Patents by Inventor Michele Bezzi
Michele Bezzi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11972258Abstract: Systems and methods are provided for training a machine learning model to generate a score indicating a level of discrepancy between a commit message and a corresponding code change. The computing system receives a commit comprising a given commit message and a given corresponding code change and analyzes, using the trained machine learning model, the given commit message and given corresponding code change to generate a score indicating the level of discrepancy between the given commit message and the given corresponding code change of the received commit.Type: GrantFiled: June 27, 2022Date of Patent: April 30, 2024Assignee: SAP SEInventors: Rocio Cabrera Lozoya, Antonino Sabetta, Michele Bezzi
-
Publication number: 20230418599Abstract: Systems and methods are provided for training a machine learning model to generate a score indicating a level of discrepancy between a commit message and a corresponding code change. The computing system receives a commit comprising a given commit message and a given corresponding code change and analyzes, using the trained machine learning model, the given commit message and given corresponding code change to generate a score indicating the level of discrepancy between the given commit message and the given corresponding code change of the received commit.Type: ApplicationFiled: June 27, 2022Publication date: December 28, 2023Inventors: Rocio Cabrera Lozoya, Antonino Sabetta, Michele Bezzi
-
Patent number: 11392370Abstract: Distributed vector representations of source code commits, are generated to become part of a data corpus for machine learning (ML) for analyzing source code. The code commit is received, and time information is referenced to split the source code into pre-change source code and post-change source code. The pre-change source code is converted into a first code representation (e.g., based on a graph model), and the post-change source code into a second code representation. A first particle is generated from the first code representation, and a second particle is generated from the second code representation. The first particle and the second particle are compared to create a delta. The delta is transformed into a first commit vector by referencing an embedding matrix to numerically encode the first particle and the second particle. Following classification, the commit vector is stored in a data corpus for performing ML analysis upon source code.Type: GrantFiled: October 26, 2020Date of Patent: July 19, 2022Assignee: SAP SEInventors: Rocio Cabrera Lozoya, Antonino Sabetta, Michele Bezzi, Arnaud Baumann
-
Publication number: 20220129261Abstract: Distributed vector representations of source code commits, are generated to become part of a data corpus for machine learning (ML) for analyzing source code. The code commit is received, and time information is referenced to split the source code into pre-change source code and post-change source code. The pre-change source code is converted into a first code representation (e.g., based on a graph model), and the post-change source code into a second code representation. A first particle is generated from the first code representation, and a second particle is generated from the second code representation. The first particle and the second particle are compared to create a delta. The delta is transformed into a first commit vector by referencing an embedding matrix to numerically encode the first particle and the second particle. Following classification, the commit vector is stored in a data corpus for performing ML analysis upon source code.Type: ApplicationFiled: October 26, 2020Publication date: April 28, 2022Inventors: Rocio Cabrera Lozoya, Antonino Sabetta, Michele Bezzi, Arnaud Baumann
-
Patent number: 10963474Abstract: A front end receives a request for data specifying a data type. A query handler retrieves data of the data type comprising a plurality of data records from at least one database. The query handler assigns a classification attribute to each data record using a pre-defined classification policy stored in a policy store. A discrimination detection engine statistically evaluates the classification attributes for the data to identify a mutual information metric. The query handler generates a listing of one or more discriminatory attributes and corresponding mutual information metric contributing to discriminatory data patterns based on the mutual information metric.Type: GrantFiled: July 20, 2017Date of Patent: March 30, 2021Assignee: SAP SEInventor: Michele Bezzi
-
Patent number: 10831899Abstract: Systems and methods are provided for retrieving a set of code changes to source code from a source code repository, analyzing the set of code changes to generate a vector representation of each code change of the set of code changes, analyzing the vector representation of each code change of the set of code changes using a trained security-relevant code detection machine learning model, receiving a prediction from the security-relevant code detection machine learning model representing a probability that each code change of the set of code changes contains security-relevant changes, analyzing the prediction to determine whether the prediction is below or above a predetermined threshold, and generating results based on determining whether the prediction is below or above a predetermined threshold.Type: GrantFiled: May 14, 2018Date of Patent: November 10, 2020Assignee: SAP SEInventors: Michele Bezzi, Antonino Sabetta, Henrik Plate, Serena Ponta
