US 12,229,264 B2
System and method for securing applications through an application-aware runtime agent
Chetan Conikee, Santa Clara, CA (US); Manish Gupta, San Jose, CA (US); Vlad A Ionescu, Menlo Park, CA (US); and Ignacio del Valle Alles, Asturias (ES)
Assigned to ShiftLeft Inc, Santa Clara, CA (US)
Filed by ShiftLeft Inc, Santa Clara, CA (US)
Filed on May 18, 2023, as Appl. No. 18/198,861.
Application 18/198,861 is a continuation of application No. 17/178,070, filed on Feb. 17, 2021, granted, now 11,657,154.
Application 17/178,070 is a continuation of application No. 16/154,151, filed on Oct. 8, 2018, granted, now 10,956,574, issued on Mar. 23, 2021.
Claims priority of provisional application 62/569,524, filed on Oct. 7, 2017.
Prior Publication US 2023/0385414 A1, Nov. 30, 2023
This patent is subject to a terminal disclaimer.
Int. Cl. G06F 21/56 (2013.01); G06F 21/55 (2013.01); G06F 21/57 (2013.01); H04L 9/40 (2022.01)
CPC G06F 21/566 (2013.01) [G06F 21/554 (2013.01); G06F 21/577 (2013.01); H04L 63/20 (2013.01); H04L 63/1416 (2013.01)] 18 Claims
OG exemplary drawing
 
1. A method for securing an application comprising:
converting a set of code sources of the application to a code profile, which comprises a set of flow graphs and which characterizes controls within the set of code sources;
mapping controls of interest within the code profile by identifying sequences of controls in the set of flow graphs that are associated with detection of a potential security event;
instrumenting the application according to the code profile, wherein instrumenting comprises augmenting the execution of the controls of interest in the application to trigger tracking operations during execution of the application;
during execution of the application, tracking execution flow of the controls of interest through triggered tracking operations, and detecting a security event based at least in part on a detected sequence of execution flow associated with the security event.