US7051322B2
(en)
*
|
2002-12-06 |
2006-05-23 |
@Stake, Inc. |
Software analysis framework
|
US8108826B2
(en)
*
|
2004-09-29 |
2012-01-31 |
Avaya Inc. |
Code-coverage guided prioritized test generation
|
EP2092424B1
(en)
|
2006-10-19 |
2015-12-30 |
Checkmarx Ltd. |
Locating security vulnerabilities in source code
|
US8429637B2
(en)
*
|
2008-09-02 |
2013-04-23 |
Apple Inc. |
System and method for conditional expansion obfuscation
|
US8589884B2
(en)
*
|
2009-01-15 |
2013-11-19 |
Infosys Limited |
Method and system for identifying regression test cases for a software
|
US8869111B2
(en)
*
|
2009-01-15 |
2014-10-21 |
Infosys Limited |
Method and system for generating test cases for a software application
|
JP5228943B2
(ja)
*
|
2009-01-27 |
2013-07-03 |
富士通株式会社 |
最小権限違反検出プログラム
|
KR101730513B1
(ko)
|
2009-02-13 |
2017-04-26 |
아브 이니티오 테크놀로지 엘엘시 |
태스크 실행 관리
|
JP5186443B2
(ja)
|
2009-06-30 |
2013-04-17 |
インターナショナル・ビジネス・マシーンズ・コーポレーション |
文字列の妥当性を判定するシステム、方法及びプログラム
|
CN101964025B
(zh)
*
|
2009-07-23 |
2016-02-03 |
北京神州绿盟信息安全科技股份有限公司 |
Xss检测方法和设备
|
US8612954B2
(en)
*
|
2009-08-17 |
2013-12-17 |
International Business Machines Corporation |
Fine slicing: generating an executable bounded slice for program
|
US8397300B2
(en)
|
2009-09-22 |
2013-03-12 |
International Business Machines Corporation |
Detecting security vulnerabilities relating to cryptographically-sensitive information carriers when testing computer software
|
US8448139B2
(en)
*
|
2009-10-05 |
2013-05-21 |
International Business Machines Corporation |
Automatic correction of application based on runtime behavior
|
US8584246B2
(en)
|
2009-10-13 |
2013-11-12 |
International Business Machines Corporation |
Eliminating false reports of security vulnerabilities when testing computer software
|
US8468512B2
(en)
*
|
2009-10-30 |
2013-06-18 |
International Business Machines Corporation |
Abstracting benefit rules from computer code
|
JP5381649B2
(ja)
*
|
2009-11-26 |
2014-01-08 |
富士通株式会社 |
検証対象抽出プログラム、検証対象抽出装置、および検証対象抽出方法
|
US8468605B2
(en)
|
2009-11-30 |
2013-06-18 |
International Business Machines Corporation |
Identifying security vulnerability in computer software
|
US8359584B2
(en)
*
|
2009-12-18 |
2013-01-22 |
Microsoft Corporation |
Debugging from a call graph
|
US9210184B2
(en)
|
2009-12-29 |
2015-12-08 |
International Business Machines Corporation |
Determining the vulnerability of computer software applications to attacks
|
US8843902B2
(en)
*
|
2010-03-12 |
2014-09-23 |
XMOS Ltd. |
Program flow route constructor
|
US10025688B2
(en)
*
|
2010-03-14 |
2018-07-17 |
Virtual Forge GmbH |
System and method for detecting data extrusion in software applications
|
US8589898B2
(en)
*
|
2010-03-29 |
2013-11-19 |
GM Global Technology Operations LLC |
Method and apparatus for analyzing software including a calibrated value
|
US8584108B2
(en)
*
|
2010-03-29 |
2013-11-12 |
GM Global Technology Operations LLC |
Method and apparatus for analyzing software
|
US8910133B2
(en)
*
|
2010-06-07 |
2014-12-09 |
Microsoft Corporation |
