DETECTING MALWARE USING REVISION CONTROL LOGS
Methods, systems, computer-readable media, and apparatuses for detecting malware using revision control logs are presented. In some embodiments, a computing device may gather one or more revision control logs, and the one or more revision control logs may identify one or more code changes. Subsequen...
Saved in:
Main Authors | , , |
---|---|
Format | Patent |
Language | English |
Published |
05.03.2015
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Methods, systems, computer-readable media, and apparatuses for detecting malware using revision control logs are presented. In some embodiments, a computing device may gather one or more revision control logs, and the one or more revision control logs may identify one or more code changes. Subsequently, the computing device may determine, based on one or more risk factors, that at least one code change identified in the one or more revision control logs is potentially malicious. Based on determining that the at least one code change is potentially malicious, the computing device may generate a notification indicating that the at least one code change is potentially malicious. |
---|---|
Bibliography: | Application Number: US201314014754 |