会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 4. 发明申请
    • COMPUTER MEMORY ACCESS MONITORING AND ERROR CHECKING
    • 计算机内存访问监控和错误检查
    • US20130152053A1
    • 2013-06-13
    • US13316582
    • 2011-12-12
    • Weidong CuiDavid MolnarSang Kil Cha
    • Weidong CuiDavid MolnarSang Kil Cha
    • G06F9/44
    • G06F11/3672
    • Computer memory access monitoring and error checking systems and processes are disclosed herein. In one embodiment, a computer implemented method includes executing a computer program having a first object in a first memory location and having a value corresponding to a second memory location holding a second object. The method also includes, during a memory read from the second memory location, performing a comparison of a first version of the first memory location and a second version of the second memory location. The method further includes determining if an error exists in the computer program based on the comparison between the first version and the second version.
    • 本文公开了计算机存储器访问监视和错误检查系统和过程。 在一个实施例中,计算机实现的方法包括执行具有在第一存储器位置中的第一对象并具有对应于保持第二对象的第二存储器位置的值的计算机程序。 该方法还包括在从第二存储器位置读取的存储器期间执行第一存储器位置的第一版本和第二存储器位置的第二版本的比较。 该方法还包括基于第一版本和第二版本之间的比较来确定计算机程序中是否存在错误。
    • 5. 发明授权
    • Determining target types for generic pointers in source code
    • 确定源代码中通用指针的目标类型
    • US09329845B2
    • 2016-05-03
    • US12477954
    • 2009-06-04
    • Weidong CuiMarcus Peinado
    • Weidong CuiMarcus Peinado
    • G06F9/45
    • G06F8/434
    • A system described herein includes a receiver component that receives source code from a computer-readable medium of a computing device and a static analysis component that executes a points-to analysis algorithm over the source code to cause generation of a points-to graph, wherein the points-to graph is a directed graph that comprises a plurality of nodes and a plurality of edges, wherein nodes of the points-to graph represent pointers in the source code and edges represent inclusion relationships in the source code. The system also includes an inference component that infers target types for generic pointers in the source code based at least in part upon known type definitions and global variables in the source code.
    • 本文描述的系统包括从计算设备的计算机可读介质接收源代码的接收器组件和在源代码上执行点对分析算法以产生点对图的静态分析组件,其中 点对图是包括多个节点和多个边缘的有向图,其中点对图的节点表示源代码中的指针,边缘表示源代码中的包含关系。 该系统还包括至少部分地基于源代码中的已知类型定义和全局变量来推断源代码中的通用指针的目标类型的推理组件。
    • 8. 发明申请
    • DETECTING DATA PROPAGATION IN A DISTRIBUTED SYSTEM
    • 在分布式系统中检测数据传播
    • US20080320075A1
    • 2008-12-25
    • US11767312
    • 2007-06-22
    • Benjamin LivshitsWeidong Cui
    • Benjamin LivshitsWeidong Cui
    • G06F15/16
    • H04L63/145H04L63/166
    • Embodiments gather historical information about data propagation by monitoring requests to and replies from a server. When a request is received from a client system to upload code onto a web site, a user identity associated with the client system is determined and a tag that uniquely identifies the uploaded data is created and mapped with the user identity into a propagation graph. The propagation graph includes nodes and edges associated with a number of client systems that made similar requests such that each node of the propagation graph corresponds to both a tag and user identity of a client system and edges within the propagation graph represent causality links between the nodes. The propagation graph can then be used for finding long propagation chains, which can be useful for detecting worm-like propagation activity.
    • 实施例通过监视对服务器的请求和从服务器的回复来收集关于数据传播的历史信息。 当从客户端系统接收到将代码上传到网站上的请求时,确定与客户端系统相关联的用户身份,并且创建唯一地标识上传的数据的标签并将其与用户身份映射到传播图中。 传播图包括与产生类似请求的多个客户端系统相关联的节点和边缘,使得传播图的每个节点对应于客户端系统的标签和用户标识,传播图中的边缘表示节点之间的因果关系 。 然后,传播图可以用于寻找长的传播链,这可以用于检测蠕虫状传播活动。
    • 9. 发明申请
    • DEMAND-DRIVEN ANALYSIS OF POINTERS FOR SOFTWARE PROGRAM ANALYSIS AND DEBUGGING
    • 软件程序分析和调试指标的需求驱动分析
    • US20130055207A1
    • 2013-02-28
    • US13220651
    • 2011-08-29
    • Weidong CuiMarcus PeinadoZhilei Xu
    • Weidong CuiMarcus PeinadoZhilei Xu
    • G06F9/44
    • G06F8/434G06F11/3608
    • A “Demand-Driven Pointer Analyzer” (DDPA) provides a “demand-driven” field-sensitive pointer analysis process. This process rapidly and accurately identifies alias sets for selected pointers in software modules or programs of any size, including large-scale C/C++ programs such as a complete operating system (OS). The DDPA formulates the pointer analysis task as a Context-Free Language (CFL) reachability problem that operates using a Program Expression Graph (PEG) automatically constructed from the program code. The PEG provides a node and edge-based graph representation of all expressions and assignments in the program and allows the DDPA to rapidly identify aliases for pointers in the program by traversing the graph as a CFL reachability problem to determine pointer alias sets. In various embodiments, the DDPA is also context-sensitive.
    • 需求驱动指针分析器(DDPA)提供了一种需求驱动的现场敏感指针分析过程。 此过程可快速准确地识别软件模块或任何大小的程序(包括大型C / C ++程序,如完整的操作系统(OS))中的所选指针的别名集。 DDPA使用由程序代码自动构建的程序表达式图(PEG)来运行,使指针分析任务形成为无上下文语言(CFL)可达性问题。 PEG提供程序中所有表达式和赋值的节点和边缘图表示,并允许DDPA通过遍历图形来快速识别程序中的指针的别名,作为CFL可达性问题,以确定指针别名集。 在各种实施例中,DDPA也是上下文相关的。