Library conformity checker
|
WO2011159759A1
(en)
|
2010-06-15 |
2011-12-22 |
Ab Initio Technology Llc |
Dynamically loading graph-based computations
|
US8528095B2
(en)
|
2010-06-28 |
2013-09-03 |
International Business Machines Corporation |
Injection context based static analysis of computer software applications
|
EP2609506B1
(en)
*
|
2010-08-24 |
2019-01-16 |
Checkmarx Ltd. |
Mining source code for violations of programming rules
|
US20120102474A1
(en)
*
|
2010-10-26 |
2012-04-26 |
International Business Machines Corporation |
Static analysis of client-server applications using framework independent specifications
|
US8572747B2
(en)
*
|
2010-11-19 |
2013-10-29 |
International Business Machines Corporation |
Policy-driven detection and verification of methods such as sanitizers and validators
|
US8667584B2
(en)
|
2010-12-15 |
2014-03-04 |
International Business Machines Corporation |
Formal analysis of the quality and conformance of information flow downgraders
|
US8407242B2
(en)
*
|
2010-12-16 |
2013-03-26 |
Microsoft Corporation |
Temporal binding for semantic queries
|
IL210169A0
(en)
|
2010-12-22 |
2011-03-31 |
Yehuda Binder |
System and method for routing-based internet security
|
KR101097105B1
(ko)
*
|
2010-12-23 |
2011-12-22 |
한국저작권위원회 |
Sw 소스코드 난독화와 버전 관리시스템과의 연동 방법 및 시스템
|
US20120192280A1
(en)
*
|
2011-01-20 |
2012-07-26 |
Board Of Trustees Of The University Of Illinois |
Apparatus for enhancing web application security and method therefor
|
US8914890B2
(en)
*
|
2011-01-31 |
2014-12-16 |
International Business Machines Corporation |
Determining the vulnerability of computer software applications to privilege-escalation attacks
|
US8606866B2
(en)
|
2011-02-10 |
2013-12-10 |
Kaspersky Lab Zao |
Systems and methods of probing data transmissions for detecting spam bots
|
JP5654944B2
(ja)
*
|
2011-05-02 |
2015-01-14 |
Kddi株式会社 |
アプリケーション解析装置およびプログラム
|
US8539466B2
(en)
|
2011-05-23 |
2013-09-17 |
International Business Machines Corporation |
Determining suitable insertion points for string sanitizers in a computer code
|
US8516443B2
(en)
*
|
2011-05-26 |
2013-08-20 |
Oracle International Corporation |
Context-sensitive analysis framework using value flows
|
US8949992B2
(en)
*
|
2011-05-31 |
2015-02-03 |
International Business Machines Corporation |
Detecting persistent vulnerabilities in web applications
|
US8666999B2
(en)
*
|
2011-08-02 |
2014-03-04 |
Rockwell Automation Technologies, Inc. |
Search utility program for software developers
|
US8875109B2
(en)
*
|
2011-08-26 |
2014-10-28 |
Fujitsu Limited |
Tracking variables in javascript software using a control flow graph
|
US8793665B2
(en)
*
|
2011-08-26 |
2014-07-29 |
Fujitsu Limited |
Performing taint analysis for javascript software using a control flow graph
|
JP2013061843A
(ja)
*
|
2011-09-14 |
2013-04-04 |
Fujifilm Corp |
コンピュータ・ソフトウエア解析システムならびにクライアント・コンピュータ,その動作制御方法およびその動作プログラム
|
US8769696B2
(en)
|
2011-09-29 |
2014-07-01 |
International Business Machines Corporation |
