String sanitizer modeling
    31.
    发明授权

    公开(公告)号:US12182273B2

    公开(公告)日:2024-12-31

    申请号:US17665319

    申请日:2022-02-04

    Applicant: SAP SE

    Abstract: Code injection is a type of security vulnerability in which an attacker injects client-side scripts modifying the content being delivered. A sanitizer function may provide defense against such attacks by removing certain characters (e.g., characters causing state transitions in HTML). A string sanitizer may be modeled in order to determine its effectiveness by obtaining data flow information indicating string operations that used an input string or information derived therefrom, including a string sanitizer function. A deterministic finite automata representing string values of the output parameter may be generated based on a graph generated from the data flow information, where the automata accepts possible output string values of the sanitizer. It can be determined whether there is a non-empty intersection between the automata for the sanitizer output and an automata representing a security exploit, which would indicate that the sanitizer function is vulnerable to the exploit.

    Web application execution with secure element extension

    公开(公告)号:US11386214B2

    公开(公告)日:2022-07-12

    申请号:US16218781

    申请日:2018-12-13

    Applicant: SAP SE

    Inventor: Martin Johns

    Abstract: Various examples are directed to systems and methods for executing a web application with client-side encryption. A web browser can receive a document comprising a plurality of data elements including a secure element that comprises an encrypted value. An extension component may generate a secure container element to replace the secure element. The extension component can also insert a subdocument into the secure container element. The web browser may be configured to prevent web applications from accessing the subdocument. The extension component may also decrypt the encrypted value to generate a clear value and write the clear value to the subdocument. The web browser may render the document using the clear value.

    Robust and transparent persistence of taint information to enable detection and mitigation of injection attacks

    公开(公告)号:US11374966B2

    公开(公告)日:2022-06-28

    申请号:US16218752

    申请日:2018-12-13

    Applicant: SAP SE

    Inventor: Martin Johns

    Abstract: Methods, systems, and computer-readable storage media for receiving, by a database connector having a taint extension, a SQL request from an application, sending, by the taint extension, the SQL request to a SQL parser, receiving, by the taint extension, a structural representation of the SQL request from the SQL parser, adding, by the taint extension, taint information corresponding to data within the SQL request to provide an enhanced SQL statement, and transmitting, by the database connector, the enhanced SQL statement to a database for storing the taint information with the data.

    Dynamic data-use restrictions
    34.
    发明授权

    公开(公告)号:US10552642B2

    公开(公告)日:2020-02-04

    申请号:US15650064

    申请日:2017-07-14

    Applicant: SAP SE

    Abstract: Data use restrictions are linked with a data value for a data instance, such as in a data type implementation. The data use restrictions can be compared with a purpose associated with an operation request, such as an operation request from a software application, to determine whether the operation is permitted or prohibited. The data use restrictions can be automatically propagated to derivative data. Log entries can be generated for operations involving the data. The data use restrictions can include a data subject identifier and a data identifier, which may be used to locate related data and data associated with a particular data subject.

    Condition checking for page integration of third party services

    公开(公告)号:US10397243B2

    公开(公告)日:2019-08-27

    申请号:US14341585

    申请日:2014-07-25

    Applicant: SAP SE

    Abstract: A widget generator may be configured to provide, to a browser application, a widget that is executable to be rendered in conjunction with a page rendered by the browser application. A protection manager may be configured to provide, to the browser application and in conjunction with the widget, a protection script that is executable within a page context of the page and separate from a widget context of the widget. The protection script, during execution, validates a condition associated with a frame of the page that is used to render the widget, and enables functionality of the widget within the page, based on validation of the condition.

