Patents by Inventor Daryl R. Shannon

Daryl R. Shannon has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8572574
    Abstract: In one embodiment, a software module is validated according to requirements associated with the software module. The software module has numeric and string variables, and is associated with first numeric constrains and first string constraints. Second numeric constraints applying to specific numeric variables and second string constraints applying to specific string variables are inferred. Each numeric constraint is represented with an equation, and each string constraint is represented with a finite state machine. Attempt to solve a solution for the numeric and string variables that satisfies all the first and second numeric constraints, all the first and second string constraints, and all the requirements associated with the software module by iteratively testing different possible values for the numeric and string variables.
    Type: Grant
    Filed: July 16, 2010
    Date of Patent: October 29, 2013
    Assignee: Fujitsu Limited
    Inventors: Indradeep Ghosh, Daryl R. Shannon
  • Publication number: 20120017200
    Abstract: In one embodiment, a method includes analyzing one or more first numeric constraints and one or more first string constraints associated with a software module including one or more numeric variables and string variables; inferring one or more second numeric constraints applying to specific ones of the string variables; inferring one or more second string constraints applying to specific ones of the numeric variables; representing each one of the first and second numeric constraints with an equation; representing each one of the first and second string constraints with a finite state machine; and verifying whether the software module is able to detect one or more forms of injection attacks by attempting to solve for a solution including one or more values for specific ones of the numeric and string variables that satisfies all the first and second numeric constraints and all the first and second string constraints.
    Type: Application
    Filed: July 16, 2010
    Publication date: January 19, 2012
    Applicant: FUJITSU LIMITED
    Inventors: Indradeep Ghosh, Daryl R. Shannon
  • Publication number: 20120017119
    Abstract: In one embodiment, a method includes analyzing one or more first numeric constraints and one or more first string constraints associated with a software module including one or more numeric variables and string variables; inferring one or more second numeric constraints applying to specific ones of the string variables; inferring one or more second string constraints applying to specific ones of the numeric variables; representing each one of the first and second numeric constraints with an equation; representing each one of the first and second string constraints with a finite state machine; and testing the software module for one or more possible errors by attempting to solve for a solution including one or more values for specific ones of the numeric and string variables that satisfies all the first and second numeric constraints and all the first and second string constraints.
    Type: Application
    Filed: July 16, 2010
    Publication date: January 19, 2012
    Applicant: FUJITSU LIMITED
    Inventors: Indradeep Ghosh, Daryl R. Shannon
  • Publication number: 20120017117
    Abstract: In one embodiment, a method includes analyzing one or more first numeric constraints and one or more first string constraints associated with a software module including one or more numeric variables and string variables; inferring one or more second numeric constraints applying to specific ones of the string variables; inferring one or more second string constraints applying to specific ones of the numeric variables; representing each one of the first and second numeric constraints with an equation; representing each one of the first and second string constraints with a finite state machine; and validating the software module with respect to one or more requirements associated with the software module by attempting to solve for a solution including one or more values for specific ones of the numeric and string variables that satisfies all the first and second numeric constraints, all the first and second string constraints, and all the requirements.
    Type: Application
    Filed: July 16, 2010
    Publication date: January 19, 2012
    Applicant: FUJITSU LIMITED
    Inventors: Indradeep Ghosh, Daryl R. Shannon
  • Publication number: 20100223599
    Abstract: In one embodiment, a method includes accessing software comprising one or more inputs, one or more variables, and one or more segments of code that when executed operate on one or more of the inputs or one or more of the variables. The method includes, for every variable, determining whether the variable is relevant or irrelevant to a set of the inputs when expressed symbolically and, if the variable is relevant, instrumenting the variable and every one of the segments of code associated with the variable. A segment of code is associated with the variable if the variable affects the segment of code when executed. The method includes symbolically executing the software with every relevant variable and its associated segments of code as instrumented to test the software.
    Type: Application
    Filed: February 27, 2009
    Publication date: September 2, 2010
    Applicant: FUJITSU LIMITED
    Inventors: Indradeep Ghosh, Daryl R. Shannon, Sreeranga P. Rajan
  • Publication number: 20090089759
    Abstract: In accordance with a particular embodiment of the present invention, a method is offered that includes generating a symbolic string manipulation class library for one or more web applications. The manipulations are generalized into a string manipulation symbolic algebra. The method also includes performing symbolic execution for one or more web applications. Typically, a Java model checker is augmented to check for certain types of requirements or properties in performing the symbolic execution. If an error scenario exists, a solution to a set of symbolic constraints is obtained, and the solution is mapped back to a source code to obtain an error trace and a test case. In still other specific embodiments, requirements or properties are encoded through templates and checked using public domain decision procedures. The properties or requirements can relate to security validation. The symbolic execution can be customized and tuned for Java-based web applications.
    Type: Application
    Filed: October 2, 2007
    Publication date: April 2, 2009
    Applicant: Fujitsu Limited
    Inventors: Sreeranga P. Rajan, Oksana I. Tkachuk, Indradeep Ghosh, Mukul R. Prasad, Daryl R. Shannon