G06F8/53

File vulnerability detection system and detection method thereof

A file vulnerability detection method includes: translating a binary file into an intermediate file; analyzing the intermediate file to obtain multiple functions to be tested; establishing function characteristic data of each of the functions to be tested; and comparing correlations between the function characteristic data of each of the functions to be tested and at least one pair of characteristic data with vulnerability of at least one vulnerability function and characteristic data without vulnerability of the at least one vulnerability function in a vulnerability database based on a characteristic model to determine whether each of the functions to be tested corresponding to each function characteristic data has a vulnerability, wherein the characteristic model has information representing multiple back-end binary files generated by multiple back-end platforms, wherein the characteristic data with vulnerability has the vulnerability, and the characteristic data without vulnerability does not have the vulnerability.

Automatically mapping binary executable files to source code by a software modernization system

Techniques are described for enabling a software modernization system to automatically map binary executable files and other runtime artifacts (e.g., application binaries, Java ARchive (JAR) files, .NET Dynamic Link Library (DLL) files, process identifiers, etc.) to source code associated with the binary executable files, e.g., as part of modernization processes aimed at migrating users' applications to a cloud service provider's infrastructure. A software modernization service of a cloud provider network provides discovery agents and other tools that are capable of creating an inventory of users' software applications and collecting profile data about the software applications. Various techniques are described for automatically identifying the source code associated with software applications identified by a discovery agent in a user's computing environment, thereby improving the efficiency of various software modernization analyses and other modernization processes.

Automatically mapping binary executable files to source code by a software modernization system

Techniques are described for enabling a software modernization system to automatically map binary executable files and other runtime artifacts (e.g., application binaries, Java ARchive (JAR) files, .NET Dynamic Link Library (DLL) files, process identifiers, etc.) to source code associated with the binary executable files, e.g., as part of modernization processes aimed at migrating users' applications to a cloud service provider's infrastructure. A software modernization service of a cloud provider network provides discovery agents and other tools that are capable of creating an inventory of users' software applications and collecting profile data about the software applications. Various techniques are described for automatically identifying the source code associated with software applications identified by a discovery agent in a user's computing environment, thereby improving the efficiency of various software modernization analyses and other modernization processes.

LOAD MODULE COMPILER
20230100192 · 2023-03-30 ·

The disclosure invention provides a method for executing a program compiled for a source architecture on a machine having a different target architecture, a non-transitory computer readable medium configured to store instructions for performing such a method, and a system for performing such a method.

LOAD MODULE COMPILER
20230100192 · 2023-03-30 ·

The disclosure invention provides a method for executing a program compiled for a source architecture on a machine having a different target architecture, a non-transitory computer readable medium configured to store instructions for performing such a method, and a system for performing such a method.

System Call Method and Apparatus, and Electronic Device
20230103210 · 2023-03-30 ·

A system call method and apparatus, and an electronic device are provided. The method includes that: when a simulator runs on an operating system, a library file of the simulator and a pre-scanned system call table of the simulator are loaded, the system call table including a system file called by a simulation system in the simulator, and position information of the system file; a target system file associated with the library file is searched in the system call table; and the position information of the target system file is modified to a execution function corresponding to the simulator in the system call table, so as to call the target system file through the execution function.

METHOD FOR CREATING AND EXECUTING A CONTROL PROGRAM FOR CONTROLLING AN AUTOMATION SYSTEM, AND AUTOMATION SYSTEM
20230101320 · 2023-03-30 ·

A method is provided for creating and executing a control program for controlling an automation system having a controller and a web server connected to the controller. The method includes creating a first version of a program code of a control program for the automation system in an input module of a web-based development environment executed in a web browser, in a code creating step; executing a translation module of the web-based development environment on the web server and translating the program code into a program code of a binary language, in a translating step; and executing the program code in the binary language with the aid of the controller of the automation system, in an executing step. An automation system is also provided.

METHOD FOR CREATING AND EXECUTING A CONTROL PROGRAM FOR CONTROLLING AN AUTOMATION SYSTEM, AND AUTOMATION SYSTEM
20230101320 · 2023-03-30 ·

A method is provided for creating and executing a control program for controlling an automation system having a controller and a web server connected to the controller. The method includes creating a first version of a program code of a control program for the automation system in an input module of a web-based development environment executed in a web browser, in a code creating step; executing a translation module of the web-based development environment on the web server and translating the program code into a program code of a binary language, in a translating step; and executing the program code in the binary language with the aid of the controller of the automation system, in an executing step. An automation system is also provided.

AOT Compiler For A Legacy Game
20230034289 · 2023-02-02 ·

A method for ahead of time (AoT) compiling during a play of a legacy game is provided. The method includes scanning a memory device for an executable code of the legacy game, decoding the executable code, and translating the executable code into a first source code. The method further includes compiling the first source code to output a first compiled code, determining whether a user input during the play of the legacy game is received, and determining whether a fiber for servicing the user input is created. The fiber provides directionality of execution between the first compiled code and a second compiled code. The method includes executing the fiber in response to determining that the fiber for servicing the user input is created. The fiber is executed to generate one or more image frames of the legacy game.

Training and/or using neural network model to generate target source code from lower-level representation

Training and/or utilization of a neural decompiler that can be used to generate, from a lower-level compiled representation, a target source code snippet in a target programming language. In some implementations, the lower-level compiled representation is generated by compiling a base source code snippet that is in a base programming language, thereby enabling translation of the base programming language (e.g., C++) to a target programming language (e.g., Python). In some of those implementations, output(s) from the neural decompiler indicate canonical representation(s) of variables. Technique(s) can be used to match those canonical representation(s) to variable(s) of the base source code snippet. In some implementations, multiple candidate target source code snippets are generated using the neural decompiler, and a subset (e.g., one) is selected based on evaluation(s).