Mike Andrews

Mike Andrews

Redmond, Washington, United States
722 followers 500+ connections

About

I find that there's three types of people - rockstars, roadies, and audience members.…

Articles by Mike

  • To cloud or not to cloud - that is the question.

    To cloud or not to cloud - that is the question.

    Moving services to the cloud has many benefits - scale, availability, security - but rarely should it be cost, though…

    10 Comments
  • Multi-Cloud is BS

    Multi-Cloud is BS

    It’s not that there’s no such thing as companies that are “doing” multi-cloud, using some combination of…

    2 Comments

Activity

Join now to see all activity

Experience

  • Microsoft Graphic

    Microsoft

    Redmond, Washington, United States

  • -

  • -

  • -

  • -

  • -

    Bellevue, WA

  • -

  • -

  • -

  • -

  • -

  • -

Education

  • University of Kent Graphic

    University of Kent

    -

    Research focused on programmer psychology and debugging techniques. System derived from thesis was published in IEEE Software Nov/Dec 2003 titled "Signpost: matching program behavior against known faults"

  • -

Patents

  • Adaptive Fuzzing System for Web Services

    Issued US 8997235

    Web applications, systems and services, which are prone to cyber-attacks, can utilize an adaptive fuzzing system and methodology to intelligently employ fuzzer technology to test web site pages for vulnerabilities. A breadth first search and minimal fuzzing testing is performed on identified pages of a web site looking for either a vulnerability or the potential for a vulnerability. Heuristics are gathered and/or generated on each tested web page to determine a vulnerability score for the page…

    Web applications, systems and services, which are prone to cyber-attacks, can utilize an adaptive fuzzing system and methodology to intelligently employ fuzzer technology to test web site pages for vulnerabilities. A breadth first search and minimal fuzzing testing is performed on identified pages of a web site looking for either a vulnerability or the potential for a vulnerability. Heuristics are gathered and/or generated on each tested web page to determine a vulnerability score for the page that is an indication of the page's potential for hosting a vulnerability. When a page is discovered with a vulnerability score that indicates the page has the potential for a vulnerability a depth first search and expanded fuzzing testing is performed on one or more branches of the web site that begin with the page with the potential vulnerability.

    See patent
  • Cross-site scripting prevention in dynamic content

    Issued US 8910247

    Embodiment relate to systems, methods, and computer storage media for suppressing cross-site scripting in a content delivery system. A request is received for content that includes a scripted item or scripted items. The scripted item is identified within the content. An identifier is associated with the scripted element when the scripted element is an intended scripted element to be associated with the content. The identifier may be a hash value based from a hash function and the scripted item.…

    Embodiment relate to systems, methods, and computer storage media for suppressing cross-site scripting in a content delivery system. A request is received for content that includes a scripted item or scripted items. The scripted item is identified within the content. An identifier is associated with the scripted element when the scripted element is an intended scripted element to be associated with the content. The identifier may be a hash value based from a hash function and the scripted item. Prior to communicating the content to a user, the scripted item is identified again to determine if an identifier is associated with the scripted item. If an identifier is associated with the scripted item, the identifier is evaluated to determine if the identifier is appropriate. When the identifier is determined to not be appropriate, the scripted item is prevented from being communicated to a user.

    See patent
  • System and Method for Application Security Assessment

    Issued US 8,695,027

    A system and method in one embodiment includes modules for running a test script to generate a request to a target application, receiving a response from the target application, and running a detector script to inspect the response for a vulnerability. More specific embodiments include a target web site, populating a work in a queue, where the work corresponds to content in the response, and running a second test script or detector script to generate a follow-up request to the application if…

    A system and method in one embodiment includes modules for running a test script to generate a request to a target application, receiving a response from the target application, and running a detector script to inspect the response for a vulnerability. More specific embodiments include a target web site, populating a work in a queue, where the work corresponds to content in the response, and running a second test script or detector script to generate a follow-up request to the application if the vulnerability has been identified in the response. Other embodiments include extracting the work from the queue, and running a second test script corresponding to the extracted work. Other embodiments include storing an injection in an injection cache, de-registering the injection from the injection cache if it is identified in the response, and re-crawling the application, if the injection has not been de-registered from the injection cache.

    Other inventors
    See patent

More activity by Mike

View Mike’s full profile

  • See who you know in common
  • Get introduced
  • Contact Mike directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Mike Andrews in United States

Add new skills with these courses