18557539. PAYLOAD DATA REMOVAL FROM EXECUTION TRACES simplified abstract (Microsoft Technology Licensing, LLC)

From WikiPatents
Jump to navigation Jump to search

PAYLOAD DATA REMOVAL FROM EXECUTION TRACES

Organization Name

Microsoft Technology Licensing, LLC

Inventor(s)

Jordi Mola of Bellevue WA (US)

PAYLOAD DATA REMOVAL FROM EXECUTION TRACES - A simplified explanation of the abstract

This abstract first appeared for US patent application 18557539 titled 'PAYLOAD DATA REMOVAL FROM EXECUTION TRACES

The patent application describes a method for removing payload data from an execution trace by identifying the payload data item, determining constraints placed on it by executable code, and replacing the value of the payload data item with information maintaining those constraints.

  • Identification of payload data item within an execution trace
  • Determination of constraints placed on the payload data item by executable code
  • Replacement of payload data item value with information preserving constraints
  • Information maintaining constraints can include bytes of executable code, memory addresses, or data structured to preserve code flow
  • Preservation of code flow through replacement values, valid value specifications, or instructions for code paths

Potential Applications: - Data security and privacy protection in software systems - Debugging and analysis of software execution traces - Optimization of code performance by removing unnecessary payload data

Problems Solved: - Ensuring data privacy by removing sensitive information from execution traces - Streamlining software analysis by focusing on relevant code interactions - Enhancing code performance by eliminating unnecessary payload data

Benefits: - Improved data security and privacy compliance - Enhanced software debugging and analysis capabilities - Increased code performance and efficiency

Commercial Applications: Title: Data Security and Performance Optimization Software Tool This technology can be utilized in cybersecurity software, software development tools, and performance optimization solutions for various industries such as finance, healthcare, and technology.

Questions about the technology: 1. How does this method enhance data security in software systems? 2. What are the potential implications of using this technology in software development processes?


Original Abstract Submitted

Removing payload data from an execution trace. Embodiments identify a pay load data item within an execution trace, identify particular executable code that interacted with the payload data item, and determine constraint(s) that execution of the particular executable code has placed on the pay load data item. Embodiments then replace a value of the payload data item in the execution trace with information maintaining the constraint(s). Examples of information maintaining the constraint(s) include one or more bytes of the particular executable code. a memory address corresponding to the pay load data item, and data structured to preserve code flow-such as a replacement value for the pay load data item, a specification of a set of one or more valid values for the pay load data item, or an instruction of a code path to follow in the particular executable code.