-
公开(公告)号:US11822920B1
公开(公告)日:2023-11-21
申请号:US17314892
申请日:2021-05-07
Applicant: Stripe, Inc.
Inventor: Richard Healey
CPC classification number: G06F8/74 , G06F8/53 , G06F9/45504 , G06F21/14
Abstract: In embodiments, methods and systems for implementing source code extraction are provided. Source code extraction facilitates processing obfuscated byte code and extracting source code representations of original source code of applications. Source code extraction is implemented based on leveraging and monitoring an interpreter (e.g., a software interpreter running on a virtual machine) when portions of obfuscated byte code (i.e., obfuscated compiled version of source code) are loaded or executed using the interpreter. In operation, the obfuscated byte code is accessed at the interpreter. The interpreter, processing the obfuscated byte code, is monitored using a source code extraction manager that supports instrumentation instances associated with functions of the obfuscated byte code. Instruction sequences of functions that the interpreter is processing are recorded using the source code extraction manager. Source code representations are generated based on the instruction sequences that are recorded while monitoring the functions that are processed by the interpreter.
-
公开(公告)号:US10394554B1
公开(公告)日:2019-08-27
申请号:US15699716
申请日:2017-09-08
Applicant: Stripe, Inc.
Inventor: Richard Healey
Abstract: In embodiments, methods and systems for implementing source code extraction are provided. Source code extraction facilitates processing obfuscated byte code and extracting source code representations of original source code of applications. Source code extraction is implemented based on leveraging and monitoring an interpreter (e.g., a software interpreter running on a virtual machine) when portions of obfuscated byte code (i.e., obfuscated compiled version of source code) are loaded or executed using the interpreter. In operation, the obfuscated byte code is accessed at the interpreter. The interpreter, processing the obfuscated byte code, is monitored using a source code extraction manager that supports instrumentation instances associated with functions of the obfuscated byte code. Instruction sequences of functions that the interpreter is processing are recorded using the source code extraction manager. Source code representations are generated based on the instruction sequences that are recorded while monitoring the functions that are processed by the interpreter.
-
公开(公告)号:US11003443B1
公开(公告)日:2021-05-11
申请号:US16542108
申请日:2019-08-15
Applicant: Stripe, Inc.
Inventor: Richard Healey
Abstract: In embodiments, methods and systems for implementing source code extraction are provided. Source code extraction facilitates processing obfuscated byte code and extracting source code representations of original source code of applications. Source code extraction is implemented based on leveraging and monitoring an interpreter (e.g., a software interpreter running on a virtual machine) when portions of obfuscated byte code (i.e., obfuscated compiled version of source code) are loaded or executed using the interpreter. In operation, the obfuscated byte code is accessed at the interpreter. The interpreter, processing the obfuscated byte code, is monitored using a source code extraction manager that supports instrumentation instances associated with functions of the obfuscated byte code. Instruction sequences of functions that the interpreter is processing are recorded using the source code extraction manager. Source code representations are generated based on the instruction sequences that are recorded while monitoring the functions that are processed by the interpreter.
-
公开(公告)号:US10484427B2
公开(公告)日:2019-11-19
申请号:US15207217
申请日:2016-07-11
Applicant: Stripe Inc.
Inventor: Richard Healey , Andrew Brody
Abstract: In embodiments, methods and systems for implementing configuration management are provided. A configuration management system facilitates processing and preserving configurations associated with a software infrastructure. The software infrastructure operates as a co-located environment, high availability environment, disaster recovery environment or migration environment. The configuration management system specifically maintains implementation of firewall configurations for a source computing environment and a destination computing environment. The source computing environment communicates with the destination computing environment using a communication channel via an untrusted network. The configuration management system includes a leader component that accesses the firewall configurations, from the source computing environment, transforms the firewall configurations to a transformed version and communicates the transformed version to the destination computing environment. The configuration management system also includes a follower component that accesses and restores the transformed version into a restored version of the firewall configurations and implements the restored version at the destination computing environment.
-
公开(公告)号:US20180013791A1
公开(公告)日:2018-01-11
申请号:US15207217
申请日:2016-07-11
Applicant: Stripe Inc.
Inventor: Richard Healey , Andrew Brody
CPC classification number: H04L63/20 , H04L9/3247 , H04L41/0863 , H04L63/0218 , H04L63/0263 , H04L63/126 , H04L67/16
Abstract: In embodiments, methods and systems for implementing configuration management are provided. A configuration management system facilitates processing and preserving configurations associated with a software infrastructure. The software infrastructure operates as a co-located environment, high availability environment, disaster recovery environment or migration environment. The configuration management system specifically maintains implementation of firewall configurations for a source computing environment and a destination computing environment. The source computing environment communicates with the destination computing environment using a communication channel via an untrusted network. The configuration management system includes a leader component that accesses the firewall configurations, from the source computing environment, transforms the firewall configurations to a transformed version and communicates the transformed version to the destination computing environment. The configuration management system also includes a follower component that accesses and restores the transformed version into a restored version of the firewall configurations and implements the restored version at the destination computing environment.
-
-
-
-