Patents Assigned to Whitehat Security, Inc.
  • Patent number: 11036868
    Abstract: Techniques for performing auto-remediation on computer system vulnerabilities in source code are disclosed herein. An application source code representation is scanned to determine any security vulnerabilities and from those vulnerabilities, a set of security patch rules are generated that may be used to automatically remediate the vulnerabilities. One or more of the security patch rules is selected for verification and, once verified may be used to generate a security patch. The security patch may then be automatically applied to the source code representation to produce a patched representation of the application source code with the vulnerability at least partly remediated.
    Type: Grant
    Filed: May 6, 2019
    Date of Patent: June 15, 2021
    Assignee: WHITEHAT SECURITY, INC.
    Inventors: Eric Sheridan, Harry Papaxenopoulos, John Thomas Melton
  • Patent number: 10965708
    Abstract: Discloses are systems, methods and computer readable mediums for automated verifications of potential vulnerabilities of one or more sites or code utilizing one or more neural networks. The systems, methods and computer readable mediums can transmit one or more scan operations to one or more sites, receive one or more responses to the one or more scan operations, tokenize the one or more responses, transmit to one or more neural networks the one or more tokenized responses, receive from the one or more neural networks verification of the one or more tokenized responses, and determine one or more confidences of the one or more verified responses.
    Type: Grant
    Filed: June 6, 2018
    Date of Patent: March 30, 2021
    Assignee: WHITEHAT SECURITY, INC.
    Inventors: Sergey Kolychev, Robert Stone, James Richardson
  • Patent number: 10855717
    Abstract: Disclosed are systems, methods and computer readable mediums for intelligent and directed dynamic application security testing. The systems, methods and computer-readable mediums can be configured to receive an attack location and an attack type for a web-application, transmit the attack location and attack type to a ID-DAST platform, receive from the ID-DAST platform a payload, attack the web-application using the payload, and receive results of the attack.
    Type: Grant
    Filed: June 3, 2020
    Date of Patent: December 1, 2020
    Assignee: WHITEHAT SECURITY, INC.
    Inventors: Joseph Feiman, Eric Sheridan, Prabhuram Mohan
  • Patent number: 10657264
    Abstract: Methods, apparatus, and systems for characterizing vulnerabilities of an application source code are disclosed. Steps for characterizing vulnerabilities include traversing a representation of the application source code, generating a signature of a potential vulnerability of the application source code, and determining characteristics of the potential vulnerability based on a correlation between the generated signature of the potential vulnerability and previously stored signatures of potential vulnerabilities.
    Type: Grant
    Filed: November 27, 2017
    Date of Patent: May 19, 2020
    Assignee: WHITEHAT SECURITY, INC.
    Inventor: Eric Sheridan
  • Publication number: 20190324885
    Abstract: Methods, apparatus, and systems for traversing a representation of an application source code are disclosed. Steps for traversing the representation include beginning to traverse the representation, monitoring a history of the traverse, and continuing to traverse the representation based on the history of the traverse. Continuing to traverse the representation may include identifying a plurality of concrete implementations of a method invocation and traversing less than all of the concrete implementations, the concrete implementations being traversed being selected based on the history of the traverse.
    Type: Application
    Filed: July 2, 2019
    Publication date: October 24, 2019
    Applicant: WHITEHAT SECURITY, INC.
    Inventor: Eric SHERIDAN
  • Patent number: 10379993
    Abstract: Methods, apparatus, and systems for traversing a representation of an application source code, such as an abstract syntax tree (AST), are disclosed. Steps for traversing the AST include specifying a plurality of runtime binding rules which are associated with one or more locations within the AST, beginning to traverse the AST, monitoring a history of the traverse, continuing to traverse the AST based on the history of the traverse, and updating the history of the traverse. Continuing to traverse the AST may include identifying a plurality of concrete implementations of a method invocation and traversing less than all of the concrete implementations based at least in part on the runtime binding rules, the concrete implementations being traversed being selected based on the history of the traverse.
    Type: Grant
    Filed: January 12, 2017
    Date of Patent: August 13, 2019
    Assignee: WHITEHAT SECURITY, INC.
    Inventor: Eric Sheridan
  • Patent number: 10282550
    Abstract: Techniques for performing auto-remediation on computer system vulnerabilities in source code are disclosed herein. An application source code representation is scanned to determine any security vulnerabilities and from those vulnerabilities, a set of security patch rules are generated that may be used to automatically remediate the vulnerabilities. One or more of the security patch rules is selected for verification and, once verified may be used to generate a security patch. The security patch may then be automatically applied to the source code representation to produce a patched representation of the application source code with the vulnerability at least partly remediated.
