Patents by Inventor Eric Sheridan
Eric Sheridan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11601462Abstract: Disclosed are systems, methods and computer readable mediums for intelligent and directed dynamic application security testing. The systems, methods and computer-readable mediums can be configured to receive an attack location and an attack type for a web-application, transmit the attack location and attack type to a ID-DAST platform, receive from the ID-DAST platform a payload, attack the web-application using the payload, and receive results of the attack.Type: GrantFiled: November 25, 2020Date of Patent: March 7, 2023Assignee: Synopsys, Inc.Inventors: Joseph Feiman, Eric Sheridan, Prabhuram Mohan
-
Patent number: 11307961Abstract: Methods, apparatus, and systems for traversing a representation of an application source code, such as an abstract syntax tree (AST), are disclosed. Steps for traversing the AST include specifying a plurality of runtime binding rules which are associated with one or more locations within the AST, beginning to traverse the AST, monitoring a history of the traverse, continuing to traverse the AST based on the history of the traverse, and updating the history of the traverse. Continuing to traverse the AST may include identifying a plurality of concrete implementations of a method invocation and traversing less than all of the concrete implementations based at least in part on the runtime binding rules, the concrete implementations being traversed being selected based on the history of the traverse.Type: GrantFiled: August 7, 2019Date of Patent: April 19, 2022Assignee: NTT SECURITY APPSEC SOLUTIONS INC.Inventor: Eric Sheridan
-
Patent number: 11249877Abstract: Methods, apparatus, and systems for traversing a representation of an application source code are disclosed. Steps for traversing the representation include beginning to traverse the representation, monitoring a history of the traverse, and continuing to traverse the representation based on the history of the traverse. Continuing to traverse the representation may include identifying a plurality of concrete implementations of a method invocation and traversing less than all of the concrete implementations, the concrete implementations being traversed being selected based on the history of the traverse.Type: GrantFiled: July 2, 2019Date of Patent: February 15, 2022Assignee: NTT SECURITY APPSEC SOLUTIONS INC.Inventor: Eric Sheridan
-
Patent number: 11042645Abstract: Techniques for performing auto-remediation on computer system vulnerabilities in source code utilizing local repositories are disclosed herein. An application source code representation is scanned to determine any security vulnerabilities and from those vulnerabilities, a set of security patch rules are generated that may be used to automatically remediate the vulnerabilities. One or more of the security patch rules is selected for verification and, once verified may be used to generate a security patch. The security patch may then be automatically applied to the source code representation to produce a patched representation of the application source code with the vulnerability at least partly remediated.Type: GrantFiled: July 30, 2018Date of Patent: June 22, 2021Assignee: NTT SECURITY APPSEC SOLUTIONS INC.Inventors: Harry Papaxenopoulos, Eric Sheridan
-
Patent number: 11036868Abstract: Techniques for performing auto-remediation on computer system vulnerabilities in source code are disclosed herein. An application source code representation is scanned to determine any security vulnerabilities and from those vulnerabilities, a set of security patch rules are generated that may be used to automatically remediate the vulnerabilities. One or more of the security patch rules is selected for verification and, once verified may be used to generate a security patch. The security patch may then be automatically applied to the source code representation to produce a patched representation of the application source code with the vulnerability at least partly remediated.Type: GrantFiled: May 6, 2019Date of Patent: June 15, 2021Assignee: WHITEHAT SECURITY, INC.Inventors: Eric Sheridan, Harry Papaxenopoulos, John Thomas Melton
-
Publication number: 20210084064Abstract: Disclosed are systems, methods and computer readable mediums for intelligent and directed dynamic application security testing. The systems, methods and computer-readable mediums can be configured to receive an attack location and an attack type for a web-application, transmit the attack location and attack type to a ID-DAST platform, receive from the ID-DAST platform a payload, attack the web-application using the payload, and receive results of the attack.Type: ApplicationFiled: November 25, 2020Publication date: March 18, 2021Inventors: Joseph FEIMAN, Eric SHERIDAN, Prabhuram MOHAN
-
Patent number: 10855717Abstract: Disclosed are systems, methods and computer readable mediums for intelligent and directed dynamic application security testing. The systems, methods and computer-readable mediums can be configured to receive an attack location and an attack type for a web-application, transmit the attack location and attack type to a ID-DAST platform, receive from the ID-DAST platform a payload, attack the web-application using the payload, and receive results of the attack.Type: GrantFiled: June 3, 2020Date of Patent: December 1, 2020Assignee: WHITEHAT SECURITY, INC.Inventors: Joseph Feiman, Eric Sheridan, Prabhuram Mohan
