G06F9/4484

Forensic Data Collection and Analysis Utilizing Function Call Stacks

A novel compiler is described. The compiler is able to view source code of the application in its entirety and can do so from the inside. Unlike other tools which examine the forensic data from an application crash after the fact, from the outside, the compiler of the present invention can provide novel data on function call stacks and function profiles during runtime. The application may be stopped immediately during runtime to prevent further or potential damage, but the forensic data that is collected is focused and can be used to show where vulnerabilities exists in the application and how they were exploited. Hashes are taken of function call stacks and used as unique identifiers or thumbprints which can be used to reduce the volume of forensic data that needs to be analyzed after an attack.

Function evaluation using multiple values loaded into registers by a single instruction

A technique for efficient calling of functions on a processor generates an executable program having a function call by analysing an interface for the function that defines an argument expression and an internal value used solely within the function, and an argument declaration defining an argument value to be provided to the function when the program is run. A data structure is generated including the internal value and a resolved argument value derived from the argument expression and the argument value. A single instruction is encoded in the program to utilise the data structure. When the program is executed on a processor, the single instruction causes the processor to load the argument value and internal value from the data structure into registers in the processor, prior to evaluating the function. The function can then be executed without further register loads being performed.

SYSTEM AND METHOD FOR MACHINE CODE SUBROUTINE CREATION AND EXECUTION WITH INDETERMINATE ADDRESSES
20230154078 · 2023-05-18 ·

A method is disclosed. The method may include receiving chart data; converting the received chart data into one or more sets of hardware directives and one or more subroutines, the one or more sets of one or more hardware directives including at least a first set hardware directives and a second set of hardware directives, the first set of hardware directives including one or more relative offsets needing address modification, the second set of hardware directives not needing address modification; generating a display list including the set of hardware directives and one or more rules, the one or more relative offsets needing address modification arranged at a beginning position in the generated display list; providing the generated display list to an on-board aircraft controller; and updating, via the on-board aircraft controller, the one or more absolute addresses of the relative offsets of the first set of hardware directives during run-time.

Systems and methods for developing digital experience applications

In one implementation, systems and methods are provided for developing a computer-implemented digital experience application having a first and a second micro-application. Each micro-application includes a front end interface configured to receive and display information. The first micro-application includes a first event manager configured to detect an application event belonging to a category, and a first state manager configured to detect an application state belonging to the category. The digital experience application further includes a driver application configured to host the first and second micro-applications, an event hub configured to receive the detected application event from the first micro-application, and a state store configured to store the detected application state received from the first micro-application. The second micro-application includes a second event manager configured to receive the detected application event from the event hub, and a second state manager configured to receive the detected application state from the state store.

Cloud Computing Platform That Executes Third-Party Code in A Distributed Cloud Computing Network

A compute server receives a first request from a client device that triggers execution of a first third-party code piece. The first request is directed to a first zone. A single process at the compute server executes the first third-party code piece. As a result of executing the first third-party code piece, a second request is generated that triggers execution of a second third-party code piece. The second request is directed to a second zone. The single process executes the second third-party code piece. A response is generated to the first request based at least in part on the executed first third-party code piece and the executed second third-party code piece. The generated response is transmitted to the client device.

Forensic data collection and analysis utilizing function call stacks

A novel compiler is described. The compiler is able to view source code of the application in its entirety and can do so from the inside. Unlike other tools which examine the forensic data from an application crash after the fact, from the outside, the compiler of the present invention can provide novel data on function call stacks and function profiles during runtime. The application may be stopped immediately during runtime to prevent further or potential damage, but the forensic data that is collected is focused and can be used to show where vulnerabilities exists in the application and how they were exploited. Hashes are taken of function call stacks and used as unique identifiers or thumbprints which can be used to reduce the volume of forensic data that needs to be analyzed after an attack.

FUNCTION RESULT PREDICTION

A computer-implemented method, system, and computer program product for writing and checking functions of a code file in interactive development environments. The method may include, responsive to determining the function matches a historical function in a log of previously executed functions and their corresponding execution responses, identifying the execution response corresponding to the matching historical function in the log. The method may also include determining an expected result of the function based on the identified execution response.

Macro-Script Execution Control
20170357805 · 2017-12-14 ·

An agent inserts one or more hooks into a sub-execution runtime environment that is configured to include a script and/or targeted to include the script. The agent including the one or more hooks monitors a behavior of the sub-execution runtime environment and/or the script. The agent subsequently obtains context information regarding the sub-execution runtime environment and/or the script so that it can control the runtime of at least the sub-execution runtime environment. Related systems, methods, and articles of manufacture are also disclosed.

LOCATING FAILURES IN MICROSERVICE SYSTEM

An information handling system may include at least one processor and a memory. The information handling system may be configured to: execute an application comprising a plurality of microservices on the at least one processor, wherein the application is configured to service external requests by executing a plurality of application programming interface (API) calls among the plurality of microservices; and for each API call: determine a span ID associated with such API call; determine a trace ID associated with a particular external request that is associated with such API call; and log the span ID and the trace ID.

System and method for integrating data from a remote server with a client application

The electronic device may invoke a host application. The device may display a first host user interface on the display, the first host user interface including a first host user interface component associated with a child application. In response, the device may invoke, using the host application, the child application executed at the electronic device. The device may transmit, using the host application, a request for data associated with a child user interface component to the child application. The device may transmit, using the child application, the request for data associated with the child user interface component to a child application server, wherein the data associated with the child user interface component is inaccessible by the host application. The device may receive, using the child application, the data associated with the child user interface component from the child application server. The device may display the child user interface component.