    Type: Grant
    Filed: March 12, 2015
    Date of Patent: May 7, 2019
    Assignee: WhiteHat Security, Inc.
    Inventors: Eric Sheridan, Harry Papaxenopoulos, John Thomas Melton
  • Patent number: 9923892
    Abstract: A method of testing a web application, wherein a web application is a program that operates on a server and interacts with clients that access the program over a network, wherein further the web application accepts parameters that define results generated from the web application, the method comprising determining which web application uniform resource identifiers (“URIs”) are used to access various web applications on a system, selecting a subset of less than all of the URIs for the common web, wherein the subset is selected at least in part independently of the order generated, performing a security scan on a first URI of the subset of URIs, comparing locality-sensitive hash (“LSH”) signatures of responses to the first URI, determine if the differences between responses exceed a threshold and performing a security scan on a second URI of the subset if the responses exceed the threshold.
    Type: Grant
    Filed: September 30, 2013
    Date of Patent: March 20, 2018
    Assignee: WhiteHat Security, Inc.
    Inventors: Robert Stone, Tomasz Derylo
  • Patent number: 9830460
    Abstract: Methods, apparatus, and systems for characterizing vulnerabilities of an application source code are disclosed. Steps for characterizing vulnerabilities include traversing a representation of the application source code, generating a signature of a potential vulnerability of the application source code, and determining characteristics of the potential vulnerability based on a correlation between the generated signature of the potential vulnerability and previously stored signatures of potential vulnerabilities.
    Type: Grant
    Filed: July 28, 2016
    Date of Patent: November 28, 2017
    Assignee: WHITEHAT SECURITY, INC.
    Inventor: Eric Sheridan
  • Patent number: 9792443
    Abstract: Techniques for performing position analysis on a representation of an application source code are disclosed herein. An application source code is scanned to produce a representation of the application source code, start locations within the representation are determined, corresponding stop locations within the representation are determined, and a set of data impact locations within the representation are determined. The set of data impact locations are then used in a dataflow analysis to determine a position of high control of the data within the representation.
    Type: Grant
    Filed: March 12, 2015
    Date of Patent: October 17, 2017
    Assignee: WHITEHAT SECURITY, INC.
    Inventors: Eric Sheridan, Harry Papaxenopoulos, John Thomas Melton
  • Patent number: 9742792
    Abstract: Techniques for monitoring site security are disclosed herein. Sites are scanned for security metric values associated with one or more security metrics. Normalized values for those scanned security metric values are calculated based on previously obtained values associated with one or more other security metrics associated with other scanned sites. Site security metrics are then calculated for the sites based on a subset of the normalized values and based at least in part on a comparison to other scanned sites.
    Type: Grant
    Filed: October 1, 2014
    Date of Patent: August 22, 2017
    Assignee: WhiteHat Security, Inc.
    Inventors: John Philip Peach, Robert Hansen
  • Patent number: 9569334
    Abstract: Methods, apparatus, and systems for traversing a representation of an application source code, such as an abstract syntax tree (AST), are disclosed. Steps for traversing the AST include specifying a plurality of runtime binding rules which are associated with one or more locations within the AST, beginning to traverse the AST, monitoring a history of the traverse, continuing to traverse the AST based on the history of the traverse, and updating the history of the traverse. Continuing to traverse the AST may include identifying a plurality of concrete implementations of a method invocation and traversing less than all of the concrete implementations based at least in part on the runtime binding rules, the concrete implementations being traversed being selected based on the history of the traverse.
    Type: Grant
    Filed: March 14, 2013
    Date of Patent: February 14, 2017
    Assignee: WhiteHat Security, Inc.
    Inventor: Eric Sheridan
  • Patent number: 9405915
    Abstract: Methods, apparatus, and systems for characterizing vulnerabilities of an application source code are disclosed. Steps for characterizing vulnerabilities include traversing a representation of the application source code, generating a signature of a potential vulnerability of the application source code, and determining characteristics of the potential vulnerability based on a correlation between the generated signature of the potential vulnerability and previously stored signatures of potential vulnerabilities.
    Type: Grant
    Filed: March 14, 2013
    Date of Patent: August 2, 2016
    Assignee: WHITEHAT SECURITY, INC.
    Inventor: Eric Sheridan
  • Patent number: 9239745
    Abstract: Vulnerability testing of a web application can be done using external testing, wherein an external test system runs with permissions of a user of the web application and interacts with the web application over a network, the external test system might obtain a schedule for a vulnerability test, execute the schedule using the external test system, log at least portions of responses of the web application to interactions of the external test system with the web application, compare portions of the responses to expected possible responses associated with particular possible vulnerabilities of the web application, thereby detecting possible vulnerabilities of the web application and, for at least one detected possible vulnerability, generating a retest script that comprises at least instructions to place the web application in a state at least similar to the state at which the at least one detected possible vulnerability was detected during execution of the schedule and that comprises at least instructions to int
    Type: Grant
    Filed: September 28, 2007
    Date of Patent: January 19, 2016
    Assignee: Whitehat Security, Inc.
