About
I find that there's three types of people - rockstars, roadies, and audience members.…
Articles by Mike
Activity
-
Even at a discount, a Unicorn is still a Unicorn Can't wait to see this offering when it is integrated - GameChanger
Even at a discount, a Unicorn is still a Unicorn Can't wait to see this offering when it is integrated - GameChanger
Liked by Mike Andrews
-
ZeroGPT - for all those times when you smell BS, but aren't really sure. (and may thanks to one of my colleagues for…
ZeroGPT - for all those times when you smell BS, but aren't really sure. (and may thanks to one of my colleagues for…
Shared by Mike Andrews
-
This is close to home in many ways - both on the “product builder” and “product adopter” fronts, but the point that security products aren’t just…
This is close to home in many ways - both on the “product builder” and “product adopter” fronts, but the point that security products aren’t just…
Shared by Mike Andrews
Experience
Education
-
University of Kent
-
Research focused on programmer psychology and debugging techniques. System derived from thesis was published in IEEE Software Nov/Dec 2003 titled "Signpost: matching program behavior against known faults"
-
-
Patents
-
Adaptive Fuzzing System for Web Services
Issued US 8997235
Web applications, systems and services, which are prone to cyber-attacks, can utilize an adaptive fuzzing system and methodology to intelligently employ fuzzer technology to test web site pages for vulnerabilities. A breadth first search and minimal fuzzing testing is performed on identified pages of a web site looking for either a vulnerability or the potential for a vulnerability. Heuristics are gathered and/or generated on each tested web page to determine a vulnerability score for the page…
Web applications, systems and services, which are prone to cyber-attacks, can utilize an adaptive fuzzing system and methodology to intelligently employ fuzzer technology to test web site pages for vulnerabilities. A breadth first search and minimal fuzzing testing is performed on identified pages of a web site looking for either a vulnerability or the potential for a vulnerability. Heuristics are gathered and/or generated on each tested web page to determine a vulnerability score for the page that is an indication of the page's potential for hosting a vulnerability. When a page is discovered with a vulnerability score that indicates the page has the potential for a vulnerability a depth first search and expanded fuzzing testing is performed on one or more branches of the web site that begin with the page with the potential vulnerability.
-
Cross-site scripting prevention in dynamic content
Issued US 8910247
Embodiment relate to systems, methods, and computer storage media for suppressing cross-site scripting in a content delivery system. A request is received for content that includes a scripted item or scripted items. The scripted item is identified within the content. An identifier is associated with the scripted element when the scripted element is an intended scripted element to be associated with the content. The identifier may be a hash value based from a hash function and the scripted item.…
Embodiment relate to systems, methods, and computer storage media for suppressing cross-site scripting in a content delivery system. A request is received for content that includes a scripted item or scripted items. The scripted item is identified within the content. An identifier is associated with the scripted element when the scripted element is an intended scripted element to be associated with the content. The identifier may be a hash value based from a hash function and the scripted item. Prior to communicating the content to a user, the scripted item is identified again to determine if an identifier is associated with the scripted item. If an identifier is associated with the scripted item, the identifier is evaluated to determine if the identifier is appropriate. When the identifier is determined to not be appropriate, the scripted item is prevented from being communicated to a user.
-
System and Method for Application Security Assessment
Issued US 8,695,027
A system and method in one embodiment includes modules for running a test script to generate a request to a target application, receiving a response from the target application, and running a detector script to inspect the response for a vulnerability. More specific embodiments include a target web site, populating a work in a queue, where the work corresponds to content in the response, and running a second test script or detector script to generate a follow-up request to the application if…
A system and method in one embodiment includes modules for running a test script to generate a request to a target application, receiving a response from the target application, and running a detector script to inspect the response for a vulnerability. More specific embodiments include a target web site, populating a work in a queue, where the work corresponds to content in the response, and running a second test script or detector script to generate a follow-up request to the application if the vulnerability has been identified in the response. Other embodiments include extracting the work from the queue, and running a second test script corresponding to the extracted work. Other embodiments include storing an injection in an injection cache, de-registering the injection from the injection cache if it is identified in the response, and re-crawling the application, if the injection has not been de-registered from the injection cache.
Other inventorsSee patent
More activity by Mike
-
Insight into Google SRE is always valuable, particularly because what the industry has done with the job title often is different than what the…
Insight into Google SRE is always valuable, particularly because what the industry has done with the job title often is different than what the…
Liked by Mike Andrews
-
Follow this playbook to bring your cloud migration strategy to life. Based on experience from our migration specialists.
Follow this playbook to bring your cloud migration strategy to life. Based on experience from our migration specialists.
Liked by Mike Andrews
-
I think the best way I’ve been able to explain the SVB fiasco to family and non-tech friends is simply a case of Prisoner’s Dilemma. Given rational…
I think the best way I’ve been able to explain the SVB fiasco to family and non-tech friends is simply a case of Prisoner’s Dilemma. Given rational…
Shared by Mike Andrews
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Mike Andrews in United States
-
Mike Andrews
Technology Executive | Software Engineering Leader | Media, Sports, Fintech | Former Disney, ESPN, Capital One
-
Mike Andrews
-
Mike Andrews
Engineering Manager and Full-stack Engineer
-
Mike Andrews
1604 others named Mike Andrews in United States are on LinkedIn
See others named Mike Andrews