-
公开(公告)号:US20200150951A1
公开(公告)日:2020-05-14
申请号:US16740619
申请日:2020-01-13
Applicant: Architecture Technology Corporation
Inventor: Colleen Kimball , Katey Huddleston , Paul Nicotera
Abstract: A computer-implemented method includes creating, by a computing device, an abstract syntax tree based on a source code file of a software application, the source code file including source code defining operations of the software application. The method also includes traversing, by the computing device, the abstract syntax tree. The method further includes identifying, by the computing device and based on the traversing of the abstract syntax tree, one or more code violations present in the source code. The method also includes generating, by the computing device, at least one refactoring option for the one or more code violations, each refactoring option of the at least one refactoring option representing a change to the source code file that is configured to remediate the associated code violation.
-
2.
公开(公告)号:US11010472B1
公开(公告)日:2021-05-18
申请号:US16168722
申请日:2018-10-23
Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
Inventor: Judson Powers , Katey Huddleston
Abstract: Disclosed herein are embodiments of systems, methods, and products providing real-time anti-malware detection and protection. The computer uses artificial intelligence techniques to learn and detect new exploits in real time and protect the full system from harm. The computer trains a first machine learning model for executable files. The computer trains a second machine learning model for non-executable files. The computer trains a third machine learning model for network traffic. The computer identifies malware using the various machine learning models. The computer restores to a clean, uncorrupted state using virtual machine technology. The computer reports the detected malware to a security server, such as security information and even management (SIEM) systems, by transmitting detection alert message regarding the malware. The computer interacts with an administrative system over an isolated control network to allow the system administrator to correct the corruption caused by the malware.
-
公开(公告)号:US10534604B1
公开(公告)日:2020-01-14
申请号:US15926912
申请日:2018-03-20
Applicant: Architecture Technology Corporation
Inventor: Colleen Kimball , Katey Huddleston , Paul Nicotera
Abstract: A computer-implemented method includes creating, by a computing device, an abstract syntax tree based on a source code file of a software application, the source code file including source code defining operations of the software application. The method also includes traversing, by the computing device, the abstract syntax tree. The method further includes identifying, by the computing device and based on the traversing of the abstract syntax tree, one or more code violations present in the source code. The method also includes generating, by the computing device, at least one refactoring option for the one or more code violations, each refactoring option of the at least one refactoring option representing a change to the source code file that is configured to remediate the associated code violation.
-
4.
公开(公告)号:US11675904B1
公开(公告)日:2023-06-13
申请号:US17322498
申请日:2021-05-17
Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
Inventor: Judson Powers , Katey Huddleston
CPC classification number: G06F21/566 , G06F9/45558 , G06K9/6282 , G06N20/00 , H04L63/1416 , G06F2009/45591
Abstract: Disclosed herein are embodiments of systems, methods, and products providing real-time anti-malware detection and protection. The computer uses artificial intelligence techniques to learn and detect new exploits in real time and protect the full system from harm. The computer trains a first machine learning model for executable files. The computer trains a second machine learning model for non-executable files. The computer trains a third machine learning model for network traffic. The computer identifies malware using the various machine learning models. The computer restores to a clean, uncorrupted state using virtual machine technology. The computer reports the detected malware to a security server, such as security information and even management (SIEM) systems, by transmitting detection alert message regarding the malware. The computer interacts with an administrative system over an isolated control network to allow the system administrator to correct the corruption caused by the malware.
-
公开(公告)号:US10853060B2
公开(公告)日:2020-12-01
申请号:US16740619
申请日:2020-01-13
Applicant: Architecture Technology Corporation
Inventor: Colleen Kimball , Katey Huddleston , Paul Nicotera
Abstract: A computer-implemented method includes creating, by a computing device, an abstract syntax tree based on a source code file of a software application, the source code file including source code defining operations of the software application. The method also includes traversing, by the computing device, the abstract syntax tree. The method further includes identifying, by the computing device and based on the traversing of the abstract syntax tree, one or more code violations present in the source code. The method also includes generating, by the computing device, at least one refactoring option for the one or more code violations, each refactoring option of the at least one refactoring option representing a change to the source code file that is configured to remediate the associated code violation.
-
-
-
-