发明名称 Application testing system and method
摘要 A method, computer program product, and computer system for sending, by a first computing device, a payload from a plurality of payloads to a second computing device. A response from the second computing device responding to the payload is received at the first computing device. It is determined whether the payload has successfully attacked an application executing at the second computing device based upon, at least in part, the response. If not, at least a portion of the plurality of payloads that shares a structural overlap with the first payload is identified. At least a second payload of the portion is prevented from being sent to the second computing device in response to identifying that the second payload shares the structural overlap with the first payload.
申请公布号 US8949985(B2) 申请公布日期 2015.02.03
申请号 US201314048585 申请日期 2013.10.08
申请人 International Business Machines Corporation 发明人 Amit Yair;Cohen Adi;Guy Lotem;Landau Alexander;Tripp Omer;Vana Avishai;Weisman Omri
分类号 G06F21/00;H04L29/06;H04L27/26;H04L1/00;H04L5/00 主分类号 G06F21/00
代理机构 Holland & Knight LLP 代理人 Holland & Knight LLP ;Colandreo, Esq. Brian J.;Placker, Esq. Jeffrey T.
主权项 1. A computer-implemented method comprising: defining a collection of constraints to which an application must conform for a test in a set of test, the set of test including a plurality of payloads; defining a collection of constraints to which the application conforms; defining a collection of constraints to which the application does not conform; sending, by a first computing device, a payload from the plurality of payloads to a second computing device, wherein sending the payload is in response to determining that a constraint in the collection of constraints to which the application must conform for the test is not in the collection of constraints to which the application does not conform; receiving, at the first computing device, a response from the second computing device responding to the payload; determining whether the payload has successfully attacked the application executing at the second computing device based upon, at least in part, the response; and if the attack failed, identifying at least a portion of the plurality of payloads that shares a structural overlap with the first payload; and preventing at least a second payload of the portion from being sent to the second computing device in response to identifying that the second payload shares the structural overlap with the first payload, including adjusting a priority of at least the second payload.
地址 Armonk NY US