Patents by Inventor Serena Ponta

Serena Ponta has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10831899
    Abstract: Systems and methods are provided for retrieving a set of code changes to source code from a source code repository, analyzing the set of code changes to generate a vector representation of each code change of the set of code changes, analyzing the vector representation of each code change of the set of code changes using a trained security-relevant code detection machine learning model, receiving a prediction from the security-relevant code detection machine learning model representing a probability that each code change of the set of code changes contains security-relevant changes, analyzing the prediction to determine whether the prediction is below or above a predetermined threshold, and generating results based on determining whether the prediction is below or above a predetermined threshold.
    Type: Grant
    Filed: May 14, 2018
    Date of Patent: November 10, 2020
    Assignee: SAP SE
    Inventors: Michele Bezzi, Antonino Sabetta, Henrik Plate, Serena Ponta
  • Publication number: 20200175174
    Abstract: Data is received that characterizes source code requiring a security vulnerability assessment. Using this received data, an input node of a vulnerability context graph is generated. Subsequently, at least one node is resolved from the input node using at least one of a plurality of resolvers that collectively access each of a knowledge base, a source code commit database, and at least one online resource. Additionally nodes are later iteratively resolved at different depth levels until a pre-defined threshold is met. The vulnerability context graph is then caused to be displayed in a graphical user interface such that each node has a corresponding graphical user interface element which, when activated, causes complementary information for such node to be displayed.
    Type: Application
    Filed: December 4, 2018
    Publication date: June 4, 2020
    Inventors: Jamarber Bakalli, Michele Bezzi, Cedric Dangremont, Sule Kahraman, Henrik Plate, Serena Ponta, Antonino Sabetta
  • Publication number: 20190347424
    Abstract: Systems and methods are provided for retrieving a set of code changes to source code from a source code repository, analyzing the set of code changes to generate a vector representation of each code change of the set of code changes, analyzing the vector representation of each code change of the set of code changes using a trained security-relevant code detection machine learning model, receiving a prediction from the security-relevant code detection machine learning model representing a probability that each code change of the set of code changes contains security-relevant changes, analyzing the prediction to determine whether the prediction is below or above a predetermined threshold, and generating results based on determining whether the prediction is below or above a predetermined threshold.
    Type: Application
    Filed: May 14, 2018
    Publication date: November 14, 2019
    Inventors: Michele Bezzi, Antonino Sabetta, Henrik Plate, Serena Ponta
  • Patent number: 10474456
    Abstract: Systems and methods are provided for accessing a source code repository comprising a plurality of versions of code, analyzing the plurality of versions of code of the component to compute metrics to identify each version of code, analyzing the metrics to determine a subset of the metrics to use to as a fingerprint definition to identify each version of the code, generating a fingerprint for each version of code using the fingerprint definition, generating a fingerprint matrix with the fingerprint for each version of code for the software component and storing the fingerprint definition and the fingerprint matrix
    Type: Grant
    Filed: May 17, 2019
    Date of Patent: November 12, 2019
    Assignee: SAP SE
    Inventors: Michele Bezzi, Antonino Sabetta, Henrik Plate, Serena Ponta, Francesco Di Cerbo
  • Publication number: 20190272170
    Abstract: Systems and methods are provided for accessing a source code repository comprising a plurality of versions of code, analyzing the plurality of versions of code of the component to compute metrics to identify each version of code, analyzing the metrics to determine a subset of the metrics to use to as a fingerprint definition to identify each version of the code, generating a fingerprint for each version of code using the fingerprint definition, generating a fingerprint matrix with the fingerprint for each version of code for the software component and storing the fingerprint definition and the fingerprint matrix
    Type: Application
    Filed: May 17, 2019
    Publication date: September 5, 2019
    Inventors: Michele Bezzi, Antonino Sabetta, Henrik Plate, Serena Ponta, Francesco Di Cerbo
  • Patent number: 10338916
    Abstract: Systems and methods are provided for accessing a source code repository comprising a plurality of versions of code, analyzing the plurality of versions of code of the component to compute metrics to identify each version of code, analyzing the metrics to determine a subset of the metrics to use to as a fingerprint definition to identify each version of the code, generating a fingerprint for each version of code using the fingerprint definition, generating a fingerprint matrix with the fingerprint for each version of code for the software component and storing the fingerprint definition and the fingerprint matrix.
    Type: Grant
    Filed: December 7, 2016
    Date of Patent: July 2, 2019
    Assignee: SAP SE
    Inventors: Michele Bezzi, Antonino Sabetta, Henrik Plate, Serena Ponta, Francesco Di Cerbo
  • Publication number: 20180157486
    Abstract: Systems and methods are provided for accessing a source code repository comprising a plurality of versions of code, analyzing the plurality of versions of code of the component to compute metrics to identify each version of code, analyzing the metrics to determine a subset of the metrics to use to as a fingerprint definition to identify each version of the code, generating a fingerprint for each version of code using the fingerprint definition, generating a fingerprint matrix with the fingerprint for each version of code for the software component and storing the fingerprint definition and the fingerprint matrix
    Type: Application
    Filed: December 7, 2016
    Publication date: June 7, 2018
    Inventors: Michele Bezzi, Antonino Sabetta, Henrik Plate, Serena Ponta, Francesco Di Cerbo
  • Patent number: 9959111
    Abstract: Various embodiments of systems, computer program products, and methods for prioritizing software patches are described herein. In an aspect, the software patches are retrieved by querying software repositories. Further, code changes associated with the software patches are determined. One or more instances of bug fix patterns are identified in determined code changes. The software patches are classified based on the identified bug fix patterns. Priorities of the software patches corresponding to the identified instances of the bug fix patterns are determined based on the classification and a pre-defined policy. Upon determining priorities, the software patches are installed based on the priorities.
