US 11,734,433 B2
Open source vulnerability remediation tool
Vinjith Nagaraja, Austin, TX (US); Raymond Brammer, Round Rock, TX (US); James Myers, Round Rock, TX (US); Christopher Gutierrez, Foster City, CA (US); Ireneusz Pazdzierniak, Foster City, CA (US); Shanshan Jiang, Foster City, CA (US); Karim Mawani, Foster City, CA (US); Pankaj Rathore, Austin, TX (US); Jerry Wald, San Francisco, CA (US); David Worth, Foster City, CA (US); Dhruv Vig, Austin, TX (US); Archana Taparia, Foster City, CA (US); Robert Chifamba, Austin, TX (US); and Vamshi Ramarapu, Austin, TX (US)
Assigned to Visa International Service Association, San Francisco, CA (US)
Filed by VISA INTERNATIONAL SERVICE ASSOCIATION, San Francisco, CA (US)
Filed on Mar. 30, 2022, as Appl. No. 17/709,241.
Application 17/709,241 is a continuation of application No. 16/228,538, filed on Dec. 20, 2018, granted, now 11,308,218.
Prior Publication US 2022/0222353 A1, Jul. 14, 2022
Int. Cl. G06F 21/57 (2013.01); G06F 11/36 (2006.01); G06F 8/71 (2018.01)
CPC G06F 21/577 (2013.01) [G06F 8/71 (2013.01); G06F 11/3664 (2013.01); G06F 11/3684 (2013.01); G06F 2221/033 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method comprising:
receiving, by a remediation computer, a candidate application that uses a plurality of code libraries;
identifying, by the remediation computer, a vulnerable library from the plurality of code libraries;
obtaining, by the remediation computer, a list of a plurality of versions of the vulnerable library;
for each of the plurality of versions of the vulnerable library in the list:
identifying one or more risks, wherein each of the identified one or more risks is assigned a risk score;
assigning an intermediate risk score to each of the identified one or more risks based on the risk score for each of the identified one or more risks;
evaluating one or more operational risks to generate a change score;
sorting, by the remediation computer, the plurality of versions of the vulnerable library in the list based on the generated change score;
determining a version of the vulnerable library that minimizes risk from the sorted list; and
incorporating the determined version of the vulnerable library that minimizes the risk into the candidate application.