Method for analysis of source texts

A source code and code development technology, applied in the field of data processing devices and data carriers, can solve problems such as time-consuming and expensive development cycles, and achieve the effect of sensitization

Pending Publication Date: 2021-03-19
CONTINENTAL AUTOMOTIVE TECH GMBH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, if this type of source code vulnerability is identified, source code development needs to be done again, thus requiring a time-consuming and expensive development cycle to fix the identified vulnerability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for analysis of source texts

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] exist figure 1 The integrated development environment shown in FIG. 2 schematically illustrates an embodiment of the method for analyzing source code 10 according to the present invention.

[0025] The method is performed by a data processing device comprising a processor configured to perform the method described below. The method is based on a computer program product comprising commands which, when executed by the computer, cause the program to carry out the method accordingly.

[0026] During execution of the method, a source code vulnerability 14 is identified in the source code 10 entered by the source code developer. The source code developer enters the source code 10 into the editor 12 via an input device designed as a keyboard. During active source code development, source code vulnerabilities14 are identified in real time without compiling the program.

[0027] Within the scope of the method, source code vulnerabilities 14 that are susceptible to implementa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for the analysis of source texts (10), comprising the step: identifying source text weak points (14) which are susceptible to implementation attacks, the source textweak points (14) being identified during the active source text development without the need for program compilation.

Description

technical field [0001] The invention relates to a method for analyzing source code / source text, comprising the steps of: identifying source code vulnerabilities that are susceptible to the implementation of attacks. [0002] Furthermore, the invention relates to a device for data processing, a computer program product and a computer-readable data carrier. Background technique [0003] When the source code is developed using an integrated development environment, for example, the source code developer is regularly supported in the generation of the source code in order to speed up the source code development and reduce the error rate of later software. Developer support is known in the art to emphasize syntax, wherein source code is syntax checked during active source code development so that source code errors can be identified during active source code development. During active source code development, draws the source code developer's attention to an identified source co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F8/30
CPCG06F8/30G06F11/362G06F21/54G06F21/565G06F21/577
Inventor M·S·P·斯托廷格R·佩里奇
Owner CONTINENTAL AUTOMOTIVE TECH GMBH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products