ELECTRONIC SYSTEM FOR DYNAMICALLY PERFORMING LINKED EVALUATION TESTS TO IDENTIFY FAULTY CODE AND VULNERABILITIES IN SOFTWARE PROGRAMS BASED ON EFFICACY

    公开(公告)号:US20220327218A1

    公开(公告)日:2022-10-13

    申请号:US17229180

    申请日:2021-04-13

    IPC分类号: G06F21/57 G06F11/36 G06F21/54

    摘要: Systems, computer program products, and methods are described herein for dynamically performing linked security tests. The present invention may be configured to determine a fingerprint of an application, perform, in an order based on the fingerprint of the application, security test sequences on the application, parse responses of the application to the security test sequences to generate results of the security test sequences, and label, with the fingerprint, the results. The present invention may be further configured to provide, to one or more machine learning models, the labeled results to determine probabilities of applications having a same fingerprint as the fingerprint of the application failing the security test sequences, update, based on the probabilities of the applications failing the security test sequences, the order, and store, in a temporary persistent storage device and based on the updated order, the security test sequences.

    Artificial intelligence security configuration engine

    公开(公告)号:US11824900B2

    公开(公告)日:2023-11-21

    申请号:US17078176

    申请日:2020-10-23

    摘要: Artificial intelligence (“AI”) apparatus and methods are provided for hardening security of software applications. Under the conventional approaches, additional manual investment implementing security policies does not yield proportional increases in combating cyber security threats. Using manual approaches, it is increasingly difficult to consistently apply multiple policies covering different software applications or versions. This results in increased risk and technical debt. Over time, these undesirable consequences exacerbate the likelihood of inadvertently introducing an adverse policy omission or change. As the scale of software application deployed across and organization increases, it becomes even more difficult to ensure that security policies tracked and consistently applied. This may result in ineffective, contradictory or duplicative configuration requirements. AI apparatus and methods provided herein ingest human-readable policy requirements and generate technical configuration settings that implement policy requirements across diverse technology platforms.

    WEB-BROWSER EXTENSION ANALYSIS AND ENHANCEMENT

    公开(公告)号:US20220094683A1

    公开(公告)日:2022-03-24

    申请号:US17028419

    申请日:2020-09-22

    IPC分类号: H04L29/06 G06F16/958

    摘要: Enhancement of web browser extension analysis capabilities, such as security application analysis, is realized by encapsulating the extension with a wrapper function that defines entry and exits points within the source code of the extension. By wrapping the web browser extension in a function that defines entry and exit points, the present invention enables the use of commercial SAST tools/engines and any other application which desires to analyze the web browser extension and/or extract data therefrom. The web browser extension is programmatically analyzed to identify the entry and exit points and, in response, the wrapper function is generated that defines the entry and exits points and the web browser extension is encapsulated with the wrapper function.

    System for testing an application with dynamically linked security tests

    公开(公告)号:US11144436B1

    公开(公告)日:2021-10-12

    申请号:US17073576

    申请日:2020-10-19

    摘要: Systems, computer program products, and methods are described herein for testing an application with dynamically linked security tests. The present invention may be configured to perform, using a request engine, based on the first data, and based on test protocols stored in a first data structure, a first security test on an application. The present invention may be further configured to determine, based on determining that the application failed the first security test and based on a second data structure, whether the first security test is linked to one or more other security tests, where the second data structure includes security test sequences linking security tests and/or data to transmit from the first security test to the one or more other security tests, and provide, to the first queue, one or more other security tests to which the first security test is linked.

    Web-browser extension analysis and enhancement

    公开(公告)号:US11765165B2

    公开(公告)日:2023-09-19

    申请号:US17028419

    申请日:2020-09-22

    IPC分类号: H04L29/06 G06F16/958 H04L9/40

    摘要: Enhancement of web browser extension analysis capabilities, such as security application analysis, is realized by encapsulating the extension with a wrapper function that defines entry and exits points within the source code of the extension. By wrapping the web browser extension in a function that defines entry and exit points, the present invention enables the use of commercial SAST tools/engines and any other application which desires to analyze the web browser extension and/or extract data therefrom. The web browser extension is programmatically analyzed to identify the entry and exit points and, in response, the wrapper function is generated that defines the entry and exits points and the web browser extension is encapsulated with the wrapper function.

    ARTIFICIAL INTELLIGENCE SECURITY CONFIGURATION ENGINE

    公开(公告)号:US20220131904A1

    公开(公告)日:2022-04-28

    申请号:US17078176

    申请日:2020-10-23

    IPC分类号: H04L29/06 H04L29/08 G06N20/00

    摘要: Artificial intelligence (“AI”) apparatus and methods are provided for hardening security of software applications. Under the conventional approaches, additional manual investment implementing security policies does not yield proportional increases in combating cyber security threats. Using manual approaches, it is increasingly difficult to consistently apply multiple policies covering different software applications or versions. This results in increased risk and technical debt. Over time, these undesirable consequences exacerbate the likelihood of inadvertently introducing an adverse policy omission or change. As the scale of software application deployed across and organization increases, it becomes even more difficult to ensure that security policies tracked and consistently applied. This may result in ineffective, contradictory or duplicative configuration requirements. AI apparatus and methods provided herein ingest human-readable policy requirements and generate technical configuration settings that implement policy requirements across diverse technology platforms.