US 12,265,627 B1
Behavioral analysis for identification of malicious code
Adrian Wood, Clemmons, NC (US); Douglas Brookes Tucker, Westbrook, CT (US); and Michael Barone, Wallingford, CT (US)
Assigned to Wells Fargo Bank, N.A., San Francisco, CA (US)
Filed by Wells Fargo Bank, N.A., San Francisco, CA (US)
Filed on Aug. 25, 2022, as Appl. No. 17/895,879.
Int. Cl. G06F 21/57 (2013.01); G06F 21/56 (2013.01)
CPC G06F 21/577 (2013.01) [G06F 21/565 (2013.01)] 16 Claims
OG exemplary drawing
 
1. A method comprising:
obtaining, by a computing system, metadata associated with source code of a software package;
determining, by the computing system and based on the metadata associated with source code, whether there are any anomalies associated with the source code;
in response to determining that there is at least one anomaly associated with the source code, computing, by the computing system, an overall risk level for the software package, wherein computing the overall risk level for the software package is based on an author risk score that specifies a value that indicates a risk level of behavior of the author, a popularity score that specifies a value that indicates the popularity of the software package, and a health score that specifies a value that indicates a health of the software package; and
performing, by the computing system, an action based on the overall risk level for the software package, wherein performing the action comprises blocking use of the software package in a software product.