Abstract

Techniques described herein provide for a runtime-aware defect/advisory notification system that filters or reprioritizes alerts for a device based on whether defective/vulnerable code has executed on the device.  Instead of assuming all devices running a particular software release are equally vulnerable, the techniques rule out defects/vulnerabilities that have not occurred at the current runtime state for a device.  The techniques focus on negative confirmation in which relevant defects are identified by tracking the absence of defective code execution.

Creative Commons License

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.

Share

COinS