Detection of data exfiltration
    12.
    发明授权

    公开(公告)号:US10462116B1

    公开(公告)日:2019-10-29

    申请号:US14855298

    申请日:2015-09-15

    Abstract: The present document describes systems and methods that detect unauthorized transmission of data from internal networks to remote service providers, even when the transmission occurs over an encrypted connection. An exfiltration monitor is configured to monitor encrypted communications between clients within an internal network and a remote service provider. In various implementations, the exfiltration monitor associates the encrypted connections with account information, and applies exfiltration policies to the connections based at least in part on the associated account information. In additional implementations, the exfiltration monitor is provided with cryptographic keys that facilitate packet inspection of the encrypted connections. In many situations, the exfiltration monitor can use this information to discern between authorized use of a remote service, and unauthorized data exfiltration to the remote service.

    Techniques for network site validation

    公开(公告)号:US10333922B1

    公开(公告)日:2019-06-25

    申请号:US15657878

    申请日:2017-07-24

    Abstract: Disclosed are various embodiments for validating the identity of network sites. A communication session is established with a network site using a credential for the network site. A validation of the communication session is generated based at least in part upon a profile for the network site. The profile is derived from at least one previous communication session with the network site. An action is initiated in response to the validation when the validation indicates a discrepancy exists between the profile for the network site and the communication session with the network site.

    PREVENTING LEAKAGE OF COOKIE DATA
    14.
    发明申请

    公开(公告)号:US20190166127A1

    公开(公告)日:2019-05-30

    申请号:US16265414

    申请日:2019-02-01

    Abstract: Disclosed are various embodiments for preventing the unintended leakage of cookie data. In one embodiment, a browser application stores cookie data from a first network site having a high-level domain in a client computing device. A classification is assigned to a second network site having the high-level domain. The cookie data is sent to the second network site based at least in part on the classification rather than the default behavior of the browser application.

    Dynamic rendering of user interfaces

    公开(公告)号:US10180848B1

    公开(公告)日:2019-01-15

    申请号:US14952596

    申请日:2015-11-25

    Abstract: Described are techniques for determining features to be presented in a user interface based on the times that users spent viewing previous webpages or other user interfaces. A data structure associating user viewing times with the count, size, color, or other features of the elements presented in the previous user interfaces may be generated. Based on this data structure and a target viewing time, a set of user interface features to be presented in a subsequent user interface may be selected.

    BUFFER OVERFLOW EXPLOIT DETECTION
    16.
    发明申请

    公开(公告)号:US20180349597A1

    公开(公告)日:2018-12-06

    申请号:US15894611

    申请日:2018-02-12

    CPC classification number: G06F21/52 G06F2221/033

    Abstract: A call to a memory management application programming interface (API) that results in a buffer overflow due to inaccurate bounds checking could potentially leave the system vulnerable to being exploited by a third party. Approaches presented herein can monitor calls to these APIs in order to determine typical memory sizes passed to these APIs. During an initial baselining period a number of profiles are generated that indicate expected memory size parameters under various different call conditions, such from specific sources or call stacks. Comparing subsequently received API calls against the expected values from the relevant profile enables the legitimacy of an API call to be determined with relatively high accuracy. A suspicious call is identified based at least in part upon determining that the memory size of the call falls outside an expected range for that API and the relevant context.

    Preventing inter-application message hijacking

    公开(公告)号:US10135808B1

    公开(公告)日:2018-11-20

    申请号:US14964959

    申请日:2015-12-10

    Abstract: Various approaches discussed herein enable validation of an application on a computing device, such as a mobile computing device, prior to that application being invoked by activation of a link in another application. Upon activation of the link in a calling application, the computing device determines a target application to be invoked in response to the activation. Sensitive or confidential data, such as login credentials, may be included in the link to be passed to the target application. By validating either the calling or the target application, the data may be safeguarded by confirming an identity of an application associated with the link.

    Secure message protocol
    18.
    发明授权

    公开(公告)号:US10063590B1

    公开(公告)日:2018-08-28

    申请号:US14694987

    申请日:2015-04-23

    Abstract: Observable characteristics of an encrypted data transmission can be analyzed and used to make inferences about the content of the data transmission. This information leakage is reduced by obscuring the observable characteristics of the data transmission. An obscuring engine is installed into the networking stack of a computer system that performs data transmission operations. The obscuring engine performs a variety of obscuring operations to obscure characteristics of the data transmission. The obscuring operations can include altering the size, packet ordering, packet partitioning, packet timing, and structure of the data transmission.

    Service-to-service digital path tracing

    公开(公告)号:US09954852B2

    公开(公告)日:2018-04-24

    申请号:US15420011

    申请日:2017-01-30

    Abstract: A service receives from a sender service a digital message and a corresponding trace, which includes an ordered set of digital signatures of one or more services that participated in causing the service to receive the digital message. The trace may further specify an ordering of the one or more services, which may be generated according to the order of participation of these one or more services. The service may compare the received trace to recorded message paths to determine whether the ordering specified within the trace is valid. If the ordering is valid, the service may use one or more digital certificates to further verify the digital signatures included within the trace. If the service determines that these digital signatures are also valid, the service may process the message.

Patent Agency Ranking