Automated detection of flaws and incompatibility problems in information flow downgraders
|
US9098624B1
(en)
|
2011-12-22 |
2015-08-04 |
Dell Software Inc. |
Deep type parsing
|
US8856935B2
(en)
|
2012-02-07 |
2014-10-07 |
International Business Machines Corporation |
Automatic synthesis of unit tests for security testing
|
US8806464B2
(en)
*
|
2012-04-26 |
2014-08-12 |
Hewlett-Packard Development Company, L.P. |
Process flow optimized directed graph traversal
|
CA2777434C
(en)
|
2012-05-18 |
2019-09-10 |
Ibm Canada Limited - Ibm Canada Limitee |
Verifying application security vulnerabilities
|
CN102693396B
(zh)
*
|
2012-06-11 |
2014-09-17 |
中南大学 |
一种基于虚拟执行模式的Flash漏洞检测方法
|
CN104272270B
(zh)
|
2012-07-26 |
2017-06-09 |
慧与发展有限责任合伙企业 |
应用程序安全测试
|
JP6382196B2
(ja)
|
2012-08-18 |
2018-08-29 |
フーガ インコーポレイテッド |
セキュアな計算環境を提供するシステム及び方法
|
US20150244737A1
(en)
*
|
2012-09-25 |
2015-08-27 |
Checkmarx Ltd. |
Detecting malicious advertisements using source code analysis
|
EP2902939A4
(en)
|
2012-09-26 |
2016-04-27 |
Mitsubishi Electric Corp |
PROGRAM VERIFICATION DEVICE, PROGRAM VERIFICATION METHOD, AND PROGRAM VERIFICATION PROGRAM
|
US9032530B2
(en)
|
2012-09-28 |
2015-05-12 |
International Business Machines Corporation |
Correcting workflow security vulnerabilities via static analysis and virtual patching
|
US9141807B2
(en)
*
|
2012-09-28 |
2015-09-22 |
Synopsys, Inc. |
Security remediation
|
US9292693B2
(en)
*
|
2012-10-09 |
2016-03-22 |
International Business Machines Corporation |
Remediation of security vulnerabilities in computer software
|
US8966636B2
(en)
*
|
2012-10-16 |
2015-02-24 |
International Business Machines Corporation |
Transforming unit tests for security testing
|
US10521288B2
(en)
*
|
2012-11-07 |
2019-12-31 |
International Business Machines Corporation |
Collaborative application testing
|
JP6052297B2
(ja)
|
2012-11-13 |
2016-12-27 |
富士通株式会社 |
ネットワークのフィルタリング装置、及びフィルタリング方法
|
US10108521B2
(en)
|
2012-11-16 |
2018-10-23 |
Ab Initio Technology Llc |
Dynamic component performance monitoring
|
US9507682B2
(en)
|
2012-11-16 |
2016-11-29 |
Ab Initio Technology Llc |
Dynamic graph performance monitoring
|
CN103108044B
(zh)
*
|
2013-02-04 |
2015-08-19 |
南京大学 |
一种基于依赖图约减和QoS保持的Web服务组合方法
|
US9384354B2
(en)
|
2013-02-20 |
2016-07-05 |
International Business Machines Corporation |
Rule matching in the presence of languages with no types or as an adjunct to current analyses for security vulnerability analysis
|
JP5941859B2
(ja)
*
|
2013-03-05 |
2016-06-29 |
株式会社エヌ・ティ・ティ・データ |
検証装置、検証方法、及びプログラム
|
US9372785B2
(en)
*
|
2013-03-07 |
2016-06-21 |
Microsoft Technology Licensing, Llc |
Identifying implicit assumptions associated with a software product
|
US9569334B2
(en)
|
2013-03-14 |
2017-02-14 |
Whitehat Security, Inc. |
Techniques for traversing representations of source code
|
CN105210075A
(zh)
|
2013-04-19 |
2015-12-30 |
惠普发展公司,有限责任合伙企业 |
被测应用程序的未使用参数
|
US9158922B2
(en)
|
2013-05-29 |
2015-10-13 |
Lucent Sky Corporation |
Method, system, and computer-readable medium for automatically mitigating vulnerabilities in source code