    Inventors: William Pennington, Jeremiah Grossman, Robert Stone, Siamak Pazirandeh
  • Patent number: 8925051
    Abstract: A web application security scanner (WASS) includes a login manager configured to perform an automated login to a web site. The automated login may be performed when the login manager detects that a login session has ended. The login manager is configured to determine credentials for the web site to allow the WASS to access the web site. The WASS may then use the credentials to continue scanning the web site. Thus, previously unscannable web pages may be accessed in the web site because of the automated login process.
    Type: Grant
    Filed: November 20, 2012
    Date of Patent: December 30, 2014
    Assignee: WhiteHat Security, Inc.
    Inventors: William Pennington, Jeremiah Grossman, Robert Stone, Siamak Pazirandeh
  • Patent number: 8893282
    Abstract: An improved method and apparatus for client-side application analysis is provided. Client-side application analysis involves determining and testing, using client-side application interfaces and the like, data input points and analyzing client requests and server responses. A security vulnerability analyzer can be employed to analyze content for client-side application files, such as Flash files and Java applets, extract addresses and data parameters embedded in the client-side application file, and modify the data parameters according to user-defined test criteria. The modified data parameters are transmitted as part of a request to a respective server used to service requests from the client-side application files. The security vulnerability analyzer analyzes the response from the server to ascertain if there are any security vulnerabilities associated with the interface between the client-side application file and the server.
    Type: Grant
    Filed: August 27, 2012
    Date of Patent: November 18, 2014
    Assignee: WhiteHat Security, Inc.
    Inventors: Bill Pennington, Jeremiah Grossman, Robert Stone, Siamak Pazirandeh
  • Patent number: 8863280
    Abstract: A method of testing a web application, wherein a web application is a program that operates on a server and interacts with clients that access the program over a network, wherein further the web application accepts parameters that define results generated from the web application, the method comprising determining which web application uniform resource identifiers (URIs) are used to access various web applications on a system, determining if more than a threshold of the URIs are for a common web application, selecting a subset of less than all of the URIs for the common web application when the threshold is exceeded for that common web application, wherein the subset is selected at least in part independently of the order generated and performing a security scan on the selected subset.
    Type: Grant
    Filed: January 2, 2013
    Date of Patent: October 14, 2014
    Assignee: Whitehat Security, Inc.
    Inventors: William Pennington, Jeremiah Grossman, Robert Stone, Siamak Pazirandeh
  • Publication number: 20140282424
    Abstract: Methods, apparatus, and systems for traversing a representation of an application source code, such as an abstract syntax tree (AST), are disclosed. Steps for traversing the AST include beginning to traverse the AST, monitoring a history of the traverse, and continuing to traverse the AST based on the history of the traverse. Continuing to traverse the AST may include identifying a plurality of concrete implementations of a method invocation and traversing less than all of the concrete implementations, the concrete implementations being traversed being selected based on the history of the traverse.
    Type: Application
    Filed: March 14, 2013
    Publication date: September 18, 2014
    Applicant: WhiteHat Security, Inc.
    Inventor: WhiteHat Security, Inc.
  • Publication number: 20140283081
    Abstract: Methods, apparatus, and systems for characterizing vulnerabilities of an application source code are disclosed. Steps for characterizing vulnerabilities include traversing a representation of the application source code, generating a signature of a potential vulnerability of the application source code, and determining characteristics of the potential vulnerability based on a correlation between the generated signature of the potential vulnerability and previously stored signatures of potential vulnerabilities.
    Type: Application
    Filed: March 14, 2013
    Publication date: September 18, 2014
    Applicant: WhiteHat Security, Inc.
    Inventor: WhiteHat Security, Inc.
  • Patent number: 8789187
    Abstract: An apparatus and method of managing vulnerability testing of a web application is provided for running a set of one or more scripted tests against a web application, recording results of the one or more scripted tests, providing an interface for a human evaluator to review the recorded results, and accepting from the human evaluator custom test parameters based on observations of the recorded results, wherein custom test parameters include at least one context usable by a future tester in deciding whether to run the custom test, and also includes at least one instruction for automatically running custom test steps of the custom test.
    Type: Grant
    Filed: September 28, 2007
    Date of Patent: July 22, 2014
    Assignee: Whitehat Security, Inc.
    Inventors: William Pennington, Jeremiah Grossman, Robert Stone, Siamak Pazirandeh