DETECTING MALWARE USING REVISION CONTROL LOGS

Methods, systems, computer-readable media, and apparatuses for detecting malware using revision control logs are presented. In some embodiments, a computing device may gather one or more revision control logs, and the one or more revision control logs may identify one or more code changes. Subsequen...

Full description

Saved in:
Bibliographic Details
Main Authors FOLEY ALEXANDER G, LANGSAM PETER J, READ RONALD
Format Patent
LanguageEnglish
Published 05.03.2015
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Methods, systems, computer-readable media, and apparatuses for detecting malware using revision control logs are presented. In some embodiments, a computing device may gather one or more revision control logs, and the one or more revision control logs may identify one or more code changes. Subsequently, the computing device may determine, based on one or more risk factors, that at least one code change identified in the one or more revision control logs is potentially malicious. Based on determining that the at least one code change is potentially malicious, the computing device may generate a notification indicating that the at least one code change is potentially malicious.
Bibliography:Application Number: US201314014754