发明名称 Systems and methods for determining potential impacts of applications on the security of computing systems
摘要 A computer-implemented method for determining potential impacts of applications on the security of computing systems may include (1) identifying an application subject to a security vulnerability assessment, (2) requesting information that identifies a potential impact of the application on a vulnerability of at least one computing system to at least one exploit associated with the application, (3) receiving the information that identifies the potential impact of the application on the vulnerability of the computing system, wherein the information may be derived at least in part from data from at least one additional computing system on which the application has previously been installed and (4) directing a determination about an installation of the application on the computing system based at least in part on the information that identifies the potential impact of the application on the vulnerability of the computing system. Various other methods, systems, and computer-readable media are also disclosed.
申请公布号 US9501649(B2) 申请公布日期 2016.11.22
申请号 US201313838613 申请日期 2013.03.15
申请人 Symantec Corporation 发明人 Sharma Piyush;Ashley Peter
分类号 G06F21/57 主分类号 G06F21/57
代理机构 ALG Intellectual Property, LLC 代理人 ALG Intellectual Property, LLC
主权项 1. A computer-implemented method for determining potential impacts of applications on the security of computing systems, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising: identifying an application subject to a security vulnerability assessment that includes an assessment of how the application may interfere with one or more components of a computing system that may create a vulnerability in the computing system, the one or more components comprising at least one of a hardware component of the computing system or a software component of the computing system; requesting information that identifies a potential impact of the application on a vulnerability of the computing system to at least one exploit associated with the application by submitting information about the one or more components of the computing system; receiving the information that identifies the potential impact of the application on the vulnerability of the computing system, wherein: the information that identifies the potential impact of the application is derived at least in part from a statistical analysis correlating at least one of the one or more components of the computing system with at least one event on at least one additional computing system on which the application has previously been installed;the event indicates the exploit associated with the application;one or more components of the additional computing system match at least one of the one or more components of the computing system;the information that identifies the potential impact is based at least in part on the one or more components of the computing system; directing a determination about an installation of the application on the computing system based at least in part on the information that identifies the potential impact of the application on the vulnerability of the computing system, wherein: the installation comprises an automatic update of a previous version of the application to a newer version of the application;directing the determination about the installation comprises blocking the automatic update of the previous version of the application on the computing system to the newer version of the application.
地址 Mountain View CA US