G06F8/53

Electronic system for dynamic analysis and detection of transformed transient data in a distributed system network

Embodiments of the invention are directed to systems, methods, and computer program products for dynamic analysis and detection of transformed transient data in a distributed system network. The system is structured for validating, determining and evaluating temporal data transformations associated with technology resource components across iterations of technology applications for maintaining backward compatibility. The system comprises an execution module structured for executing technology resource components in a plurality of testing technology environments concurrently. The system further comprises an analysis module structured for evaluating iterations of a first technology resource component by comparing the transformed first testing output with the transformed second testing output to determine modifications to the first iteration of the first technology resource component in the second iteration of the first technology resource component that succeeds the first iteration.

Electronic system for dynamic analysis and detection of transformed transient data in a distributed system network

Embodiments of the invention are directed to systems, methods, and computer program products for dynamic analysis and detection of transformed transient data in a distributed system network. The system is structured for validating, determining and evaluating temporal data transformations associated with technology resource components across iterations of technology applications for maintaining backward compatibility. The system comprises an execution module structured for executing technology resource components in a plurality of testing technology environments concurrently. The system further comprises an analysis module structured for evaluating iterations of a first technology resource component by comparing the transformed first testing output with the transformed second testing output to determine modifications to the first iteration of the first technology resource component in the second iteration of the first technology resource component that succeeds the first iteration.

System for software compiler integrity verification

Systems, computer program products, and methods are described herein for software compiler integrity verification. The present invention is configured to retrieve, from a source code repository, a source code; process, using a first build machine, the source code into a first object code; process, using a second build machine, the source code into a second object code; initiate an integrity verification engine on the first object code and the second object code; decompile, using the integrity verification engine, the first object code to create a first decompiled object code and the second object code to create a second decompiled object code; compare the first decompiled object code with the second decompiled object code; determine a match between the first decompiled object code and the second decompiled object code; and transmit an approval notification.

System for software compiler integrity verification

Systems, computer program products, and methods are described herein for software compiler integrity verification. The present invention is configured to retrieve, from a source code repository, a source code; process, using a first build machine, the source code into a first object code; process, using a second build machine, the source code into a second object code; initiate an integrity verification engine on the first object code and the second object code; decompile, using the integrity verification engine, the first object code to create a first decompiled object code and the second object code to create a second decompiled object code; compare the first decompiled object code with the second decompiled object code; determine a match between the first decompiled object code and the second decompiled object code; and transmit an approval notification.

Methods, controllers, and machine-readable storage media for automated commissioning of equipment

Tools and techniques are described to automate commissioning of physical spaces. Controllers have access to databases of the devices that are controlled by them, including wiring diagrams and protocols, such that the controller can automatically check that each wire responds correctly to stimulus from the controller. Controllers also have access to databases of the physical space such that they can check that sensors in the space record the correct information for device activity, and sensors can cross-check each other for consistency. Once a physical space is commissioned, incentives can be sought based on commissioning results.

Methods, controllers, and machine-readable storage media for automated commissioning of equipment

Tools and techniques are described to automate commissioning of physical spaces. Controllers have access to databases of the devices that are controlled by them, including wiring diagrams and protocols, such that the controller can automatically check that each wire responds correctly to stimulus from the controller. Controllers also have access to databases of the physical space such that they can check that sensors in the space record the correct information for device activity, and sensors can cross-check each other for consistency. Once a physical space is commissioned, incentives can be sought based on commissioning results.

Application Code Hiding Apparatus by Modifying Code in Memory and Method of Hiding Application Code Using the Same

An application code hiding apparatus includes a secret code dividing part, a secret code caller generating part, a code analyzing part, a dummy code generating part, a code encrypting part, a code disposing part, a code decryptor generating part, a disposed code importer generating part, a code loader generating part, a memory inner code modifier generating part and a decrypted code caller generating part.

CODE PROCESSING METHOD, APPARATUS, AND DEVICE
20230236814 · 2023-07-27 ·

A code processing method includes: obtaining first code, where the first code is code that is obtained through compilation and that is applicable to a source platform; then relocating addresses of variables associated with functions in the first code, to obtain logical addresses of the variables; and then performing decompilation based on the logical addresses of the variables and the first code, to obtain second code applicable to a target platform.

CODE PROCESSING METHOD, APPARATUS, AND DEVICE
20230236814 · 2023-07-27 ·

A code processing method includes: obtaining first code, where the first code is code that is obtained through compilation and that is applicable to a source platform; then relocating addresses of variables associated with functions in the first code, to obtain logical addresses of the variables; and then performing decompilation based on the logical addresses of the variables and the first code, to obtain second code applicable to a target platform.

MACHINE LEARNING (ML) MODEL-BASED COMPILER
20230236813 · 2023-07-27 ·

Systems and methods are provided for implementing a machine learning (ML) model based compiler, language translator, and/or a decompiler. For example, the system may receive a first source code in a first programming language, tokenize the first source code file forming tokenized code, generate a sequence vector of tokenized code, and provide the sequence vector of tokenized code as input to a trained ML model compiler. The output of the trained ML model compiler may create a second executable file or the source code in a second programming language.