|
US9471286B2
(en)
*
|
2013-06-04 |
2016-10-18 |
Microsoft Technology Licensing, Llc |
System and method for providing code completion features for code modules
|
US9426177B2
(en)
*
|
2013-07-15 |
2016-08-23 |
Tencent Technology (Shenzhen) Company Limited |
Method and apparatus for detecting security vulnerability for animation source file
|
JP6233414B2
(ja)
|
2013-07-26 |
2017-11-22 |
富士通株式会社 |
情報処理装置、フィルタリングシステム、フィルタリング方法、及びフィルタリングプログラム
|
CN105431859A
(zh)
*
|
2013-07-31 |
2016-03-23 |
惠普发展公司,有限责任合伙企业 |
指示恶意软件的信号标记
|
US9459986B2
(en)
|
2013-08-28 |
2016-10-04 |
International Business Machines Corporation |
Automatic generation of analysis-equivalent application constructs
|
US12124586B2
(en)
*
|
2013-09-13 |
2024-10-22 |
Omnissa, Llc |
Risk assessment for managed client devices
|
US20150095894A1
(en)
*
|
2013-09-30 |
2015-04-02 |
International Business Machines Corporation |
Detecting race condition vulnerabilities in computer software applications
|
CA2932763C
(en)
*
|
2013-12-05 |
2022-07-12 |
Ab Initio Technology Llc |
Managing interfaces for dataflow graphs composed of sub-graphs
|
US11057416B2
(en)
*
|
2013-12-19 |
2021-07-06 |
Micro Focus Llc |
Analyze code that uses web framework using local parameter model
|
US10019567B1
(en)
*
|
2014-03-24 |
2018-07-10 |
Amazon Technologies, Inc. |
Encoding of security codes
|
US20150278526A1
(en)
*
|
2014-03-25 |
2015-10-01 |
Wipro Limited |
Computerized systems and methods for presenting security defects
|
DK3130123T3
(da)
*
|
2014-04-11 |
2021-10-04 |
Hdiv Security S L |
Detektering af manipulation af applikationer
|
US10423793B2
(en)
*
|
2014-06-19 |
2019-09-24 |
Entit Software Llc |
Install runtime agent for security test
|
US9852294B1
(en)
*
|
2014-06-24 |
2017-12-26 |
Symantec Corporation |
Systems and methods for detecting suspicious applications based on how entry-point functions are triggered
|
US9454659B1
(en)
|
2014-08-15 |
2016-09-27 |
Securisea, Inc. |
Software vulnerabilities detection system and methods
|
US9824214B2
(en)
|
2014-08-15 |
2017-11-21 |
Securisea, Inc. |
High performance software vulnerabilities detection system and methods
|
US10599852B2
(en)
|
2014-08-15 |
2020-03-24 |
Securisea, Inc. |
High performance software vulnerabilities detection system and methods
|
CN105487966B
(zh)
*
|
2014-09-17 |
2023-07-25 |
深圳市雅阅科技有限公司 |
程序测试方法、装置及系统
|
US10657262B1
(en)
*
|
2014-09-28 |
2020-05-19 |
Red Balloon Security, Inc. |
Method and apparatus for securing embedded device firmware
|
EP3241135A4
(en)
|
2015-01-01 |
2018-05-02 |
Checkmarx Ltd. |
Code instrumentation for runtime application self-protection
|
US9792443B1
(en)
*
|
2015-03-12 |
2017-10-17 |
Whitehat Security, Inc. |
Position analysis of source code vulnerabilities
|
US10282550B1
(en)
|
2015-03-12 |
2019-05-07 |
Whitehat Security, Inc. |
Auto-remediation workflow for computer security testing
|
CN106295346B
(zh)
*
|
2015-05-20 |
2022-08-30 |
深圳市腾讯计算机系统有限公司 |
一种应用漏洞检测方法、装置及计算设备
|
US10095734B2
(en)
|
2015-06-10 |