-
Publication number: 20200175174Abstract: Data is received that characterizes source code requiring a security vulnerability assessment. Using this received data, an input node of a vulnerability context graph is generated. Subsequently, at least one node is resolved from the input node using at least one of a plurality of resolvers that collectively access each of a knowledge base, a source code commit database, and at least one online resource. Additionally nodes are later iteratively resolved at different depth levels until a pre-defined threshold is met. The vulnerability context graph is then caused to be displayed in a graphical user interface such that each node has a corresponding graphical user interface element which, when activated, causes complementary information for such node to be displayed.Type: ApplicationFiled: December 4, 2018Publication date: June 4, 2020Inventors: Jamarber Bakalli, Michele Bezzi, Cedric Dangremont, Sule Kahraman, Henrik Plate, Serena Ponta, Antonino Sabetta
-
Publication number: 20190347424Abstract: Systems and methods are provided for retrieving a set of code changes to source code from a source code repository, analyzing the set of code changes to generate a vector representation of each code change of the set of code changes, analyzing the vector representation of each code change of the set of code changes using a trained security-relevant code detection machine learning model, receiving a prediction from the security-relevant code detection machine learning model representing a probability that each code change of the set of code changes contains security-relevant changes, analyzing the prediction to determine whether the prediction is below or above a predetermined threshold, and generating results based on determining whether the prediction is below or above a predetermined threshold.Type: ApplicationFiled: May 14, 2018Publication date: November 14, 2019Inventors: Michele Bezzi, Antonino Sabetta, Henrik Plate, Serena Ponta
-
Patent number: 10474456Abstract: Systems and methods are provided for accessing a source code repository comprising a plurality of versions of code, analyzing the plurality of versions of code of the component to compute metrics to identify each version of code, analyzing the metrics to determine a subset of the metrics to use to as a fingerprint definition to identify each version of the code, generating a fingerprint for each version of code using the fingerprint definition, generating a fingerprint matrix with the fingerprint for each version of code for the software component and storing the fingerprint definition and the fingerprint matrixType: GrantFiled: May 17, 2019Date of Patent: November 12, 2019Assignee: SAP SEInventors: Michele Bezzi, Antonino Sabetta, Henrik Plate, Serena Ponta, Francesco Di Cerbo
-
Publication number: 20190272170Abstract: Systems and methods are provided for accessing a source code repository comprising a plurality of versions of code, analyzing the plurality of versions of code of the component to compute metrics to identify each version of code, analyzing the metrics to determine a subset of the metrics to use to as a fingerprint definition to identify each version of the code, generating a fingerprint for each version of code using the fingerprint definition, generating a fingerprint matrix with the fingerprint for each version of code for the software component and storing the fingerprint definition and the fingerprint matrixType: ApplicationFiled: May 17, 2019Publication date: September 5, 2019Inventors: Michele Bezzi, Antonino Sabetta, Henrik Plate, Serena Ponta, Francesco Di Cerbo
-
Patent number: 10338916Abstract: Systems and methods are provided for accessing a source code repository comprising a plurality of versions of code, analyzing the plurality of versions of code of the component to compute metrics to identify each version of code, analyzing the metrics to determine a subset of the metrics to use to as a fingerprint definition to identify each version of the code, generating a fingerprint for each version of code using the fingerprint definition, generating a fingerprint matrix with the fingerprint for each version of code for the software component and storing the fingerprint definition and the fingerprint matrix.Type: GrantFiled: December 7, 2016Date of Patent: July 2, 2019Assignee: SAP SEInventors: Michele Bezzi, Antonino Sabetta, Henrik Plate, Serena Ponta, Francesco Di Cerbo
-
Publication number: 20190026345Abstract: A front end receives a request for data specifying a data type. A query handler retrieves data of the data type comprising a plurality of data records from at least one database. The query handler assigns a classification attribute to each data record using a pre-defined classification policy stored in a policy store. A discrimination detection engine statistically evaluates the classification attributes for the data to identify a mutual information metric. The query handler generates a listing of one or more discriminatory attributes and corresponding mutual information metric contributing to discriminatory data patterns based on the mutual information metric.Type: ApplicationFiled: July 20, 2017Publication date: January 24, 2019Inventor: Michele Bezzi
-
