Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

32 results about "Code audit" patented technology

A software code audit is a comprehensive analysis of source code in a programming project with the intent of discovering bugs, security breaches or violations of programming conventions. It is an integral part of the defensive programming paradigm, which attempts to reduce errors before the software is released. C and C++ source code is the most common code to be audited since many higher-level languages, such as Python, have fewer potentially vulnerable functions (e.g., functions that do not check bounds).

Fine-grained source code vulnerability detection method based on graph neural network

The invention discloses a fine-grained source code vulnerability detection method based on a graph neural network, which comprises the following steps: A, for all source codes of software, extractinga code attribute graph of a function in the source codes, and performing vectorization representation on the code attribute graph, the vectorization representation comprising vectorization representation of node attributes and graph structures; B, extracting code features by using a graph attention network, and processing all statements to obtain a final data set; and C, training a vulnerability detection model, and determining a final model through the effect on the test set. The source code vulnerability detection method provided by the invention has the advantages that the automation degreeis higher; dependence on domain expert knowledge is reduced, code auditing cost is greatly saved, code auditing efficiency is improved, grammar and semantic information in source codes are better reserved, meanwhile, vectorized representation of statements can be learned purposefully through a graph attention network, and vulnerability detection of a finer-grained statement level is achieved.
Owner:SUN YAT SEN UNIV

System and method for implementing a code audit tool

PendingUS20210406004A1Improve code health determinationGood for healthReverse engineeringSoftware metricsSecurity metricMaintainability
An embodiment of the present invention is directed to a code audit tool that intelligently analyzes and profiles code, such as Python code, based on a variety of previously unmeasured factors and metrics including a set of software dimensions, such as Algorithmic Complexities; Software Sizing Metrics; Anti-Pattern Implementations; Maintainability Metrics; Dependency Mappings; Runtime Metrics; Testing Metrics; and Security Metrics. Once this analysis is complete, a standardized report card or other scoring interface may be generated. This may include analytical findings as well as suggestions and recommend steps so that developers can make informed decisions, enhance their code bases and improve the score assigned to their code.
Owner:JPMORGAN CHASE BANK NA

Code auditing method and device, electronic equipment and medium

The invention relates to the technical field of artificial intelligence, and provides a code auditing method and device. The code auditing method comprises the following steps: acquiring a to-be-detected first code fragment; processing the first code snippet to obtain a first code attribute graph corresponding to the first code snippet; inputting the first code attribute graph into a code auditingmodel, wherein the code auditing model is a machine learning model obtained by training based on N second code attribute graphs corresponding to N second code snippets and N third code attribute graphs corresponding to N third code snippets; wherein the second code snippets are code snippets with bugs, and the third code snippets are code snippets obtained after bugs in the second code snippets are repaired; and obtaining an output of the code auditing model to obtain a detection result of auditing the first code snippet. The invention further provides a training method and device of the codeauditing module, electronic equipment and a medium.
Owner:INDUSTRIAL AND COMMERCIAL BANK OF CHINA

Code scanning result processing method and device, computer equipment and storage medium

The invention discloses a code scanning result processing method and a device, computer equipment and a storage medium. The method comprises the steps of pulling system scanning data of a report management center in a timed task mode, and the system scanning data comprise version data and vulnerability data; performing aging verification on the version data to obtain a verification result; if theverification result is that the verification is passed, obtaining vulnerability data corresponding to the version data; performing quantitative analysis on the vulnerability data, and performing calculation to obtain a risk coefficient of the vulnerability data; if the risk coefficient is smaller than or equal to a preset coefficient threshold, generating necessary parameters of system scanning data by using PORTAL; performing code scanning on the necessary parameters in a code auditing mode, and obtaining a code scanning processing result. According to the code scanning result processing method, the comprehensive integrity of vulnerability repair can be guaranteed, and the efficiency and safety of code scanning processing result processing are improved.
Owner:PING AN TECH (SHENZHEN) CO LTD

Code auditing method for particle swarm optimization based on bubble sort

The invention discloses a code auditing method for particle swarm optimization based on bubble sort. The method includes: initializing a particle swarm; testing a path and calculating a fitness function value; on the basis of using a feasible rule for constraint solution, dividing the particle swarm into feasible particles and infeasible particles, and putting the feasible particles and the infeasible particles into two vessels; retaining infeasible particles low in violation degree on the basis of the bubble sort, and putting the retained infeasible particles in the feasible particle swarm to solve the problem that a global optimal point is positioned close to a constrained boundary; finally working out a shortest path of defected codes to avoid the problem of proneness to fall into premature convergence when particle swarm optimization is applicable to code audit aiming at paths.
Owner:BEIJING SAFE CODE TECH

Code auditing method and device based on knowledge graph

The invention discloses a code auditing method and device based on a knowledge graph, is used for meeting the code auditing requirement of a distributed system, and is suitable for a multi-level and multi-granularity code auditing scene. The method comprises the steps of obtaining a to-be-audited first code segment from a source code library of a distributed system; extracting first knowledge having a logical relationship with a first entity corresponding to the first code segment from a first knowledge graph corresponding to a source code library, wherein the first knowledge comprises a second entity having a logical relationship with the first entity and a logical relationship between the first entity and the second entity; wherein the first knowledge graph is used for describing a logicrelationship between entities corresponding to different code segments included in a source code library; and generating a first audit report, wherein the first audit report is used for describing the first knowledge.
Owner:QINGDAO HISENSE SMART HOME SYST CO LTD

Automatic code auditing method, system and device and storage medium

PendingCN111078577AAdapt to the lack of independent research and development capabilitiesAdapt to the situationSoftware testing/debuggingEngineeringInformation security
The invention discloses an automatic code auditing method, system and device and a storage medium, and the method comprises the steps: traversing a to-be-audited code package directory, and obtaininga to-be-audited code package; creating a to-be-audited code packet queue, and adding the obtained to-be-audited code packet into the to-be-audited code packet queue; calling a code auditing tool to audit the to-be-audited code packets in the to-be-audited code packet queue to generate an auditing report; and outputting the auditing report to an output directory, and uploading the auditing report to a server. According to the invention, the to-be-audited code packet is obtained by traversing the to-be-audited code packet directory, and the to-be-audited code packet queue is created, so that mistakes and omissions are avoided; automatic code auditing is achieved by calling a code auditing tool, the achieving method is simple, the cost is low, and the method is suitable for the situations that independent research and development capacity of entrepreneurship companies and small enterprises is insufficient, and budget investment is insufficient. The method can be widely applied to the technical field of information security.
Owner:易票联支付有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products