Abstract: A computer readable storage medium includes executable instructions to identify a path in target source code. Constraints associated with the path are extracted. The constraints are converted to a Boolean expression. The Boolean expression is processed with a Boolean satisfiability engine to identify either a feasible path or an infeasible path. A feasible path is statically analyzed, while an infeasible path is not statically analyzed.
Type:
Application
Filed:
November 2, 2007
Publication date:
May 7, 2009
Applicant:
Fortify Software, Inc.
Inventors:
Brian CHESS, Sean Fay, Ayee Kannan Goundan
Abstract: A computer readable storage medium includes executable instructions to identify a memory operation in target source code. A set of constraints associated with the memory operation are developed. The constraints are converted into a Boolean expression. The Boolean expression is processed with a Boolean satisfiability engine to determine whether the memory operation is potentially unsafe.
Type:
Application
Filed:
November 2, 2007
Publication date:
May 7, 2009
Applicant:
Fortify Software, Inc.
Inventors:
Brian Chess, Sean Fay, Ayee Kannan Goundan
Abstract: A computer readable medium includes executable instructions to analyze program instructions for security vulnerabilities. The executable instructions convert diverse program instruction formats to a common format. A system model is derived from the common format. A static analysis is performed on the system model to identify security vulnerabilities. Security vulnerabilities are then reported.
Type:
Application
Filed:
April 9, 2007
Publication date:
October 11, 2007
Applicant:
FORTIFY SOFTWARE, INC.
Inventors:
Brian CHESS, Arthur DO, Sean FAY, Roger THORNTON
Abstract: A computer readable medium includes executable instructions to analyze program instructions for security vulnerabilities. The executable instructions convert diverse program instruction formats to a common format. A system model is derived from the common format. A static analysis is performed on the system model to identify security vulnerabilities. Security vulnerabilities are then reported.
Type:
Grant
Filed:
December 10, 2004
Date of Patent:
April 17, 2007
Assignee:
Fortify Software, Inc.
Inventors:
Brian Chess, Arthur Do, Sean Fay, Roger Thornton
Abstract: A computer readable storage medium has executable instructions to perform an automated analysis of program instructions. The automated analysis includes at least two analyses selected from an automated analysis of injection vulnerabilities, an automated analysis of potential repetitive attacks, an automated analysis of sensitive information, and an automated analysis of specific HTTP attributes. Protective instructions are inserted into the program instructions. The protective instructions are utilized to detect and respond to attacks during execution of the program instructions.