Publication number: 20180157486Abstract: Systems and methods are provided for accessing a source code repository comprising a plurality of versions of code, analyzing the plurality of versions of code of the component to compute metrics to identify each version of code, analyzing the metrics to determine a subset of the metrics to use to as a fingerprint definition to identify each version of the code, generating a fingerprint for each version of code using the fingerprint definition, generating a fingerprint matrix with the fingerprint for each version of code for the software component and storing the fingerprint definition and the fingerprint matrixType: ApplicationFiled: December 7, 2016Publication date: June 7, 2018Inventors: Michele Bezzi, Antonino Sabetta, Henrik Plate, Serena Ponta, Francesco Di Cerbo
-
Patent number: 9514494Abstract: A report handler may receive abuse reports from reporters alleging policy violations of network use policies by at least one potential victim, and a source analyzer may determine at least one subset of the reporters. A content analyzer may determine a reference to the at least one potential victim in network activities of the at least one subset, and a review requester may generate a notification of a potential coalition attack against the at least one potential victim, based on the reference in the context of the at least one subset.Type: GrantFiled: August 23, 2012Date of Patent: December 6, 2016Assignee: SAP SEInventors: Slim Trabelsi, Michele Bezzi, Gilles Montagnon
-
Patent number: 9460311Abstract: The method includes determining, using an in-memory database, a privacy risk associated with a resultant dataset of a query, returning, by the in-memory database, an anonymized dataset if the privacy risk is above a threshold value, the anonymized dataset being based on an anonymization, by the in-memory database, of the resultant dataset, and returning, by the in-memory database, the resultant dataset if the privacy risk is below a threshold value.Type: GrantFiled: June 26, 2013Date of Patent: October 4, 2016Assignee: SAP SEInventors: Michele Bezzi, Antonino Sabetta
-
Patent number: 8990252Abstract: The invention concerns a data anonymity measuring device for selectively transmitting an anonymized database to a third party comprising: calculation means (402) coupled to at least one memory, the memory storing an original database (204) and said anonymized database (206), said calculation means arranged to calculate the conditional entropy for each entry in said anonymized database based on entries in said original database; comparing means (406) arranged to compare at least one of said conditional entropies with a threshold value; and output means (410) arranged to transmit said anonymized database based on the result of said comparison.Type: GrantFiled: January 7, 2013Date of Patent: March 24, 2015Assignee: Accenture Global Services LimitedInventor: Michele Bezzi
-
Patent number: 8955115Abstract: The embodiments encompass an apparatus for generating security checks including a model editor configured to annotate at least one element in an architectural source model with security requirement information and countermeasure information. The security requirement information identifies the at least one element and provides a textual description of a corresponding security requirement, and the countermeasure information identifies the at least one element and indicates a countermeasure type to the corresponding security requirement. The apparatus also includes a code generation engine configured to generate a security check for the countermeasure information based on the countermeasure type.Type: GrantFiled: July 6, 2012Date of Patent: February 10, 2015Assignee: SAP SEInventors: Antonino Sabetta, Michele Bezzi
-
Publication number: 20150007249Abstract: The method includes determining, using an in-memory database, a privacy risk associated with a resultant dataset of a query, returning, by the in-memory database, an anonymized dataset if the privacy risk is above a threshold value, the anonymized dataset being based on an anonymization, by the in-memory database, of the resultant dataset, and returning, by the in-memory database, the resultant dataset if the privacy risk is below a threshold value.Type: ApplicationFiled: June 26, 2013Publication date: January 1, 2015Applicant: SAP AGInventors: Michele Bezzi, Antonino Sabetta
-
Publication number: 20140059203Abstract: A report handler may receive abuse reports from reporters alleging policy violations of network use policies by at least one potential victim, and a source analyzer may determine at least one subset of the reporters. A content analyzer may determine a reference to the at least one potential victim in network activities of the at least one subset, and a review requester may generate a notification of a potential coalition attack against the at least one potential victim, based on the reference in the context of the at least one subset.Type: ApplicationFiled: August 23, 2012Publication date: February 27, 2014Applicant: SAP AGInventors: Slim Trabelsi, Michele Bezzi, Gilles Montagnon
-
Publication number: 20140013415Abstract: The embodiments encompass an apparatus for generating security checks including a model editor configured to annotate at least one element in an architectural source model with security requirement information and countermeasure information. The security requirement information identifies the at least one element and provides a textual description of a corresponding security requirement, and the countermeasure information identifies the at least one element and indicates a countermeasure type to the corresponding security requirement. The apparatus also includes a code generation engine configured to generate a security check for the countermeasure information based on the countermeasure type.Type: ApplicationFiled: July 6, 2012Publication date: January 9, 2014Applicant: SAP AGInventors: Antonino Sabetta, Michele Bezzi