SG11201505534SA - Systems and methods for identifying and reporting application and file vulnerabilities - Google Patents

Systems and methods for identifying and reporting application and file vulnerabilities

Info

Publication number
SG11201505534SA
SG11201505534SA SG11201505534SA SG11201505534SA SG11201505534SA SG 11201505534S A SG11201505534S A SG 11201505534SA SG 11201505534S A SG11201505534S A SG 11201505534SA SG 11201505534S A SG11201505534S A SG 11201505534SA SG 11201505534S A SG11201505534S A SG 11201505534SA
Authority
SG
Singapore
Prior art keywords
vulnerabilities
file
identifying
systems
methods
Prior art date
Application number
SG11201505534SA
Inventor
Chris Silva
Brad Hibbert
Original Assignee
Beyondtrust Software Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beyondtrust Software Inc filed Critical Beyondtrust Software Inc
Publication of SG11201505534SA publication Critical patent/SG11201505534SA/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
SG11201505534SA 2013-01-15 2014-01-15 Systems and methods for identifying and reporting application and file vulnerabilities SG11201505534SA (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201361752808P 2013-01-15 2013-01-15
PCT/US2014/011729 WO2014113501A1 (en) 2013-01-15 2014-01-15 Systems and methods for identifying and reporting application and file vulnerabilities

Publications (1)

Publication Number Publication Date
SG11201505534SA true SG11201505534SA (en) 2015-09-29

Family

ID=51166356

Family Applications (1)

Application Number Title Priority Date Filing Date
SG11201505534SA SG11201505534SA (en) 2013-01-15 2014-01-15 Systems and methods for identifying and reporting application and file vulnerabilities

Country Status (8)

Country Link
US (1) US20140201843A1 (en)
EP (1) EP2946327A4 (en)
JP (1) JP2016503936A (en)
AU (1) AU2014207540A1 (en)
CA (1) CA2899909A1 (en)
MX (1) MX2015009172A (en)
SG (1) SG11201505534SA (en)
WO (1) WO2014113501A1 (en)

Families Citing this family (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2507357B (en) * 2013-01-21 2016-04-20 F Secure Corp Agent based application reputation system for operating systems
US8943592B1 (en) * 2013-07-15 2015-01-27 Eset, Spol. S.R.O. Methods of detection of software exploitation
US9298923B2 (en) * 2013-09-04 2016-03-29 Cisco Technology, Inc. Software revocation infrastructure
US20150312276A1 (en) * 2014-04-29 2015-10-29 1E Limited White lists
US9467455B2 (en) 2014-12-29 2016-10-11 Palantir Technologies Inc. Systems for network risk assessment including processing of user access rights associated with a network of devices
US9648036B2 (en) 2014-12-29 2017-05-09 Palantir Technologies Inc. Systems for network risk assessment including processing of user access rights associated with a network of devices
JP6404771B2 (en) * 2015-05-26 2018-10-17 日本電信電話株式会社 Log determination device, log determination method, and log determination program
US10205737B2 (en) * 2016-01-11 2019-02-12 International Business Machines Corporation Addressing login platform security risks
US10025701B2 (en) * 2016-05-16 2018-07-17 Google Llc Application pre-release report
US10530803B1 (en) * 2016-07-05 2020-01-07 Wells Fargo Bank, N.A. Secure online transactions
US10594719B2 (en) 2016-08-30 2020-03-17 Kivu Consulting, Inc. Systems and methods for remote identification of enterprise threats
US10609065B2 (en) 2016-08-30 2020-03-31 Kivu Consulting, Inc. Systems and methods for identifying and mapping sensitive data on an enterprise
GB2553836B (en) 2016-09-16 2021-05-19 1E Ltd File execution
US9749349B1 (en) * 2016-09-23 2017-08-29 OPSWAT, Inc. Computer security vulnerability assessment
US11522901B2 (en) 2016-09-23 2022-12-06 OPSWAT, Inc. Computer security vulnerability assessment
US11256812B2 (en) * 2017-01-31 2022-02-22 Zerofox, Inc. End user social network protection portal
CN110476167B (en) * 2017-02-27 2023-10-13 英万齐股份有限公司 Context-based computer security risk mitigation system and method
US11394722B2 (en) 2017-04-04 2022-07-19 Zerofox, Inc. Social media rule engine
US11418527B2 (en) 2017-08-22 2022-08-16 ZeroFOX, Inc Malicious social media account identification
US11403400B2 (en) 2017-08-31 2022-08-02 Zerofox, Inc. Troll account detection
US10623433B1 (en) 2017-09-25 2020-04-14 Amazon Technologies, Inc. Configurable event-based compute instance security assessments
US11741196B2 (en) 2018-11-15 2023-08-29 The Research Foundation For The State University Of New York Detecting and preventing exploits of software vulnerability using instruction tags
US11269997B2 (en) * 2019-08-13 2022-03-08 Sap Se Automated dynamic security testing
US11205005B2 (en) 2019-09-23 2021-12-21 International Business Machines Corporation Identifying microarchitectural security vulnerabilities using simulation comparison with modified secret data
US11443044B2 (en) 2019-09-23 2022-09-13 International Business Machines Corporation Targeted very long delay for increasing speculative execution progression
CN111488580A (en) * 2020-03-25 2020-08-04 杭州迪普科技股份有限公司 Potential safety hazard detection method and device, electronic equipment and computer readable medium
US11706239B2 (en) 2020-08-26 2023-07-18 Cisco Technology, Inc. Systems and methods for detecting vulnerabilities in network processes during runtime
CN112948258A (en) * 2021-03-26 2021-06-11 杭州万高科技股份有限公司 Code testing method, device, equipment and computer readable storage medium
US20230112966A1 (en) * 2021-09-30 2023-04-13 Dell Products L.P. Method and system for generating security findings acquisition records for systems and system components

