-
公开(公告)号:US11436030B2
公开(公告)日:2022-09-06
申请号:US16788041
申请日:2020-02-11
Applicant: Cisco Technology, Inc.
Inventor: Walter Theodore Hulick, Jr.
Abstract: In one embodiment, an agent inserts instrumentation into a Java Platform Module System in which a plurality of Java modules of an application is executed. The agent captures, using the instrumentation, an access check failure for an inter-module operation between the Java modules. The agent overrides, using the instrumentation, the access check failure. The agent reports the captured access check failure to a user interface.
-
公开(公告)号:US11012523B2
公开(公告)日:2021-05-18
申请号:US16520919
申请日:2019-07-24
Applicant: Cisco Technology, Inc.
Inventor: Walter Theodore Hulick, Jr. , Harish Nataraj
Abstract: In one embodiment, a proxying agent loaded at application startup loads a circuit breaker framework into a class loader, and also loads a circuit breaker proxy into an extension class loader seen by the proxying agent and by the application. The proxying agent may also instrument selected methods of the application, such that, when calling to run an instrumented method: an ID of the circuit breaker proxy is set to a trackable context, and the proxy execution may be held until exit of the run method (and if exit of the run method is due to a particular exception, an exception of the proxy may also be set to reflect the particular exception). The circuit breaker may then monitor the proxy for latency, exceptions, and circuit breaker trip criteria, and stops the run method in response to the latency, exceptions, or circuit breaker trip criteria surpassing a particular respective threshold.
-
公开(公告)号:US10984109B2
公开(公告)日:2021-04-20
申请号:US15883492
申请日:2018-01-30
Applicant: Cisco Technology, Inc.
Inventor: Walter Theodore Hulick, Jr.
IPC: H04L29/06 , G06F21/00 , G06F21/57 , G06F16/951
Abstract: In one embodiment, a process on a computer for dynamic application component auditing is disclosed, the process includes automatically identifying, by an agent, all application components in an application. The process includes determining, by the agent, manifest information for the identified application components. The process includes accessing, by the agent, an alias file to convert the determined manifest information to align with corresponding information in a vulnerability database. The process includes using a Web service to query the vulnerability database to search for a match with the converted manifest information. The process includes responsive to the query, creating an audit report of the application components.
-
公开(公告)号:US11635972B2
公开(公告)日:2023-04-25
申请号:US16788497
申请日:2020-02-12
Applicant: Cisco Technology, Inc.
Inventor: Walter Theodore Hulick, Jr.
Abstract: In one embodiment, a device launches a core agent for a Java application. The core agent loads a first tenant and a second tenant, each tenant having its own isolated class loader. The device instruments, via the core agent and by each tenant, the Java application to capture data regarding execution of the Java application. The device provides the captured data to a user interface.
-
公开(公告)号:US11553001B2
公开(公告)日:2023-01-10
申请号:US16787552
申请日:2020-02-11
Applicant: Cisco Technology, Inc.
Inventor: Walter Theodore Hulick, Jr.
Abstract: In one embodiment, a client device accesses an online application via a browser executed by the client device. The client device makes an assessment as to whether the online application uses Hypertext Transfer Protocol (HTTP) security headers that satisfy a security header policy. The client device generates scoring for the webpage based on the assessment. The client device presents the generated scoring to a user of the client device.
-
公开(公告)号:US11349909B2
公开(公告)日:2022-05-31
申请号:US16921431
申请日:2020-07-06
Applicant: Cisco Technology, Inc.
Inventor: Walter Theodore Hulick, Jr.
IPC: H04L67/10 , G06N20/00 , G06F9/455 , H04W24/02 , H04L67/025
Abstract: In one embodiment, an agent executed by a device detects an invocation that is made using Java reflection of a method associated with a microservice. The agent instruments the invocation of the method associated with the microservice, to capture one or more metrics regarding the microservice. The agent optimizes the invocation of the method associated with the microservice. The agent provides the one or more metrics regarding the microservice to a user interface.
-
公开(公告)号:US12299097B2
公开(公告)日:2025-05-13
申请号:US17390610
申请日:2021-07-30
Applicant: Cisco Technology, Inc.
Inventor: Walter Theodore Hulick, Jr. , David John Zacks , Thomas Szigeti
Abstract: According to one or more embodiments of the disclosure, the techniques herein are directed toward a dynamic transaction-aware web application authentication using call intercepts. In one embodiment, a method comprises: intercepting, by a monitoring process, calls made for transactions within an executing application; determining, by the monitoring process, whether a particular intercepted call triggers an enhanced user authentication requirement for a particular transaction; initiating, by the monitoring process in response to the particular intercepted call triggering the enhanced user authentication requirement, a corresponding challenge to adequately authenticate a user for the particular transaction; and allowing, by the monitoring process, the particular intercepted call to proceed for the particular transaction in response to an adequately authenticated user for the particular transaction.
-
公开(公告)号:US12174941B2
公开(公告)日:2024-12-24
申请号:US17494952
申请日:2021-10-06
Applicant: Cisco Technology, Inc.
Inventor: Walter Theodore Hulick, Jr.
Abstract: In one embodiment, a method may comprise: instrumenting, by a process, runtime of a software application; detecting, by the process, a reflection call made within the runtime of the software application; determining, by the process and from the reflection call, a reflection target and a reflection caller; comparing, by the process, the reflection target, the reflection caller, and the reflection call against a security policy; and performing, by the process, one or more mitigation actions on the reflection call in response to a violation of the security policy. In another embodiment, a secure audit process first generates the security policy based on approving reflection calls, reflection targets, and reflection callers seen during a runtime of the software application in a secure environment, and then shares the security policy with local instrumentors of the software application to cause enforcement of the security policy against a local runtime of the software application.
-
公开(公告)号:US12061703B2
公开(公告)日:2024-08-13
申请号:US17088987
申请日:2020-11-04
Applicant: Cisco Technology, Inc.
Inventor: Walter Theodore Hulick, Jr.
CPC classification number: G06F21/577 , H04L63/1416
Abstract: In one embodiment, a device instruments an application to generate OpenTelemetry trace data during execution of the application. The device detects an occurrence of a security event during execution of the application. The device identifies a correlation between the security event and the OpenTelemetry trace data. The device provides an indication of the security event in conjunction with the OpenTelemetry trace data, based on the security event being correlated with the OpenTelemetry trace data.
-
公开(公告)号:US11971800B2
公开(公告)日:2024-04-30
申请号:US17743734
申请日:2022-05-13
Applicant: Cisco Technology, Inc.
Inventor: Walter Theodore Hulick, Jr. , Bhuvneshwar Kumar
IPC: G06F11/34
CPC classification number: G06F11/34
Abstract: In one embodiment, an illustrative method herein may comprise: listening, by an agent process, to a discovery-based execution of an application; determining, by the agent process, a plurality of transition locations during the discovery-based execution of the application; recording, by the agent process, the plurality of transition locations into a recorded file; and providing, by the agent process, the recorded file to cause injection of instrumentation into the plurality of transition locations during runtime of the application based on the recorded file.
-
-
-
-
-
-
-
-
-