Search

Joshua Daymont Phones & Addresses

  • Annapolis, MD
  • 1141 Chestnut St APT 1, San Francisco, CA 94109
  • Severna Park, MD
  • 1895 Redbourne Dr, Atlanta, GA 30350
  • Ellicott City, MD
  • Chicago, IL
  • Glenside, PA
  • Emeryville, CA
  • 747 Holmes St NW APT F, Atlanta, GA 30318 (404) 431-4042

Work

Position: Installation, Maintenance, and Repair Occupations

Education

Degree: Graduate or professional degree

Industries

Computer & Network Security

Resumes

Resumes

Joshua Daymont Photo 1

Joshua Daymont

View page
Location:
San Francisco Bay Area
Industry:
Computer & Network Security

Publications

Us Patents

High Performance Software Vulnerabilities Detection System And Methods

View page
US Patent:
20170017789, Jan 19, 2017
Filed:
Feb 3, 2016
Appl. No.:
15/014309
Inventors:
- Atlanta GA, US
Joshua M. Daymont - San Francisco CA, US
International Classification:
G06F 21/55
G06F 11/36
G06F 21/52
Abstract:
This invention teaches a system and methods of detecting software vulnerabilities in a computer program by analyzing the compiled code and optionally the source code of the computer program. The invention models compiled software to examine both control flow and data flow properties of the target program. A comprehensive instruction model is used for each instruction of the compiled code, and is complemented by a control flow graph that includes all potential control flow paths of the instruction. A data flow model is used to record the flow of unsafe data during the execution of the program. The system analyzes the data flow model and creates a security finding corresponding to each instruction that calls an unsafe function on unsafe data. The security findings are aggregated in a security report. The system further uses precomputation to improve performance by caching 1-to-many data flow mapping for each basic block in the code.

Software Vulnerabilities Detection System And Methods

View page
US Patent:
20160371494, Dec 22, 2016
Filed:
Aug 30, 2016
Appl. No.:
15/251232
Inventors:
- Atlanta GA, US
Joshua M. Daymont - San Francisco CA, US
International Classification:
G06F 21/57
G06F 11/36
Abstract:
This invention discloses a system and methods of detecting software vulnerabilities in a computer program. The invention models compiled software to examine both control flow and data flow properties of the target program. A comprehensive instruction model is used for each instruction of the compiled code, and is complemented by a control flow graph that includes all potential control flow paths of the instruction. A data flow model is used to record the flow of unsafe data during the execution of the program. The system analyzes the data flow model and creates a security finding corresponding to each instruction that calls an unsafe function on unsafe data. These security findings are aggregated in a security report along with the corresponding debug information, remediation recommendations and any ancillary information related to each instruction that triggered the security finding.

Software Vulnerabilities Detection System And Methods

View page
US Patent:
20160300063, Oct 13, 2016
Filed:
Aug 15, 2014
Appl. No.:
14/460636
Inventors:
- Atlanta GA, US
Joshua M. Daymont - San Francisco CA, US
International Classification:
G06F 21/56
G06F 11/36
Abstract:
This invention teaches a system and methods of detecting software vulnerabilities in a computer program by analyzing the compiled code and optionally the source code of the computer program. The invention models compiled software to examine both control flow and dataflow properties of the target program. A comprehensive instruction model is used for each instruction of the compiled code, and is complemented by a control flow graph that includes all potential control flow paths of the instruction. A data flow model is used to record the flow of unsafe data during the execution of the program. The system analyzes the data flow model and creates a security finding corresponding to each instruction that calls an unsafe function on unsafe data. These security findings are aggregated in a security report along with the corresponding debug information, any ancillary information, remediation recommendations and the optional source code information for each instruction that triggered the security finding.
Joshua M Daymont from Annapolis, MD, age ~48 Get Report