2018-10-09 |
International Business Machines Corporation |
Source code search engine
|
KR102414250B1
(ko)
*
|
2015-07-30 |
2022-06-29 |
삼성전자주식회사 |
전자 장치, 컴파일링 방법 및 컴퓨터 판독가능 기록매체
|
US10657134B2
(en)
|
2015-08-05 |
2020-05-19 |
Ab Initio Technology Llc |
Selecting queries for execution on a stream of real-time data
|
KR101696694B1
(ko)
*
|
2015-08-17 |
2017-01-18 |
(주)트리니티소프트 |
역추적을 이용한 소스 코드 취약점 분석 방법 및 장치
|
KR101640479B1
(ko)
*
|
2015-08-28 |
2016-07-18 |
(주)엔키소프트 |
소스코드기반 소프트웨어 취약점 공격행위 분석시스템
|
US10341194B2
(en)
|
2015-10-05 |
2019-07-02 |
Fugue, Inc. |
System and method for building, optimizing, and enforcing infrastructure on a cloud based computing environment
|
US10229612B2
(en)
|
2015-10-07 |
2019-03-12 |
Coursera Inc. |
Secure computer-implemented execution and evaluation of programming assignments for on demand courses
|
CN105389194B
(zh)
*
|
2015-10-19 |
2019-02-01 |
华为技术有限公司 |
一种确定应用程序计算逻辑的方法及装置
|
US20220014555A1
(en)
|
2015-10-28 |
2022-01-13 |
Qomplx, Inc. |
Distributed automated planning and execution platform for designing and running complex processes
|
US11218510B2
(en)
*
|
2015-10-28 |
2022-01-04 |
Qomplx, Inc. |
Advanced cybersecurity threat mitigation using software supply chain analysis
|
CA3114779C
(en)
|
2015-12-21 |
2023-03-07 |
Ab Initio Technology Llc |
Sub-graph interface generation
|
US11593249B2
(en)
*
|
2015-12-23 |
2023-02-28 |
Oracle International Corporation |
Scalable points-to analysis via multiple slicing
|
KR101645019B1
(ko)
|
2016-01-15 |
2016-08-02 |
지티원 주식회사 |
소프트웨어 보안취약점 검출을 위한 규칙명세언어
|
US10366213B2
(en)
*
|
2016-02-09 |
2019-07-30 |
International Business Machines Corporation |
Protecting an application via an intra-application firewall
|
US9959097B2
(en)
*
|
2016-03-09 |
2018-05-01 |
Bank Of America Corporation |
SVN interface system for heterogeneous development environments
|
US10387656B2
(en)
|
2016-03-21 |
2019-08-20 |
Checkmarx Ltd. |
Integrated interactive application security testing
|
US10210336B2
(en)
*
|
2016-03-29 |
2019-02-19 |
International Business Machines Corporation |
Precision-tuned runtime monitoring
|
US10127386B2
(en)
*
|
2016-05-12 |
2018-11-13 |
Synopsys, Inc. |
Systems and methods for adaptive analysis of software
|
US10210077B2
(en)
|
2016-05-18 |
2019-02-19 |
International Business Machines Corporation |
Using multiple sequence alignment to identify security vulnerability code paths
|
CN105959335B
(zh)
*
|
2016-07-19 |
2019-11-19 |
腾讯科技(深圳)有限公司 |
一种网络攻击行为检测方法及相关装置
|
US10325097B2
(en)
*
|
2016-07-19 |
2019-06-18 |
Oracle International Corporation |
Static detection of context-sensitive cross-site scripting vulnerabilities
|
KR20180010053A
(ko)
*
|
2016-07-20 |
2018-01-30 |
주식회사 이븐스타 |
보안 취약점 점검을 위한 위험성 코드 검출 시스템 및 그 방법
|
US10176074B2
(en)
*
|
2016-09-21 |
2019-01-08 |
Lenvio Inc. |
Computed call/jump target resolution via behavior computation
|
WO2018092237A1
(ja)
|
2016-11-17 |
2018-05-24 |
三菱電機株式会社 |
プログラムコード生成装置、プログラムコード生成方法及びプログラムコード生成プログラム
|
US10339320B2
(en)
|
2016-11-18 |
2019-07-02 |
