Identifying security risks in code using security metric comparison
An example system includes a processor to receive a source code and history information, wherein the history information includes a version control history or a defect history, or a combination of the version control history and the defect history. The processor is to also divide the source code int...
Saved in:
Main Authors | , , |
---|---|
Format | Patent |
Language | English |
Published |
09.06.2020
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | An example system includes a processor to receive a source code and history information, wherein the history information includes a version control history or a defect history, or a combination of the version control history and the defect history. The processor is to also divide the source code into security-related components and security-non-related components. The processor is to further calculate security metrics for each of the security-related components and each of the security-non-related components based on the history information. The processor is also to compare the security metrics of the security-related components with the security metrics of the security-non-related components. The processor is to further generate a visual representation comprising a highlighted area of concern based on the comparison. |
---|---|
AbstractList | An example system includes a processor to receive a source code and history information, wherein the history information includes a version control history or a defect history, or a combination of the version control history and the defect history. The processor is to also divide the source code into security-related components and security-non-related components. The processor is to further calculate security metrics for each of the security-related components and each of the security-non-related components based on the history information. The processor is also to compare the security metrics of the security-related components with the security metrics of the security-non-related components. The processor is to further generate a visual representation comprising a highlighted area of concern based on the comparison. |
Author | Raz, Orna Derobertis, Christopher V Brodie, Aharon |
Author_xml | – fullname: Raz, Orna – fullname: Brodie, Aharon – fullname: Derobertis, Christopher V |
BookMark | eNrjYmDJy89L5WRw9kxJzSvJTKvMzEtXKE5NLi3KLKlUKMoszi5WyMxTSM5PSVUoLUaRzE0tKcpMBkrlFiQCFebn8TCwpiXmFKfyQmluBkU31xBnD93Ugvz41OKCxOTUvNSS-NBgQwMzcwtLIzMnI2Ni1AAA6HA1Fw |
ContentType | Patent |
DBID | EVB |
DatabaseName | esp@cenet |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: EVB name: esp@cenet url: http://worldwide.espacenet.com/singleLineSearch?locale=en_EP sourceTypes: Open Access Repository |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Medicine Chemistry Sciences Physics |
ExternalDocumentID | US10678926B2 |
GroupedDBID | EVB |
ID | FETCH-epo_espacenet_US10678926B23 |
IEDL.DBID | EVB |
IngestDate | Fri Jul 19 15:04:31 EDT 2024 |
IsOpenAccess | true |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-epo_espacenet_US10678926B23 |
Notes | Application Number: US201715401118 |
OpenAccessLink | https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20200609&DB=EPODOC&CC=US&NR=10678926B2 |
ParticipantIDs | epo_espacenet_US10678926B2 |
PublicationCentury | 2000 |
PublicationDate | 20200609 |
PublicationDateYYYYMMDD | 2020-06-09 |
PublicationDate_xml | – month: 06 year: 2020 text: 20200609 day: 09 |
PublicationDecade | 2020 |
PublicationYear | 2020 |
RelatedCompanies | International Business Machines Corporation |
RelatedCompanies_xml | – name: International Business Machines Corporation |
Score | 3.2725625 |
Snippet | An example system includes a processor to receive a source code and history information, wherein the history information includes a version control history or... |
SourceID | epo |
SourceType | Open Access Repository |
SubjectTerms | CALCULATING COMPUTING COUNTING ELECTRIC COMMUNICATION TECHNIQUE ELECTRIC DIGITAL DATA PROCESSING ELECTRICITY PHYSICS TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
Title | Identifying security risks in code using security metric comparison |
URI | https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20200609&DB=EPODOC&locale=&CC=US&NR=10678926B2 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1bS8MwFD6MeX3Tqui8EEH6Vsxc2tmHIjRtGcIuuFX2NtKYwgS7YSv-fU9id3nR1wRCcuDknJN833cA7nLMsVnmUactlXAYY7kjsG5wXCaExPRBuIYh1x94vZQ9T91pA95XXBijE_ptxBHRoyT6e2Xu6-XmESsy2MryPpvj0OIpmQSRXVfHuj6mvh2FQTwaRkNucx6kY3vwEmiltEf_wQvxut7BNLqrvSF-DTUrZbkdUpIj2B3hakV1DA1VWHDAV53XLNjv1x_eFuwZhKYscbD2wvIE-C-71jCUSFk3oCMaJF6SeUE0S51oPPvW5IdunCWJXHcdPIXbJJ7wnoP7mq2NMEvHmyN0zqBZLAp1DoTmb0ayq511KcYjIXLPoxLLPqW16Ri7gNbf67T-m7yEQ21QA4vyr6BZfX6pawzAVXZjLPcDDDWKUw |
link.rule.ids | 230,309,783,888,25576,76876 |
linkProvider | European Patent Office |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3dS8MwED_G_JhvWhWdXxGkb8Vupp19KELTlaprN9wmextpbGGC3bAV_30vsft40dcEQnJwubvk9_sdwE2GOTZNbNNoiZQblNLM4Fg3GBblXGD6wC3FkItiOxzTp4k1qcH7kgujdEK_lTgiepRAfy_Vfb1YP2L5CltZ3CYzHJo_BCPX16vqWNbHpqP7ntsd9P0-0xlzx0M9fnGlUtq907Y9vK63MMXuSG_ovnqSlbLYDCnBPmwPcLW8PIBammvQYMvOaxrsRtWHtwY7CqEpChysvLA4BPbLrlUMJVJUDeiIBIkXZJYTyVInEs--MfkhG2cJIlZdB4_gOuiOWGjgvqYrI0zHw_UR7o6hns_z9ASImb0pya5W0jExHnGe2bYpsOxLpTYdpafQ_Hud5n-TV9AIR1Fv2nuMn89gTxpXQaScc6iXn1_pBQbjMrlUVvwBtOeNRg |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Apatent&rft.title=Identifying+security+risks+in+code+using+security+metric+comparison&rft.inventor=Raz%2C+Orna&rft.inventor=Brodie%2C+Aharon&rft.inventor=Derobertis%2C+Christopher+V&rft.date=2020-06-09&rft.externalDBID=B2&rft.externalDocID=US10678926B2 |