-
公开(公告)号:US11928460B2
公开(公告)日:2024-03-12
申请号:US17659864
申请日:2022-04-20
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Jin Hong Fu , Bao Zhang , Shi Chong Ma , He Huang , Naijie Li , Jia Yu
IPC: G06F9/44 , G06F8/658 , G06F9/30 , G06F12/02 , G06F12/0804
CPC classification number: G06F8/658 , G06F9/3009 , G06F12/0238 , G06F12/0804
Abstract: Embodiments of the present disclosure relate to a method, system, and computer program product for dynamic update of a computer program in memory. According to the method, one or more processors obtain incremental information, the incremental information specifying an incremental update to at least one section of at least one target function in a computer program. One or more processors identify, based on the incremental information, the at least one target function to be updated from the computer program. One or more processors generate at least one updated copy of the at least one target function by updating the at least one section of the at least one target function based on the incremental information. One or more processors update the computer program based on the at least one updated copy of the at least one target function while the computer program is running.
-
公开(公告)号:US12111773B2
公开(公告)日:2024-10-08
申请号:US17930439
申请日:2022-09-08
Applicant: International Business Machines Corporation
Inventor: He Huang , Jin Hong Fu , Shi Chong Ma , Bao Zhang , Jia Yu , Peng Hui Jiang
IPC: G06F12/10 , G06F12/1036 , G06F12/14 , G06F21/62
CPC classification number: G06F12/1036 , G06F12/145 , G06F21/6254
Abstract: A computer-implemented method, computer program product and computer system are provided. A processor receives an indication of sensitive data in one or more files. A processor updates at least one bit in the virtual address space for the one or more files indicated to have sensitive data. A processor, in response to a program accessing the one or more files, evaluates a respective virtual address for the one or more files. A processor, in response to the at least one bit in the respective virtual address for the one or more files, marks intermediate data generated by the program as sensitive data.
-
公开(公告)号:US20230409568A1
公开(公告)日:2023-12-21
申请号:US17807264
申请日:2022-06-16
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Bao Zhang , XI QING ZHANG , Jin Hong Fu , He Huang , Shi Chong Ma , Jia Yu , Mu Chen , HUI Zhang , Ran Ren , XING XING SHEN
IPC: G06F16/242 , G06F16/2457 , G06F16/23 , G06F16/25
CPC classification number: G06F16/244 , G06F16/2457 , G06F16/2358 , G06F16/258
Abstract: A method, computer system, and a computer program for monitoring synchronization and aggregation are provided. The method may include receiving a plurality of metrics and identifying a plurality of metadata associated with the plurality of metrics. The method may further include calculating a hash value of the plurality of metadata based on the plurality of metrics. The method may further include detecting at least one modification to the plurality of metadata based on the hash value and updating the plurality of metrics based on the at least one modification in which the plurality of metrics are displayed in a self-adapting metric diagram.
-
公开(公告)号:US20230342142A1
公开(公告)日:2023-10-26
申请号:US17659864
申请日:2022-04-20
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Jin Hong Fu , Bao Zhang , Shi Chong Ma , He Huang , NAIJIE LI , Jia Yu
IPC: G06F8/658 , G06F12/02 , G06F12/0804 , G06F9/30
CPC classification number: G06F8/658 , G06F12/0238 , G06F12/0804 , G06F9/3009
Abstract: Embodiments of the present disclosure relate to a method, system, and computer program product for dynamic update of a computer program in memory. According to the method, one or more processors obtain incremental information, the incremental information specifying an incremental update to at least one section of at least one target function in a computer program. One or more processors identify, based on the incremental information, the at least one target function to be updated from the computer program. One or more processors generate at least one updated copy of the at least one target function by updating the at least one section of the at least one target function based on the incremental information. One or more processors update the computer program based on the at least one updated copy of the at least one target function while the computer program is running.
