Patent classifications
G06F8/427
Monitoring control-flow integrity
A method for monitoring control-flow integrity in a low-level execution environment, the method comprising receiving, at a monitor, a message from the execution environment indicating that the execution environment has entered a controlled mode of operation, receiving, at the monitor, a data packet representing execution of a selected portion of a control-flow process at the execution environment, identifying, using the data packet, a pathway corresponding to the selected portion of the control-flow process from a set of permissible control-flow pathways and determining whether the identified pathway corresponds to an expected control-flow behaviour.
OBJECT-ORIENTED INFRASTRUCTURE-AS-CODE PLATFORM (OOIACP)
Novel tools and techniques are provided for implementing object-oriented infrastructure-as-code platform (“OOIACP”) and its functionalities. In various embodiments, an OOIACP may receive a request to perform a function from a requesting device. The OOIACP includes a declarative configuration language (“DCL”)-based infrastructure-as-code (“IAC”) software tool that provides structure and data functionalities and a wrapper tool that provides algorithm and sequence functionalities to the IAC software tool to convert the IAC software tool into an object-oriented programming (“OOP”)-based IAC system. The OOIACP uses a run command to perform the requested function, by identifying classes within a class hierarchy associated with the requested function, and initiating a set of procedures in each identified class. Each class and subclass within the class hierarchy has one or more predefined class behaviors, and each subclass inherits class behaviors of classes to which it belongs and of any intermediate subclasses.
SYSTEMS, METHODS, AND STORAGE MEDIA FOR CREATING SECURED COMPUTER CODE
Systems, methods, and storage media for creating secured computer code are disclosed. Exemplary implementations may: access computer code; convert the computer code into a numeric description of characteristics of the code; partition the computer code into blocks of code; determine a corresponding ranking of at least some of the blocks of code with an anomaly measure by applying an anomaly detection algorithm to the blocks of code; select anomalous blocks of the blocks of code by applying a threshold to the rankings; and apply code security techniques to at least one of the anomalous blocks of code to thereby create secured computer code.
Methods, systems, and articles of manufacture to autonomously select data structures
Methods, systems, and articles of manufacture to autonomously select data structures are disclosed. An example apparatus includes an ordinal assigner to assign training code operations to respective first ordered values, and assign candidate data structure types to respective second ordered values, a filter generator to, for a first instruction of the training code operations, generate a Bloom filter bit vector pattern based on (a) one of the first ordered values, (b) one of the second ordered values corresponding to a first one of the candidate data structure types, and (c) a size of the first instruction, a label generator to generate a first model training input feature vector based on the Bloom filter bit vector pattern, data corresponding to the first instruction, and a performance metric of the first one of the candidate data structure types, and a neural network manager to train the data structure selection model with the first model training input feature vector.
Lightweight extension of core data services
Implementations of the present disclosure include receiving, by a parser, a view source file and an extension source file, the view source file defining a view on data stored in a database, the extension source file defining an extension to the view, parsing, by the parser, the view source file to provide a view abstract syntax tree (AST) and the extension source file to provide an extension AST, providing, by the parser, a merged AST based on the view AST and the extension AST, generating a mixed runtime data object using the merged AST, and providing the mixed runtime data object for consumption by at least one runtime component.
Automatic code reconfiguration based on function and subfunction analysis
Disclosed herein are techniques for automatically reconfiguring code based on function and subfunction analysis. Techniques include determining, by parsing a code structure representing a plurality of functions, that at least one first function has a threshold degree of complexity; identifying, in response to the determination, a plurality of subfunctions based on the at least one first function, the plurality of subfunctions having a commonality with the at least one first function; and forming a second function by reconfiguring the first function to call at least one of the identified plurality of subfunctions.
Integrating machine learning models into an interpreted software development environment
The subject technology provides for parsing a line of code in a project of an integrated development environment (IDE). The subject technology executes indirectly, using the interpreter, the parsed line of code. The interpreter references a translated source code document generated by a source code translation component from a machine learning (ML) document written in a particular data format. The translated source code document includes code in a chosen programming language specific to the IDE, and the code of the translated source code document is executable by the interpreter. Further the subject technology provides, by the interpreter, an output of the executed parsed line of code.
Character recommending method and apparatus, and computer device and storage medium
A character recommendation method and apparatus, a computer device, and a storage medium are disclosed. The method includes: converting code inputted in a code input interface into a syntax tree, the syntax tree including a plurality of nodes, a hierarchical relationship between the plurality of nodes, and location intervals of the plurality of nodes; determining, according to a cursor location in the code input interface and the syntax tree, at least one reference node corresponding to the cursor location in the syntax tree; parsing the at least one reference node, and determining a to-be-recommended target character according to a parsing result; and recommending the target character in the code input interface.
Creating portable serverless applications
A lexical analyzer is provided to analyze serverless application code to help ensure that the serverless application is portable between different execution environments. The lexical analyzer may identify non-portable features of the application, and alerts of these features may be provided to users. A transfer tool may be provided to assist in transferring a serverless application between computing platforms, such as by converting the portable serverless application to a container format. An interface may be provided that subscribes, on behalf of a container, to receive notifications of triggering events from a computing platform's notification service. The interface may provide a message to the container to indicate an occurrence of a triggering event, which may trigger execution of a serverless function by the container.
Automated code generation using analysis of design diagrams
Methods, systems, and computer-readable media for automated code generation using analysis of design diagrams are disclosed. A diagram-to-code system determines one or more security properties of a plurality of components associated with a software product. Relationships between the components are indicated in a software design diagram. At least some of the security properties are determined using input to a user interface. The diagram-to-code system generates one or more secure code packages based (at least in part) on the software design diagram and the one or more security properties. The secure code package(s) implement one or more security controls associated with the software product. The secure code package(s) are provided to a developer. The secure code package(s) and additional program code from the developer are compiled into a compiled software product. Execution of the compiled software product mitigates security vulnerabilities using the one or more security controls.