IN2015CH03057A - - Google Patents

Info

Publication number
IN2015CH03057A
IN2015CH03057A IN3057CH2015A IN2015CH03057A IN 2015CH03057 A IN2015CH03057 A IN 2015CH03057A IN 3057CH2015 A IN3057CH2015 A IN 3057CH2015A IN 2015CH03057 A IN2015CH03057 A IN 2015CH03057A
Authority
IN
India
Application number
Inventor
Sridhar Kavitha
Original Assignee
Wipro Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wipro Ltd filed Critical Wipro Ltd
Priority to IN3057CH2015 priority Critical patent/IN2015CH03057A/en
Publication of IN2015CH03057A publication Critical patent/IN2015CH03057A/en
Priority to US14/814,912 priority patent/US9781146B2/en
Priority to EP15201794.3A priority patent/EP3107027B1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software
IN3057CH2015 2015-06-18 2015-06-18 IN2015CH03057A (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
IN3057CH2015 IN2015CH03057A (en) 2015-06-18 2015-06-18
US14/814,912 US9781146B2 (en) 2015-06-18 2015-07-31 Method and device for evaluating security assessment of an application
EP15201794.3A EP3107027B1 (en) 2015-06-18 2015-12-21 Method and device for evaluating security assessment of an application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
IN3057CH2015 IN2015CH03057A (en) 2015-06-18 2015-06-18

Publications (1)

Publication Number Publication Date
IN2015CH03057A true IN2015CH03057A (en) 2015-07-03

Family

ID=54397108

Family Applications (1)

Application Number Title Priority Date Filing Date
IN3057CH2015 IN2015CH03057A (en) 2015-06-18 2015-06-18

Country Status (2)

Country Link
US (1) US9781146B2 (en)
IN (1) IN2015CH03057A (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10250586B2 (en) * 2015-12-08 2019-04-02 Sap Se Security certification and application categorization for mobile device management
US10467419B1 (en) 2018-10-31 2019-11-05 Capital One Services, Llc Methods and systems for determining software risk scores
CN109450956B (en) * 2018-12-29 2021-06-08 奇安信科技集团股份有限公司 Network security evaluation method, system, medium, and computer system
US11301569B2 (en) * 2019-03-07 2022-04-12 Lookout, Inc. Quarantine of software based on analysis of updated device data
US11899792B2 (en) 2019-04-08 2024-02-13 Walmart Apollo, Llc System for security scanning code with minimal user interface
US20210349970A1 (en) * 2020-05-07 2021-11-11 Arris Enterprises Llc Application protection enforcement in the cloud
US11756097B2 (en) 2021-01-05 2023-09-12 Walmart Apollo, Llc Methods and apparatus for automatically detecting data attacks using machine learning processes

Family Cites Families (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8510571B1 (en) * 2003-03-24 2013-08-13 Hoi Chang System and method for inserting security mechanisms into a software program
US9069967B2 (en) * 2007-02-16 2015-06-30 Veracode, Inc. Assessment and analysis of software security flaws
US8499353B2 (en) 2007-02-16 2013-07-30 Veracode, Inc. Assessment and analysis of software security flaws
US8613080B2 (en) * 2007-02-16 2013-12-17 Veracode, Inc. Assessment and analysis of software security flaws in virtual machines
CN102141956B (en) * 2010-01-29 2015-02-11 国际商业机器公司 Method and system for managing response of security flaw during development
US9560036B2 (en) * 2010-07-08 2017-01-31 International Business Machines Corporation Cross-protocol federated single sign-on (F-SSO) for cloud enablement
US8701198B2 (en) 2010-08-10 2014-04-15 Salesforce.Com, Inc. Performing security analysis on a software application
US20150195181A1 (en) * 2010-09-30 2015-07-09 Google Inc. Testing of dynamic web content applications
US8800045B2 (en) * 2011-02-11 2014-08-05 Achilles Guard, Inc. Security countermeasure management platform
EP2610776B1 (en) 2011-09-16 2019-08-21 Veracode, Inc. Automated behavioural and static analysis using an instrumented sandbox and machine learning classification for mobile security
US8875298B2 (en) * 2012-02-16 2014-10-28 Nec Laboratories America, Inc. Method for scalable analysis of android applications for security vulnerability
US9661003B2 (en) * 2012-05-11 2017-05-23 Thomas W. Parker System and method for forensic cyber adversary profiling, attribution and attack identification
GB2503920A (en) * 2012-07-12 2014-01-15 Ibm Using a tag to identify the application context for a program object
WO2014041561A2 (en) 2012-08-31 2014-03-20 Iappsecure Solutions Pvt. Ltd. A system for analyzing applications accurately for finding security and quality issues
WO2014133528A1 (en) 2013-02-28 2014-09-04 Hewlett-Packard Development Company, L.P. Determining coverage of dynamic security scans using runtime and static code analyses
IN2013MU01201A (en) * 2013-03-28 2015-04-10 Tata Consultancy Services Ltd
US8959646B2 (en) * 2013-06-24 2015-02-17 Sap Se Automated detection and validation of sanitizers
US9305168B2 (en) * 2013-07-01 2016-04-05 Sap Se Modular static application security testing
US8881293B1 (en) * 2013-07-01 2014-11-04 Sap Se Static application security testing
US20150121532A1 (en) * 2013-10-31 2015-04-30 Comsec Consulting Ltd Systems and methods for defending against cyber attacks at the software level
US9977904B2 (en) * 2014-02-25 2018-05-22 Board Of Regents, The University Of Texas System Systems and methods for automated detection of application vulnerabilities
US9485268B2 (en) * 2014-04-04 2016-11-01 International Business Machines Corporation System, method and apparatus to visually configure an analysis of a program
WO2016018286A1 (en) * 2014-07-30 2016-02-04 Hewlett-Packard Development Company, L.P. Product risk profile
US10097574B2 (en) * 2014-12-18 2018-10-09 International Business Machines Corporation Auto-tuning program analysis tools based on user feedback
US9785777B2 (en) * 2014-12-19 2017-10-10 International Business Machines Corporation Static analysis based on abstract program representations
US9594913B2 (en) * 2015-01-28 2017-03-14 Wal-Mart Stores, Inc. System, method, and non-transitory computer-readable storage media for analyzing software application modules and provide actionable intelligence on remediation efforts

Also Published As

Publication number Publication date
US9781146B2 (en) 2017-10-03
US20160373480A1 (en) 2016-12-22

Similar Documents

Publication Publication Date Title
IN2015CH03057A (en)
BR0001810B1 (en)
CN303162133S (en)
BR0008719B1 (en)
BR0008604B1 (en)
BR0008158B1 (en)
BR0002402B1 (en)
BR0008132B1 (en)
BR0007834B1 (en)
BR0007747B1 (en)
BR0007688B1 (en)
BR0007672B1 (en)
BR0007487B1 (en)
BR0007468B1 (en)
BR0006866B1 (en)
BR0006854B1 (en)
BR0006634B1 (en)
BR0005085B1 (en)
BR0005041B1 (en)
BR0010150B1 (en)
BR0004687B1 (en)
CN303166918S (en)
BR0001684B1 (en)
BR0003928B1 (en)
CN303152154S (en)