US 11,809,571 B2
Vulnerability analysis using continuous application attestation
Hendrikus G. P. Bosch, Aalsmeer (NL); Alessandro Duminuco, Milan (IT); and Sape Jurriën Mullender, Amsterdam (NL)
Assigned to CISCO TECHNOLOGY, INC., San Jose, CA (US)
Filed by Cisco Technology, Inc., San Jose, CA (US)
Filed on Jun. 14, 2021, as Appl. No. 17/346,898.
Prior Publication US 2022/0398324 A1, Dec. 15, 2022
Int. Cl. G06F 21/57 (2013.01)
CPC G06F 21/577 (2013.01) [G06F 2221/033 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A system, comprising:
one or more processors;
one or more computer-readable non-transitory storage media comprising instructions that, when executed by the one or more processors, cause one or more components of the system to perform operations comprising:
receiving, at an application agent, a load map associated with an application, the load map indicating loaded modules of the application, the load map being a dynamic software bill of material (SBOM);
determining whether at least one notification is received indicating at least one update to the loaded modules of the application,
wherein, when the at least one notification is received, the load map is updated based on the indicated at least one update, and
wherein, when the at least one notification is not received, the load map is retained in an existing state;
periodically retrieving one or more call traces associated with the application, the one or more call traces indicating executed modules of the application; and
generating a continuous application attestation comprising at least a combination of the updated load map or the retained load map, and the retrieved one or more call traces associated with the application at a given time.