Static analysis for discovery of timing attack vulnerabilities in a computer software application
    81.
    发明授权
    Static analysis for discovery of timing attack vulnerabilities in a computer software application 有权
    在计算机软件应用程序中发现计时攻击漏洞的静态分析

    公开(公告)号:US09239926B2

    公开(公告)日:2016-01-19

    申请号:US13537497

    申请日:2012-06-29

    申请人: Omer Tripp

    发明人: Omer Tripp

    摘要: Discovering timing attack vulnerabilities in a computer software application by statically analyzing instructions of a computer software application to identify multiple possible execution paths traversing any of the instructions, calculating, for each of the possible execution paths, a cost associated with the execution of the instructions traversed by the possible execution path, comparing the costs of at least two of the possible execution paths having inputs of the same size, and identifying as a timing attack vulnerability any of the compared possible execution paths whose cost differs, by at least a predetermined amount, from the cost of any other of the compared possible execution paths.

    摘要翻译: 通过静态分析计算机软件应用程序的指令来识别计算机软件应用程序中的计时攻击漏洞,以识别穿过任何指令的多个可能的执行路径,为每个可能的执行路径计算与执行的指令相关的成本 通过可能的执行路径,比较具有相同大小的输入的至少两个可能执行路径的成本,并且将成本相差至少预定量的可比执行路径中的任一个识别为定时攻击脆弱性, 从任何其他可比较的执行路径的成本。

    Determining the vulnerability of computer software applications to attacks
    82.
    发明授权
    Determining the vulnerability of computer software applications to attacks 有权
    确定计算机软件应用程序攻击的脆弱性

    公开(公告)号:US09210184B2

    公开(公告)日:2015-12-08

    申请号:US12648445

    申请日:2009-12-29

    摘要: Determining the vulnerability of computer software applications to attacks by identifying a defense-related variable within a computer software application that is assigned results of a defense operation defending against a predefined type of attack, identifying a control-flow predicate dominating a security-sensitive operation within the application, identifying a data-flow dependent variable in the application that is data-flow dependent on the defense-related variable, determining whether the control-flow predicate uses the data-flow dependent variable to make a branching decision and whether a control-flow path leading to the security-sensitive operation is taken only if the data-flow dependent variable is compared against a value of a predefined type, determining that the security-sensitive operation is safe from the attack if both control-flow conditions are true, and determining that the application is safe from the attack if all security-sensitive operations in the application are determined to be safe from the attack.

    摘要翻译: 通过在计算机软件应用程序中识别防御相关变量来确定计算机软件应用程序对攻击的脆弱性,该计算机软件应用程序分配了针对预定类型攻击的防御操作结果,识别控制安全敏感操作的控制流谓词 该应用程序在应用程序中识别数据流依赖于与防御相关变量的数据流相关变量,确定控制流谓词是否使用数据流依赖变量进行分支决策,以及控制 - 只有当数据流相关变量与预定义类型的值进行比较时,才能获得导致安全敏感操作的流程路径,如果两个控制流条件都为真,则确定安全敏感操作对于攻击是安全的, 并且如果应用程序中的所有安全敏感操作都确定应用程序是否安全 被确定为安全的攻击。

    Generating a custom parameter rule based on a comparison of a run-time value to a request URL
    83.
    发明授权
    Generating a custom parameter rule based on a comparison of a run-time value to a request URL 有权
    根据运行时间值与请求URL的比较生成自定义参数规则

    公开(公告)号:US09026612B2

    公开(公告)日:2015-05-05

    申请号:US13447952

    申请日:2012-04-16

    IPC分类号: G06F13/00 H04L29/08

    CPC分类号: G06F17/30893 H04L29/08981

    摘要: Identifying at least one custom parameter in a request uniform resource locator (URL). The method can include identifying at least a first portion of source code of a Web application that typically consumes the custom parameter provided in the request URL and, via a processor, instrumenting the Web application at the first portion of the source code. The Web application can receive the request URL and the Web application can be executed with the instrumented source code. At least one run-time value consumed by the second portion of the source code can be identified, and the run-time value can be compared to the request URL to determine whether the run-time value intersects with the request URL. Responsive to determining that the run-time value intersects with the request URL, the run-time value can be identified as the custom parameter. A custom parameter rule can be generated based on the comparison.

    摘要翻译: 在请求统一资源定位符(URL)中标识至少一个自定义参数。 该方法可以包括识别Web应用程序的源代码的至少第一部分,其通常消耗在请求URL中提供的自定义参数,并且经由处理器在源代码的第一部分检验Web应用程序。 Web应用程序可以接收请求URL,Web应用程序可以使用带检测的源代码执行。 可以识别由源代码的第二部分消耗的至少一个运行时值,并且可以将运行时值与请求URL进行比较,以确定运行时值是否与请求URL相交。 响应于确定运行时值与请求URL相交,运行时值可以被标识为自定义参数。 可以根据比较生成自定义参数规则。

    Detecting persistent vulnerabilities in web applications
    84.
    发明授权
    Detecting persistent vulnerabilities in web applications 有权
    检测Web应用程序中的持久漏洞

    公开(公告)号:US08949992B2

    公开(公告)日:2015-02-03

    申请号:US13149158

    申请日:2011-05-31

    申请人: Yair Amit Omer Tripp

    发明人: Yair Amit Omer Tripp

    摘要: A method, including storing a test payload to a persistent state of an application and performing a static analysis to identify a first code location in the application that retrieves the test payload, to identify a first path from an entry point to the first code location, and to identify a second path from the first code location to a second code location that executes a security sensitive operation using the retrieved data. A dynamic analysis is then performed to retrieve the test payload via the first path, and to convey the test payload to the second code location via the second path.

