Abstract:
Technologies are described herein for performing a defect analysis on a software component based upon collected data that describes the operational state of hardware devices in an execution environment utilized to execute the software component at different points in time. The hardware state data is collected from the hardware devices in the execution environment at different points in time and stored in a version control system. A defect analysis may then be performed for an issue identified in the software component utilizing the hardware state data stored in the version control system. Based upon the results of the defect analysis, one or more actions may be taken such as, but not limited to, rolling the hardware or software configuration of one or more of the hardware devices in the execution environment back to a previous point in time.
Abstract:
Session-specific information stored to a cookie or other secure token can be selected and/or caused to vary over time, such that older copies will become less useful over time. Such an approach reduces the ability of entities obtaining a copy of the cookie from performing unauthorized tasks on a session. A cookie received with a request can contain a timestamp and an operation count for a session that may need to fall within an acceptable range of the current values in order for the request to be processed. A cookie returned with a response can be set to the correct value or incremented from the previous value based on various factors. The allowable bands can decrease with age of the session, and various parameter values such as a badness factor for a session can be updated continually based on the events for the session.
Abstract:
A computer system implements a hypervisor which, in turn, implements one or more computer system instances and a controller. The controller and a computer system instance share a memory. A request is processed using facilities of both the computer system instance and the controller. As part of request processing, information is passed between the computer system instance and the controller via the shared memory.
Abstract:
Systems and methods for the analysis of memory information of a computing device are provided. One or more user computing devices may transmit memory information to a memory analysis system. The memory analysis system may generate a weighted object graph based on the received memory information, and identify subgraphs to inspect for potential memory use patterns. If such patterns are common in an identified subgraph, they may indicate a potential memory leak. The memory analysis system may further analyze a larger portion of the weighted object graph based on a detected common pattern. Each detected pattern may be ranked based on the likelihood that it corresponds to a memory leak.
Abstract:
A method for authenticating a request for access to resources is described. A request for access to a resource is received from a user, and the user accesses a proof-of-work challenge. An adjustment factor associated with the user is determined. The adjustment factor may be generated as a function of a password associated with the user and the requested resource. The proof-of-work challenge may have a complexity that is determined based on the adjustment factor. A selected password and a solution to the proof-of-work challenge are received from the user. It is determined whether the received solution is correct based on the determined adjustment factor.
Abstract:
Systems and methods are described for coordinating clocks in a distributed computing environment. In one embodiment, a plurality of groups of nodes are formed. Nodes within a group may be time-synchronized and time differences between groups may be tracked. Clock adjustments between groups may be accumulated for tracked activities. The accumulated clock adjustments may be used to determine an ordering of the tracked activities.
Abstract:
Techniques and systems are provided for detecting penetration attempts with fuzzing techniques utilizing historical log data of target system. The techniques may, for example, include comparing logs captured in response to fuzzed inputs with large numbers of historical logs and then modifying how the inputs are fuzzed based on how the fuzzed inputs resulting in a high similarity score were fuzzed. In some implementations, historical logs and captured logs with high similarity scores may cause an alarm condition to be triggered to alert a human operator.