Processing

Please wait...

Settings

Settings

Goto Application

1. WO2022011102 - SYSTEMS AND METHODS FOR SOFTWARE SECURITY ANALYSIS

Publication Number WO/2022/011102
Publication Date 13.01.2022
International Application No. PCT/US2021/040826
International Filing Date 08.07.2021
IPC
G06F 21/56 2013.1
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
55Detecting local intrusion or implementing counter-measures
56Computer malware detection or handling, e.g. anti-virus arrangements
G06F 21/57 2013.1
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
CPC
G06F 21/562
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
55Detecting local intrusion or implementing counter-measures
56Computer malware detection or handling, e.g. anti-virus arrangements
562Static detection
G06F 21/566
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
55Detecting local intrusion or implementing counter-measures
56Computer malware detection or handling, e.g. anti-virus arrangements
566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
G06F 21/577
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
577Assessing vulnerabilities and evaluating computer system security
G06F 2221/033
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
2221Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
033Test or assess software
Applicants
  • CODELOGIC, INC. [US]/[US]
Inventors
  • SARKAR, Soumik
Agents
  • MCLAUGHLIN, Neal, J.
Priority Data
16/924,08708.07.2020US
Publication Language English (en)
Filing Language English (EN)
Designated States
Title
(EN) SYSTEMS AND METHODS FOR SOFTWARE SECURITY ANALYSIS
(FR) SYSTÈMES ET PROCÉDÉS POUR ANALYSE DE SÉCURITÉ DE LOGICIEL
Abstract
(EN) A security analysis of software includes analyzing security risks at each level of the hierarchy of the software and aggregating identified risks within the hierarchy levels. Weights applied during aggregation assist in homogenizing risk scores originating from different types of identified security risks and provide for the ability to communicate a meaningful risk score at each level of the hierarchy.
(FR) Une analyse de sécurité de logiciel consiste à analyser des risques de sécurité à chaque niveau de la hiérarchie du logiciel et à agréger les risques identifiés dans les niveaux hiérarchiques. Des poids appliqués pendant l'agrégation aident à homogénéiser des scores de risques à partir de différents types de risques de sécurité identifiés et assurent la capacité à communiquer un score de risque significatif à chaque niveau de la hiérarchie.
Related patent documents
Latest bibliographic data on file with the International Bureau