G06F11/3644

PROGRAMMING DEVICE AND PROGRAM
20220058110 · 2022-02-24 · ·

A programming device which is capable of creating a program, typified by an image processing algorithm, and of easily validating a program being edited, and a program are provided.

The programming device edits a program by arranging icons of units, the unit representing a processing unit, and linking the units on an editing screen in response to a user operation. The programming device includes program execution means for executing a program defined by the units arranged and linked on the editing screen and calculating an output of each unit, and debug view display control means for displaying the output of each unit obtained by being calculated by the program execution means in a debug view region associated with an icon of each of the units arranged on the editing screen.

Quantization of data streams of instrumented software

A data analysis system processes data generated by instrumented software. The data analysis system receives data streams generated by instances of instrumented software executing on systems. The data analysis system also receives metadata describing data streams. The data analysis system receives an expression based on the metadata. The data analysis system receives data of data streams for each time interval and computes the result of the expression based on the received data values. The data analysis system repeats these steps for each time interval. The data analysis system may quantize data values of data streams for each time interval by generating an aggregate value for the time interval based on data received for each data stream for that time interval. The data analysis system evaluates the expression using the quantized data for the time interval.

Application debugging in a restricted container environment

An example method of debugging an application running in a container includes detecting, by a kernel, a system call from an application running in a container. The method also includes performing a capability check based on detection of the system call. The capability check provides a set of capabilities used by the system call. The method further includes associating the system call with the set of capabilities and providing debug information based on the application run in the container. The debug information includes the association between the system call and the set of capabilities.

APPLICATION TESTING ON DIFFERENT DEVICE TYPES

Methods, systems, and apparatus include computer programs encoded on a computer-readable storage medium, including a p_method for testing applications. A connection is made by a test development device to a source device. User interactions with various components of an application executing at the source device are detected by the test development device. A p_method corresponding to each user interaction with the various components of the application is identified by the test development device and within code of the application or underlying OS framework code. Contextual information is extracted from each identified p_method that corresponding to the component with which the user interaction occurred. A test script is generated by the test development device based on the user interactions and the contextual information extracted from the identified p_methods. The test script is automatically run on a test device that differs from the source device.

Software protection from attacks using self-debugging techniques

In overview, methods, computer programs products and devices for securing software are provided. In accordance with the disclosure, a method may comprise attaching a debugger process to a software process. During execution of the software process, operations relevant to the functionality of the code process are carried out within the debugger process. As a result, the debugger process cannot be replaced or subverted without impinging on the functionality of the software process. The software process can therefore be protected from inspection by modified or malicious debugging techniques.

Protecting against the introduction of alien content

In one implementation, a computer-implemented method can identify abnormal computer behavior. The method can receive, at a computer server subsystem and from a web server system, computer code to be served in response to a request from a computing client over the internet. The method can also modify the computer code to obscure operational design of the web server system that could be determined from the computer code, and supplement the computer code with instrumentation code that is programmed to execute on the computing client. The method may serve the modified and supplemented computer code to the computing client.

Memory management model and interface for unmodified applications

A memory management system is described herein that receives information from applications describing how memory is being used and that allows an application host to exert more control over application requests for using memory. The system provides an application memory management application-programming interface (API) that allows the application to specify more information about memory allocations that is helpful for managing memory later. The system also provides an ability to statically and/or dynamically analyze legacy applications to give applications that are not modified to work with the system some ability to participate in more effective memory management. The system provides application host changes to leverage the information provided by applications and to manage memory more effectively using the information and hooks into the application's use of memory. Thus, the system provides a new model for managing memory that improves application host behavior and allows applications to use computing resources more efficiently.

Code injection for conditional breakpoints
09785536 · 2017-10-10 · ·

An apparatus for debugging operational code of a target program comprises a memory storing the operational code and a set of instructions representing a debugger program for debugging the operational code. A microprocessor is configured to execute the operational code and the debugger program. The debugger program can inject a jump to a breakpoint handling routine into the operational code and let a compiler program create code pieces for the breakpoint handling routine.

Dynamic Addition of Code in Shared Libraries

Various embodiments include methods for dynamically modifying shared libraries on a client computing device. Various embodiment methods may include receiving a first set of code segments and a first set of code sites associated with a first application. Each code in the first set of code sites may include an address within a compiled shared library stored on the client computing device. The compiled shared library may include one or more dummy instructions inserted at each code site in the first set of code sites, and each code segment in the first set of code segments may be associated with a code site in the first set of code sites. The client computing device may insert each code segment in the first set of code segments at its associated code site in the compiled shared library.

Privilege Test and Monitoring

Testing code. A method includes identifying in code being executed on a computing system a specification of a permission set. The method further includes dynamically, as the code is running changing a permission level of the computing system to match the permission set. The method further includes executing code at the computing system within the permissions in the permission set. The method further includes during execution, for actions performed in the execution, determining if the permission set includes sufficient permissions for the action to be performed.