Patents by Inventor Benjamin John Godwood
Benjamin John Godwood has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11868465Abstract: A computer includes a memory and a processor programmed to execute instructions stored in the memory. The instructions include identifying a function in a binary file, assigning one of a plurality of classifications to the function, and determining that the function requires stack cookie protection based at least in part on the classification assigned to the function.Type: GrantFiled: October 25, 2021Date of Patent: January 9, 2024Assignee: Blackberry LimitedInventors: Adam John Boulton, Benjamin John Godwood
-
Publication number: 20230216869Abstract: In embodiments of the present teachings, improved capabilities are described for detecting restricted content associated with retrieved content. The method and system may include receiving a client request for content, saving contextual information from the client request, and presenting the contextual information from the client request, and retrieved content, to a scanning facility. The scanning facility may use the contextual information and the retrieved content to initiate a remedial action on the client.Type: ApplicationFiled: March 13, 2023Publication date: July 6, 2023Inventors: Fraser Peter Howard, Paul Oliver Baccas, Vanja Svajcer, Benjamin John Godwood, William James McCourt
-
Patent number: 11632379Abstract: In embodiments of the present invention improved capabilities are described for detecting restricted content associated with retrieved content. The method and system may include receiving a client request for content, saving contextual information from the client request, presenting retrieved content in response to the client request, and presenting the contextual information from the client request, and retrieved content, to a scanning facility. The scanning facility may utilize the contextual information from the client request to aid in the detection of restricted content associated with retrieved content.Type: GrantFiled: April 2, 2018Date of Patent: April 18, 2023Assignee: Sophos LimitedInventors: Fraser Howard, Paul Oliver Baccas, Vanja Svajcer, Benjamin John Godwood, William James McCourt
-
Patent number: 11347850Abstract: Systems, methods, and software can be used to analyze binary software codes. In some aspects, a computer-implemented method comprises: scanning, by at least one hardware processor, a binary software code to identify one or more text strings; associating, by the at least one hardware processor, the binary software code with a software platform based on the identified one or more text strings; disassembling, by the at least one hardware processor, the binary software code based on the software platform associated with the binary software code; and detecting, by the at least one hardware processor, a security risk in the disassembled binary software code.Type: GrantFiled: October 1, 2018Date of Patent: May 31, 2022Assignee: BlackBerry LimitedInventors: Adam John Boulton, William James McCourt, Benjamin John Godwood, Paul Compton Hirst, Niall Fitzgibbon
-
Publication number: 20220058260Abstract: A computer includes a memory and a processor programmed to execute instructions stored in the memory. The instructions include identifying a function in a binary file, assigning one of a plurality of classifications to the function, and determining that the function requires stack cookie protection based at least in part on the classification assigned to the function.Type: ApplicationFiled: October 25, 2021Publication date: February 24, 2022Applicant: Blackberry LimitedInventors: Adam John BOULTON, Benjamin John GODWOOD
-
Patent number: 11210405Abstract: A method of determining a severity score is disclosed. The method includes receiving a binary; using the binary, determining a plurality of vulnerability parameters; and generating a report based on the plurality of vulnerability parameters.Type: GrantFiled: October 29, 2019Date of Patent: December 28, 2021Assignee: BlackBerry LimitedInventors: Adam John Boulton, William James McCourt, Benjamin John Godwood, Paul Compton Hirst
-
Patent number: 11157611Abstract: A computer includes a memory and a processor programmed to execute instructions stored in the memory. The instructions include identifying a function in a binary file, assigning one of a plurality of classifications to the function, and determining that the function requires stack cookie protection based at least in part on the classification assigned to the function.Type: GrantFiled: September 12, 2018Date of Patent: October 26, 2021Assignee: Blackberry LimitedInventors: Adam John Boulton, Benjamin John Godwood
-
