Detecting malware using revision control logs

Methods, systems, computer-readable media, and apparatuses for detecting malware using revision control logs are presented. In some embodiments, a computing device may gather one or more revision control logs, and the one or more revision control logs may identify one or more code changes. Subsequen...

Full description

Saved in:
Bibliographic Details
Main Authors FOLEY ALEXANDER G, LANGSAM PETER J, READ RONALD
Format Patent
LanguageEnglish
Published 27.10.2015
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Methods, systems, computer-readable media, and apparatuses for detecting malware using revision control logs are presented. In some embodiments, a computing device may gather one or more revision control logs, and the one or more revision control logs may identify one or more code changes. Subsequently, the computing device may determine, based on one or more risk factors, that at least one code change identified in the one or more revision control logs is potentially malicious. Based on determining that the at least one code change is potentially malicious, the computing device may generate a notification indicating that the at least one code change is potentially malicious.
AbstractList Methods, systems, computer-readable media, and apparatuses for detecting malware using revision control logs are presented. In some embodiments, a computing device may gather one or more revision control logs, and the one or more revision control logs may identify one or more code changes. Subsequently, the computing device may determine, based on one or more risk factors, that at least one code change identified in the one or more revision control logs is potentially malicious. Based on determining that the at least one code change is potentially malicious, the computing device may generate a notification indicating that the at least one code change is potentially malicious.
Author LANGSAM PETER J
FOLEY ALEXANDER G
READ RONALD
Author_xml – fullname: FOLEY ALEXANDER G
– fullname: LANGSAM PETER J
– fullname: READ RONALD
BookMark eNrjYmDJy89L5WTQdUktSU0uycxLV8hNzClPLEpVKC0G8YpSyzKLM_PzFJLz80qK8nMUcvLTi3kYWNMSc4pTeaE0N4OCm2uIs4duakF-fGpxQWJyal5qSXxosKWhuZG5kYGTkTERSgCNRSwH
ContentType Patent
DBID EVB
DatabaseName esp@cenet
DatabaseTitleList
Database_xml – sequence: 1
  dbid: EVB
  name: esp@cenet
  url: http://worldwide.espacenet.com/singleLineSearch?locale=en_EP
  sourceTypes: Open Access Repository
DeliveryMethod fulltext_linktorsrc
Discipline Medicine
Chemistry
Sciences
Physics
ExternalDocumentID US9172720B2
GroupedDBID EVB
ID FETCH-epo_espacenet_US9172720B23
IEDL.DBID EVB
IngestDate Fri Jul 19 11:50:01 EDT 2024
IsOpenAccess true
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-epo_espacenet_US9172720B23
Notes Application Number: US201314014754
OpenAccessLink https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20151027&DB=EPODOC&CC=US&NR=9172720B2
ParticipantIDs epo_espacenet_US9172720B2
PublicationCentury 2000
PublicationDate 20151027
PublicationDateYYYYMMDD 2015-10-27
PublicationDate_xml – month: 10
  year: 2015
  text: 20151027
  day: 27
PublicationDecade 2010
PublicationYear 2015
RelatedCompanies BANK OF AMERICA CORPORATION
RelatedCompanies_xml – name: BANK OF AMERICA CORPORATION
Score 3.0015671
Snippet Methods, systems, computer-readable media, and apparatuses for detecting malware using revision control logs are presented. In some embodiments, a computing...
SourceID epo
SourceType Open Access Repository
SubjectTerms CALCULATING
COMPUTING
COUNTING
ELECTRIC COMMUNICATION TECHNIQUE
ELECTRIC DIGITAL DATA PROCESSING
ELECTRICITY
PHYSICS
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
Title Detecting malware using revision control logs
URI https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20151027&DB=EPODOC&locale=&CC=US&NR=9172720B2
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LS8NAEB5Kfd40KtYXe5Dcgua1bQ5ByIsi9IFtpLeym2xLQdOSRPr3nV3S6kWvszDMDsw3MzuPBXjklHHHEtwQFMM3x809w-tmuUEXvYWMCGxmygHnwZD2U-d15s5asNrNwqg9oVu1HBEtKkN7rxVeb34esSLVW1k98RWS1i_J1I_0JjtG94Vplh4FfjweRaNQD0M_nejDN98zVcUxQLQ-kFG0XLMfvwdyKGXz26MkZ3A4RmZFfQ4tUWhwEu4-XtPgeNDUuzU4Ug2aWYXExgirCzBQNAlTxZJ8so8tKwWR3etLUjaT4qTpPyeIa9UlkCSehn0DJZjvbztPJ3tZ7StoF-tCXAOx8mfGbGrTvOeiP6HMdRnjXCzcjHlZZnag8yebm3_ObuFUqk2isdW9g3Zdfol7dLM1f1AK-gb1N4KG
link.rule.ids 230,309,786,891,25594,76906
linkProvider European Patent Office
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LS8NAEB5KfdSbRsX63IPkFrR5bJtDEJq0RO0L20pvYTfZlIKmpYn07zu7pNWLXmdhmB2Yb2Z2Hgtwzynjtim4ISiGb7aTuIbbjBODpq1URgQWa8gB5_6AhlP7ZebMKrDYzsKoPaEbtRwRLSpGey8UXq9-HrEC1VuZP_AFkpZP3YkX6GV2jO4L0yw9aHud0TAY-rrve9OxPnjz3IaqOLYRrfeacjmvjJze23IoZfXbo3SPYX-EzLLiBCoi06Dmbz9e0-CwX9a7NThQDZpxjsTSCPNTMFA0CVPZnHyyjw1bCyK71-dkXU6Kk7L_nCCu5WdAup2JHxooQbS7bTQd72S1zqGaLTNxAcRMHhmzqEWTloP-hDLHYYxzkToxc-O4UYf6n2wu_zm7g1o46fei3vPg9QqOpAolMpvNa6gW6y9xgy634LdKWd84SIVz
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Apatent&rft.title=Detecting+malware+using+revision+control+logs&rft.inventor=FOLEY+ALEXANDER+G&rft.inventor=LANGSAM+PETER+J&rft.inventor=READ+RONALD&rft.date=2015-10-27&rft.externalDBID=B2&rft.externalDocID=US9172720B2