US 12,135,793 B2
Runtime filtering of computer system vulnerabilities
Mattia Pagnozzi, Milan (IT); Luca Guerra, Milan (IT); and Guido Bonomi, Milan (IT)
Assigned to Sysdig, Inc., San Francisco, CA (US)
Filed by Sysdig, Inc., San Francisco, CA (US)
Filed on Oct. 28, 2022, as Appl. No. 17/976,182.
Application 17/976,182 is a continuation of application No. 17/574,423, filed on Jan. 12, 2022, granted, now 11,507,672.
Prior Publication US 2023/0222222 A1, Jul. 13, 2023
This patent is subject to a terminal disclaimer.
Int. Cl. G06F 21/57 (2013.01); G06F 8/65 (2018.01); G06F 21/54 (2013.01); H04L 9/40 (2022.01)
CPC G06F 21/577 (2013.01) [G06F 8/65 (2013.01); G06F 21/54 (2013.01); H04L 63/0263 (2013.01); G06F 2221/033 (2013.01)] 18 Claims
OG exemplary drawing
 
1. A computer-implemented method of managing computer vulnerabilities, comprising:
detecting, by a processor, one or more processes running on a particular computing system during a particular period of time including now;
determining, by the processor, a set of active vulnerabilities that are associated with the one or more processes from a plurality of vulnerabilities;
determining, for each vulnerability of the set of active vulnerabilities, context metadata related to a process or an application associated with the vulnerability, the context metadata including runtime metadata indicating how often the application has been executed, for how long the process has run, or when in the particular period of time the process was, is, or will be running, and vulnerability metadata indicating vulnerability severity, attack type, or availability of a solution for the vulnerability;
filtering the set of active vulnerabilities based on the context metadata;
ranking the filtered set of active vulnerabilities based on the context metadata for each active vulnerability to obtain a ranked order; and
transmitting information related to the ranking to a device.