Publication number: 20210271762Abstract: A method for symbolic analysis of a software program is described. The method comprises constructing a control flow graph (CFG), for a software program procedure, the CFG comprising nodes representing basic blocks reachable within the software program procedure, the basic blocks represented as respective functions from a first machine state on entry to a said basic block to a second machine state on exit from that basic block. The method further describes simplifying the CFG to a single node representing the software program procedure as a function from an input machine state on entry to the software program procedure to an output machine state on exit from the software program procedure, comparing said function to a rule set identifying vulnerabilities based on effects on the machine state; and determining a vulnerability within the software program procedure based on the comparing.Type: ApplicationFiled: February 4, 2021Publication date: September 2, 2021Applicant: BlackBerry LimitedInventors: William James McCOURT, Niall FITZGIBBON, Benjamin John GODWOOD, Paul Compton HIRST
-
Publication number: 20210133330Abstract: Systems, methods, and software can be used to determine a security score of a binary software code. In some aspects, a computer-implemented method comprises: receiving a binary software code; inspecting the binary software code to determine at least one Common Vulnerability Scoring Standard (CVSS) factor; and determining a CVSS score based on the at least one CVSS factor.Type: ApplicationFiled: November 1, 2019Publication date: May 6, 2021Applicant: BlackBerry LimitedInventors: Adam John BOULTON, William James McCOURT, Paul Compton HIRST, Benjamin John GODWOOD
-
Publication number: 20210034757Abstract: A method of determining a severity score is disclosed. The method includes receiving a binary; using the binary, determining a plurality of vulnerability parameters; and generating a report based on the plurality of vulnerability parameters.Type: ApplicationFiled: October 29, 2019Publication date: February 4, 2021Inventors: Adam John BOULTON, William James McCOURT, Benjamin John GODWOOD, Paul Compton HIRST
-
Publication number: 20200410108Abstract: Described are methods and computing devices for identifying potential vulnerabilities in a software package. The package includes build files that include an application file and one or more associated files. The method may include scanning the application file to identify and extract a string from the application file and determining that the string is referenced in one of the associated files and obtaining data associated with the string from the associated file. The string may then be classified based, in part, on the data obtained from the associated file, and a full context may be determined for the string based, at least in part, on the classification. A relevance rank for the string is then set based on the full context and the string and its relevance rank are output.Type: ApplicationFiled: June 27, 2019Publication date: December 31, 2020Applicant: BlackBerry LimitedInventors: Adam John BOULTON, William James MCCOURT, Benjamin John GODWOOD
-
Publication number: 20200104490Abstract: Systems, methods, and software can be used to analyze binary software codes. In some aspects, a computer-implemented method comprises: scanning, by at least one hardware processor, a binary software code to identify one or more text strings; associating, by the at least one hardware processor, the binary software code with a software platform based on the identified one or more text strings; disassembling, by the at least one hardware processor, the binary software code based on the software platform associated with the binary software code; and detecting, by the at least one hardware processor, a security risk in the disassembled binary software code.Type: ApplicationFiled: October 1, 2018Publication date: April 2, 2020Applicant: BlackBerry LimitedInventors: Adam John BOULTON, William James McCOURT, Benjamin John GODWOOD, Paul Compton HIRST, Niall FITZGIBBON
-
Publication number: 20200082080Abstract: A computer includes a memory and a processor programmed to execute instructions stored in the memory. The instructions include processing a binary file to determine a security risk associated with the binary file. Processing the binary file includes determining a characteristic from metadata of the binary file. The security risk associated with the binary file is based at least in part on the characteristic of the binary file.Type: ApplicationFiled: September 12, 2018Publication date: March 12, 2020Inventors: Adam John BOULTON, Benjamin John GODWOOD
-
Publication number: 20190205526Abstract: A computer includes a memory and a processor programmed to execute instructions stored in the memory. The instructions include identifying a function in a binary file, assigning one of a plurality of classifications to the function, and determining that the function requires stack cookie protection based at least in part on the classification assigned to the function.Type: ApplicationFiled: September 12, 2018Publication date: July 4, 2019Inventors: Adam John BOULTON, Benjamin John GODWOOD
-
