Blacklisting of fault generating software code
First Claim
1. A computer-implemented method comprising:
- receiving, over a network, respective crash reports for a plurality of browsers, each crash report including an identification of one or more executables related to a software crash of one of the plurality of browsers, wherein software code of the one or more executables is included in a memory space of the one of the plurality of browsers during the software crash;
analyzing the plurality of received crash reports together to determine a browser component affected by software code of an executable included in respective memory spaces of the plurality of browsers to cause one or more software crashes of the browsers;
computing, for the executable, a fault level based on at least a number of crashes of the browser component that is associated with the executable and a number of crashes of the browser component independent of the executable; and
including an identifier representing the executable in a list of blacklisted executable identifiers based on the determined fault level of the executable.
2 Assignments
0 Petitions
Accused Products
Abstract
Techniques for blacklisting of fault generating software code are provided. An example method includes receiving crash reports of a plurality of browsers, a crash report including an identification of one or more executables related to a software crash of a browser, wherein software code of the executables is included in a memory space of the browser during the software crash, analyzing the crash reports of the browsers to determine a browser component affected by software code of an executable included in respective memory spaces of the browsers to cause one or more software crashes of the browsers, computing, for the executable, a fault level based on a number of crashes of the browser component that is associated with the executable and a number of crashes of the browser component independent of the executable, and including an identifier representing the executable in a list based on the determined fault level.
-
Citations
20 Claims
-
1. A computer-implemented method comprising:
-
receiving, over a network, respective crash reports for a plurality of browsers, each crash report including an identification of one or more executables related to a software crash of one of the plurality of browsers, wherein software code of the one or more executables is included in a memory space of the one of the plurality of browsers during the software crash; analyzing the plurality of received crash reports together to determine a browser component affected by software code of an executable included in respective memory spaces of the plurality of browsers to cause one or more software crashes of the browsers; computing, for the executable, a fault level based on at least a number of crashes of the browser component that is associated with the executable and a number of crashes of the browser component independent of the executable; and including an identifier representing the executable in a list of blacklisted executable identifiers based on the determined fault level of the executable. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A non-transitory machine-readable medium comprising instructions stored therein, which when executed by a processor, causes the processor to perform operations comprising:
-
receiving, over a network, respective crash reports for a plurality of browsers, each crash report including an identification of one or more executables related to a software crash of one of the plurality of browsers, wherein software code of the one or more executables is included in a memory space of the one of the plurality of browsers during the software crash; analyzing plurality of received crash reports together to determine a browser component affected by software code of an executable included in respective memory spaces of the plurality of browsers to cause one or more software crashes of the browsers; computing, for the executable, a fault level based on at least a number of crashes of the browser component that is associated with the executable and a number of crashes of the browser component independent of the executable; and including an identifier representing the executable in a list of blacklisted executable identifiers based on the determined fault level of the executable. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A system comprising:
-
a memory comprising instructions; and a processor configured to execute the instructions to; receive, over a network, respective crash reports for a plurality of web applications configured to retrieve content from a web server, each crash report including an identification of one or more executables related to a software crash of one of the plurality of web applications, wherein software code of the one or more executables is included in a memory space of the one of the plurality of web applications during the software crash; analyze the plurality of received crash reports of the web applications together to determine a web application component affected by software code of an executable included in respective memory spaces of the plurality of web applications to cause one or more software crashes of the web applications; compute, for the executable, a fault level based on at least a number of crashes of the application component that is associated with the executable and a number of crashes of the application component independent of the executable; and include an identifier representing the executable in a list of blacklisted executable identifiers based on the determined fault level of the executable. - View Dependent Claims (18, 19, 20)
-
Specification