Patents Assigned to Whitehat Security, Inc.
-
Patent number: 10282550Abstract: Techniques for performing auto-remediation on computer system vulnerabilities in source code are disclosed herein. An application source code representation is scanned to determine any security vulnerabilities and from those vulnerabilities, a set of security patch rules are generated that may be used to automatically remediate the vulnerabilities. One or more of the security patch rules is selected for verification and, once verified may be used to generate a security patch. The security patch may then be automatically applied to the source code representation to produce a patched representation of the application source code with the vulnerability at least partly remediated.Type: GrantFiled: March 12, 2015Date of Patent: May 7, 2019Assignee: WhiteHat Security, Inc.Inventors: Eric Sheridan, Harry Papaxenopoulos, John Thomas Melton
-
Patent number: 9923892Abstract: A method of testing a web application, wherein a web application is a program that operates on a server and interacts with clients that access the program over a network, wherein further the web application accepts parameters that define results generated from the web application, the method comprising determining which web application uniform resource identifiers (“URIs”) are used to access various web applications on a system, selecting a subset of less than all of the URIs for the common web, wherein the subset is selected at least in part independently of the order generated, performing a security scan on a first URI of the subset of URIs, comparing locality-sensitive hash (“LSH”) signatures of responses to the first URI, determine if the differences between responses exceed a threshold and performing a security scan on a second URI of the subset if the responses exceed the threshold.Type: GrantFiled: September 30, 2013Date of Patent: March 20, 2018Assignee: WhiteHat Security, Inc.Inventors: Robert Stone, Tomasz Derylo
-
Patent number: 9742792Abstract: Techniques for monitoring site security are disclosed herein. Sites are scanned for security metric values associated with one or more security metrics. Normalized values for those scanned security metric values are calculated based on previously obtained values associated with one or more other security metrics associated with other scanned sites. Site security metrics are then calculated for the sites based on a subset of the normalized values and based at least in part on a comparison to other scanned sites.Type: GrantFiled: October 1, 2014Date of Patent: August 22, 2017Assignee: WhiteHat Security, Inc.Inventors: John Philip Peach, Robert Hansen
-
Patent number: 9569334Abstract: Methods, apparatus, and systems for traversing a representation of an application source code, such as an abstract syntax tree (AST), are disclosed. Steps for traversing the AST include specifying a plurality of runtime binding rules which are associated with one or more locations within the AST, beginning to traverse the AST, monitoring a history of the traverse, continuing to traverse the AST based on the history of the traverse, and updating the history of the traverse. Continuing to traverse the AST may include identifying a plurality of concrete implementations of a method invocation and traversing less than all of the concrete implementations based at least in part on the runtime binding rules, the concrete implementations being traversed being selected based on the history of the traverse.Type: GrantFiled: March 14, 2013Date of Patent: February 14, 2017Assignee: WhiteHat Security, Inc.Inventor: Eric Sheridan
-
Patent number: 9239745Abstract: Vulnerability testing of a web application can be done using external testing, wherein an external test system runs with permissions of a user of the web application and interacts with the web application over a network, the external test system might obtain a schedule for a vulnerability test, execute the schedule using the external test system, log at least portions of responses of the web application to interactions of the external test system with the web application, compare portions of the responses to expected possible responses associated with particular possible vulnerabilities of the web application, thereby detecting possible vulnerabilities of the web application and, for at least one detected possible vulnerability, generating a retest script that comprises at least instructions to place the web application in a state at least similar to the state at which the at least one detected possible vulnerability was detected during execution of the schedule and that comprises at least instructions to intType: GrantFiled: September 28, 2007Date of Patent: January 19, 2016Assignee: Whitehat Security, Inc.Inventors: William Pennington, Jeremiah Grossman, Robert Stone, Siamak Pazirandeh
-
Patent number: 8925051Abstract: A web application security scanner (WASS) includes a login manager configured to perform an automated login to a web site. The automated login may be performed when the login manager detects that a login session has ended. The login manager is configured to determine credentials for the web site to allow the WASS to access the web site. The WASS may then use the credentials to continue scanning the web site. Thus, previously unscannable web pages may be accessed in the web site because of the automated login process.Type: GrantFiled: November 20, 2012Date of Patent: December 30, 2014Assignee: WhiteHat Security, Inc.Inventors: William Pennington, Jeremiah Grossman, Robert Stone, Siamak Pazirandeh
-
Patent number: 8893282Abstract: An improved method and apparatus for client-side application analysis is provided. Client-side application analysis involves determining and testing, using client-side application interfaces and the like, data input points and analyzing client requests and server responses. A security vulnerability analyzer can be employed to analyze content for client-side application files, such as Flash files and Java applets, extract addresses and data parameters embedded in the client-side application file, and modify the data parameters according to user-defined test criteria. The modified data parameters are transmitted as part of a request to a respective server used to service requests from the client-side application files. The security vulnerability analyzer analyzes the response from the server to ascertain if there are any security vulnerabilities associated with the interface between the client-side application file and the server.Type: GrantFiled: August 27, 2012Date of Patent: November 18, 2014Assignee: WhiteHat Security, Inc.Inventors: Bill Pennington, Jeremiah Grossman, Robert Stone, Siamak Pazirandeh
