G06F8/49

System and method for determining test coverage

A computer-implemented method, computer program product, and system is provided for determining test coverage. In an implementation, a method may include identifying at least one change in source code. The method may also include instrumenting object code of at least one class file associated with a source file of the source code associated with the identified at least one change. The method may further include testing the instrumented object code with at least one test case. The method may further include generating a coverage report associated with the instrumented object code, wherein the coverage report includes a proportion of the at least one change in the source code covered by the at least one test case.

System and method for static detection and categorization of information-flow downgraders

A system and method for static detection and categorization of information-flow downgraders includes transforming a program stored in a memory device by statically analyzing program variables to yield a single assignment to each variable in an instruction set. The instruction set is translated to production rules with string operations. A context-free grammar is generated from the production rules to identify a finite set of strings. An information-flow downgrader function is identified by checking the finite set of strings against one or more function specifications.

Electronic device, compiling method and computer-readable recording medium

The present invention relates to an electronic device, a compiling method, and a computer-readable recording medium. An electronic device according to an embodiment of the present invention compiles a source code of a dynamic programming language compiled during execution of a program to the level of a static programming language compiled before execution, and may comprise a processor which determines whether the source code of the dynamic programming language generated when a command for operating the program is received can be processed by the first compiler in the same manner as the source code of the static programming language processing, and converts the source code of the dynamic programming language by the first compiler if the code can be processed as a result of the determination.

SELF-LEARNING BASED PREDICTIVE SECURITY REQUIREMENTS SYSTEM FOR APPLICATION RISK MANAGEMENT

Systems and methods for application development include predicting a probable set of risks (e.g., security risks, financial risks, legal risks etc.) and risk mitigations for software development or deployment risk management. The system records user activity with respect to assigning risks and risk mitigations to application components. The system utilizes user inputs and characteristics of the modelled application as well as the user inputs and characteristics associated with past development and deployment of similar applications in order to predict a probable set of risks and/or risk mitigation actions.

System and method for providing code completion features for code modules

Systems and methods are described for providing code completion features for code modules that have been incorporated into a source code document being edited by a user of a source code editor. Embodiment dynamically load and apply partial code evaluation to code modules referenced in the source code document (and any code modules referenced directly or indirectly by such code modules) while the user is editing it. The partial code evaluation is performed on a background thread that is separate from a main thread used to execute the user interface for the source code editor. The results of such partial code evaluation are cached and used to provide code completion information for the code modules.

EVENT HANDLING INSTRUCTION PROCESSING
20190278607 · 2019-09-12 ·

A method of providing instructions to computer processing apparatus for improved event handling comprises the following. Instructions for execution on the computer processing apparatus are provided to an event processor generator. These instructions comprise a plurality of functional steps, a set of dependencies between the functional steps, and configuration data. The event processor generator creates instances of the functional steps from the instructions and represents the instances as directed acyclic graphs. The event processor generator identifies a plurality of event types and topologically sort is the directed acyclic graphs to determine a topologically ordered event path for each event type. The event processor generator then provides a revised set of instructions for execution on the computer processing apparatus in which original instructions have been replaced by instructions requiring each event type to be executed according to its topologically ordered event path. Suitable computing apparatus for executing the event processor generator and for storing and running the generated event processor code is also described.

Automated integration of a source modification engine
11983265 · 2024-05-14 · ·

Systems and methods of cyber hardening software by modifying one or more assembly source files. In some embodiments, the SME tool transparently and seamlessly integrates into the build process of the assembly source files being modified. For example, upon integration of the disclosed SME tool into the application's development environment, the modifications in the final executable are transparent to the developer and can support other cyber hardening techniques. In some embodiments, the integration of the SME tool into a build can be automated. Simplifying integration, through automated means, can be beneficial for widespread adoption of SME tools in cyberhardening software applications. Automated SME build integrations, e.g., removing manual methods and techniques, can help eliminate human errors and result in faster SME integrations, in comparison to manual integrations of a SME tool.

Compilation of a quantum program

Embodiments are provided for compilation of a quantum program. In some embodiments, a system can include a processor that executes computer-executable components stored in memory. The computer-executable components can include an identification component that selects a subgraph that is common among a first commutation directed acyclic graph (DAG) and a second commutation DAG. The subgraph has an upper-bound size that is greater than a threshold size. The first commutation DAG represents a first quantum circuit of a set of quantum circuits and the second commutation DAG represents a second quantum circuit of the set of quantum circuits. The computer-executable components also include a compilation component that compiles a quantum subcircuit corresponding to the subgraph. The computer-executable components further include a configuration component that replaces the quantum subcircuit in the first quantum circuit with the compiled quantum subcircuit.

Software development environment

Systems and methods for managing software resources such as machine learning/artificial intelligence models. The system includes a number of components that provide versioning services to both software resources and to data sets. A data storage component also addresses storage/retrieval functions for the system. A user interface element is also present to provide users with both a GUI and a command line interface. An assessment element assesses user selected software assets for project inclusion, with the assessment being based on good software development principles and practices. Once a project of selected software assets has passed the assessment stage, the software assets are pipelined for execution by an execution unit. The outputs of the execution unit are sent to a data output module automatically populates predetermined and preconfigured templates with the outputs to produce reports. The outputs may be final outputs or they may be intermediate results produced by the software assets.

Method for executing a computer program with a parameterised function

A method for executing a program includes: storing, in a table associated with each address of a specialized code of a parameterized function, a value of each of specialized parameters for generating the specialized code, and each time the address of a specialized code must be modified, deleted from, or added to the table, a microprocessor generates and records in a memory a search routine written in machine language of the microprocessor, this search routine containing, coded as constants, each address and each specialized parameter value stored in the table, such that the search routine does not include any reading operation of the value of a specialized parameter or of the address of a specialized code outside the continuous address range in which this search routine is recorded, and the microprocessor runs this recorded search routine directly.