-
公开(公告)号:US10158658B1
公开(公告)日:2018-12-18
申请号:US14960013
申请日:2015-12-04
Applicant: AMAZON TECHNOLOGIES, INC.
Inventor: Nima Sharifi Mehr
IPC: H04L29/06
Abstract: Described are techniques for determining abnormalities in the transmission of data using one or more networks. Responsive to a request or other data, multiple anomaly detection services may determine anomaly values indicative of the likelihood that the request is anomalous. An aggregate value may also be determined based on at least a subset of the anomaly values. Based on correspondence between the aggregate value or any of the anomaly values and threshold data, the request may be determined to be anomalous or non-anomalous. The anomaly values may also be compared to security profile data indicative of sets of values determined based on previous requests. If the current anomaly values do not correspond to the security profile data, this determination may indicate that one or more of the anomaly detection services is compromised. Subsequent values from compromised anomaly detection services may be disregarded until remedied.
-
102.
公开(公告)号:US20180322066A1
公开(公告)日:2018-11-08
申请号:US16035461
申请日:2018-07-13
Applicant: Amazon Technologies, Inc.
Inventor: Muhammad Wasiq , Nima Sharifi Mehr
IPC: G06F12/0877
CPC classification number: G06F12/0877 , G06F2212/1021 , G06F2212/154 , G06F2212/263 , G06F2212/60
Abstract: Modifications to throughput capacity provisioned at a data store for servicing access requests to the data store may be performed according to cache performance metrics. A cache that services access requests to the data store may be monitored to collected and evaluate cache performance metrics. The cache performance metrics may be evaluated with respect to criteria for triggering different throughput modifications. In response to triggering a throughput modification, the throughput capacity for the data store may be modified according to the triggered throughput modification. In some embodiments, the criteria for detecting throughput modifications may be determined and modified based on cache performance metrics.
-
公开(公告)号:US10103878B1
公开(公告)日:2018-10-16
申请号:US14854883
申请日:2015-09-15
Applicant: Amazon Technologies, Inc.
Inventor: Nima Sharifi Mehr
Abstract: Disclosed are various embodiments for separating security credential verification. A first authentication service receives a first security credential from a client. The first authentication service also receives an encrypted version of a second security credential from a second authentication service. The first authentication service determines a stored encrypted credential corresponding to the second security credential based at least in part on the first security credential. The first authentication service authenticates the client by comparing the encrypted version of the second security credential to the stored encrypted credential.
-
公开(公告)号:US10068232B2
公开(公告)日:2018-09-04
申请号:US15331179
申请日:2016-10-21
Applicant: Amazon Technologies, Inc.
Inventor: Nima Sharifi Mehr
Abstract: A credit card reader is attached to a mobile device to process credit card transactions at the point of sale. In response to detecting attachment of the credit card reader to the mobile device, the credit card reader displays a one-time password for authenticating the credit card reader. The algorithm used to generate the one-time password is synchronized with a user token configured to display one-time passwords. If there is a match between the one-time passwords of the credit card reader and the token, the credit card reader is authentic. Further, if there is a match, the credit card reader may allow the user to process credit card transactions through the credit card reader.
-
公开(公告)号:US20180234462A1
公开(公告)日:2018-08-16
申请号:US15953262
申请日:2018-04-13
Applicant: Amazon Technologies, Inc.
Inventor: William Frederick Hingle Kruse , Bharath Mukkati Prakash , Ashish Rangole , Nima Sharifi Mehr , Jeffrey John Wierer , Kunal Chadha , Chenxi Zhang , Hardik Nagda , Kai Zhao
IPC: H04L29/06
Abstract: A computing resource service receives a request to access the service and perform various actions. In response to the request, the computing resource service obtains a set of active policies that are applicable to the request. As a result of the service determining that the set of active policies fail to provide sufficient permissions for fulfillment of the request, the service determines if an enforcement policy is available that is applicable to the request. The service evaluates the request using the enforcement policy such that if the enforcement policy includes permissions sufficient for fulfillment of the request, the request is fulfilled.