International Business Machines Corporation |
Applying machine learning techniques to discover security impacts of application programming interfaces
|
CN108614695A
(zh)
*
|
2016-12-06 |
2018-10-02 |
北京奇虎科技有限公司 |
快速定位安卓应用代码文件中的指定内容的方法和装置
|
US10581879B1
(en)
*
|
2016-12-22 |
2020-03-03 |
Fireeye, Inc. |
Enhanced malware detection for generated objects
|
EP3566166B1
(en)
*
|
2017-01-04 |
2022-03-02 |
Checkmarx Ltd. |
Management of security vulnerabilities
|
DE102017200161A1
(de)
*
|
2017-01-09 |
2018-07-12 |
Robert Bosch Gmbh |
Verfahren zum Erfassen von Signalen
|
US10437714B2
(en)
*
|
2017-01-25 |
2019-10-08 |
Wipro Limited |
System and method for performing script-less unit testing
|
IL259201B
(en)
*
|
2017-05-10 |
2021-12-01 |
Checkmarx Ltd |
Using the same query language for static and dynamic application security testing tools
|
US10740470B2
(en)
|
2017-05-31 |
2020-08-11 |
Shiftleft Inc. |
System and method for application security profiling
|
CN109214188B
(zh)
*
|
2017-06-30 |
2022-05-27 |
阿里巴巴集团控股有限公司 |
一种漏洞分析方法和装置及数据处理方法和装置
|
US10796240B2
(en)
*
|
2017-07-22 |
2020-10-06 |
QC Ware Corp. |
Performing fault tree analysis on quantum computers
|
US10872156B2
(en)
*
|
2017-08-11 |
2020-12-22 |
Jpmorgan Chase Bank, N.A. |
Typescript security scanner
|
US20190052602A1
(en)
*
|
2017-08-14 |
2019-02-14 |
Onapsis, lnc. |
Generating rules to detect security vulnerabilities based on vulnerability primitives with entry point finder
|
US10275235B2
(en)
|
2017-09-18 |
2019-04-30 |
International Business Machines Corporation |
Adaptable management of web application state in a micro-service architecture
|
US10956574B2
(en)
|
2017-10-07 |
2021-03-23 |
Shiftleft Inc. |
System and method for securing applications through an application-aware runtime agent
|
US10365905B1
(en)
*
|
2017-10-26 |
2019-07-30 |
Facebook, Inc. |
Systems and methods for evaluating application performance changes via comparative call graphs
|
US10540255B2
(en)
*
|
2017-10-31 |
2020-01-21 |
Oracle International Corporation |
Staged refinement for static analysis
|
KR102392642B1
(ko)
*
|
2017-11-08 |
2022-04-29 |
한국전력공사 |
Cfg를 이용한 패턴 기반의 소프트웨어 절차변경 동작 감시 장치 및 그 방법
|
US10572367B2
(en)
|
2017-11-21 |
2020-02-25 |
Accenture Global Solutions Limited |
Intelligent code quality monitoring
|
US11074362B2
(en)
|
2017-12-04 |
2021-07-27 |
ShiftLeft, Inc. |
System and method for code-based protection of sensitive data
|
US10133871B1
(en)
|
2017-12-13 |
2018-11-20 |
Booz Allen Hamilton Inc. |
Method and system for identifying functional attributes that change the intended operation of a compiled binary extracted from a target system
|
US10740469B2
(en)
|
2017-12-28 |
2020-08-11 |
Fmr Llc |
Automated secure software development management, risk assessment, and risk remediation
|
US10198250B1
(en)
*
|
2018-01-04 |
2019-02-05 |
Accenture Global Solutions Limited |
Partitioning based migration of systems to container and microservice based platforms
|
KR102092192B1
(ko)
*
|
2018-01-08 |
2020-03-23 |
국방과학연구소 |