-
Patent number: 8863280Abstract: A method of testing a web application, wherein a web application is a program that operates on a server and interacts with clients that access the program over a network, wherein further the web application accepts parameters that define results generated from the web application, the method comprising determining which web application uniform resource identifiers (URIs) are used to access various web applications on a system, determining if more than a threshold of the URIs are for a common web application, selecting a subset of less than all of the URIs for the common web application when the threshold is exceeded for that common web application, wherein the subset is selected at least in part independently of the order generated and performing a security scan on the selected subset.Type: GrantFiled: January 2, 2013Date of Patent: October 14, 2014Assignee: Whitehat Security, Inc.Inventors: William Pennington, Jeremiah Grossman, Robert Stone, Siamak Pazirandeh
-
Publication number: 20140282424Abstract: Methods, apparatus, and systems for traversing a representation of an application source code, such as an abstract syntax tree (AST), are disclosed. Steps for traversing the AST include beginning to traverse the AST, monitoring a history of the traverse, and continuing to traverse the AST based on the history of the traverse. Continuing to traverse the AST may include identifying a plurality of concrete implementations of a method invocation and traversing less than all of the concrete implementations, the concrete implementations being traversed being selected based on the history of the traverse.Type: ApplicationFiled: March 14, 2013Publication date: September 18, 2014Applicant: WhiteHat Security, Inc.Inventor: WhiteHat Security, Inc.
-
Publication number: 20140283081Abstract: Methods, apparatus, and systems for characterizing vulnerabilities of an application source code are disclosed. Steps for characterizing vulnerabilities include traversing a representation of the application source code, generating a signature of a potential vulnerability of the application source code, and determining characteristics of the potential vulnerability based on a correlation between the generated signature of the potential vulnerability and previously stored signatures of potential vulnerabilities.Type: ApplicationFiled: March 14, 2013Publication date: September 18, 2014Applicant: WhiteHat Security, Inc.Inventor: WhiteHat Security, Inc.
-
Patent number: 8789187Abstract: An apparatus and method of managing vulnerability testing of a web application is provided for running a set of one or more scripted tests against a web application, recording results of the one or more scripted tests, providing an interface for a human evaluator to review the recorded results, and accepting from the human evaluator custom test parameters based on observations of the recorded results, wherein custom test parameters include at least one context usable by a future tester in deciding whether to run the custom test, and also includes at least one instruction for automatically running custom test steps of the custom test.Type: GrantFiled: September 28, 2007Date of Patent: July 22, 2014Assignee: Whitehat Security, Inc.Inventors: William Pennington, Jeremiah Grossman, Robert Stone, Siamak Pazirandeh
-
Patent number: 8621639Abstract: A system provides for fuzzy classification in comparisons of scanner responses. A web application test suite performs tests against a web application by sending client requests from a testing computer to the server running the web application and checking how the web application responds. A thorough web application security scan might involve thousands of checks and responses. As a result, some sort of programmatic analysis is needed. One such evaluation involves comparing one response against another. Response matching that compares two HTTP responses might use fuzzy classification processes.Type: GrantFiled: November 30, 2011Date of Patent: December 31, 2013Assignee: WhiteHat Security, Inc.Inventors: William Pennington, Jeremiah Grossman, Robert Stone, Siamak Pazirandeh
-
Publication number: 20130055403Abstract: An improved method and apparatus for client-side web application analysis is provided. Client-side web application analysis involves determining and testing, using client-side application interfaces and the like, data input points and analyzing client requests and server responses. In one embodiment, a security vulnerability analyzer is employed to analyze web page content for client-side application files, such as Flash files and Java applets, extract web addresses and data parameters embedded in the client-side application file, and modify the data parameters according to user-defined test criteria. The modified data parameters are transmitted as part of a request to a respective web server used to service the client-side application files. The security vulnerability analyzer analyzes the response from the server to ascertain if there are any security vulnerabilities associated with the interface between the client-side application file and the web server.Type: ApplicationFiled: August 27, 2012Publication date: February 28, 2013Applicant: WhiteHat Security, Inc.Inventors: Bill Pennington, Jeremiah Grossman, Robert Stone, Siamak Pazirandeh
-
