BlackBerry Limited
Determining security risks in binary software code based on network protocols

Last updated:

Abstract:

Systems, methods, and software can be used to analyze security risks of a binary software code. In some aspects, a computer-implemented method comprises: receiving, by at least one hardware processor, a binary software code; determining, by the at least one hardware processor, that the binary software code accesses one or more network addresses; for each of the one or more network addresses that are accessed by the binary software code: determining, by the at least one hardware processor, whether the binary software code uses an insecure network protocol to access the network address; and generating, by the at least one hardware processor, a security notification indicating the network address that is accessed by the binary software code using the insecure network protocol.

Status:
Grant
Type:

Utility

Filling date:

14 Mar 2019

Issue date:

28 Dec 2021