pre-generated message endpoints.
  63. Guignet Jean-Bruce,FRX ; Barbier Denis,FRX, Process for analyzing complex structures and system for implementing a process of this type.
  64. Tremblay Marc ; O'Connor James Michael, Process of executing a method on a stack-based processor.
  65. Kataoka Yoshio,JPX, Program analysis system and program analysis method.
  66. Wright, Gregory M.; Wolczko, Mario I.; Seidl, Matthew L., Reducing the overhead involved in executing native code in a virtual machine through binary reoptimization.
  67. Newman, Gary H.; DeFuria, Richard M., Security control verification and monitoring subsystem for use in a computer information database system.
  68. Bowden,Tommy H., Self-configuring server and server network.
  69. Tseng Ping-Sheng ; Lin Sharon Sheau-Pyng ; Shen Quincy Kun-Hsu ; Sun Richard Yachyang ; Tsai Mike Mon Yen ; Tsay Ren-Song ; Wang Steven, Simulation/emulation system and method.
  70. Rioux, Christien, Software analysis framework.
  71. Rioux, Christien R., Software analysis framework.
  72. Rioux,Christien R., Software analysis framework.
  73. Grover, Vinod K.; Mitchell, Charles L.; Gillies, David Mitford; Roberts, Mark Leslie; Plesko, Mark Ronald; Tarditi, Jr., David Read; Edwards, Andrew James; Burger, Julian; Ayers, Andrew Edward; Sastry, Akella V. S., Software development infrastructure.
  74. Thompson, Gerald R., Software diversity using context-free grammar transformations.
  75. Homing, James J.; Sibert, W. Olin; Tarjan, Robert E.; Maheshwari, Umesh; Home, William G.; Wright, Andrew K.; Matheson, Lesley R.; Owicki, Susan, Software self-defense systems and methods.
  76. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  77. Estep, James L.; Dehlin, Mark A., Software suitability testing system.
  78. Guenter Brian K. ; Knoblock Todd B. ; Ruf Erik S., Specialized shaders for shading objects in computer generated images.
  79. Rickel David ; McBeath James B., Static debugging tool and method.
  80. Mahaffey, Kevin, System and method for attack and malware prevention.
  81. Rozenberg, Boris; Gudes, Ehud; Elovici, Yuval, System and method for detecting new malicious executables, based on discovering and monitoring characteristic system call sequences.
  82. Solinsky,James C., System and method for dynamic knowledge construction.
  83. Walls,Thomas J.; Shah,Viren; Ghosh,Anup K., System and method for identifying and eliminating vulnerabilities in computer software applications.
  84. Victorov, Victor Y., System and method for obfuscation of reverse compiled computer code.
  85. Mahaffey, Kevin Patrick; Burgess, James David; Golombek, David; Wyatt, Timothy Micheal; Lineberry, Anthony McKay; Barton, Kyle; Evans, Daniel Lee; Richardson, David Luke; Salomon, Ariel, System and method for server-coupled malware prevention.
  86. Fleehart, Timothy G.; Pincus, Jonathan D.; Wallace, Jeffrey S., System and method for whole-system program analysis.
  87. Kukol Peter (Aptos CA), System and methods for optimizing object-oriented compilations.
  88. Nayak,Anshuman; Haldar,Malay; Choudhary,Alok; Saxena,Vikram; Banerjee,Prithviraj, System for architecture and resource specification and methods to compile the specification onto hardware.
  89. Stefik Mark J., System for controlling the distribution and use of digital works having attached usage rights where the usage rights are.
  90. Chow Jyh-Herng ; Fuh You-Chin (Gene) ; Mattos Nelson Mendonca ; Tran Brian T., System, method, and program for extending a SQL compiler for handling control statements packaged with SQL query statem.
  91. Judge,Paul; Rajan,Guru, Systems and methods for adaptive message interrogation through multiple queues.
  92. Papakipos, Matthew N.; Grant, Brian K.; McGuire, Morgan S.; Demetriou, Christopher G., Systems and methods for determining compute kernels for an application in a parallel-processing computer system.
  93. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  94. Chow, Stanley T.; Johnson, Harold J.; Gu, Yuan, Tamper resistant software encoding.
  95. Chow, Stanley T.; Johnson, Harold J.; Gu, Yuan, Tamper resistant software-control flow encoding.
  96. Steensgaard Bjarne, Terminating polymorphic type inference program analysis.
  97. Parvathala, Praveen K.; Maneparambil, Kailasnath; Lindsay, William C.; Jayaraman, Kamalnayan; Zhou, Geliang, Tool for generating a re-generative functional test.
  98. Nair,Sreekumar R.; Abraham,Santosh G., Using value speculation to break constraining dependencies in iterative control flow structures.
  99. Gordon,Andrew; Syme,Donald; Forbes,Jonathon; Morrison,Vance P., Verifier to check intermediate language.
  100. Sobel,William E.; Isenberg,Henri, Vulnerability assessment of disk images.
  101. Louch, John O.; Forstall, Scott; Peyton, Eric Steven, Widget security.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로