Ryan James Berg - Sudbury MA, US Larry Rose - Chelmsford MA, US John Peyton - Arlington MA, US John J. Danahy - Canton MA, US Robert Gottlieb - Westford MA, US Chris Rehbein - Watertown MA, US
Assignee:
Ounce Labs, Inc. - Waltham MA
International Classification:
G06F 9/44 G06F 12/14 G06F 21/00
US Classification:
717126, 717125, 726 25
Abstract:
A method and system of detecting vulnerabilities in source code. Source code is parsed into an intermediate representation. Models (e. g. , in the form of lattices) are derived for the variables in the code and for the variables and/or expressions used in conjunction with routine calls. The models are then analyzed in conjunction with pre-specified rules about the routines to determine if the routine call posses one or more of pre-selected vulnerabilities.
Method And System For Detecting Race Condition Vulnerabilities In Source Code
Ryan James Berg - Sudbury MA, US Larry Rose - Chelmsford MA, US John Peyton - Arlington MA, US John J. Danahy - Canton MA, US Robert Gottlieb - Westford MA, US Chris Rehbein - Watertown MA, US
Assignee:
Ounce Labs, Inc. - Waltham MA
International Classification:
G06F 9/44 G06F 12/14 G06F 21/00
US Classification:
717126, 717125, 726 25
Abstract:
A method and system of detecting vulnerabilities in source code. Source code is parsed into an intermediate representation. Models are derived for the code and the models are then analyzed in conjunction with pre-specified rules about the routines to determine if the routines posses one or more of pre-selected vulnerabilities.
Method And System For Detecting Vulnerabilities In Source Code
Ryan J. Berg - Sudbury MA, US Larry Rose - Chelmsford MA, US John Peyton - Arlington MA, US John J. Danahy - Canton MA, US Robert Gottlieb - Westford MA, US Chris Rehbein - Watertown MA, US
Assignee:
Ounce Labs, Inc. - Waltham MA
International Classification:
G06F 9/44 G06F 12/14 G06F 21/00
US Classification:
717126, 717125, 726 25
Abstract:
A method and system of detecting vulnerabilities in source code. Source code is parsed into an intermediate representation. Models (e. g. , in the form of lattices) are derived for the variables in the code and for the variables and/or expressions used in conjunction with routine calls. The models are then analyzed in conjunction with pre-specified rules about the routines to determine if the routine call posses one or more of pre-selected vulnerabilities.
Method And System For Detecting Privilege Escalation Vulnerabilities In Source Code
Ryan James Berg - Sudbury MA, US Larry Rose - Chelmsford MA, US John Peyton - Arlington MA, US John J. Danahy - Canton MA, US Robert Gottlieb - Westford MA, US Chris Rehbein - Watertown MA, US
Assignee:
Ounce Labs, Inc. - Waltham MA
International Classification:
G08B 23/00
US Classification:
726 25, 726 22, 726 23, 726 24, 717106, 717122
Abstract:
A method and system of detecting vulnerabilities in source code. Source code is parsed into an intermediate representation. Models are derived for the code and the models are then analyzed in conjunction with pre-specified rules about the routines to determine if the routine call posses one or more of pre-selected vulnerabilities.
Method And System For Detecting Vulnerabilities In Source Code
Ryan J. Berg - Sudbury MA, US Larry Rose - Chelmsford MA, US John Peyton - Arlington MA, US John J. Danahy - Canton MA, US Robert Gottlieb - Westford MA, US Chris Rehbein - Watertown MA, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 9/45
US Classification:
717152, 717143, 717153, 717154, 717155
Abstract:
A method and system of detecting vulnerabilities in source code. Source code is parsed into an intermediate representation. Models (e. g. , in the form of lattices) are derived for the variables in the code and for the variables and/or expressions used in conjunction with routine calls. The models are then analyzed in conjunction with pre-specified rules about the routines to determine if the routine call posses one or more of pre-selected vulnerabilities.
Ryan Berg - Marlborough MA, US John Danahy - Canton MA, US Lawrence Rose - Chelmsford MA, US
International Classification:
H04L009/32 H04L009/00
US Classification:
713/201000, 713/164000
Abstract:
A remote communication mechanism is provided for creating a secured channel for direct interaction with kernel-level components, such as device drivers, of designated systems. By connecting directly to managed kernel-level devices, as opposed to connecting to user space software which then connects to these devices, management of those resources is simplified, better secured, and partitioned from general system administration utilities and configuration.
Name / Title
Company / Classification
Phones & Addresses
John J. Danahy Principal
The Danahy Group Inc Nonclassifiable Establishments
225 Franklin St, Boston, MA 02110
John Danahy General Manager
Visage Imaging Hospital & Health Care · Provides Document Software and Imaging to The Medical Industry
12250 El Camino Real SUITE 230, San Diego, CA 92130 300 Brickstone Sq, Andover, MA 01810 (858)3454410, (858)4082717