System And Method For Patching A Device Through Exploitation

Abstract

A system and method that includes identifying a vulnerability in a computing device; accessing a vulnerability exploitation mapped to the identified vulnerability; at the computing device, executing the vulnerability exploitation and entering an operating mode of escalated privileges; and while in the operating mode of escalated privileges, updating the system with a vulnerability resolution.


Claims
Download PDF
Document Preview
Document History
  • Publication: Mar 28, 2017
  • Application: Feb 24, 2014
    US US 201414188492 A
  • Priority: Feb 24, 2014
    US US 201414188492 A
  • Priority: Feb 22, 2013
    US US 201361768256 P

Download Citation


Sign in to the Lens

Feedback