Patents by Inventor Eric Sheridan

Eric Sheridan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11601462
    Abstract: Disclosed are systems, methods and computer readable mediums for intelligent and directed dynamic application security testing. The systems, methods and computer-readable mediums can be configured to receive an attack location and an attack type for a web-application, transmit the attack location and attack type to a ID-DAST platform, receive from the ID-DAST platform a payload, attack the web-application using the payload, and receive results of the attack.
    Type: Grant
    Filed: November 25, 2020
    Date of Patent: March 7, 2023
    Assignee: Synopsys, Inc.
    Inventors: Joseph Feiman, Eric Sheridan, Prabhuram Mohan
  • Patent number: 11307961
    Abstract: Methods, apparatus, and systems for traversing a representation of an application source code, such as an abstract syntax tree (AST), are disclosed. Steps for traversing the AST include specifying a plurality of runtime binding rules which are associated with one or more locations within the AST, beginning to traverse the AST, monitoring a history of the traverse, continuing to traverse the AST based on the history of the traverse, and updating the history of the traverse. Continuing to traverse the AST may include identifying a plurality of concrete implementations of a method invocation and traversing less than all of the concrete implementations based at least in part on the runtime binding rules, the concrete implementations being traversed being selected based on the history of the traverse.
    Type: Grant
    Filed: August 7, 2019
    Date of Patent: April 19, 2022
    Assignee: NTT SECURITY APPSEC SOLUTIONS INC.
    Inventor: Eric Sheridan
  • Patent number: 11249877
    Abstract: Methods, apparatus, and systems for traversing a representation of an application source code are disclosed. Steps for traversing the representation include beginning to traverse the representation, monitoring a history of the traverse, and continuing to traverse the representation based on the history of the traverse. Continuing to traverse the representation may include identifying a plurality of concrete implementations of a method invocation and traversing less than all of the concrete implementations, the concrete implementations being traversed being selected based on the history of the traverse.
    Type: Grant
    Filed: July 2, 2019
    Date of Patent: February 15, 2022
    Assignee: NTT SECURITY APPSEC SOLUTIONS INC.
    Inventor: Eric Sheridan
  • Patent number: 11042645
    Abstract: Techniques for performing auto-remediation on computer system vulnerabilities in source code utilizing local repositories are disclosed herein. An application source code representation is scanned to determine any security vulnerabilities and from those vulnerabilities, a set of security patch rules are generated that may be used to automatically remediate the vulnerabilities. One or more of the security patch rules is selected for verification and, once verified may be used to generate a security patch. The security patch may then be automatically applied to the source code representation to produce a patched representation of the application source code with the vulnerability at least partly remediated.
    Type: Grant
    Filed: July 30, 2018
    Date of Patent: June 22, 2021
    Assignee: NTT SECURITY APPSEC SOLUTIONS INC.
    Inventors: Harry Papaxenopoulos, Eric Sheridan
  • Patent number: 11036868
    Abstract: Techniques for performing auto-remediation on computer system vulnerabilities in source code are disclosed herein. An application source code representation is scanned to determine any security vulnerabilities and from those vulnerabilities, a set of security patch rules are generated that may be used to automatically remediate the vulnerabilities. One or more of the security patch rules is selected for verification and, once verified may be used to generate a security patch. The security patch may then be automatically applied to the source code representation to produce a patched representation of the application source code with the vulnerability at least partly remediated.
    Type: Grant
    Filed: May 6, 2019
    Date of Patent: June 15, 2021
    Assignee: WHITEHAT SECURITY, INC.
    Inventors: Eric Sheridan, Harry Papaxenopoulos, John Thomas Melton
  • Publication number: 20210084064
    Abstract: Disclosed are systems, methods and computer readable mediums for intelligent and directed dynamic application security testing. The systems, methods and computer-readable mediums can be configured to receive an attack location and an attack type for a web-application, transmit the attack location and attack type to a ID-DAST platform, receive from the ID-DAST platform a payload, attack the web-application using the payload, and receive results of the attack.
    Type: Application
    Filed: November 25, 2020
    Publication date: March 18, 2021
    Inventors: Joseph FEIMAN, Eric SHERIDAN, Prabhuram MOHAN
  • Patent number: 10855717
    Abstract: Disclosed are systems, methods and computer readable mediums for intelligent and directed dynamic application security testing. The systems, methods and computer-readable mediums can be configured to receive an attack location and an attack type for a web-application, transmit the attack location and attack type to a ID-DAST platform, receive from the ID-DAST platform a payload, attack the web-application using the payload, and receive results of the attack.