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1999066383A2 (en) * 1998-06-15 1999-12-23 Dmw Worldwide, Inc. Method and apparatus for assessing the security of a computer system
ATE414943T1 (en) * 2000-03-03 2008-12-15 Ibm SYSTEM FOR DETERMINING WEAKNESSES OF WEB APPLICATIONS
US7225343B1 (en) * 2002-01-25 2007-05-29 The Trustees Of Columbia University In The City Of New York System and methods for adaptive model generation for detecting intrusions in computer systems
US7325002B2 (en) * 2003-04-04 2008-01-29 Juniper Networks, Inc. Detection of network security breaches based on analysis of network record logs
US7237266B2 (en) * 2003-06-30 2007-06-26 At&T Intellectual Property, Inc. Electronic vulnerability and reliability assessment
US7797752B1 (en) * 2003-12-17 2010-09-14 Vimal Vaidya Method and apparatus to secure a computing environment
US7895651B2 (en) * 2005-07-29 2011-02-22 Bit 9, Inc. Content tracking in a network security system
US20070094735A1 (en) * 2005-10-26 2007-04-26 Cohen Matthew L Method to consolidate and prioritize web application vulnerabilities
US8612971B1 (en) * 2006-10-17 2013-12-17 Manageiq, Inc. Automatic optimization for virtual systems
US8613080B2 (en) * 2007-02-16 2013-12-17 Veracode, Inc. Assessment and analysis of software security flaws in virtual machines
US7472420B1 (en) * 2008-04-23 2008-12-30 Kaspersky Lab, Zao Method and system for detection of previously unknown malware components
US8127354B1 (en) * 2008-10-09 2012-02-28 Mcafee, Inc. System, method, and computer program product for identifying vulnerabilities associated with data loaded in memory
US9009837B2 (en) * 2010-07-01 2015-04-14 Onapsis S.R.L. Automated security assessment of business-critical systems and applications
TWI442260B (en) * 2010-11-19 2014-06-21 Inst Information Industry Server, user device and malware detection method thereof
US8560661B2 (en) * 2010-12-30 2013-10-15 Kaspersky Lab Zao System and methods for launching antivirus application tasks during computer downtime
US9075993B2 (en) * 2011-01-24 2015-07-07 Mcafee, Inc. System and method for selectively grouping and managing program files
US9286182B2 (en) * 2011-06-17 2016-03-15 Microsoft Technology Licensing, Llc Virtual machine snapshotting and analysis

Also Published As

Publication number Publication date
CA2899909A1 (en) 2014-07-24
JP2016503936A (en) 2016-02-08
EP2946327A4 (en) 2016-09-14
EP2946327A1 (en) 2015-11-25
US20140201843A1 (en) 2014-07-17
AU2014207540A1 (en) 2015-08-06
MX2015009172A (en) 2016-02-18
WO2014113501A1 (en) 2014-07-24

Similar Documents

Publication Publication Date Title
SG11201505534SA (en) Systems and methods for identifying and reporting application and file vulnerabilities
HK1218013A1 (en) Systems and methods for evaluating computing resources
GB2534067B (en) Methods and systems for genomic analysis
HK1216551A1 (en) Systems and methods for identifying explosives
GB2560653B8 (en) Vaporizaton device systems and methods
GB2517483B (en) Detecting file encrypting malware
GB201520169D0 (en) Methods and systems for improved document comparison
EP2955900A4 (en) File sharing method and device
SG11201507023XA (en) Systems and methods for cloud data security
SG11201603039PA (en) Methods and systems for identifying disease-induced mutations
GB201610930D0 (en) Systems and methods for sales execution environment
EP2959403A4 (en) Link association analysis systems and methods
HUE050641T2 (en) Methods and systems for analyzing image data
EP2947570A4 (en) Information processing device and file management method
GB201316957D0 (en) Operation management system and operation management method
SG10201407868TA (en) Systems and methods for software based encryption
GB2526996B (en) Systems and methods for document and material management
EP2951978A4 (en) Methods and systems for shared file storage
HK1205581A1 (en) Hadoop distributed file system and management method thereof hadoop
PL3071774T3 (en) Systems and methods for piston assemblies
SG11201605156WA (en) Ct systems and methods
TWI563840B (en) Media file management method and system
IL241527B (en) Systems and methods for assessing security risk
EP2979181A4 (en) Systems and methods for providing an emulator
BR112014019186A2 (en) FILE PROCESSING SYSTEMS AND METHODS