-
Patent number: 10657264Abstract: Methods, apparatus, and systems for characterizing vulnerabilities of an application source code are disclosed. Steps for characterizing vulnerabilities include traversing a representation of the application source code, generating a signature of a potential vulnerability of the application source code, and determining characteristics of the potential vulnerability based on a correlation between the generated signature of the potential vulnerability and previously stored signatures of potential vulnerabilities.Type: GrantFiled: November 27, 2017Date of Patent: May 19, 2020Assignee: WHITEHAT SECURITY, INC.Inventor: Eric Sheridan
-
Publication number: 20190361787Abstract: Methods, apparatus, and systems for traversing a representation of an application source code, such as an abstract syntax tree (AST), are disclosed. Steps for traversing the AST include specifying a plurality of runtime binding rules which are associated with one or more locations within the AST, beginning to traverse the AST, monitoring a history of the traverse, continuing to traverse the AST based on the history of the traverse, and updating the history of the traverse. Continuing to traverse the AST may include identifying a plurality of concrete implementations of a method invocation and traversing less than all of the concrete implementations based at least in part on the runtime binding rules, the concrete implementations being traversed being selected based on the history of the traverse.Type: ApplicationFiled: August 7, 2019Publication date: November 28, 2019Inventor: Eric SHERIDAN
-
Publication number: 20190324885Abstract: Methods, apparatus, and systems for traversing a representation of an application source code are disclosed. Steps for traversing the representation include beginning to traverse the representation, monitoring a history of the traverse, and continuing to traverse the representation based on the history of the traverse. Continuing to traverse the representation may include identifying a plurality of concrete implementations of a method invocation and traversing less than all of the concrete implementations, the concrete implementations being traversed being selected based on the history of the traverse.Type: ApplicationFiled: July 2, 2019Publication date: October 24, 2019Applicant: WHITEHAT SECURITY, INC.Inventor: Eric SHERIDAN
-
Publication number: 20190311133Abstract: Techniques for performing auto-remediation on computer system vulnerabilities in source code are disclosed herein. An application source code representation is scanned to determine any security vulnerabilities and from those vulnerabilities, a set of security patch rules are generated that may be used to automatically remediate the vulnerabilities. One or more of the security patch rules is selected for verification and, once verified may be used to generate a security patch. The security patch may then be automatically applied to the source code representation to produce a patched representation of the application source code with the vulnerability at least partly remediated.Type: ApplicationFiled: May 6, 2019Publication date: October 10, 2019Inventors: Eric Sheridan, Harry Papaxenopoulos, John Thomas Melton
-
Patent number: 10379993Abstract: Methods, apparatus, and systems for traversing a representation of an application source code, such as an abstract syntax tree (AST), are disclosed. Steps for traversing the AST include specifying a plurality of runtime binding rules which are associated with one or more locations within the AST, beginning to traverse the AST, monitoring a history of the traverse, continuing to traverse the AST based on the history of the traverse, and updating the history of the traverse. Continuing to traverse the AST may include identifying a plurality of concrete implementations of a method invocation and traversing less than all of the concrete implementations based at least in part on the runtime binding rules, the concrete implementations being traversed being selected based on the history of the traverse.Type: GrantFiled: January 12, 2017Date of Patent: August 13, 2019Assignee: WHITEHAT SECURITY, INC.Inventor: Eric Sheridan
-
Patent number: 10282550Abstract: Techniques for performing auto-remediation on computer system vulnerabilities in source code are disclosed herein. An application source code representation is scanned to determine any security vulnerabilities and from those vulnerabilities, a set of security patch rules are generated that may be used to automatically remediate the vulnerabilities. One or more of the security patch rules is selected for verification and, once verified may be used to generate a security patch. The security patch may then be automatically applied to the source code representation to produce a patched representation of the application source code with the vulnerability at least partly remediated.Type: GrantFiled: March 12, 2015Date of Patent: May 7, 2019Assignee: WhiteHat Security, Inc.Inventors: Eric Sheridan, Harry Papaxenopoulos, John Thomas Melton
-