    Type: Grant
    Filed: July 11, 2016
    Date of Patent: May 1, 2018
    Assignee: SAP SE
    Inventors: Henrik Plate, Serena Ponta, Antonino Sabetta
  • Patent number: 9880832
    Abstract: Automated systems and methods for assessing the urgency of installing a patch for a component of a software application are described. The systems and methods involve identifying a set of defective programming constructs of the component that are altered by the patch, collecting execution traces of programming constructs of the software application and programming constructs of the component in a context of application use, and evaluating the execution traces to determine whether one or more defective programming constructs of the component are invoked in the context of application use.
    Type: Grant
    Filed: March 6, 2015
    Date of Patent: January 30, 2018
    Assignee: SAP SE
    Inventors: Henrik Plate, Serena Ponta, Antonino Sabetta
  • Publication number: 20180011700
    Abstract: Various embodiments of systems, computer program products, and methods for prioritizing software patches are described herein. In an aspect, the software patches are retrieved by querying software repositories. Further, code changes associated with the software patches are determined. One or more instances of bug fix patterns are identified in determined code changes. The software patches are classified based on the identified bug fix patterns. Priorities of the software patches corresponding to the identified instances of the bug fix patterns are determined based on the classification and a pre-defined policy. Upon determining priorities, the software patches are installed based on the priorities.
    Type: Application
    Filed: July 11, 2016
    Publication date: January 11, 2018
    Inventors: HENRIK PLATE, Serena Ponta, Antonino Sabetta
  • Patent number: 9811668
    Abstract: An input handler receives an exploit test request specifying at least one exploit to be tested against at least one application in at least one execution environment. A deployment engine deploys the at least one execution environment including instantiating a container providing a virtual machine image and configured based on the exploit test request, the instantiated container including the at least one application. A scheduler schedules execution of the at least one execution environment within at least one execution engine, including scheduling an injection of the at least one exploit as specified in the exploit test request. A report generator generates an exploit test report characterizing a result of the at least one exploit being injected into the at least one execution environment of the at least one execution engine.
    Type: Grant
    Filed: April 21, 2015
    Date of Patent: November 7, 2017
    Assignee: SAP SE
    Inventors: Antonino Sabetta, Luca Compagna, Serena Ponta, Stanislav Dashevskyi, Daniel Dos Santos, Fabio Massacci
  • Publication number: 20170300701
    Abstract: At design time, a process designer may generate a workflow model of a process associated with in-memory database. The workflow model include tasks and authorization constraints. The authorization constraints are task based constraints, associated with the workflow model. The workflow model is translated into transition system format to generate a reachability graph including possible workflow execution paths. The reachability graph may be translated in a database query format to generate a monitor. At runtime, when a request is received from a process participant to execute a specific task in the workflow model, the monitor is able to enforce authorization constraints and authorization policies received at the runtime, and ensure secure and compliant execution of processes.
    Type: Application
    Filed: April 13, 2016
    Publication date: October 19, 2017
    Inventors: SERENA PONTA, Luca Compagna, Daniel Dos Santos, Silvio Ranise
  • Patent number: 9792200
    Abstract: Implementations are directed to enhancing assessment of one or more known vulnerabilities inside one or more third-party libraries used within an application program that interacts with the one or more third-party libraries. In some examples, actions include receiving a complete call graph that is provided by static source code analysis (SSCA) of the application program and any third-party libraries used by the application, receiving one or more stack traces that are provided based on dynamic source code analysis (DSCA) during execution of the application program, processing the complete call graph, the one or more stack traces, and vulnerable function data to provide one or more combined call graphs, the vulnerable function data identifying one or more vulnerable functions included in the one or more third-party libraries, each combined call graph being specific to a respective vulnerable function, and providing a graphical representation of each combined call graph.
    Type: Grant
    Filed: March 1, 2016
    Date of Patent: October 17, 2017
    Assignee: SAP SE
    Inventors: Henrik Plate, Serena Ponta, Antonino Sabetta
  • Publication number: 20170255544
    Abstract: Implementations are directed to enhancing assessment of one or more known vulnerabilities inside one or more third-party libraries used within an application program that interacts with the one or more third-party libraries. In some examples, actions include receiving a complete call graph that is provided by static source code analysis (SSCA) of the application program and any third-party libraries used by the application, receiving one or more stack traces that are provided based on dynamic source code analysis (DSCA) during execution of the application program, processing the complete call graph, the one or more stack traces, and vulnerable function data to provide one or more combined call graphs, the vulnerable function data identifying one or more vulnerable functions included in the one or more third-party libraries, each combined call graph being specific to a respective vulnerable function, and providing a graphical representation of each combined call graph.
