An analysis tool provides a call path set for reviewing the security of trusted software components during development. By examining the usage of permissions in programs and libraries within a managed execution environment, potential gaps in the security of trusted components may be identified. A call graph generator creates a permission-sensitive call graph. A call graph analyzer evaluates the permission-sensitive call graph to highlight call paths that may present security risks.

 
Web www.patentalert.com

< VLSI timing optimization with interleaved buffer insertion and wire sizing stages

> Coordinated collaboration system in an integration platform

~ 00468