BR112023005351A2 - Sistemas e métodos para triagem de vulnerabilidades de softwares - Google Patents

Sistemas e métodos para triagem de vulnerabilidades de softwares

Info

Publication number
BR112023005351A2
BR112023005351A2 BR112023005351A BR112023005351A BR112023005351A2 BR 112023005351 A2 BR112023005351 A2 BR 112023005351A2 BR 112023005351 A BR112023005351 A BR 112023005351A BR 112023005351 A BR112023005351 A BR 112023005351A BR 112023005351 A2 BR112023005351 A2 BR 112023005351A2
Authority
BR
Brazil
Prior art keywords
vulnerability
systems
methods
machine learning
triage
Prior art date
Application number
BR112023005351A
Other languages
English (en)
Inventor
Tarrant Finbarr
Kavanadala Sridhar Gopal
Hyub Kim Jee
Sharma Navdeep
Mulrooney Eanna
Plotnikov Anton
Kohout Karel
Lauande Lacroix Mário
Levine Richard
Obando Johnny
Original Assignee
Accenture Global Solutions Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Accenture Global Solutions Ltd filed Critical Accenture Global Solutions Ltd
Publication of BR112023005351A2 publication Critical patent/BR112023005351A2/pt

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N20/00Machine learning
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Artificial Intelligence (AREA)
  • Data Mining & Analysis (AREA)
  • Evolutionary Computation (AREA)
  • Medical Informatics (AREA)
  • Mathematical Physics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Stored Programmes (AREA)
  • Debugging And Monitoring (AREA)
  • Peptides Or Proteins (AREA)
  • Control Of Ac Motors In General (AREA)
  • Logic Circuits (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

SISTEMAS E MÉTODOS PARA TRIAGEM DE VULNERABILIDADES DE SOFTWARES. São fornecidos sistemas e métodos para a classificação de vulnerabilidades de segurança identificadas em aplicativos de software e sua triagem com base na triagem automatizada de árvore de decisão e/ou aprendizado de máquina. O sistema divulgado pode gerar um relatório listando possíveis problemas de vulnerabilidade detectados e determinar automaticamente se os possíveis problemas de vulnerabilidade são exploráveis usando políticas de triagem automatizadas contendo árvores de decisão ou extraindo recursos de vulnerabilidade do relatório e processando os recursos de vulnerabilidade extraídos usando modelos de aprendizado de máquina.
BR112023005351A 2020-09-28 2021-09-10 Sistemas e métodos para triagem de vulnerabilidades de softwares BR112023005351A2 (pt)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US17/035,375 US11861013B2 (en) 2020-09-28 2020-09-28 Systems and methods for triaging software vulnerabilities
PCT/EP2021/074995 WO2022063612A1 (en) 2020-09-28 2021-09-10 Systems and methods for triaging software vulnerabilities

Publications (1)

Publication Number Publication Date
BR112023005351A2 true BR112023005351A2 (pt) 2023-04-25

Family

ID=77910799

Family Applications (1)

Application Number Title Priority Date Filing Date
BR112023005351A BR112023005351A2 (pt) 2020-09-28 2021-09-10 Sistemas e métodos para triagem de vulnerabilidades de softwares

Country Status (9)

Country Link
US (1) US11861013B2 (pt)
EP (1) EP4217893A1 (pt)
JP (1) JP7511081B2 (pt)
CN (1) CN116209997A (pt)
AU (1) AU2021346779B2 (pt)
BR (1) BR112023005351A2 (pt)
CA (1) CA3196398A1 (pt)
MX (1) MX2023003118A (pt)
WO (1) WO2022063612A1 (pt)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11570199B2 (en) * 2020-12-23 2023-01-31 Intel Corporation Threat prevention by selective feature deprivation
US20220269790A1 (en) * 2021-02-24 2022-08-25 ArcaWorx Inc. Real-time automated compliance deviation monitoring and remediation
US12032703B2 (en) * 2021-07-06 2024-07-09 Sap Se Automatically rating the product's security during software development
US20230036102A1 (en) * 2021-07-30 2023-02-02 Red Hat, Inc. Differential diagnosis feature engineering for machine learning applications
US20230038196A1 (en) * 2021-08-04 2023-02-09 Secureworks Corp. Systems and methods of attack type and likelihood prediction
US12034751B2 (en) 2021-10-01 2024-07-09 Secureworks Corp. Systems and methods for detecting malicious hands-on-keyboard activity via machine learning
US11928221B2 (en) * 2021-11-29 2024-03-12 Bank Of America Corporation Source code clustering for automatically identifying false positives generated through static application security testing
US12015623B2 (en) 2022-06-24 2024-06-18 Secureworks Corp. Systems and methods for consensus driven threat intelligence
CN116663019B (zh) * 2023-07-06 2023-10-24 华中科技大学 一种源代码漏洞检测方法、装置和系统

