Caleb Sima - Woodstock GA, US Steve Millar - Dawsonville GA, US Raymond Kelly - Loganville GA, US Bryan Sullivan - Duluth GA, US Gerald Sullivan - Roswell GA, US David Tillery - Woodstock GA, US
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
G06F 21/00
US Classification:
726 25, 713188, 707709
Abstract:
A vulnerability assessment tool that is operative to analyze web sites by simultaneously operating a crawling process and an audit process. Once the crawling process is invoked, the results are provided to the audit process. The audit process, rather than waiting until the crawl process is completed, simultaneously audits the web site based on the already provided crawl results. The results of the audit are also fed back to the crawl process to further enhance the crawl.
Caleb Sima - Woodstock GA, US Raymond Kelly - Loganville GA, US Steve Millar - Dawsonville GA, US Robert Raboud - Atlanta GA, US Bryan Sullivan - Duluth GA, US Jerry Sullivan - Roswell GA, US David Tillery - Woodstock GA, US
International Classification:
H04L 9/32
US Classification:
709200000
Abstract:
A crawler that is either based on an interactive mode of operation or includes an interactive mode along with one or more other modes, such as automatic or manual. Similar to an automatic mode crawler, the crawler traverses web sites, web content and links. However, if the crawler encounters a structure that requires human interaction, such as a form, a radio button selector, a drop down selector, a human verification test, etc., the crawler pauses and prompts a user to take action.
- Houston TX, US Kirill Mendelev - Alpharetta GA, US David Scott Tillery - Alpharetta GA, US
International Classification:
G06F 17/30 G06F 17/22
Abstract:
Example embodiments disclosed herein relate to analyzing a web application. A web application is loaded. User actions are simulated on user interface elements of the web application. A structure of the web application is traversed based on rules to determine a set of actionable tokens. The respective actionable tokens include a portion of the web application that can change a user interface presented based on the web application.
Aporeto
Software Engineer
Hpe Security - Data Security
Senior Software Engineer
Spi Dynamics Feb 2002 - Aug 2007
Senior Software Engineer
Mimsware Corporation Sep 2001 - Apr 2002
Software Consultant
Ibm Aug 1999 - Aug 2000
Software Engineer
Education:
Southern Polytechnic State University 1990 - 1995
Bachelors, Computer Science
Georgia Southern University 1988 - 1990
Skills:
Software Development Web Application Security C# Agile Methodologies Xml Software Engineering Security Application Security Web Services .Net Cloud Computing Enterprise Software Web Applications Computer Security Microsoft Sql Server Saas Java Scrum Asp.net Software Design Object Oriented Design C++ Soa Jquery Enterprise Architecture Webinspect