{"id":116930,"date":"2020-12-10T14:24:06","date_gmt":"2020-12-10T22:24:06","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2020\/12\/automatic-bug-repair"},"modified":"2020-12-10T14:24:06","modified_gmt":"2020-12-10T22:24:06","slug":"automatic-bug-repair","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2020\/12\/automatic-bug-repair","title":{"rendered":"Automatic bug repair"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/automatic-bug-repair.jpg\"><\/a><\/p>\n<p>Circa 2015<\/p>\n<hr>\n<p>At the Association for Computing Machinery\u2019s Programming Language Design and Implementation conference this month, MIT researchers presented a new system that repairs dangerous software bugs by automatically importing functionality from other, more secure applications.<\/p>\n<p>Remarkably, the system, dubbed CodePhage, doesn\u2019t require access to the source code of the applications whose functionality it\u2019s borrowing. Instead, it analyzes the applications\u2019 execution and characterizes the types of security checks they perform. As a consequence, it can import checks from applications written in programming languages other than the one in which the program it\u2019s repairing was written.<\/p>\n<p>Once it\u2019s imported code into a vulnerable application, CodePhage can provide a further layer of analysis that guarantees that the bug has been repaired.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Circa 2015 At the Association for Computing Machinery\u2019s Programming Language Design and Implementation conference this month, MIT researchers presented a new system that repairs dangerous software bugs by automatically importing functionality from other, more secure applications. Remarkably, the system, dubbed CodePhage, doesn\u2019t require access to the source code of the applications whose functionality it\u2019s borrowing. [\u2026]<\/p>\n","protected":false},"author":513,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34],"tags":[],"class_list":["post-116930","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/116930","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/513"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=116930"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/116930\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=116930"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=116930"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=116930"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}