함수 정보 요약 장치 및 방법
|
JP6608569B1
(ja)
*
|
2018-01-19 |
2019-11-20 |
三菱電機株式会社 |
セキュリティ設計装置、セキュリティ設計方法およびセキュリティ設計プログラム
|
US10606570B2
(en)
*
|
2018-03-08 |
2020-03-31 |
Fujitsu Limited |
Representing software with an abstract code graph
|
US10678916B2
(en)
*
|
2018-03-20 |
2020-06-09 |
Didi Research America, Llc |
Malicious program detection
|
US11087001B2
(en)
|
2018-04-04 |
2021-08-10 |
Red Hat, Inc. |
Determining location of speculation denial instructions for memory access vulnerabilities
|
US10261784B1
(en)
*
|
2018-06-20 |
2019-04-16 |
Terbium Labs, Inc. |
Detecting copied computer code using cryptographically hashed overlapping shingles
|
US11144840B2
(en)
*
|
2018-07-26 |
2021-10-12 |
International Business Machines Corporation |
Completing decision logic to avoid a side effect
|
US20200042712A1
(en)
*
|
2018-07-31 |
2020-02-06 |
Veracode, Inc. |
Open-source software vulnerability analysis
|
US11036866B2
(en)
|
2018-10-18 |
2021-06-15 |
Denso Corporation |
Systems and methods for optimizing control flow graphs for functional safety using fault tree analysis
|
US10534912B1
(en)
*
|
2018-10-31 |
2020-01-14 |
Capital One Services, Llc |
Methods and systems for multi-tool orchestration
|
US10754628B2
(en)
*
|
2018-11-02 |
2020-08-25 |
Microsoft Technology Licensing, Llc |
Extracting web API endpoint data from source code to identify potential security threats
|
US11741196B2
(en)
|
2018-11-15 |
2023-08-29 |
The Research Foundation For The State University Of New York |
Detecting and preventing exploits of software vulnerability using instruction tags
|
US11514172B2
(en)
|
2018-11-15 |
2022-11-29 |
Grabango Co. |
System and method for information flow analysis of application code
|
US11265292B1
(en)
*
|
2019-01-28 |
2022-03-01 |
Amazon Technologies, Inc. |
Graph based management of virtualized infrastructures
|
US11163888B2
(en)
*
|
2019-02-15 |
2021-11-02 |
Oracle International Corporation |
Detecting second-order security vulnerabilities via modelling information flow through persistent storage
|
CN111611149B
(zh)
*
|
2019-02-22 |
2023-03-31 |
上海信息安全工程技术研究中心 |
基于代码行为单位的程序变量有效定义检测方法及装置
|
US11599644B2
(en)
*
|
2019-05-17 |
2023-03-07 |
Walmart Apollo, Llc |
Blocking insecure code with locking
|
CN110221973B
(zh)
*
|
2019-05-22 |
2022-12-16 |
湖南泛联新安信息科技有限公司 |
面向c程序缺陷检测的靶向式并行符号执行方法
|
US11636211B2
(en)
*
|
2019-06-27 |
2023-04-25 |
Blackberry Limited |
Binary static analysis of application structure to identify vulnerabilities
|
US11650905B2
(en)
|
2019-09-05 |
2023-05-16 |
International Business Machines Corporation |
Testing source code changes
|
CN111027073B
(zh)
*
|
2019-11-28 |
2022-03-22 |
深信服科技股份有限公司 |
漏洞检测方法、装置、设备及存储介质
|
CN110825650B
(zh)
*
|
2019-11-29 |
2023-04-11 |
北京网聘咨询有限公司 |
单元测试覆盖精度检测方法及装置
|
US11440190B1
(en)
*
|
2020-02-26 |
2022-09-13 |
Trend Micro Incorporated |
Detecting unsecure data flow in automation task programs
|
CN111460450B
(zh)
*
|
2020-03-11 |
2023-02-10 |
西北大学 |
一种基于图卷积网络的源代码漏洞检测方法
|
US11321319B2
(en)
*
|
2020-03-20 |
2022-05-03 |
