17938174. INVISIBLE TROJAN SOURCE CODE DETECTION simplified abstract (International Business Machines Corporation)

From WikiPatents
Jump to navigation Jump to search

INVISIBLE TROJAN SOURCE CODE DETECTION

Organization Name

International Business Machines Corporation

Inventor(s)

Su Liu of Austin TX (US)

SARITHA Arunkumar

Boyi Tzen

Luis Osvaldo Pizana of Austin TX (US)

INVISIBLE TROJAN SOURCE CODE DETECTION - A simplified explanation of the abstract

This abstract first appeared for US patent application 17938174 titled 'INVISIBLE TROJAN SOURCE CODE DETECTION

Simplified Explanation

The abstract describes a computer implemented method for detecting problematic source code by comparing the source code with a rendered version of the code and taking actions based on the differences found.

  • Detects problematic source code by comparing source code with rendered version
  • Determines difference between source code and rendered source code
  • Identifies problematic source code based on the difference
  • Performs actions in response to detecting problematic source code

Potential Applications

This technology could be applied in software development and quality assurance processes to identify and address problematic source code efficiently.

Problems Solved

1. Efficient detection of problematic source code 2. Improved software quality and reliability

Benefits

1. Increased efficiency in identifying and addressing issues in source code 2. Enhanced software quality and reliability 3. Streamlined software development processes

Potential Commercial Applications

Optimizing software development processes, improving software quality assurance, and enhancing overall product reliability in various industries such as technology, finance, healthcare, and more.

Possible Prior Art

One possible prior art could be static code analysis tools that help identify potential issues in source code before execution.

What are the potential limitations of this technology?

How does this technology compare to existing solutions in the market?

Original Abstract Submitted

A computer implemented method, apparatus, system, and computer program product detects a problematic source code. A computer system loads a source code into a first memory. The computer system loads a rendered source code into a second memory. The rendered source code is a rendered version of the source code. The computer system determines a difference between the source code in the first memory and the rendered source code in the second memory. The computer system determines whether a problematic source code is present within the source code using the difference. The computer system performs a set of actions with respect to the problematic source code in response to determining that the problematic source code is present in the source code. According to other illustrative embodiments, a computer system and a computer program product for detecting a problematic source code are provided.