发明名称 HYBRID ANALYSIS OF VULNERABLE INFORMATION FLOWS
摘要 <p>Arrangements described herein relate to analyzing vulnerable information flows in an application. A black-box scan of the application can be performed to record a call-tree representation of call stacks arising in the application due to test inputs provided during the black-box scan. For each path in the call-tree representation that does not constitute a vulnerable information flow during the black-box scan, a static analysis can be performed to determine at least one parameter value that, when abstracted, drives execution of the application, via the path, to flow to the at least one security sink. A security report can be generated identifying at least one of the paths in the call-tree representation that does not constitute the vulnerable information flow during the black-box scan, but flows to the at least one security sink when the at least one parameter value is abstracted.</p>
申请公布号 WO2014102627(A1) 申请公布日期 2014.07.03
申请号 WO2013IB60235 申请日期 2013.11.19
申请人 INTERNATIONAL BUSINESS MACHINES CORPORATION;IBM UNITED KINGDOM LIMITED;IBM (CHINA) INVESTMENT COMPANY LIMITED 发明人 TRIPP, OMER;BESKROVNY, EVGENY;SHARABANI, ADI
分类号 G06F11/36 主分类号 G06F11/36
代理机构 代理人
主权项
地址