-
公开(公告)号:US20240104000A1
公开(公告)日:2024-03-28
申请号:US17936233
申请日:2022-09-28
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Bao Zhang , Jin Hong Fu , Peng Hui Jiang , Shi Chong Ma , He Huang , Jia Yu
IPC: G06F11/36
CPC classification number: G06F11/3636
Abstract: Determination and provision of improved representations of program flow control are provided by a method that monitors execution of binary code of a program on a computer system. The monitoring includes monitoring manipulation(s) of call stack(s) maintained by the computer system for the execution of the binary code. The method, based on the monitoring, determines function call pattern(s) and branch pattern(s) exhibited by the execution of the binary code. The method identifies, from the binary code and using the determined function call pattern(s) and branch pattern(s), function calls and branches, relations between the function calls and branches, and function and variable names. The method also provides a representation of program flow control of the program using the identified function calls and branches, relations, and function and variable names.
-
公开(公告)号:US20240086333A1
公开(公告)日:2024-03-14
申请号:US17930439
申请日:2022-09-08
Applicant: International Business Machines Corporation
Inventor: He Huang , Jin Hong Fu , Shi Chong Ma , Bao Zhang , Jia Yu , Peng Hui Jiang
IPC: G06F12/1036 , G06F12/14 , G06F21/62
CPC classification number: G06F12/1036 , G06F12/145 , G06F21/6254
Abstract: A computer-implemented method, computer program product and computer system are provided. A processor receives an indication of sensitive data in one or more files. A processor updates at least one bit in the virtual address space for the one or more files indicated to have sensitive data. A processor, in response to a program accessing the one or more files, evaluates a respective virtual address for the one or more files. A processor, in response to the at least one bit in the respective virtual address for the one or more files, marks intermediate data generated by the program as sensitive data.
-
公开(公告)号:US11822910B2
公开(公告)日:2023-11-21
申请号:US17501018
申请日:2021-10-14
Applicant: International Business Machines Corporation
Inventor: Bao Zhang , Jin Hong Fu , Shi Chong Ma , He Huang , Yong Yin , Jia Tian Zhong , Xing Xing Shen , Jia Yu
Abstract: Aspects of the invention include includes detecting a change in a code section of a source code in relation to a reference code section. An incremental section is created in object code, the incremental section includes an object code section describing the change in the code section and a symbol section describing a change to a symbol associated with the changed code section. The incremental section is attached to a software update. The software update to a target computer system.
-
公开(公告)号:US20230118695A1
公开(公告)日:2023-04-20
申请号:US17501018
申请日:2021-10-14
Applicant: International Business Machines Corporation
Inventor: Bao Zhang , Jin Hong Fu , Shi Chong Ma , He Huang , Yong Yin , Jia Tian Zhong , XING XING SHEN , Jia Yu
Abstract: Aspects of the invention include includes detecting a change in a code section of a source code in relation to a reference code section. An incremental section is created in object code, the incremental section includes an object code section describing the change in the code section and a symbol section describing a change to a symbol associated with the changed code section. The incremental section is attached to a software update. The software update to a target computer system.
-
公开(公告)号:US20200026827A1
公开(公告)日:2020-01-23
申请号:US16039737
申请日:2018-07-19
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: He Huang , Shi Peng Li , Jin Hong Fu , Shi Chong Ma
Abstract: The present disclosure provides a computer-implemented method, computer system and computer program product for user authentication. According to the method, identity information can be received from a user, and a plurality of questions can be presented to the user, the plurality of questions comprising one or more valid questions generated based on a password related to the identity information and one or more invalid questions. Then, an input can be received from the user, and in response to the input corresponding to the one or more valid questions, the user can be authenticated based on the input.
-
公开(公告)号:US11940900B1
公开(公告)日:2024-03-26
申请号:US17936233
申请日:2022-09-28
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Bao Zhang , Jin Hong Fu , Peng Hui Jiang , Shi Chong Ma , He Huang , Jia Yu
CPC classification number: G06F11/3636
Abstract: Determination and provision of improved representations of program flow control are provided by a method that monitors execution of binary code of a program on a computer system. The monitoring includes monitoring manipulation(s) of call stack(s) maintained by the computer system for the execution of the binary code. The method, based on the monitoring, determines function call pattern(s) and branch pattern(s) exhibited by the execution of the binary code. The method identifies, from the binary code and using the determined function call pattern(s) and branch pattern(s), function calls and branches, relations between the function calls and branches, and function and variable names. The method also provides a representation of program flow control of the program using the identified function calls and branches, relations, and function and variable names.
-
-
-
-
-
-
-
-
-