Abstract
Techniques described herein provide for a runtime-aware defect/advisory notification system that filters or reprioritizes alerts for a device based on whether defective/vulnerable code has executed on the device. Instead of assuming all devices running a particular software release are equally vulnerable, the techniques rule out defects/vulnerabilities that have not occurred at the current runtime state for a device. The techniques focus on negative confirmation in which relevant defects are identified by tracking the absence of defective code execution.
Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 License.
Recommended Citation
Lulja, Elis; Rodriguez-Natal, Alberto; Williams, Steve; and Sun, Yu, "OPTIMIZING KNOWN DEFECT NOTIFICATIONS USING RUNTIME DATA", Technical Disclosure Commons, (March 09, 2026)
https://www.tdcommons.org/dpubs_series/9473