International business machines corporation (20240119151). INVISIBLE TROJAN SOURCE CODE DETECTION simplified abstract

From WikiPatents
Jump to navigation Jump to search

INVISIBLE TROJAN SOURCE CODE DETECTION

Organization Name

international business machines corporation

Inventor(s)

Su Liu of Austin TX (US)

SARITHA Arunkumar

Boyi Tzen

Luis Osvaldo Pizana of Austin TX (US)

INVISIBLE TROJAN SOURCE CODE DETECTION - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240119151 titled 'INVISIBLE TROJAN SOURCE CODE DETECTION

Simplified Explanation

The abstract describes a computer implemented method for detecting problematic source code by comparing the source code with a rendered version of the code and taking actions based on the differences found.

  • The computer system loads the source code and a rendered version of the code into separate memories.
  • It then compares the two versions to determine any differences.
  • If problematic source code is detected, the system takes actions to address the issues.

Potential Applications

This technology could be used in software development to identify and address issues in source code before deployment. It could also be utilized in code review processes to improve code quality and efficiency.

Problems Solved

This technology helps to detect problematic source code, such as bugs or vulnerabilities, which can lead to software malfunctions or security breaches if left unaddressed. By identifying and fixing these issues early on, developers can improve the overall quality and reliability of their software.

Benefits

The benefits of this technology include improved code quality, enhanced software reliability, and increased security. By detecting and addressing problematic source code, developers can reduce the risk of software failures and security vulnerabilities.

Potential Commercial Applications

Potential commercial applications of this technology include software development tools, code analysis services, and quality assurance solutions. Companies in the tech industry could use this technology to streamline their development processes and deliver more reliable software products to their customers.

Possible Prior Art

One possible prior art for this technology could be static code analysis tools that are used to identify issues in source code without the need for executing the code. These tools have been around for some time and are commonly used in software development to improve code quality and maintainability.

Unanswered Questions

How does the system determine what actions to take in response to detecting problematic source code?

The abstract mentions that the system performs a set of actions with respect to the problematic source code, but it does not specify what these actions entail. Further details on the specific actions taken would provide a clearer understanding of how the system addresses the detected issues.

What level of granularity does the system use to detect differences between the source code and the rendered code?

It is not clear from the abstract how the system determines the differences between the source code and the rendered code. Understanding the level of granularity at which these differences are identified would help assess the accuracy and effectiveness of the detection process.


Original Abstract Submitted

a computer implemented method, apparatus, system, and computer program product detects a problematic source code. a computer system loads a source code into a first memory. the computer system loads a rendered source code into a second memory. the rendered source code is a rendered version of the source code. the computer system determines a difference between the source code in the first memory and the rendered source code in the second memory. the computer system determines whether a problematic source code is present within the source code using the difference. the computer system performs a set of actions with respect to the problematic source code in response to determining that the problematic source code is present in the source code. according to other illustrative embodiments, a computer system and a computer program product for detecting a problematic source code are provided.