SYSTEMS AND METHODS FOR DETECTING VULNERABILITIES IN NETWORK PROCESSES DURING RUNTIME

    公开(公告)号:US20220070197A1

    公开(公告)日:2022-03-03

    申请号:US17003450

    申请日:2020-08-26

    Abstract: Systems, methods, and non-transitory computer-readable storage media are disclosed for detecting vulnerabilities in real-time during execution of a process or an application. In one example, a device may have one or more memories storing computer-readable instructions and one or more processors configured to execute the computer-readable instructions to obtain real-time process information associated with a process executing in an endpoint. The device can then determine package information for a package associated with the process based on the process information. The device can then identify at least one vulnerability associated with the package information using a database of vulnerabilities stored on a backend component of the network. The backend component may have a database of vulnerabilities for packages.

    Systems and methods for detecting vulnerabilities in network processes during runtime

    公开(公告)号:US11706239B2

    公开(公告)日:2023-07-18

    申请号:US17003450

    申请日:2020-08-26

    CPC classification number: H04L63/1433

    Abstract: Systems, methods, and non-transitory computer-readable storage media are disclosed for detecting vulnerabilities in real-time during execution of a process or an application. In one example, a device may have one or more memories storing computer-readable instructions and one or more processors configured to execute the computer-readable instructions to obtain real-time process information associated with a process executing in an endpoint. The device can then determine package information for a package associated with the process based on the process information. The device can then identify at least one vulnerability associated with the package information using a database of vulnerabilities stored on a backend component of the network. The backend component may have a database of vulnerabilities for packages.

Patent Agency Ranking