SQL proxy analyzer to detect and prevent unauthorized SQL queries

    公开(公告)号:US12111916B2

    公开(公告)日:2024-10-08

    申请号:US17455109

    申请日:2021-11-16

    摘要: A proxy apparatus for analyzing database queries in a secure network using a valid-query library that is constructed during an initial period following the deployment of an application. The proxy apparatus receives, in an operational mode, an operational database query from the secure network, generates an identifier for the received operational database query based at least upon a query code of the received operational database query; identifies a source and a destination of the received operation database query and compares the generated identifier, the identified source, and the identified destination to the valid-query library. When the comparing fails to match any entries in the valid-query library, the proxy apparatus terminates the operational database query; and when the comparing step matches an entry in the valid-query library, the proxy apparatus relays the received operational database query based on the destination identification.

    Method and apparatus to reduce the window for policy violations with minimal consistency assumptions

    公开(公告)号:US12107866B2

    公开(公告)日:2024-10-01

    申请号:US18211537

    申请日:2023-06-19

    申请人: Styra, Inc.

    摘要: Some embodiments provide a method for authorizing application programming interface (API) calls on a host computer in a local cluster of computers. The method is performed in some embodiments by an API-authorizing agent executing on the host computer in the local computer cluster. From a remote cluster of computers, the method receives (1) a set of API-authorizing policies to evaluate in order to determine whether API calls to an application executing on the host computer are authorized, and (2) a set of parameters needed for evaluating the policies. With the remote cluster of computers, the method registers for notifications regarding updates to the set of parameters. The method then receives notifications, from the remote cluster, regarding an update to the set of parameters, and modifies the set of parameters based on the update. In some embodiments, the notification includes the update, while in other embodiments the method directs the remote cluster to provide the update after receiving the notification regarding the update. In addition to the notifications, the method periodically polls the remote cluster to retrieve the set of parameters needed for the received set of policies, in order to supplement data received through the notifications.

    Systems and methods for providing a cyber investigative pipeline

    公开(公告)号:US12105796B2

    公开(公告)日:2024-10-01

    申请号:US16596971

    申请日:2019-10-09

    摘要: Systems and methods for tracking, collecting, processing, enriching, analyzing and reporting on data in the context of cyber security investigations are disclosed. According to one embodiment, in an information processing apparatus comprising at least one computer processor, a method for conducing cyber investigations may include: (1) receiving initiation of an investigative workflow comprising contextual information including at least one of a case, a data asset, a subject, and a threat; (2) collecting digital evidence from the data asset; (3) processing the digital evidence into structured data; (4) staging and enriching the structured data; (5) analyzing the enriched structured data; and (6) generating at least one report based on the analysis.

    System for electronic data obfuscation and protection using independent destructible data objects

    公开(公告)号:US12105794B2

    公开(公告)日:2024-10-01

    申请号:US18125420

    申请日:2023-03-23

    IPC分类号: G06F21/54 G06F21/31 G06F21/60

    摘要: A system is provided for electronic data obfuscation and protection using independent destructible data objects. The system may split a set of data into a data portion and a key portion, where the data portion may be stored in a database separately from the key portion. The data portion may further comprise a set of executable code for a time or iteration based destructible data object, where the data object may incrementally decrease a countdown value based on the passage of time and/or iterations. If the countdown value reaches a threshold value without being refreshed, the data object may automatically execute one or more processes to protect the set of data. In this way, the system provides a secure way to prevent unauthorized access to sensitive data.

    Securely redirecting system service routines

    公开(公告)号:US12086237B2

    公开(公告)日:2024-09-10

    申请号:US17557643

    申请日:2021-12-21

    摘要: Securely redirecting a system service routine via a provider service table. A service call provider is loaded within an operating system executing in a lower trust security zone. The service call provider comprises metadata indicating a system service routine to be redirected to the service call provider. Based on the metadata, a provider service table is built within a higher trust security zone. The service table redirects the system service routine to the service call provider. Memory page(s) associated with the provider service table are hardware protected, and a read-only view is exposed to the operating system. The provider service table is associated with a user-mode process. A service call for a particular system service routine is received by the operation system from the user-mode process and, based on the provider service table being associated with the user-mode process, the service call is directed to the service call provider.

    FINGERPRINTING TECHNIQUES TO SUPPORT FILE HASH GENERATION

    公开(公告)号:US20240289475A1

    公开(公告)日:2024-08-29

    申请号:US18175766

    申请日:2023-02-28

    申请人: CrowdStrike, Inc.

    IPC分类号: G06F21/62 G06F21/54 G06F21/55

    摘要: A method of generating a file hash using fingerprinting data includes acquiring, using one or more programs executing in a kernel space of an operating system, fingerprinting data associated with a target application process in a user space of the operating system responsive to detecting an execution of the target application process, sharing, by a processing device using the one or more programs, the fingerprinting data with a user space monitoring application executing in the user space of the operating system, generating a hash value of a target application file associated with the target application process, and determining, using the user space monitoring application, a validity of the hash value based on the fingerprinting data.