Patents Assigned to Cigital, Inc.
  • Patent number: 7644441
    Abstract: Malicious software is identified in an executable file by identifying malicious structural features, decryption code, and cryptographic functions. A malicious structural feature is identified by comparing a known malicious structural feature to one or more instructions of the executable file. A malicious structural feature is also identified by graphically and statistically comparing windows of bytes or instructions in a section of the executable file. Cryptography is an indicator of malicious software. Decryption code is identified in an executable file by identifying a tight loop around a reversible instruction that writes to random access memory. Cryptographic functions are identified in an executable file be obtaining a known cryptographic function and performing a string comparison of the numeric constants of the known cryptographic function with the executable file.
    Type: Grant
    Filed: September 24, 2004
    Date of Patent: January 5, 2010
    Assignee: Cigital, Inc.
    Inventors: Matthew N. Schmid, Michael Weber, Michael Haddox-Schatz, David Geyer
  • Patent number: 7539978
    Abstract: Systems and methods to understand how commercial-off-the-shelf (COTS) software components interact with a system when the COTS components are integrated into a system. A software wrapping technology is utilized to encase the COTS software components such that a wrapper isolates the COTS components during testing.
    Type: Grant
    Filed: November 1, 2002
    Date of Patent: May 26, 2009
    Assignee: Cigital, Inc.
    Inventors: Jennifer M. Haddox, Gregory M. Kapfhammer, Ryan Colyer, Timothy Tsai
  • Patent number: 7392545
    Abstract: Embodiments of the present invention relate to systems and methods for static analysis of a software application. According to an embodiment, a system includes a program scanner coupled to an analysis engine. The program scanner is configured to identify one or more vulnerability patterns in a software program and to output an initial potential vulnerability list. The analysis engine is configured to apply one or more rules to a potential vulnerability to determine whether the potential vulnerability is a vulnerability.
    Type: Grant
    Filed: January 15, 2003
    Date of Patent: June 24, 2008
    Assignee: Cigital, Inc.
    Inventors: Michael D. Weber, Viren R. Shah, Chuangang Ren
  • Patent number: 7302707
    Abstract: Embodiments of the present invention relate to systems and methods for detecting software buffer security vulnerabilities. According to an embodiment, a computer-readable medium stores a plurality of instructions to be executed by a processor for detecting software buffer security vulnerabilities. The plurality of instructions comprise instructions to receive software code associated with a potential buffer vulnerability, generate constraints related to the software code associated with the potential buffer vulnerability, partition the software code into one or more procedures, and generate for each procedure a set of constraints that summarizes the impact of a procedure on buffer variables.
    Type: Grant
    Filed: January 15, 2003
    Date of Patent: November 27, 2007
    Assignee: Cigital, Inc.
    Inventors: Michael D. Weber, Viren R. Shah, Chuangang Ren
  • Patent number: 7284274
    Abstract: A system and method for certifying software for essential and security-critical systems. The system and method provide a methodology and corresponding analysis engines increase the level of confidence that common vulnerabilities are not present in a particular application. A pipeline system consisting of independent modules which involve increasingly complex analysis is disclosed. The pipeline approach allows the user to reduce computation time by focusing resources on only those code segments which were not eliminated previously in the pipeline.
    Type: Grant
    Filed: January 18, 2002
    Date of Patent: October 16, 2007
    Assignee: Cigital, Inc.
    Inventors: Thomas J. Walls, Viren Shah, Anup K. Ghosh