DETECTING MALWARE USING REVISION CONTROL LOGS

Methods, systems, computer-readable media, and apparatuses for detecting malware using revision control logs are presented. In some embodiments, a computing device may gather one or more revision control logs, and the one or more revision control logs may identify one or more code changes. Subsequen...

Full description

Saved in:
Bibliographic Details
Main Authors FOLEY ALEXANDER G, LANGSAM PETER J, READ RONALD
Format Patent
LanguageEnglish
Published 05.03.2015
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Methods, systems, computer-readable media, and apparatuses for detecting malware using revision control logs are presented. In some embodiments, a computing device may gather one or more revision control logs, and the one or more revision control logs may identify one or more code changes. Subsequently, the computing device may determine, based on one or more risk factors, that at least one code change identified in the one or more revision control logs is potentially malicious. Based on determining that the at least one code change is potentially malicious, the computing device may generate a notification indicating that the at least one code change is potentially malicious.
AbstractList Methods, systems, computer-readable media, and apparatuses for detecting malware using revision control logs are presented. In some embodiments, a computing device may gather one or more revision control logs, and the one or more revision control logs may identify one or more code changes. Subsequently, the computing device may determine, based on one or more risk factors, that at least one code change identified in the one or more revision control logs is potentially malicious. Based on determining that the at least one code change is potentially malicious, the computing device may generate a notification indicating that the at least one code change is potentially malicious.
Author LANGSAM PETER J
FOLEY ALEXANDER G
READ RONALD
Author_xml – fullname: FOLEY ALEXANDER G
– fullname: LANGSAM PETER J
– fullname: READ RONALD
BookMark eNrjYmDJy89L5WTQdXENcXUO8fRzV_B19Al3DHJVCA0G8YJcwzyDPf39FJz9_UKC_H0UfPzdg3kYWNMSc4pTeaE0N4Oym2uIs4duakF-fGpxQWJyal5qSXxosJGBoamBmbmFmaGjoTFxqgBgZyhZ
ContentType Patent
DBID EVB
DatabaseName esp@cenet
DatabaseTitleList
Database_xml – sequence: 1
  dbid: EVB
  name: esp@cenet
  url: http://worldwide.espacenet.com/singleLineSearch?locale=en_EP
  sourceTypes: Open Access Repository
DeliveryMethod fulltext_linktorsrc
Discipline Medicine
Chemistry
Sciences
Physics
ExternalDocumentID US2015067861A1
GroupedDBID EVB
ID FETCH-epo_espacenet_US2015067861A13
IEDL.DBID EVB
IngestDate Fri Jul 19 12:05:02 EDT 2024
IsOpenAccess true
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-epo_espacenet_US2015067861A13
Notes Application Number: US201314014754
OpenAccessLink https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20150305&DB=EPODOC&CC=US&NR=2015067861A1
ParticipantIDs epo_espacenet_US2015067861A1
PublicationCentury 2000
PublicationDate 20150305
PublicationDateYYYYMMDD 2015-03-05
PublicationDate_xml – month: 03
  year: 2015
  text: 20150305
  day: 05
PublicationDecade 2010
PublicationYear 2015
RelatedCompanies BANK OF AMERICA CORPORATION
RelatedCompanies_xml – name: BANK OF AMERICA CORPORATION
Score 2.9687426
Snippet Methods, systems, computer-readable media, and apparatuses for detecting malware using revision control logs are presented. In some embodiments, a computing...
SourceID epo
SourceType Open Access Repository
SubjectTerms CALCULATING
COMPUTING
COUNTING
ELECTRIC COMMUNICATION TECHNIQUE
ELECTRIC DIGITAL DATA PROCESSING
ELECTRICITY
PHYSICS
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
Title DETECTING MALWARE USING REVISION CONTROL LOGS
URI https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20150305&DB=EPODOC&locale=&CC=US&NR=2015067861A1
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LS8NAEB5Kfd40KlWrBJTcgrXNQw9B0s2jSpqUPLS3ks0DBEmLifj3nV1T7anH3YFhd9iZnd399huA20xLc6qlVB6U2VBWynIkU11JZZabUl0tGac5Q1v42iRRXubqvAMf678wnCf0m5Mjokdl6O8Nj9er_0ssi2Mr6zv6jl3LJyc2LKk9HWN2g-tXssaGPQusgEiEGEkk-eGvDAOzdm_iWWmHJdKMad9-HbN_KavNTcU5gt0Z6quaY-gUlQAHZF17TYD9afvkLcAex2hmNXa2flifgGzZsU3iZ98Vp6b3Zoa2yOpnuCIDO7DwKJLAj8PAE73AjU7hxrFjMpFxBIu_CS-SaHO4ozPoVsuq6IGIdlVpnqdZWuhKQSkdajmrE_2YYqIyeMjPob9N08V28SUcsiZHWKl96DafX8UVbrkNveaW-gGZyICS
link.rule.ids 230,309,786,891,25594,76906
linkProvider European Patent Office
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LTwIxEJ4QfOBNUYOKuolmb40I-9ADMdB9gC67ZHdRbqTdR2JiFiJr_PtOKygnrjPJpG0602n7zTcAt4nBUm4wTlp50iZanncINzVGRG7KTT0XnOYCbeEbg4n2PNWnFfhY18JIntBvSY6IHpWgv5cyXi_-H7Esia1c3vF3FM2fnLhrqavbMWY3uH9Vq9-1x4EVUJXS7iRS_fBXh4HZuO_hXWnHFPy8Inl67Yu6lMXmoeIcwu4Y7RXlEVSyog41uu69Vof90erLuw57EqOZLFG48sPlMRDLjm0aD31XGfW8t15oK6J_hqsIsIMIjwoN_DgMPMUL3OgEbhw7pgOCI5j9TXg2iTaH2zmFajEvsgYouK46T1OWsMzUMs5520hFn-hHholK6yE9g-Y2S-fb1ddQG8Qjb-YN_ZcLOBAqibbSm1AtP7-ySzx-S34lV-0HxY2Dfw
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Apatent&rft.title=DETECTING+MALWARE+USING+REVISION+CONTROL+LOGS&rft.inventor=FOLEY+ALEXANDER+G&rft.inventor=LANGSAM+PETER+J&rft.inventor=READ+RONALD&rft.date=2015-03-05&rft.externalDBID=A1&rft.externalDocID=US2015067861A1