Tata Consultancy Services Limited |
System and method for SQL query extraction in an application
|
CN111488582B
(zh)
*
|
2020-04-01 |
2023-09-29 |
杭州云象网络技术有限公司 |
一种基于图神经网络的智能合约重入性漏洞检测的方法
|
US11836258B2
(en)
*
|
2020-07-28 |
2023-12-05 |
Checkmarx Ltd. |
Detecting exploitable paths in application software that uses third-party libraries
|
US11714615B2
(en)
|
2020-09-18 |
2023-08-01 |
International Business Machines Corporation |
Application migration using cost-aware code dependency graph
|
US11610000B2
(en)
|
2020-10-07 |
2023-03-21 |
Bank Of America Corporation |
System and method for identifying unpermitted data in source code
|
US11366901B2
(en)
*
|
2020-10-07 |
2022-06-21 |
Bank Of America Corporation |
System and method for identifying insider threats in source code
|
US11568060B2
(en)
*
|
2020-12-08 |
2023-01-31 |
Oracle International Corporation |
Modular taint analysis with access paths
|
US12050668B1
(en)
*
|
2021-01-08 |
2024-07-30 |
Take-Two Interactive Software, Inc. |
Method and system for obfuscating and protecting game logic and variables during video game compilation
|
EP4044057B1
(en)
*
|
2021-02-12 |
2023-09-27 |
Tata Consultancy Services Limited |
Method and system for identifying security vulnerabilities
|
US11968224B2
(en)
|
2021-03-22 |
2024-04-23 |
International Business Machines Corporation |
Shift-left security risk analysis
|
US11550569B2
(en)
*
|
2021-05-14 |
2023-01-10 |
Cyberark Software Ltd. |
Discovering and remediating hidden secrets in code files
|
CN113467983A
(zh)
*
|
2021-07-16 |
2021-10-01 |
中国银行股份有限公司 |
故障的处理方法、装置、设备及可读存储介质
|
US20230048391A1
(en)
*
|
2021-08-11 |
2023-02-16 |
Sap Se |
Operator movement optimization technique for procedures
|
US20230130649A1
(en)
*
|
2021-10-21 |
2023-04-27 |
Dazz, Inc. |
Techniques for semantic analysis of cybersecurity event data and remediation of cybersecurity event root causes
|
CN113722721B
(zh)
*
|
2021-11-03 |
2022-03-11 |
北京鸿渐科技有限公司 |
一种基于值依赖图的源库模式Java安全漏洞检测方法
|
US20230205496A1
(en)
*
|
2021-12-23 |
2023-06-29 |
OutSystems - Software em Rede, S.A. |
Declarative visual programming language code search
|
US20230237161A1
(en)
*
|
2022-01-26 |
2023-07-27 |
Microsoft Technology Licensing, Llc |
Detection of and protection against cross-site scripting vulnerabilities in web application code
|
CN114707152A
(zh)
*
|
2022-02-23 |
2022-07-05 |
北京邮电大学 |
联盟链智能合约的安全漏洞检测方法及装置
|
CN114595148B
(zh)
*
|
2022-03-02 |
2024-04-16 |
北京大学 |
一种基于数据流传播分析的Java空指针引用检测方法及系统
|
US12086266B2
(en)
*
|
2022-05-20 |
2024-09-10 |
Dazz, Inc. |
Techniques for identifying and validating security control steps in software development pipelines
|
CN114996149B
(zh)
*
|
2022-06-16 |
2024-05-28 |
南京邮电大学 |
一种基于程序切片度量的代码缺陷预测方法
|
FR3147642A1
(fr)
|
2023-04-07 |
2024-10-11 |
Nicolas DE POMEREU |
Procédé de génération d’un code informatique résistant aux attaques par injection SQL
|
CN117171029B
(zh)
*
|
2023-09-04 |
2024-09-17 |
四川大学 |
一种基于上下文边关系的改进源码切片方法
|
CN118260771A
(zh)
*
|
2024-04-26 |
2024-06-28 |
兰州交通大学 |
一种基于CodeBERT的源代码漏洞定位方法
|