主权项 |
1. A method, in a data processing system, for evaluating downgrader code in application code with regard to a target deployment environment, comprising:
identifying, by an application analysis mechanism of the data processing system, the downgrader code in the application code, wherein the downgrader code is a portion of code in the application code that operates on an information flow of the application code to ensure confidentiality of information input to the downgrader code, in the output of the downgrader code; generating, by the application analysis mechanism, based on an input string, an output string that the downgrader code outputs in response to receiving the input string; retrieving, from a storage system associated with the data processing system, one or more sets of illegal string patterns, wherein each of the one or more sets of illegal string patterns is associated with a corresponding deployment environment, and wherein the illegal string patterns are string patterns that a downgrader identifies in the information flow for security purposes; determining, by the application analysis mechanism, whether the downgrader code is compatible with the target deployment environment based on the one or more sets of illegal string patterns and the output string; and generating, by the application analysis mechanism, an output indicative of the results of the determining. |