    Type: Grant
    Filed: June 3, 2020
    Date of Patent: December 1, 2020
    Assignee: WHITEHAT SECURITY, INC.
    Inventors: Joseph Feiman, Eric Sheridan, Prabhuram Mohan
  • Patent number: 10657264
    Abstract: Methods, apparatus, and systems for characterizing vulnerabilities of an application source code are disclosed. Steps for characterizing vulnerabilities include traversing a representation of the application source code, generating a signature of a potential vulnerability of the application source code, and determining characteristics of the potential vulnerability based on a correlation between the generated signature of the potential vulnerability and previously stored signatures of potential vulnerabilities.
    Type: Grant
    Filed: November 27, 2017
    Date of Patent: May 19, 2020
    Assignee: WHITEHAT SECURITY, INC.
    Inventor: Eric Sheridan
  • Publication number: 20190361787
    Abstract: Methods, apparatus, and systems for traversing a representation of an application source code, such as an abstract syntax tree (AST), are disclosed. Steps for traversing the AST include specifying a plurality of runtime binding rules which are associated with one or more locations within the AST, beginning to traverse the AST, monitoring a history of the traverse, continuing to traverse the AST based on the history of the traverse, and updating the history of the traverse. Continuing to traverse the AST may include identifying a plurality of concrete implementations of a method invocation and traversing less than all of the concrete implementations based at least in part on the runtime binding rules, the concrete implementations being traversed being selected based on the history of the traverse.
    Type: Application
    Filed: August 7, 2019
    Publication date: November 28, 2019
    Inventor: Eric SHERIDAN
  • Publication number: 20190324885
    Abstract: Methods, apparatus, and systems for traversing a representation of an application source code are disclosed. Steps for traversing the representation include beginning to traverse the representation, monitoring a history of the traverse, and continuing to traverse the representation based on the history of the traverse. Continuing to traverse the representation may include identifying a plurality of concrete implementations of a method invocation and traversing less than all of the concrete implementations, the concrete implementations being traversed being selected based on the history of the traverse.
    Type: Application
    Filed: July 2, 2019
    Publication date: October 24, 2019
    Applicant: WHITEHAT SECURITY, INC.
    Inventor: Eric SHERIDAN
  • Publication number: 20190311133
    Abstract: Techniques for performing auto-remediation on computer system vulnerabilities in source code are disclosed herein. An application source code representation is scanned to determine any security vulnerabilities and from those vulnerabilities, a set of security patch rules are generated that may be used to automatically remediate the vulnerabilities. One or more of the security patch rules is selected for verification and, once verified may be used to generate a security patch. The security patch may then be automatically applied to the source code representation to produce a patched representation of the application source code with the vulnerability at least partly remediated.
    Type: Application
    Filed: May 6, 2019
    Publication date: October 10, 2019
    Inventors: Eric Sheridan, Harry Papaxenopoulos, John Thomas Melton
  • Patent number: 10379993
    Abstract: Methods, apparatus, and systems for traversing a representation of an application source code, such as an abstract syntax tree (AST), are disclosed. Steps for traversing the AST include specifying a plurality of runtime binding rules which are associated with one or more locations within the AST, beginning to traverse the AST, monitoring a history of the traverse, continuing to traverse the AST based on the history of the traverse, and updating the history of the traverse. Continuing to traverse the AST may include identifying a plurality of concrete implementations of a method invocation and traversing less than all of the concrete implementations based at least in part on the runtime binding rules, the concrete implementations being traversed being selected based on the history of the traverse.
    Type: Grant
    Filed: January 12, 2017
    Date of Patent: August 13, 2019
    Assignee: WHITEHAT SECURITY, INC.
    Inventor: Eric Sheridan
  • Patent number: 10282550
    Abstract: Techniques for performing auto-remediation on computer system vulnerabilities in source code are disclosed herein. An application source code representation is scanned to determine any security vulnerabilities and from those vulnerabilities, a set of security patch rules are generated that may be used to automatically remediate the vulnerabilities. One or more of the security patch rules is selected for verification and, once verified may be used to generate a security patch. The security patch may then be automatically applied to the source code representation to produce a patched representation of the application source code with the vulnerability at least partly remediated.
    Type: Grant
    Filed: March 12, 2015
    Date of Patent: May 7, 2019
    Assignee: WhiteHat Security, Inc.
