DETECTING COMPROMISED WEB PAGES IN A RUNTIME ENVIRONMENT

    公开(公告)号:US20240340315A1

    公开(公告)日:2024-10-10

    申请号:US18746008

    申请日:2024-06-17

    IPC分类号: H04L9/40 G06F16/958

    摘要: Techniques are provided for detecting compromised web pages in a runtime environment. A first version of a web page is retrieved and loaded in a browser comprising a browser extension configured to detect event listeners added when web pages are loaded by the browser. First data is generated describing a first set of event listeners detected by the browser extension when the first version of the web page is loaded. At a second time a second version of the web page is retrieved and loaded in the browser. Second data is generated describing a second set of event listeners detected by the browser extension when the second version of the web page is loaded. It is determined that the web page is compromised based on comparing the first data and the second data. In response to determining that the web page is compromised, a threat response action is performed.

    Detecting malicious scripts in a web page

    公开(公告)号:US11790083B2

    公开(公告)日:2023-10-17

    申请号:US16914183

    申请日:2020-06-26

    IPC分类号: G06F21/56 G06F21/55 H04L67/02

    摘要: Techniques are provided for detecting a malicious script in a web page. Instrumentation code is provided for serving to a client computing device with a web page. The instrumentation code is configured to monitor web code execution at the client computing device when a script referenced by the web page is processed. Script activity data generated by the instrumentation code is received. The script activity data describes one or more script actions detected by the instrumentation code at the client computing device. Prior script activity data generated by a prior instance of the instrumentation code is obtained. A malicious change in the script is detected based on comparing the script activity data and the prior script activity data. In response to detecting the malicious change in the script, a threat response action is performed.

    Security measures for extended sessions using multi-domain data

    公开(公告)号:US11743256B1

    公开(公告)日:2023-08-29

    申请号:US17087840

    申请日:2020-11-03

    IPC分类号: H04L9/40 H04L9/32

    CPC分类号: H04L63/0876 H04L9/32

    摘要: A security server device, method, non-transitory computer readable medium and security system that receives request data for a request from a client to a web server system where the request comprises a session identifier (ID) for a session between an authenticated user and the web server system. A determination is made whether the client is a single-user device based on the request data and multi-domain data. Another determinations is made on whether the client is compromised based on the request data. In response to the determinations that the client is a single-user device and is not compromised an extension of the session between the authenticated user on the client and the web server system is caused.

    Methods for automatically preventing data exfiltration and devices thereof

    公开(公告)号:US11736512B1

    公开(公告)日:2023-08-22

    申请号:US17069180

    申请日:2020-10-13

    发明人: Jarrod S. Overson

    IPC分类号: H04L9/40

    摘要: Methods, non-transitory computer readable media, protection server apparatuses, and network security systems that improve network security for web applications by mitigating cyberattacks that cause the exfiltration of data are illustrated. With this technology, network request(s) are received from a client that specify domain(s) to which the client has sent data during rendering of a webpage. The webpage includes instrumentation code configured to intercept and post the network requests. A determination is then mage when one of the domain(s) is a malicious domain. Interceptor code is generated based on a type of attack that is associated with the one of the domains, when the determination indicates the one of the domains is a malicious domain. The instrumentation code is then updated to include the interceptor code. The interceptor code is configured to mitigate the attack when the webpage is subsequently rendered by another client.

    Detecting compromised credentials by improved private set intersection

    公开(公告)号:US11366892B2

    公开(公告)日:2022-06-21

    申请号:US16380958

    申请日:2019-04-10

    摘要: In an embodiment, a method is configured to detect compromised credentials, comprising: generating a plurality of bloom filters, wherein each bloom filter corresponds to a particular subset of a set of compromised credentials; receiving an index value from a client computing device; in response to receiving the index value, determining a target bloom filter corresponding to the index value, and sending the target bloom filter to the client computing device; receiving a first value from the client computing device; in response to receiving the first value, generating a second value based on the first value, and sending the second value to the client computing device.

    Determining environment parameter values using rendered emoji analysis

    公开(公告)号:US11329999B1

    公开(公告)日:2022-05-10

    申请号:US16192458

    申请日:2018-11-15

    IPC分类号: H04L29/06 G06T7/90

    摘要: Techniques are provided for determining environment parameter values based on rendered emoji analysis, A server computer provides a first set of code that, when executed by a browser application at a client computing device, renders a set of emoji at the client computing device, generates a set of rendered graphic data for the set of emoji at the client computing device, and transmits the set of rendered graphic data for each emoji of the set of emoji from the client computing device to the server computer. The server computer receives the rendered graphic data generated at the client computing device, Based on the set of rendered graphic data for the set of emoji generated at the client computing device, the server computer determines a set values for one or more environment parameters of the client computing device.

    Client/server security by an intermediary rendering modified in-memory objects

    公开(公告)号:US11088995B2

    公开(公告)日:2021-08-10

    申请号:US16024621

    申请日:2018-06-29

    发明人: Justin Call

    摘要: In an embodiment, a method comprises intercepting, from a server computer, a first set of instructions that define one or more objects and one or more operations that are based, at least in part, on the one or more objects; generating, in memory, one or more data structures that correspond to the one or more objects; performing the one or more operations on the one or more data structures; updating the one or more data structures, in response to performing the one or more operations, to produce one or more updated data structures; rendering a second set of instructions, which when executed by a remote client computer cause the remote client computer to generate the updated data structures in memory on the remote client computer, wherein the second set of instructions are different than the first set of instructions; sending the second set of instructions to the remote client computer.

    Secure detection and management of compromised credentials using a salt and a set model

    公开(公告)号:US10911438B2

    公开(公告)日:2021-02-02

    申请号:US16025918

    申请日:2018-07-02

    摘要: Techniques are provided for secure detection and management of compromised credentials. A first candidate credential is received, comprising a first username and a first password, wherein the first candidate credential was sent in a first request from a first client computer to log in to a first server computer. A first salt associated with the first username in a salt database is obtained. A first hashed credential is generated based on the first password and the first salt. The first hashed credential is transmitted to a set model server computer, wherein the set model server computer is configured to maintain a set model that represents a set of spilled credentials, determine whether the first hashed credential is represented in the set model, and in response to determining that the first hashed credential is represented in the set model, performing additional processing on the first hashed credential.