Patents by Inventor Christopher J. Wysopal

Christopher J. Wysopal has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11593492
    Abstract: At least a static analysis and a dynamic analysis to perform for a first software application are determined based, at least in part, on a profile of the first software application. The first software application is analyzed with the static analysis to generate static analysis results. The first software application is analyzed with dynamic analysis to generate dynamic analysis results. An assessment report is generated based on the static analysis results and the dynamic analysis results, wherein the assessment report indicates a security score of the first software application that is based, at least in part, on the static analysis results and the dynamic analysis results.
    Type: Grant
    Filed: August 7, 2020
    Date of Patent: February 28, 2023
    Assignee: Veracode, Inc.
    Inventors: Christopher J. Wysopal, Christopher J. Eng
  • Publication number: 20200364350
    Abstract: At least a static analysis and a dynamic analysis to perform for a first software application are determined based, at least in part, on a profile of the first software application. The first software application is analyzed with the static analysis to generate static analysis results. The first software application is analyzed with dynamic analysis to generate dynamic analysis results. An assessment report is generated based on the static analysis results and the dynamic analysis results, wherein the assessment report indicates a security score of the first software application that is based, at least in part, on the static analysis results and the dynamic analysis results.
    Type: Application
    Filed: August 7, 2020
    Publication date: November 19, 2020
    Inventors: Christopher J. Wysopal, Christopher J. Eng
  • Patent number: 10776497
    Abstract: Security analysis and vulnerability testing results are “packaged” or “bound to” the actual software it describes. By linking the results to the software itself, downstream users of the software can access information about the software, make informed decisions about implementation of the software, and analyze the security risk across an entire system by accessing all (or most) of the reports associated with the executables running on the system and summarizing the risks identified in the reports.
    Type: Grant
    Filed: April 29, 2019
    Date of Patent: September 15, 2020
    Assignee: Veracode, Inc.
    Inventors: Christopher J. Wysopal, Christopher J. Eng, Matthew P. Moynahan
  • Patent number: 10762206
    Abstract: A method comprises, based on receiving a request to analyze at least a first mobile application, scheduling the request for a first sandbox. The first mobile application is analyzed based on the request, wherein the analysis of the first mobile application comprises performing a behavioral analysis of the first mobile application within the first sandbox and performing a static analysis of the first mobile application. A first feature vector is generated based on data resulting from the analysis of the first mobile application. The first mobile application is determined to comprise malware based, at least in part, on comparing the first feature vector with at least a second feature vector, wherein the second feature vector was generated based on at least one of a static analysis and a behavioral analysis of malware.
    Type: Grant
    Filed: May 16, 2017
    Date of Patent: September 1, 2020
    Assignee: Veracode, Inc.
    Inventors: Theodora H. Titonis, Nelson R. Manohar-Alers, Christopher J. Wysopal
  • Publication number: 20190251267
    Abstract: Security analysis and vulnerability testing results are “packaged” or “bound to” the actual software it describes. By linking the results to the software itself, downstream users of the software can access information about the software, make informed decisions about implementation of the software, and analyze the security risk across an entire system by accessing all (or most) of the reports associated with the executables running on the system and summarizing the risks identified in the reports.
    Type: Application
    Filed: April 29, 2019
    Publication date: August 15, 2019
    Inventors: Christopher J. Wysopal, Christopher J. Eng, Matthew P. Moynahan
  • Patent number: 10275600
    Abstract: Security analysis and vulnerability testing results are “packaged” or “bound to” the actual software it describes. By linking the results to the software itself, downstream users of the software can access information about the software, make informed decisions about implementation of the software, and analyze the security risk across an entire system by accessing all (or most) of the reports associated with the executables running on the system and summarizing the risks identified in the reports.
    Type: Grant
    Filed: May 26, 2015
    Date of Patent: April 30, 2019
    Assignee: Veracode, Inc.
    Inventors: Christopher J. Wysopal, Christopher J. Eng, Matthew P. Moynahan
  • Publication number: 20180025157
    Abstract: The present system includes a computer-networked system that allows mobile subscribers, and others, to submit mobile applications to be analyzed for anomalous and malicious behavior using data acquired during the execution of the application within a highly instrumented and controlled environment for which the analysis relies on per-execution as well as comparative aggregate data across many such executions from one or more subscribers.
    Type: Application
    Filed: May 16, 2017
    Publication date: January 25, 2018
    Applicant: Veracode, Inc.
    Inventors: Theodora H. Titonis, Nelson R Manohar-Alers, Christopher J. Wysopal
  • Publication number: 20160098564
    Abstract: Security analysis and vulnerability testing results are “packaged” or “bound to” the actual software it describes. By linking the results to the software itself, downstream users of the software can access information about the software, make informed decisions about implementation of the software, and analyze the security risk across an entire system by accessing all (or most) of the reports associated with the executables running on the system and summarizing the risks identified in the reports.