    Inventors: Eric Sheridan, Harry Papaxenopoulos, John Thomas Melton
  • Publication number: 20180336354
    Abstract: Methods, apparatus, and systems for characterizing vulnerabilities of an application source code are disclosed. Steps for characterizing vulnerabilities include traversing a representation of the application source code, generating a signature of a potential vulnerability of the application source code, and determining characteristics of the potential vulnerability based on a correlation between the generated signature of the potential vulnerability and previously stored signatures of potential vulnerabilities.
    Type: Application
    Filed: November 27, 2017
    Publication date: November 22, 2018
    Inventor: Eric Sheridan
  • Publication number: 20180336356
    Abstract: Techniques for performing auto-remediation on computer system vulnerabilities in source code utilizing local repositories are disclosed herein. An application source code representation is scanned to determine any security vulnerabilities and from those vulnerabilities, a set of security patch rules are generated that may be used to automatically remediate the vulnerabilities. One or more of the security patch rules is selected for verification and, once verified may be used to generate a security patch. The security patch may then be automatically applied to the source code representation to produce a patched representation of the application source code with the vulnerability at least partly remediated.
    Type: Application
    Filed: July 30, 2018
    Publication date: November 22, 2018
    Inventors: Harry Papaxenopoulos, Eric Sheridan
  • Publication number: 20170351596
    Abstract: Methods, apparatus, and systems for traversing a representation of an application source code, such as an abstract syntax tree (AST), are disclosed. Steps for traversing the AST include specifying a plurality of runtime binding rules which are associated with one or more locations within the AST, beginning to traverse the AST, monitoring a history of the traverse, continuing to traverse the AST based on the history of the traverse, and updating the history of the traverse. Continuing to traverse the AST may include identifying a plurality of concrete implementations of a method invocation and traversing less than all of the concrete implementations based at least in part on the runtime binding rules, the concrete implementations being traversed being selected based on the history of the traverse.
    Type: Application
    Filed: January 12, 2017
    Publication date: December 7, 2017
    Inventor: Eric Sheridan
  • Patent number: 9830460
    Abstract: Methods, apparatus, and systems for characterizing vulnerabilities of an application source code are disclosed. Steps for characterizing vulnerabilities include traversing a representation of the application source code, generating a signature of a potential vulnerability of the application source code, and determining characteristics of the potential vulnerability based on a correlation between the generated signature of the potential vulnerability and previously stored signatures of potential vulnerabilities.
    Type: Grant
    Filed: July 28, 2016
    Date of Patent: November 28, 2017
    Assignee: WHITEHAT SECURITY, INC.
    Inventor: Eric Sheridan
  • Patent number: 9792443
    Abstract: Techniques for performing position analysis on a representation of an application source code are disclosed herein. An application source code is scanned to produce a representation of the application source code, start locations within the representation are determined, corresponding stop locations within the representation are determined, and a set of data impact locations within the representation are determined. The set of data impact locations are then used in a dataflow analysis to determine a position of high control of the data within the representation.
    Type: Grant
    Filed: March 12, 2015
    Date of Patent: October 17, 2017
    Assignee: WHITEHAT SECURITY, INC.
    Inventors: Eric Sheridan, Harry Papaxenopoulos, John Thomas Melton
  • Publication number: 20170053121
    Abstract: Methods, apparatus, and systems for characterizing vulnerabilities of an application source code are disclosed. Steps for characterizing vulnerabilities include traversing a representation of the application source code, generating a signature of a potential vulnerability of the application source code, and determining characteristics of the potential vulnerability based on a correlation between the generated signature of the potential vulnerability and previously stored signatures of potential vulnerabilities.
    Type: Application
    Filed: July 28, 2016
    Publication date: February 23, 2017
    Inventor: Eric Sheridan
  • Patent number: 9569334
    Abstract: Methods, apparatus, and systems for traversing a representation of an application source code, such as an abstract syntax tree (AST), are disclosed. Steps for traversing the AST include specifying a plurality of runtime binding rules which are associated with one or more locations within the AST, beginning to traverse the AST, monitoring a history of the traverse, continuing to traverse the AST based on the history of the traverse, and updating the history of the traverse. Continuing to traverse the AST may include identifying a plurality of concrete implementations of a method invocation and traversing less than all of the concrete implementations based at least in part on the runtime binding rules, the concrete implementations being traversed being selected based on the history of the traverse.
    Type: Grant
    Filed: March 14, 2013
    Date of Patent: February 14, 2017
    Assignee: WhiteHat Security, Inc.
    Inventor: Eric Sheridan