close search bar

Sorry, not available in this language yet

close language selection

We take an innovative, systematic approach to neutralize potential malicious code before it can be activated to trigger an attack or exfiltrate data.

Automated scanning

Automated scanning plus expert lead detection

We utilize a combination of static application security testing (SAST) and binary scanning, along with embedded machine learning (ML) algorithms to identify code that at first glance can look perfectly normal but is designed to damage your software system. Comprehensive scanning includes proprietary, open source, and commercial software components. The human element ensures that malicious code typically invisible to security tools because there are no vulnerability markers is also detected.

The process of identifying malicious code is broken down into two phases.

  1. Identify patterns of malicious code.
  2. Use ML to analyze frameworks/libraries to match the needed structures for the identified patterns.

The abnormal patterns are broken down into finer grained properties by creating a taxonomy or classification of malicious code components and, from this taxonomy, then generate an ontology to gain an understanding of how all the malicious components may interact to form a fully realized malicious code pattern.

Open source dependency analysis

Dependency analysis with SCA

Software composition analysis (SCA) identifies all open source dependencies within an application and provides component intelligence to enable teams to look beyond known vulnerabilities and get ahead of potential security risks.

As SCA identifies dependencies, it analyzes them for malicious behavior, such as

  • Network communication to external IP addresses or URLs
  • Component installation behavior (i.e., suspicious commands invoked during install, side installation of other applications, etc.)
  • Component capabilities such as crypto-mining, disk encryption, serialization of data, file system access, and compression

Additionally, Black Duck® SCA maintains data on known malicious components so that it can alert teams if associated dependencies impact their applications. 

Learn more about malicious code detection