Publication number: 20180336354Abstract: Methods, apparatus, and systems for characterizing vulnerabilities of an application source code are disclosed. Steps for characterizing vulnerabilities include traversing a representation of the application source code, generating a signature of a potential vulnerability of the application source code, and determining characteristics of the potential vulnerability based on a correlation between the generated signature of the potential vulnerability and previously stored signatures of potential vulnerabilities.Type: ApplicationFiled: November 27, 2017Publication date: November 22, 2018Inventor: Eric Sheridan
-
Publication number: 20180336356Abstract: Techniques for performing auto-remediation on computer system vulnerabilities in source code utilizing local repositories are disclosed herein. An application source code representation is scanned to determine any security vulnerabilities and from those vulnerabilities, a set of security patch rules are generated that may be used to automatically remediate the vulnerabilities. One or more of the security patch rules is selected for verification and, once verified may be used to generate a security patch. The security patch may then be automatically applied to the source code representation to produce a patched representation of the application source code with the vulnerability at least partly remediated.Type: ApplicationFiled: July 30, 2018Publication date: November 22, 2018Inventors: Harry Papaxenopoulos, Eric Sheridan
-
Publication number: 20170351596Abstract: Methods, apparatus, and systems for traversing a representation of an application source code, such as an abstract syntax tree (AST), are disclosed. Steps for traversing the AST include specifying a plurality of runtime binding rules which are associated with one or more locations within the AST, beginning to traverse the AST, monitoring a history of the traverse, continuing to traverse the AST based on the history of the traverse, and updating the history of the traverse. Continuing to traverse the AST may include identifying a plurality of concrete implementations of a method invocation and traversing less than all of the concrete implementations based at least in part on the runtime binding rules, the concrete implementations being traversed being selected based on the history of the traverse.Type: ApplicationFiled: January 12, 2017Publication date: December 7, 2017Inventor: Eric Sheridan
-
Patent number: 9830460Abstract: Methods, apparatus, and systems for characterizing vulnerabilities of an application source code are disclosed. Steps for characterizing vulnerabilities include traversing a representation of the application source code, generating a signature of a potential vulnerability of the application source code, and determining characteristics of the potential vulnerability based on a correlation between the generated signature of the potential vulnerability and previously stored signatures of potential vulnerabilities.Type: GrantFiled: July 28, 2016Date of Patent: November 28, 2017Assignee: WHITEHAT SECURITY, INC.Inventor: Eric Sheridan
-
Patent number: 9792443Abstract: Techniques for performing position analysis on a representation of an application source code are disclosed herein. An application source code is scanned to produce a representation of the application source code, start locations within the representation are determined, corresponding stop locations within the representation are determined, and a set of data impact locations within the representation are determined. The set of data impact locations are then used in a dataflow analysis to determine a position of high control of the data within the representation.Type: GrantFiled: March 12, 2015Date of Patent: October 17, 2017Assignee: WHITEHAT SECURITY, INC.Inventors: Eric Sheridan, Harry Papaxenopoulos, John Thomas Melton
-
Publication number: 20170053121Abstract: Methods, apparatus, and systems for characterizing vulnerabilities of an application source code are disclosed. Steps for characterizing vulnerabilities include traversing a representation of the application source code, generating a signature of a potential vulnerability of the application source code, and determining characteristics of the potential vulnerability based on a correlation between the generated signature of the potential vulnerability and previously stored signatures of potential vulnerabilities.Type: ApplicationFiled: July 28, 2016Publication date: February 23, 2017Inventor: Eric Sheridan
-
Patent number: 9569334Abstract: Methods, apparatus, and systems for traversing a representation of an application source code, such as an abstract syntax tree (AST), are disclosed. Steps for traversing the AST include specifying a plurality of runtime binding rules which are associated with one or more locations within the AST, beginning to traverse the AST, monitoring a history of the traverse, continuing to traverse the AST based on the history of the traverse, and updating the history of the traverse. Continuing to traverse the AST may include identifying a plurality of concrete implementations of a method invocation and traversing less than all of the concrete implementations based at least in part on the runtime binding rules, the concrete implementations being traversed being selected based on the history of the traverse.Type: GrantFiled: March 14, 2013Date of Patent: February 14, 2017Assignee: WhiteHat Security, Inc.Inventor: Eric Sheridan