Patent classifications
G06F8/75
Method for runtime mitigation of software and firmware code weaknesses
A system of mitigating code weaknesses in a target code by adding micro functionality fixes. The system includes a mitigation module installed a memory chip of a device and a server for identifying a plurality of code weaknesses in a target code installed in a memory chip of a device and sending configuration instructions to the mitigation module, the configuration instructions comprising: a plurality of micro functionality fixes, and a plurality of code weakness locations each associated with one of the plurality of code weaknesses and one of the plurality of micro functionality fixes. The execution of the mitigation module by at least one processor of the device induces an installment of the plurality of micro functionality fixes in the plurality of code weakness locations.
Method for runtime mitigation of software and firmware code weaknesses
A system of mitigating code weaknesses in a target code by adding micro functionality fixes. The system includes a mitigation module installed a memory chip of a device and a server for identifying a plurality of code weaknesses in a target code installed in a memory chip of a device and sending configuration instructions to the mitigation module, the configuration instructions comprising: a plurality of micro functionality fixes, and a plurality of code weakness locations each associated with one of the plurality of code weaknesses and one of the plurality of micro functionality fixes. The execution of the mitigation module by at least one processor of the device induces an installment of the plurality of micro functionality fixes in the plurality of code weakness locations.
Information processing system, information processing device, storage medium, and information processing method of detecting destruction of data due to file transfer
An information processing device, includes a memory; and a processor coupled to the memory and configured to: generate second data by adding, to first data including a machine language, first machine language data that may be destroyed at a time of transfer of the first data and second machine language data that is not destroyed at the time of the transfer, and transmit the second data.
Automatically mapping binary executable files to source code by a software modernization system
Techniques are described for enabling a software modernization system to automatically map binary executable files and other runtime artifacts (e.g., application binaries, Java ARchive (JAR) files, .NET Dynamic Link Library (DLL) files, process identifiers, etc.) to source code associated with the binary executable files, e.g., as part of modernization processes aimed at migrating users' applications to a cloud service provider's infrastructure. A software modernization service of a cloud provider network provides discovery agents and other tools that are capable of creating an inventory of users' software applications and collecting profile data about the software applications. Various techniques are described for automatically identifying the source code associated with software applications identified by a discovery agent in a user's computing environment, thereby improving the efficiency of various software modernization analyses and other modernization processes.
Automatically mapping binary executable files to source code by a software modernization system
Techniques are described for enabling a software modernization system to automatically map binary executable files and other runtime artifacts (e.g., application binaries, Java ARchive (JAR) files, .NET Dynamic Link Library (DLL) files, process identifiers, etc.) to source code associated with the binary executable files, e.g., as part of modernization processes aimed at migrating users' applications to a cloud service provider's infrastructure. A software modernization service of a cloud provider network provides discovery agents and other tools that are capable of creating an inventory of users' software applications and collecting profile data about the software applications. Various techniques are described for automatically identifying the source code associated with software applications identified by a discovery agent in a user's computing environment, thereby improving the efficiency of various software modernization analyses and other modernization processes.
Dynamic system for active detection and mitigation of anomalies in program code construction interfaces
Embodiments of the invention are directed to active detection and mitigation of anomalies in program code construction interfaces. The system provides a proactive plug-in with a dynamic machine learning (ML) anomaly detection model cloud component structured to dynamically detect architectural flaws in program code in real-time in a user coding interface. In particular, the system activates a machine learning (ML) anomaly detection plug-in for dynamically analyzing the first technology program code being constructed in the user coding interface. Moreover, the system modifies, via the ML anomaly detection plug-in, the user coding interface to embed interface elements associated with the one or more flaws in the first technology program code detected by the ML anomaly detection model cloud component.
Dynamic system for active detection and mitigation of anomalies in program code construction interfaces
Embodiments of the invention are directed to active detection and mitigation of anomalies in program code construction interfaces. The system provides a proactive plug-in with a dynamic machine learning (ML) anomaly detection model cloud component structured to dynamically detect architectural flaws in program code in real-time in a user coding interface. In particular, the system activates a machine learning (ML) anomaly detection plug-in for dynamically analyzing the first technology program code being constructed in the user coding interface. Moreover, the system modifies, via the ML anomaly detection plug-in, the user coding interface to embed interface elements associated with the one or more flaws in the first technology program code detected by the ML anomaly detection model cloud component.
SOFTWARE CODE INTEGRATION FROM A MEDIA FILE
A method for software code integration from media files includes comparing portions of development code in an integrated development environment to a plurality of classified portions of a plurality of media files. The method also includes identifying a first classified portion of a first media file from the plurality of media files for integration into the development code, where the first classified portion includes a first snippet of code associated with a first function. Responsive to receiving a user confirmation, the method also includes extracting the first snippet of code associated with the first function. The method also includes integrating the first snippet of code associated with the first function into the development code in the integrated development environment
Assessing operational stability of computer system by integrity checking of computer program
A computer-implemented method for checking the integrity of a target computer program to be executed in a computer system.
Automated code generation using analysis of design diagrams
Methods, systems, and computer-readable media for automated code generation using analysis of design diagrams are disclosed. A diagram-to-code system determines one or more security properties of a plurality of components associated with a software product. Relationships between the components are indicated in a software design diagram. At least some of the security properties are determined using input to a user interface. The diagram-to-code system generates one or more secure code packages based (at least in part) on the software design diagram and the one or more security properties. The secure code package(s) implement one or more security controls associated with the software product. The secure code package(s) are provided to a developer. The secure code package(s) and additional program code from the developer are compiled into a compiled software product. Execution of the compiled software product mitigates security vulnerabilities using the one or more security controls.