Publication number: 20180227319Abstract: In embodiments of the present invention improved capabilities are described for detecting restricted content associated with retrieved content. The method and system may include receiving a client request for content, saving contextual information from the client request, presenting retrieved content in response to the client request, and presenting the contextual information from the client request, and retrieved content, to a scanning facility. The scanning facility may utilize the contextual information from the client request to aid in the detection of restricted content associated with retrieved content.Type: ApplicationFiled: April 2, 2018Publication date: August 9, 2018Inventors: Fraser Howard, Paul Oliver Baccas, Vanja Svajcer, Benjamin John Godwood, William James McCourt
-
Patent number: 9967271Abstract: In embodiments of the present invention improved capabilities are described for detecting restricted content associated with retrieved content. The method and system may include receiving a client request for content, saving contextual information from the client request, presenting retrieved content in response to the client request, and presenting the contextual information from the client request, and retrieved content, to a scanning facility. The scanning facility may utilize the contextual information from the client request to aid in the detection of restricted content associated with retrieved content.Type: GrantFiled: August 31, 2017Date of Patent: May 8, 2018Assignee: Sophos LimitedInventors: Fraser Howard, Paul Baccas, Vanja Svajcer, Benjamin John Godwood, William James McCourt
-
Publication number: 20170366565Abstract: In embodiments of the present invention improved capabilities are described for detecting restricted content associated with retrieved content. The method and system may include receiving a client request for content, saving contextual information from the client request, presenting retrieved content in response to the client request, and presenting the contextual information from the client request, and retrieved content, to a scanning facility. The scanning facility may utilize the contextual information from the client request to aid in the detection of restricted content associated with retrieved content.Type: ApplicationFiled: August 31, 2017Publication date: December 21, 2017Inventors: Fraser Howard, Paul Baccas, Vanja Svajcer, Benjamin John Godwood, William James McCourt
-
Patent number: 9800599Abstract: In embodiments of the present invention improved capabilities are described for detecting restricted content associated with retrieved content. The method and system may include receiving a client request for content, saving contextual information from the client request, presenting retrieved content in response to the client request, and presenting the contextual information from the client request, and retrieved content, to a scanning facility. The scanning facility may utilize the contextual information from the client request to aid in the detection of restricted content associated with retrieved content.Type: GrantFiled: February 10, 2017Date of Patent: October 24, 2017Assignee: Sophos LimitedInventors: Fraser Howard, Paul Baccas, Vanja Svajcer, Benjamin John Godwood, William James McCourt
-
Publication number: 20170208078Abstract: In embodiments of the present invention improved capabilities are described for detecting restricted content associated with retrieved content. The method and system may include receiving a client request for content, saving contextual information from the client request, presenting retrieved content in response to the client request, and presenting the contextual information from the client request, and retrieved content, to a scanning facility. The scanning facility may utilize the contextual information from the client request to aid in the detection of restricted content associated with retrieved content.Type: ApplicationFiled: February 10, 2017Publication date: July 20, 2017Inventors: Fraser Howard, Paul Baccas, Vanja Svajcer, Benjamin John Godwood, William James McCourt
-
Patent number: 9654488Abstract: In embodiments of the present invention improved capabilities are described for detecting restricted content associated with retrieved content. The method and system may include receiving a client request for content, saving contextual information from the client request, presenting retrieved content in response to the client request, and presenting the contextual information from the client request, and retrieved content, to a scanning facility. The scanning facility may utilize the contextual information from the client request to aid in the detection of restricted content associated with retrieved content.Type: GrantFiled: June 8, 2016Date of Patent: May 16, 2017Assignee: Sophos LimitedInventors: Fraser Howard, Paul Baccas, Vanja Svajcer, Benjamin John Godwood, William James McCourt