-
公开(公告)号:US10032031B1
公开(公告)日:2018-07-24
申请号:US14837390
申请日:2015-08-27
Applicant: Amazon Technologies, Inc.
Inventor: Nima Sharifi Mehr
Abstract: Disclosed are various embodiments for detecting unknown software vulnerabilities and system compromises. In a first implementation, a monitoring service records an indication of which portions of an imported software package are invoked by a service during a learning period. After the learning period, the monitoring service determines that a different portion of the imported software package is invoked by the service. The portion is different than those invoked by the service during the learning period. An action is then performed in response to determining that the different portion of the imported software package is invoked by the service.
-
公开(公告)号:US10019572B1
公开(公告)日:2018-07-10
申请号:US14837403
申请日:2015-08-27
Applicant: Amazon Technologies, Inc.
Inventor: Nima Sharifi Mehr
CPC classification number: G06F21/554 , G06F21/52 , G06F2221/033
Abstract: Disclosed are various embodiments for detecting malicious activities by imported software packages. A monitoring service determines that untrusted code executing in at least one computing device has invoked a privileged operation. A context in which the privileged operation is invoked is identified. The monitoring service determines whether the context and the privileged operation corresponds to an expected behavior of the untrusted code based at least in part on a past behavior profile of the untrusted code. An action is performed in response to determining that the context and the privileged operation do not correspond to the expected behavior.
-
公开(公告)号:US09965618B1
公开(公告)日:2018-05-08
申请号:US14837401
申请日:2015-08-27
Applicant: Amazon Technologies, Inc.
Inventor: Nima Sharifi Mehr
CPC classification number: G06F21/51 , G06F21/125 , G06F21/54
Abstract: Disclosed are various embodiments for reducing privileges for imported software packages, such as software libraries. Trusted code is received that is configured to use untrusted code. A wrapper is generated for the untrusted code. The trusted code is reconfigured to use the wrapper. The wrapper is configured to invoke the untrusted code with reduced privileges as compared to the trusted code.
-
公开(公告)号:US09948681B1
公开(公告)日:2018-04-17
申请号:US15087014
申请日:2016-03-31
Applicant: Amazon Technologies, Inc.
Inventor: William Frederick Hingle Kruse , Bharath Mukkati Prakash , Ashish Rangole , Nima Sharifi Mehr , Jeffrey John Wierer , Kunal Chadha , Chenxi Zhang , Hardik Nagda , Kai Zhao
Abstract: A computing resource service receives a request to access the service and perform various actions. In response to the request, the computing resource service obtains a set of active policies that are applicable to the request. As a result of the service determining that the set of active policies fail to provide sufficient permissions for fulfillment of the request, the service determines if an enforcement policy is available that is applicable to the request. The service evaluates the request using the enforcement policy such that if the enforcement policy includes permissions sufficient for fulfillment of the request, the request is fulfilled.
-
公开(公告)号:US09892253B1
公开(公告)日:2018-02-13
申请号:US15187006
申请日:2016-06-20
Applicant: Amazon Technologies, Inc.
Inventor: Nima Sharifi Mehr
CPC classification number: G06F21/52 , G06F2221/033
Abstract: A call to a memory management application programming interface (API) that results in a buffer overflow due to inaccurate bounds checking could potentially leave the system vulnerable to being exploited by a third party. Approaches presented herein can monitor calls to these APIs in order to determine typical memory sizes passed to these APIs. During an initial baselining period a number of profiles are generated that indicate expected memory size parameters under various different call conditions, such from specific sources or call stacks. Comparing subsequently received API calls against the expected values from the relevant profile enables the legitimacy of an API call to be determined with relatively high accuracy. A suspicious call is identified based at least in part upon determining that the memory size of the call falls outside an expected range for that API and the relevant context.
-
-
-
-
-
-
-
-
-