发明名称 Automated detection of flaws and incompatibility problems in information flow downgraders
摘要 Mechanisms for evaluating downgrader code in application code with regard to a target deployment environment. Downgrader code in the application code is identified. Based on an input string, an output string that the downgrader code outputs in response to receiving the input string is identified. One or more sets of illegal string patterns are retrieved. Each of the one or more sets of illegal string patterns is associated with a corresponding deployment environment. The illegal string patterns are string patterns that a downgrader identifies in the information flow for security purposes. A determination is made as to whether the downgrader code is compatible with the target deployment environment based on the one or more sets of illegal string patterns and the output string. An output indicative of the results of the determining is generated.
申请公布号 US8881300(B2) 申请公布日期 2014.11.04
申请号 US201313784962 申请日期 2013.03.05
申请人 International Business Machines Corporation 发明人 Pistoia Marco;Tateishi Takaaki;Teilhet Stephen D.;Tripp Omer
分类号 G06F7/04;G06F17/30;H04N7/16;G06F21/00;G06F21/57 主分类号 G06F7/04
代理机构 代理人 Walder, Jr. Stpehen J.;LaBaw Jeffrey S.
主权项 1. A method, in a data processing system, for evaluating downgrader code in application code with regard to a target deployment environment, comprising: identifying, by an application analysis mechanism of the data processing system, the downgrader code in the application code, wherein the downgrader code is a portion of code in the application code that operates on an information flow of the application code to ensure confidentiality of information input to the downgrader code, in the output of the downgrader code; generating, by the application analysis mechanism, based on an input string, an output string that the downgrader code outputs in response to receiving the input string; retrieving, from a storage system associated with the data processing system, one or more sets of illegal string patterns, wherein each of the one or more sets of illegal string patterns is associated with a corresponding deployment environment, and wherein the illegal string patterns are string patterns that a downgrader identifies in the information flow for security purposes; determining, by the application analysis mechanism, whether the downgrader code is compatible with the target deployment environment based on the one or more sets of illegal string patterns and the output string; and generating, by the application analysis mechanism, an output indicative of the results of the determining.
地址 Armonk NY US