Patent number: 8370929Abstract: A method of testing a web application, wherein a web application is a program that operates on a server and interacts with clients that access the program over a network, wherein further the web application accepts parameters that define results generated from the web application, the method comprising determining which web application uniform resource identifiers (URIs) are used to access various web applications on a system, determining if more than a threshold of the URIs are for a common web application, selecting a subset of less than all of the URIs for the common web application when the threshold is exceeded for that common web application, wherein the subset is selected at least in part independently of the order generated and performing a security scan on the selected subset.Type: GrantFiled: September 28, 2007Date of Patent: February 5, 2013Assignee: WhiteHat Security, Inc.Inventors: William Pennington, Jeremiah Grossman, Robert Stone, Siamak Pazirandeh
-
Patent number: 8341711Abstract: A web application security scanner (WASS) includes a login manager configured to perform an automated login to a web site. The automated login may be performed when the login manager detects that a login session has ended. The login manager is configured to determine credentials for the web site to allow the WASS to access the web site. The WASS may then use the credentials to continue scanning the web site. Thus, previously unscannable web pages may be accessed in the web site because of the automated login process.Type: GrantFiled: November 7, 2008Date of Patent: December 25, 2012Assignee: Whitehat Security, Inc.Inventors: William Pennington, Jeremiah Grossman, Robert Stone, Siamak Pazirandeh
-
Patent number: 8281401Abstract: An improved method and apparatus for client-side web application analysis is provided. Client-side web application analysis involves determining and testing, using client-side application interfaces and the like, data input points and analyzing client requests and server responses. A security vulnerability analyzer can analyze web page content for client-side application files, such as Flash files and Java applets, extract web addresses and data parameters embedded in the client-side application file, and modify the data parameters according to user-defined test criteria. The modified data parameters are transmitted as part of a request to a respective web server used to service the client-side application files. The security vulnerability analyzer analyzes the response from the server to ascertain if there are any security vulnerabilities associated with the interface between the client-side application file and the web server.Type: GrantFiled: January 24, 2006Date of Patent: October 2, 2012Assignee: Whitehat Security, Inc.Inventors: Bill Pennington, Jeremiah Grossman, Robert Stone, Siamak Pazirandeh
-
Patent number: 8087088Abstract: A system provides for fuzzy classification in comparisons of scanner responses. A web application test suite performs tests against a web application by sending client requests from a testing computer to the server running the web application and checking how the web application responds. A thorough web application security scan might involve thousands of checks and responses. As a result, some sort of programmatic analysis is needed. One such evaluation involves comparing one response against another. Response matching that compares two HTTP responses might use fuzzy classification processes.Type: GrantFiled: September 28, 2007Date of Patent: December 27, 2011Assignee: Whitehat Security, Inc.Inventors: William Pennington, Jeremiah Grossman, Robert Stone, Siamak Pazirandeh
-
Patent number: 7467402Abstract: A web application security scanner (WASS) includes a login manager configured to perform an automated login to a web site. The automated login may be performed when the login manager detects that a login session has ended. The login manager is configured to determine credentials for the web site to allow the WASS to access the web site. The WASS may then use the credentials to continue scanning the web site. Thus, previously unscannable web pages may be accessed in the web site because of the automated login process.Type: GrantFiled: August 23, 2005Date of Patent: December 16, 2008Assignee: Whitehat Security, Inc.Inventors: Bill Pennington, Jeremiah Grossman, Robert Stone, Siamak Pazirandeh
-
Publication number: 20060288220Abstract: A web application firewall (WAFs) used to secure websites from many known and unknown vulnerabilities is described. In one embodiment, the WAF is installed between a server that is serving web content and a network over which clients access the website hosted on the server. The WAF is configured to provide security from external attacks by preventing the website from receiving data that it did not send, and that the data received was not altered by a client. The WAF encodes outbound HTTP response data such that when a client or interloper follows one of the links or other constructs in the response data, the WAF can determine the validity of the next client request. In one embodiment, each universal resource locator link is encrypted and checked for validity when it is returned to the server via the WAF.Type: ApplicationFiled: May 1, 2006Publication date: December 21, 2006Applicant: WhiteHat Security, Inc.Inventors: Bill Pennington, Jeremiah Grossman, Robert Stone, Siamak Pazirandeh, Lex Arquette
-
Publication number: 20060195588Abstract: An improved method and apparatus for client-side web application analysis is provided. Client-side web application analysis involves determining and testing, using client-side application interfaces and the like, data input points and analyzing client requests and server responses. In one embodiment, a security vulnerability analyzer is employed to analyze web page content for client-side application files, such as Flash files and Java applets, extract web addresses and data parameters embedded in the client-side application file, and modify the data parameters according to user-defined test criteria. The modified data parameters are transmitted as part of a request to a respective web server used to service the client-side application files. The security vulnerability analyzer analyzes the response from the server to ascertain if there are any security vulnerabilities associated with the interface between the client-side application file and the web server.Type: ApplicationFiled: January 24, 2006Publication date: August 31, 2006Applicant: WhiteHat Security, Inc.Inventors: Bill Pennington, Jeremiah Grossman, Robert Stone, Siamak Pazirandeh