    Type: Application
    Filed: May 26, 2015
    Publication date: April 7, 2016
    Inventors: Christopher J. Wysopal, Christopher J. Eng, Matthew P. Moynahan
  • Patent number: 9069967
    Abstract: Security analysis and vulnerability testing results are “packaged” or “bound to” the actual software it describes. By linking the results to the software itself, downstream users of the software can access information about the software, make informed decisions about implementation of the software, and analyze the security risk across an entire system by accessing all (or most) of the reports associated with the executables running on the system and summarizing the risks identified in the reports.
    Type: Grant
    Filed: September 17, 2010
    Date of Patent: June 30, 2015
    Assignee: Veracode, Inc.
    Inventors: Christopher J. Wysopal, Christopher J. Eng, Matthew P. Moynahan
  • Patent number: 8613080
    Abstract: Security analysis and vulnerability testing results are “packaged” or “bound to” the actual software it describes. By linking the results to the software itself, downstream users of the software can access information about the software, make informed decisions about implementation of the software, and analyze the security risk across an entire system by accessing all (or most) of the reports associated with the executables running on the system and summarizing the risks identified in the reports.
    Type: Grant
    Filed: June 7, 2011
    Date of Patent: December 17, 2013
    Assignee: Veracode, Inc.
    Inventors: Christopher J. Wysopal, Matthew P. Moynahan, Jon R. Stevenson
  • Patent number: 8499353
    Abstract: Security assessment and vulnerability testing of software applications is performed based at least in part on application metadata in order to determine an appropriate assurance level and associated test plan that includes multiple types of analysis. Steps from each test are combined into a “custom” or “application-specific” workflow, and the results of each test may then be correlated with other results to identify potential vulnerabilities and/or faults.
    Type: Grant
    Filed: February 15, 2008
    Date of Patent: July 30, 2013
    Assignee: Veracode, Inc.
    Inventors: Malcolm W. Lockhart, Christopher J. Wysopal, Christopher J. Eng, Matthew P. Moynahan, Simeon Simeonov
  • Publication number: 20130097706
    Abstract: The present system includes a computer-networked system that allows mobile subscribers, and others, to submit mobile applications to be analyzed for anomalous and malicious behavior using data acquired during the execution of the application within a highly instrumented and controlled environment for which the analysis relies on per-execution as well as comparative aggregate data across many such executions from one or more subscribers.
    Type: Application
    Filed: September 14, 2012
    Publication date: April 18, 2013
    Applicant: Veracode, Inc.
    Inventors: Theodora H. Titonis, Nelson R. Manohar-Alers, Christopher J. Wysopal
  • Publication number: 20120072968
    Abstract: Security analysis and vulnerability testing results are “packaged” or “bound to” the actual software it describes. By linking the results to the software itself, downstream users of the software can access information about the software, make informed decisions about implementation of the software, and analyze the security risk across an entire system by accessing all (or most) of the reports associated with the executables running on the system and summarizing the risks identified in the reports.
    Type: Application
    Filed: June 7, 2011
    Publication date: March 22, 2012
    Inventors: Christopher J. Wysopal, Matthew P. Moynahan, Jon R. Stevenson
  • Publication number: 20110173693
    Abstract: Security analysis and vulnerability testing results are “packaged” or “bound to” the actual software it describes. By linking the results to the software itself, downstream users of the software can access information about the software, make informed decisions about implementation of the software, and analyze the security risk across an entire system by accessing all (or most) of the reports associated with the executables running on the system and summarizing the risks identified in the reports.
    Type: Application
    Filed: September 17, 2010
    Publication date: July 14, 2011
    Inventors: Christopher J. Wysopal, Christopher J. Eng, Matthew P. Moynahan
  • Publication number: 20100281248
    Abstract: Security assessment and vulnerability testing of software applications is performed based at least in part on application metadata in order to determine an appropriate assurance level and associated test plan that includes multiple types of analysis. Steps from each test are combined into a “custom” or “application-specific” workflow, and the results of each test may then be correlated with other results to identify potential vulnerabilities and/or faults.
    Type: Application
    Filed: June 21, 2010
    Publication date: November 4, 2010
    Inventors: Malcolm W. Lockhart, Christopher J. Wysopal, Christopher J. Eng, Matthew P. Moynahan, Simeon Simeonov
  • Publication number: 20080209567
    Abstract: Security assessment and vulnerability testing of software applications is performed based at least in part on application metadata in order to determine an appropriate assurance level and associated test plan that includes multiple types of analysis. Steps from each test are combined into a “custom” or “application-specific” workflow, and the results of each test may then be correlated with other results to identify potential vulnerabilities and/or faults.
    Type: Application
    Filed: February 15, 2008
    Publication date: August 28, 2008
    Inventors: Malcolm W. Lockhart, Christopher J. Wysopal, Christopher J. Eng, Matthew P. Moynahan, Simeon Simeonov