Vulnerability examining system
A vulnerability examining system for examining the vulnerability of a system to an attack through a network. The system comprises a server connected to a network and storing information and an agent and a computer connected to the network. A control agent operated by the computer acquires necessary information and the agent through the network according to a scenario given an instruction to start, builds an environment for executing the scenario in the computer, prepares vulnerability examination, and makes the vulnerability examination when the preparation is completed.
Publication number: WO2005124572A1 | Search similar patents
Vulnerability assessment system, vulnerability assessment method, and vulnerability assessment program
The effect of software vulnerability is assessed in a system provided with a computer and network equipment. The vulnerability assessment system (10) assesses software vulnerability in a system to be assessed that is provided with a computer and network equipment. An affected software extraction unit (31) of the vulnerability assessment system (10) assesses whether the software of the system to be assessed is affected by vulnerability on the basis of a vulnerability information database (21) and a software database (24) of computer software. A direct path search unit (32) of the vulnerability assessment system (10) determines whether affected software can be attacked from an external network when it has been assessed by the affected software extraction unit (31) that the software of the system to be assessed is affected by the vulnerability.
Publication number: WO2012132125A1 | Search similar patents
Vulnerability detection device, vulnerability detection method, and vulnerability detection program
This vulnerability detection device (10) has a vulnerability extraction unit (12), a normalization processing unit (14), and a matching unit (15). The vulnerability extraction unit (12) extracts first program code that corresponds to a vulnerable part of software. The normalization processing unit (14) normalizes parameters included in the first program code extracted by the vulnerability extraction unit (12) and in second program code of software to be inspected for vulnerable parts. The matching unit (15) matches the normalized first program code with the normalized second program code in order to detect, within the second program code, the same or similar program code to the first program code.
Publication number: WO2016027641A1 | Search similar patents
Method and device for patching of vulnerability
The present invention discloses a method and a device for patching of vulnerability, which belong to the computer security field. The method includes: the vulnerability patching device detects whether vulnerability exists in a computer; the existent vulnerability is analyzed in order to obtain the level of the vulnerability, and the corresponding patching of the existent vulnerability is implemented according to the level of the vulnerability. The device includes: detecting module, analyzing module, and patching module. The present invention enables patching of vulnerability automatically when the vulnerability of the computer is detected, and manual operation is avoided through the whole patching process; so as to improve the user experience, help the user to patch the vulnerability of the computer instantly, and most adequately decrease the venture of the computer from being attacked by hacker while the user visits a network.
Publication number: WO2010105516A1 | Search similar patents
Vulnerability countermeasure device, and vulnerability countermeasure method
Provided is a vulnerability countermeasure device capable of assessing effects of vulnerability in order to prevent data from being interrupted more than necessary. The vulnerability countermeasure device stores configuration information which associates a plurality of computers connected across a network and software possessed by each computer, vulnerability information which associates the software with information that is related to the vulnerability of the software, and countermeasure policy information which associates the software with a countermeasure policy to be executed if there is a vulnerability in the software; calculates the computer at which data will arrive on the basis of information related to a path of the data included in the data which have been received from a used terminal; acquires software existing in the computer on the basis of the calculated computer and configuration information; assesses whether or not there is a vulnerability in the acquired software on the basis of the acquired software and the vulnerability information; and is provided with countermeasure means for executing a countermeasure to a vulnerability in accordance with a countermeasure policy with respect to the software which has been assessed to have the vulnerability.
Publication number: WO2013035181A1 | Search similar patents
Program execution device and program analysis device
The objective of the present invention is to reliably execute countermeasure processing for a vulnerability prior to occurrence of an attack targeting the vulnerability. A vulnerability countermeasure processing unit (1233) performs countermeasure processing for vulnerability of a vulnerable library function, which is a general-purpose library function with vulnerability, among general-purpose library functions included in a general-purpose library (1230). A countermeasure selection unit (1232), if the vulnerable library function is requested to be called at execution time of a Web application (1220), causes the vulnerability countermeasure processing unit (1233) to perform the countermeasure processing for the vulnerability of the vulnerable library function, and subsequent to the countermeasure processing by the vulnerability countermeasure processing unit (1233), calls the vulnerable library function.
Publication number: WO2014021190A1 | Search similar patents
Mitigating vulnerabilities associated with return-oriented programming
The disclosed embodiments provide a system that operates a processor in a computer system. During operation, the system identifies one or more return sites associated with a call instruction of a software program. Next, the system restricts execution of a return from the call instruction by the processor to the one or more return sites.
Publication number: US2014283060A1 | Search similar patents
System and method for network vulnerability detection and reporting
A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network (310), including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities (364) on target ports, active assessment of vulnerabilities based on information acquired from target computers (344), quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.
Publication number: EP1466248A1 | Search similar patents
Method to provide customized vulnerability information to a plurality of organizations
The present invention provides a means of providing computer security vulnerability information to a plurality of organizations such that the vulnerability information provided to each organization is customized to its network environment. Each organization has an Enterprise Server. An asset management module in each organization's Enterprise Servers sends device configuration information to a system at a Co-Location Facility. The Co-Location Facility system aggregates this data. Information concerning vulnerabilities is also gathered from computer equipment vendors on an ongoing basis. This vulnerability information is compared to the aggregated data from the organizations' Enterprise Servers, and only the vulnerability information relevant to each organization is delivered back to that organization. The delivered information is then used to customize the vulnerability assessment and management activities, including scanning, for each organization such that their activities are limited to vulnerabilities that are directly related to their environment.
Publication number: US2006101519A1 | Search similar patents
A vulnerability fixing method based on hierarchical vulnerability threat evaluation
A vulnerability fixing method based on hierarchical vulnerability threat evaluation is disclosed. The method includes: 1) retrieving a plurality of information security properties of the target system, a vulnerability to be test, and the required attack conditions during a process of using the vulnerability; 2) attacking the vulnerability and recording the values of required attack conditions during the process of being used and the degree of loss caused by successful utilization; 3) obtaining a qualitative grade score of the vulnerability according to the loss degree; 4) obtaining an attack utilization score of the vulnerability according to the values for the required attack conditions; 5) obtaining a quantitative grade score of the vulnerability according to the attack utilization score and the qualitative scoring score; 6) determining the processing order for the vulnerability according to the quantitative grade score of the vulnerability and fixes them. The method combines the advantage of the qualitative and quantitative vulnerability evaluation methods.
Publication number: WO2012034304A1 | Search similar patents
Systems and methods for determining potential impacts of applications on the security of computing systems
A computer-implemented method for determining potential impacts of applications on the security of computing systems may include (1) identifying an application subject to a security vulnerability assessment, (2) requesting information that identifies a potential impact of the application on a vulnerability of at least one computing system to at least one exploit associated with the application, (3) receiving the information that identifies the potential impact of the application on the vulnerability of the computing system, wherein the information may be derived at least in part from data from at least one additional computing system on which the application has previously been installed and (4) directing a determination about an installation of the application on the computing system based at least in part on the information that identifies the potential impact of the application on the vulnerability of the computing system. Various other methods, systems, and computer-readable media are also disclosed.
Publication number: US2014283082A1 | Search similar patents
Directed execution of dynamic programs in isolated environments
A test object that includes at least one computer program that includes dynamic executable code is obtained. The at least one computer program is transformed into a format that is configured to execute in a hosted isolated computing environment. Directed execution of the at least one computer program is initiated, in the hosted isolated computing environment. Dynamic code vulnerabilities of the at least one computer program are detected, based on the directed execution.
Publication number: US2015154402A1 | Search similar patents