    摘要翻译: 一种方法,包括将测试有效负载存储到应用的持久状态并执行静态分析以识别应用中检索测试有效载荷的第一代码位置,以识别从入口点到第一代码位置的第一路径, 并且识别从第一代码位置到使用检索的数据执行安全敏感操作的第二代码位置的第二路径。 然后执行动态分析以经由第一路径检索测试有效载荷,并且经由第二路径将测试有效载荷传送到第二代码位置。

    ANOMALY DETECTION AT THE LEVEL OF RUN TIME DATA STRUCTURES

    公开(公告)号:US20140053029A1

    公开(公告)日:2014-02-20

    申请号:US13614671

    申请日:2012-09-13

    IPC分类号: G06F11/07

    CPC分类号: G06F11/0751

    摘要: A useful embodiment of the invention is directed to a method associated with a computer program comprising one or more basic blocks, wherein the program defines and uses multiple data structures, such as the list of all customers of a bank along with their account information. The method includes identifying one or more invariants, wherein each invariant is associated with one of the data structures. The method further includes determining at specified times whether an invariant has been violated. Responsive to detecting a violation of one of the invariants, the detected violation is flagged as an anomaly.

    USING A HEURISTICALLY-GENERATED POLICY TO DYNAMICALLY SELECT STRING ANALYSIS ALGORITHMS FOR CLIENT QUERIES
    89.
    发明申请
    USING A HEURISTICALLY-GENERATED POLICY TO DYNAMICALLY SELECT STRING ANALYSIS ALGORITHMS FOR CLIENT QUERIES 有权
    使用全景生成策略动态选择客户端查询的分析算法

    公开(公告)号:US20130091079A1

    公开(公告)日:2013-04-11

    申请号:US13412121

    申请日:2012-03-05

    IPC分类号: G06F15/18

    CPC分类号: G06N5/00

    摘要: A method for dynamically selecting string analysis algorithms can begin with the training of the dynamic string analysis handler of a string analysis module to effectively handle a subset of string queries having contextual metadata received from a client application in an instructional environment. The effectiveness of the training module can be based upon feedback from the client application. Upon completion of the training, a string analysis algorithm selection policy can be synthesized. The string analysis algorithm selection policy can correlate a context of a string query in the subset to the usage of a string analysis algorithm. When in the operational environment, the dynamic string analysis handler can dynamically handle string queries having contextual metadata received from the client application in accordance with the string analysis algorithm selection policy. The string analysis algorithm to be used for a string query can be dynamically and independently determined.

    摘要翻译: 用于动态选择字符串分析算法的方法可以开始于字符串分析模块的动态字符串分析处理程序的训练,以有效地处理在教学环境中从客户端应用程序接收的具有上下文元数据的字符串查询的子集。 培训模块的有效性可以基于客户端应用程序的反馈。 完成培训后,可以合成字符串分析算法选择策略。 字符串分析算法选择策略可以将子集中的字符串查询的上下文与字符串分析算法的使用相关联。 在操作环境中,动态字符串分析处理程序可以根据字符串分析算法选择策略来动态地处理具有从客户端应用程序接收的上下文元数据的字符串查询。 用于字符串查询的字符串分析算法可以动态和独立地确定。

    Determining whether method of computer program is a validator
    90.
    发明授权
    Determining whether method of computer program is a validator 失效
    确定计算机程序的方法是否为验证程序

    公开(公告)号:US08365281B2

    公开(公告)日:2013-01-29

    申请号:US12950432

    申请日:2010-11-19

    CPC分类号: G06F21/50 G06F21/563

    摘要: An illegal pattern and a computer program having a method are received. The method has one or more return statements, and a number of basic blocks. The method is normalized so that each return statement of the target method relating to the illegal pattern returns a constant Boolean value. A first path condition and a second path condition for one or more corresponding paths is determined such that one or more corresponding basic blocks return a constant Boolean value of true for the first path condition and a constant Boolean value of false for the second path condition. An unsatisfiability of each path condition is determined using a monadic second-order logic (M2L) technique. Where the unsatisfiability of either path condition is false, the method is reported as not being a validator. Where the unsatisfiability of either path condition is true, the method is reported as being a validator.

    摘要翻译: 接收到具有方法的非法模式和计算机程序。 该方法具有一个或多个返回语句和一些基本块。 该方法被归一化,使得与非法模式相关的目标方法的每个返回语句返回一个常量布尔值。 确定用于一个或多个对应路径的第一路径条件和第二路径条件,使得一个或多个对应的基本块返回针对第一路径条件的常数布尔值为true,对于第二路径条件返回常量布尔值为假。 使用一元二阶逻辑(M2L)技术确定每个路径条件的不满足性。 如果任一路径条件的不满足性为假,则将该方法报告为不是验证器。 如果任一路径条件的不满足性为真,则将该方法报告为验证器。