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPWO2006087780A1 (ja) 2005-02-17 2008-07-03 富士通株式会社 脆弱性監査プログラム、脆弱性監査装置、脆弱性監査方法
US8839441B2 (en) * 2010-06-28 2014-09-16 Infosys Limited Method and system for adaptive vulnerability scanning of an application
US9665721B2 (en) 2014-04-23 2017-05-30 NSS Labs, Inc. Threat and defense evasion modeling system and method
US10127385B2 (en) * 2015-09-02 2018-11-13 Sap Se Automated security vulnerability exploit tracking on social media
US10681062B2 (en) * 2016-11-02 2020-06-09 Accenture Global Solutions Limited Incident triage scoring engine
US10650150B1 (en) * 2017-02-28 2020-05-12 University Of South Florida Vulnerability life cycle exploitation timing modeling
US10740469B2 (en) * 2017-12-28 2020-08-11 Fmr Llc Automated secure software development management, risk assessment, and risk remediation
US11843628B2 (en) * 2018-02-20 2023-12-12 Darktrace Holdings Limited Cyber security appliance for an operational technology network
JP6976194B2 (ja) 2018-02-26 2021-12-08 エヌ・ティ・ティ・コミュニケーションズ株式会社 脆弱性判定システム、脆弱性判定方法及びコンピュータプログラム
WO2020005250A1 (en) * 2018-06-28 2020-01-02 Google Llc Detecting zero-day attacks with unknown signatures via mining correlation in behavioral change of entities over time
US11568175B2 (en) 2018-09-07 2023-01-31 Verint Americas Inc. Dynamic intent classification based on environment variables
US11487879B2 (en) * 2018-12-28 2022-11-01 Tenable, Inc. Threat score prediction model
US11620389B2 (en) * 2019-06-24 2023-04-04 University Of Maryland Baltimore County Method and system for reducing false positives in static source code analysis reports using machine learning and classification techniques
US11204983B2 (en) * 2019-12-26 2021-12-21 Salesforce.Com, Inc. Scoring cloud packages for risk assessment automation

Also Published As

Publication number Publication date
JP7511081B2 (ja) 2024-07-04
CA3196398A1 (en) 2022-03-31
US11861013B2 (en) 2024-01-02
AU2021346779B2 (en) 2024-08-08
AU2021346779A1 (en) 2023-04-20
EP4217893A1 (en) 2023-08-02
JP2023545625A (ja) 2023-10-31
US20220100868A1 (en) 2022-03-31
WO2022063612A1 (en) 2022-03-31
CN116209997A (zh) 2023-06-02
MX2023003118A (es) 2023-06-19

Similar Documents

Publication Publication Date Title
BR112023005351A2 (pt) Sistemas e métodos para triagem de vulnerabilidades de softwares
US10721245B2 (en) Method and device for automatically verifying security event
US9141806B2 (en) Mining source code for violations of programming rules
Almin et al. A novel approach to detect android malware
US20190095618A1 (en) Quantitative unified analytic neural networks
EP4319054A3 (en) Identifying legitimate websites to remove false positives from domain discovery analysis
US20240330514A1 (en) Automated data masking with false positive detection and avoidance
CN105072115B (zh) 一种基于Docker虚拟化的信息系统入侵检测方法
WO2018016671A3 (ko) 보안 취약점 점검을 위한 위험성 코드 검출 시스템 및 그 방법
Maggi et al. Smart factory security: A case study on a modular smart manufacturing system
KR20200118712A (ko) 머신러닝과 자연어처리 기술을 활용한 사이버위협 탐지 방법
Layton et al. Authorship analysis of the Zeus botnet source code
CN114372519A (zh) 模型训练方法、api请求过滤方法、装置和存储介质
CN114024761A (zh) 网络威胁数据的检测方法、装置、存储介质及电子设备
US20210089656A1 (en) Real-time adaptive intrusion detection methods and apparatus
US20210056076A1 (en) High throughput embedding generation system for executable code and applications
CN110520806B (zh) 对可编程逻辑控制器的偏差工程修改的识别
CN111444502B (zh) 面向种群的安卓恶意软件检测模型库方法
US11354793B2 (en) Object detection with missing annotations in visual inspection
US20230040982A1 (en) Attack information processing apparatus, attack information processing method, and computer readable medium
Carrier Detecting obfuscated malware using memory feature engineering
Merlo et al. Phishing kits source code similarity distribution: A case study
AU2021107489A4 (en) An Real Time Automated Multi-level Malware Classification and Detection Module in Networks
KR102578291B1 (ko) 보안 규제 준수 자동화 장치
Lee et al. Toward Firmware-Type Analysis Using machine Learning Techniques