Security Vulnerability Detection
    1.
    发明公开

    公开(公告)号:US20230177166A1

    公开(公告)日:2023-06-08

    申请号:US17542939

    申请日:2021-12-06

    Applicant: SAP SE

    CPC classification number: G06F21/577 G06F2221/033

    Abstract: Embodiments relate to improving accuracy of security vulnerability detection by determining a context of a data flow from a target, generating an exploit, and injecting the exploit based upon the context to create a vulnerable Uniform Resource Locator (URL). The context may comprise a HTML context, a URL context, a JavaScript context, or a JSON context. Communication of the vulnerable URL to a testing platform results in validation of the presence of a security vulnerability. Embodiments may find particular value in detecting vulnerability to a client-side XSS attack, by generating a vulnerable URL containing an exploit that is injected based upon a collected taint flow. Where the target is a website, embodiments improve accuracy of client-side XSS validation exploits by identifying which characters of a URL enter a specific context (e.g., HTML or JavaScript), and replacing these characters with a payload designed to trigger code execution for validation.

    Client-side attack detection in web applications

    公开(公告)号:US10834102B2

    公开(公告)日:2020-11-10

    申请号:US15862830

    申请日:2018-01-05

    Applicant: SAP SE

    Abstract: A client comprising a web browser is provided. The client is configured to: run an application in the web browser, the application comprising a sensor including sensor JavaScript code, wherein running the application comprises executing the sensor JavaScript code as the first JavaScript code in the web browser to activate the sensor; and wherein the sensor is configured to: gather data with respect to the application at runtime; and check predetermined application-specific rules against the gathered data for detecting client-side attacks at runtime.

    ANOMALOUS COMMIT DETECTION
    4.
    发明申请

    公开(公告)号:US20180239898A1

    公开(公告)日:2018-08-23

    申请号:US15435961

    申请日:2017-02-17

    Applicant: SAP SE

    Abstract: Various examples are directed to detecting anomalous modifications to a software component, For example, a computing device may receive, from a version control system, version metadata describing properties of a plurality of commits for the software component. The computing device may generate a plurality of commit clusters based, at least in part, on the properties of the plurality of commits. The computing device may determine a first anomalous commit of the plurality of commits and generate an alert message indicating a first code segment modified by the first commit.

    String Sanitizer Modeling
    6.
    发明公开

    公开(公告)号:US20230252159A1

    公开(公告)日:2023-08-10

    申请号:US17665319

    申请日:2022-02-04

    Applicant: SAP SE

    CPC classification number: G06F21/577 G06F2221/034

    Abstract: Code injection is a type of security vulnerability in which an attacker injects client-side scripts modifying the content being delivered. A sanitizer function may provide defense against such attacks by removing certain characters (e.g., characters causing state transitions in HTML). A string sanitizer may be modeled in order to determine its effectiveness by obtaining data flow information indicating string operations that used an input string or information derived therefrom, including a string sanitizer function. A deterministic finite automata representing string values of the output parameter may be generated based on a graph generated from the data flow information, where the automata accepts possible output string values of the sanitizer. It can be determined whether there is a non-empty intersection between the automata for the sanitizer output and an automata representing a security exploit, which would indicate that the sanitizer function is vulnerable to the exploit.

    Web application execution with secure elements

    公开(公告)号:US11537760B2

    公开(公告)日:2022-12-27

    申请号:US17031448

    申请日:2020-09-24

    Applicant: SAP SE

    Inventor: Martin Johns

    Abstract: Various examples are directed to systems and methods for executing a web application with client-side encryption. A web application may execute in a web browser at a client computing device. The web browser may generate a document comprising a secure display element. The web browser may request to render the document at the client computing device. A cryptographic tool of the web browser may decrypt the first encrypted value to generate a first clear value. The web browser may render the document at an output device of the client computing device using the clear value. The web browser may also be programmed to prevent the web application from accessing the first clear value.

    Web application session security
    8.
    发明授权

    公开(公告)号:US10972481B2

    公开(公告)日:2021-04-06

    申请号:US16002372

    申请日:2018-06-07

    Applicant: SAP SE

    Inventor: Martin Johns

    Abstract: Various examples are directed to systems and methods for secure communication sessions between a web application and a server. A session identifier routine executing at a computing device may receive a first request message comprising a session identifier field, the session identifier field comprising a client session identifier describing a communication session between the web application executing at the computing device and the server computing device. The session identifier routine may transform the client session identifier to a server session identifier using session identifier transformation data accessed from session vault persistence at the computing device. The session identifier routine may write the server session identifier to the session identifier field of the first request message and initiate sending the request message including the server session identifier to the server computing device.

    Automatic script code coverage measurements for software scripts

    公开(公告)号:US10560539B1

    公开(公告)日:2020-02-11

    申请号:US16136628

    申请日:2018-09-20

    Applicant: SAP SE

    Abstract: In an example embodiment, a proxy server receives a request from a web browser operated on a client device, the request including a call for computer code written in a scripting language. The request is forwarded to a web server to obtain the computer code written in the scripting language. The computer code written in the scripting language is automatically instrumented by adding instrumentation code to the computer code written in the scripting language, the instrumentation code configured to, when executed, measure one or more metrics and report the resultant measurements. Then the instrumented computer code written in the scripting language is sent to the web browser for execution.

    Dynamic, Non-Invasive Taint Tracking Using Auto-Generated Datatypes

    公开(公告)号:US20190205532A1

    公开(公告)日:2019-07-04

    申请号:US15862347

    申请日:2018-01-04

    Applicant: SAP SE

    Abstract: Systems and methods are provided herein for dynamic, non-invasive taint tracking using auto-generated datatypes. A proxy entry point component of a taint-aware environment continuously monitors for a request to initiate an application. The application has an associated runtime environment and profile parameters specific to the application. Upon identifying the request, a core component of the taint-aware environment generates a set of augmented classes based on the profile parameters. The set of augmented classes contains taint-tracking functionality. The proxy entry point component modifies an initiation pathway of the application to force the runtime environment to retrieve the set of augmented classes prior to execution of the application. The runtime environment continuously monitors for tainted data or tainted code passed through or contained within the application based on the taint-tracking functionality of the set of augmented classes.

Patent Agency Ranking