    Protection Against Third Party JavaScript Vulnerabilities

    公开(公告)号:US20190228150A1

    公开(公告)日:2019-07-25

    申请号:US15880398

    申请日:2018-01-25

    Applicant: SAP SE

    Inventor: Martin Johns

    Abstract: Embodiments protect against security vulnerabilities arising from 3rd party JavaScript code. A browser receives from a server, a document including a first JavaScript. The browser in turn references a list stored in a database to recognize the first JavaScript as originating from other than the server. This recognition process may involve obtaining a stacktrace. The browser then references a second JavaScript in order to instrument a document object model (DOM) feature (e.g., global API, DOM element-attached API, DOM node property) to sanitize the first JavaScript. For instrumenting a global API, this may comprise overwriting a global reference in the first JavaScript with a replacement reference to a sanitization function. For instrumenting the DOM element-attached API or the DOM node property, the instrumenting may comprise altering a prototype of the DOM node element. The browser causes the DOM feature to sanitize the first JavaScript, and passes a sanitized JavaScript for execution.

    Anomalous commit detection
    37.
    发明授权

    公开(公告)号:US10339311B2

    公开(公告)日:2019-07-02

    申请号:US15435961

    申请日:2017-02-17

    Applicant: SAP SE

    Abstract: Various examples are directed to detecting anomalous modifications to a software component. For example, a computing device may receive, from a version control system, version metadata describing properties of a plurality of commits for the software component. The computing device may generate a plurality of commit clusters based, at least in part, on the properties of the plurality of commits. The computing device may determine a first anomalous commit of the plurality of commits and generate an alert message indicating a first code segment modified by the first commit.

    AUTOMATIC GENERATION OF LOW-INTERACTION HONEYPOTS

    公开(公告)号:US20190020683A1

    公开(公告)日:2019-01-17

    申请号:US15650974

    申请日:2017-07-17

    Applicant: SAP SE

    Abstract: Various embodiments of systems, computer program products, and methods to automatically generate low-interaction honeypots to protect application landscapes through are described herein. In an aspect, representative applications associated with resources in a network are identified. The low-interaction honeypots are automatically generated for the identified representative applications. Further, the representative applications are probed to retrieve responses corresponding to different requests. Templates are generated corresponding to request-response pairs by parsing the responses and the requests. During operation, new requests for accessing the resources are responded based on the generated templates. The new requests and corresponding responses are recorded.

    DYNAMIC DATA-USE RESTRICTIONS
    39.
    发明申请

    公开(公告)号:US20190018985A1

    公开(公告)日:2019-01-17

    申请号:US15650064

    申请日:2017-07-14

    Applicant: SAP SE

    Abstract: Data use restrictions are linked with a data value for a data instance, such as in a data type implementation. The data use restrictions can be compared with a purpose associated with an operation request, such as an operation request from a software application, to determine whether the operation is permitted or prohibited. The data use restrictions can be automatically propagated to derivative data. Log entries can be generated for operations involving the data. The data use restrictions can include a data subject identifier and a data identifier, which may be used to locate related data and data associated with a particular data subject.

    SECURITY TESTING FRAMEWORK INCLUDING VIRTUALIZED SERVER-SIDE PLATFORM

    公开(公告)号:US20180349602A1

    公开(公告)日:2018-12-06

    申请号:US15615603

    申请日:2017-06-06

    Applicant: SAP SE

    Inventor: Martin Johns

    Abstract: A web application security testing framework includes a HTTP browser engine replaying recorded sessions to identify candidate traces indicative of attack. A mutation engine changes values in the attack candidate traces to generate additional traces posed against a virtualized server-side platform. The virtualized server-side platform creates snapshots of application state for testing, avoiding permanent damage to application persistence. The virtualized server-side platform includes persistence monitoring sensors (e.g., at connectors to the database or file system) for detecting vulnerability classes including Cross-Site Request Forgery (CSRF) and SQL injection attacks. For remote command execution attack detection, a server-side vulnerability validation interface records strings passed to code generating application program interfaces (APIs). For possible Cross-Site Scripting (XSS) attacks, the mutation engine may detect HTTP responses for examination of generated web code, and the HTTP browser may be extended to include a vulnerability validation API that is automatically called by successfully injected attack payloads.

Patent Agency Ranking