    Type: Application
    Filed: March 1, 2016
    Publication date: September 7, 2017
    Applicant: SAP SE
    Inventors: Henrik Plate, Serena Ponta, Antonino Sabetta
  • Patent number: 9565201
    Abstract: Embodiments provide apparatuses and methods supporting software development teams in identifying potential security threats, and then testing those threats against under-development scenarios. At design-time, embodiments identify potential threats by providing sequence diagrams enriched with security annotations. Security information captured by the annotations can relate to topics such as security goals, properties of communications channels, environmental parameters, and/or WHAT-IF conditions. The annotated sequence diagram can reference an extensible catalog of functions useful for defining message content. Once generated, the annotated sequence diagram can in turn serve as a basis for translation into a formal model of system security. At run-time, embodiments support development teams in testing, by exploiting identified threats to automatically generate and execute test-cases against the up and running scenario. The security annotations may facilitate detection of subtle flaws in security logic, e.g.
    Type: Grant
    Filed: March 24, 2015
    Date of Patent: February 7, 2017
    Assignee: SAP SE
    Inventors: Luca Compagna, Serena Ponta
  • Publication number: 20160314302
    Abstract: An input handler receives an exploit test request specifying at least one exploit to be tested against at least one application in at least one execution environment. A deployment engine deploys the at least one execution environment including instantiating a container providing a virtual machine image and configured based on the exploit test request, the instantiated container including the at least one application. A scheduler schedules execution of the at least one execution environment within at least one execution engine, including scheduling an injection of the at least one exploit as specified in the exploit test request. A report generator generates an exploit test report characterizing a result of the at least one exploit being injected into the at least one execution environment of the at least one execution engine.
    Type: Application
    Filed: April 21, 2015
    Publication date: October 27, 2016
    Inventors: Antonino Sabetta, Luca Compagna, Serena Ponta, Stanislav Dashevskyi, Daniel Dos Santos, Fabio Massacci
  • Publication number: 20160285902
    Abstract: Embodiments provide apparatuses and methods supporting software development teams in identifying potential security threats, and then testing those threats against under-development scenarios. At design-time, embodiments identify potential threats by providing sequence diagrams enriched with security annotations. Security information captured by the annotations can relate to topics such as security goals, properties of communications channels, environmental parameters, and/or WHAT-IF conditions. The annotated sequence diagram can reference an extensible catalog of functions useful for defining message content. Once generated, the annotated sequence diagram can in turn serve as a basis for translation into a formal model of system security. At run-time, embodiments support development teams in testing, by exploiting identified threats to automatically generate and execute test-cases against the up and running scenario. The security annotations may facilitate detection of subtle flaws in security logic, e.g.
    Type: Application
    Filed: March 24, 2015
    Publication date: September 29, 2016
    Inventors: Luca Compagna, Serena Ponta
  • Publication number: 20160259636
    Abstract: Automated systems and methods for assessing the urgency of installing a patch for a component of a software application are described. The systems and methods involve identifying a set of defective programming constructs of the component that are altered by the patch, collecting execution traces of programming constructs of the software application and programming constructs of the component in a context of application use, and evaluating the execution traces to determine whether one or more defective programming constructs of the component are invoked in the context of application use.
    Type: Application
    Filed: March 6, 2015
    Publication date: September 8, 2016
    Inventors: Henrik PLATE, Serena PONTA, Antonino SABETTA
  • Patent number: 9009534
    Abstract: The embodiments provide a data processing apparatus including a runtime check identifier configured to determine, in response to a request to execute a function of the application, whether a runtime check descriptor corresponding to the function is stored in a database and select the runtime check descriptor if the runtime check descriptor is determined as stored in the database. The selected runtime check descriptor provides, in part, at least one configuration check of a component related to an execution of the function. The data processing apparatus also includes a system component configured to invoke a system management tool to perform the at least one configuration check, and a runtime check controller configured to receive results of the at least one configuration check and perform at least one action specified in the selected runtime check descriptor based on the received results.
    Type: Grant
    Filed: May 24, 2012
    Date of Patent: April 14, 2015
    Assignee: SAP SE
    Inventors: Henrik Plate, Serena Ponta, Matteo Maria Casalino, Theodoor Scholte
  • Publication number: 20140278724
    Abstract: A computer-implemented method provides remote Security Validation as a Service (SVaaS) to one or more business process modeler clients. The method includes receiving on a cloud-based server, from a remote business process modeler client, a request for validation of a business process model and related information for a business process compliance problem including the business process work flow and security-related aspects of the business process. The method further includes sending the business process compliance problem from the server to a model checker for validation and receiving, at the server, validation results from the model checker and making the validation results available to the remote business process modeler client. The method can include enhancing the remote client with a connector module that is configured to collect information on the business process compliance problem and to communicate such information to the server.
    Type: Application
    Filed: March 15, 2013
    Publication date: September 18, 2014
    Inventors: Luca Compagna, Serena Ponta