Taint tracking via non-intrusive bytecode instrumentation

    公开(公告)号:US11526600B2

    公开(公告)日:2022-12-13

    申请号:US17127772

    申请日:2020-12-18

    Applicant: SAP SE

    Abstract: Various embodiments of systems and methods to track tainting information via non-intrusive bytecode instrumentation are described herein. The described techniques include, at one aspect, defining a taint-aware class to shadow an original data class. The taint-aware class includes a payload field to store objects of the original data class, a metadata field to store tainting information corresponding to the objects of the original data class, and a method proxying a corresponding method of the original data class. In another aspect, the instances of the original data class are replaced with corresponding instances of the taint-aware class in an application bytecode. Further, in a yet another aspect, when executing the application in a runtime environment, the method propagates the content of the metadata filed and calls the corresponding method of the original data class to manage the content of the payload field.

    Client-side taint-protection using taint-aware javascript

    公开(公告)号:US11283834B2

    公开(公告)日:2022-03-22

    申请号:US16218732

    申请日:2018-12-13

    Applicant: SAP SE

    Inventor: Martin Johns

    Abstract: Methods, systems, and computer-readable storage media for receiving, by a web browser executing on a client-side device, a response from a server, the response provided in a taint-enhanced data format, processing, by a Javascript framework executed by the web browser, the response to parse data within the response and, for any data values marked as tainted, providing respective taint string Javascript objects as sanitized data, and providing the sanitized data to a document object model (DOM).

    Web application session security with protected session identifiers

    公开(公告)号:US10992759B2

    公开(公告)日:2021-04-27

    申请号:US16002399

    申请日:2018-06-07

    Applicant: SAP SE

    Inventor: Martin Johns

    Abstract: Various examples are directed to systems and methods for secure communication sessions between a web application and a server. A session vault routine executing at a computing device may receive a first request message directed to a server computing device. The first request message may comprise a client session identifier at a session identifier field of the first request message. The session vault routine may access supplemental session identifier data from a session vault persistence at the data storage. The session vault routine may write the supplemental session identifier data to a second field of the first request message, and initiate sending the first request message to the server computing device.

    WEB APPLICATION EXECUTION WITH SECURE ELEMENTS

    公开(公告)号:US20210004502A1

    公开(公告)日:2021-01-07

    申请号:US17031448

    申请日:2020-09-24

    Applicant: SAP SE

    Inventor: Martin Johns

    Abstract: Various examples are directed to systems and methods for executing a web application with client-side encryption. A web application may execute in a web browser at a client computing device. The web browser may generate a document comprising a secure display element. The web browser may request to render the document at the client computing device. A cryptographic tool of the web browser may decrypt the first encrypted value to generate a first clear value. The web browser may render the document at an output device of the client computing device using the clear value. The web browser may also be programmed to prevent the web application from accessing the first clear value.

    Dynamic, non-invasive taint tracking using auto-generated datatypes

    公开(公告)号:US10783243B2

    公开(公告)日:2020-09-22

    申请号:US15862347

    申请日:2018-01-04

    Applicant: SAP SE

    Abstract: Systems and methods are provided herein for dynamic, non-invasive taint tracking using auto-generated datatypes. A proxy entry point component of a taint-aware environment continuously monitors for a request to initiate an application. The application has an associated runtime environment and profile parameters specific to the application. Upon identifying the request, a core component of the taint-aware environment generates a set of augmented classes based on the profile parameters. The set of augmented classes contains taint-tracking functionality. The proxy entry point component modifies an initiation pathway of the application to force the runtime environment to retrieve the set of augmented classes prior to execution of the application. The runtime environment continuously monitors for tainted data or tainted code passed through or contained within the application based on the taint-tracking functionality of the set of augmented classes.

    Mitigation of injection security attacks against non-relational databases

    公开(公告)号:US10657280B2

    公开(公告)日:2020-05-19

    申请号:US15882043

    申请日:2018-01-29

    Applicant: SAP SE

    Abstract: For mitigation of injection security attacks against non-relational databases, a database driver layer is integrated with a security layer. A trigger associated with the security layer is set to implement a learning phase of the security layer. In response to enabling the trigger, queries and query parameters associated with the respective queries are received. For the queries, a previously-stored security pattern is identified based on the query and the associated query parameters. The trigger associated with the security layer is reset to implement an execution of the security patterns. In response to resetting the trigger, an additional query and additional query parameters associated with the additional query is received. A particular security pattern is identified that is associated with the additional query and the additional query parameters. At least one of the additional query parameters is determined to not match a corresponding query parameter of the particular security pattern.

    WEB BROWSER SCRIPT MONITORING
    27.
    发明申请

    公开(公告)号:US20190377877A1

    公开(公告)日:2019-12-12

    申请号:US16002412

    申请日:2018-06-07

    Applicant: SAP SE

    Inventor: Martin Johns

    Abstract: Various examples are directed to systems and methods for securing a web browser. The web browser may parse web content received from a server and identify a script associated with the web content. The web browser may generate script fingerprint data for the script. The script fingerprint data may comprise script code data describing script code for the script and script syntax data describing the script. The web browser may determine that the script fingerprint data is not described by local known script data and may send an anomalous script report to the server, where the anomalous script report comprising the script fingerprint data. The web browser may also update the local known script data to describe the script fingerprint data.

    Automatic generation of low-interaction honeypots

    公开(公告)号:US10454969B2

    公开(公告)日:2019-10-22

    申请号:US15650974

    申请日:2017-07-17

    Applicant: SAP SE

    Abstract: Various embodiments of systems, computer program products, and methods to automatically generate low-interaction honeypots to protect application landscapes through are described herein. In an aspect, representative applications associated with resources in a network are identified. The low-interaction honeypots are automatically generated for the identified representative applications. Further, the representative applications are probed to retrieve responses corresponding to different requests. Templates are generated corresponding to request-response pairs by parsing the responses and the requests. During operation, new requests for accessing the resources are responded based on the generated templates. The new requests and corresponding responses are recorded.

    MITIGATION OF INJECTION SECURITY ATTACKS AGAINST NON-RELATIONAL DATABASES

    公开(公告)号:US20190236301A1

    公开(公告)日:2019-08-01

    申请号:US15882043

    申请日:2018-01-29

    Applicant: SAP SE

    Abstract: For mitigation of injection security attacks against non-relational databases, a database driver layer is integrated with a security layer. A trigger associated with the security layer is set to implement a learning phase of the security layer. In response to enabling the trigger, queries and query parameters associated with the respective queries are received. For the queries, a previously-stored security pattern is identified based on the query and the associated query parameters. The trigger associated with the security layer is reset to implement an execution of the security patterns. In response to resetting the trigger, an additional query and additional query parameters associated with the additional query is received. A particular security pattern is identified that is associated with the additional query and the additional query parameters. At least one of the additional query parameters is determined to not match a corresponding query parameter of the particular security pattern.

    Component protection frameworks using defensive patterns

    公开(公告)号:US10242180B2

    公开(公告)日:2019-03-26

    申请号:US15403603

    申请日:2017-01-11

    Applicant: SAP SE

    Abstract: Systems and methods are provided herein for establishing a protection framework for a component. Identified assets of a component requiring protection from a potential attack are received. A list of assets is generated based on the identified assets. A protection framework is configured to include at least one defensive pattern to protect the list of assets against the potential attack. The protection framework is executed to establish a hardened boundary between the component and an attack surface of the component.

Patent Agency Ranking