会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 31. 发明授权
    • System and method for improving coverage for web code
    • 提高网页代码覆盖率的系统和方法
    • US08914879B2
    • 2014-12-16
    • US13155179
    • 2011-06-07
    • Artem MelnikMark Kaplan
    • Artem MelnikMark Kaplan
    • G06F21/00G06F21/55H04L29/06
    • G06F21/563G06F17/227G06F21/554G06F21/56H04L63/0227H04L63/1408H04L63/168
    • A system and method for improving code coverage for web code that is analyzed for security purposes by dynamic code execution are described. A controller receives information, routes the information to the appropriate engine, analyzer or module and provides the functionality for improving code coverage for code analyzed for security purposes. A code rewrite engine rewrites code in such a way that all branches and stray functions will be executed. A dynamic analyzer performs dynamic analysis on web content to detect malicious code. Additionally, a static analyzer performs static analysis on web content. The static analyzer scans web content and detects a style of coding, a style of obfuscation of the code or patterns in the code.
    • 描述了一种通过动态代码执行来改进为了安全目的而分析的用于改进代码覆盖的系统和方法。 控制器接收信息,将信息路由到适当的引擎,分析器或模块,并提供用于为了安全目的分析的代码来提高代码覆盖率的功能。 代码重写引擎以这样的方式重写代码,即所有分支和杂散函数都将被执行。 动态分析器对网页内容执行动态分析,以检测恶意代码。 另外,静态分析器可以对Web内容执行静态分析。 静态分析仪扫描Web内容并检测编码风格,代码中的代码或模式的混淆风格。
    • 32. 发明授权
    • Systems and methods for determining vulnerability to session stealing
    • 确定会话窃取漏洞的系统和方法
    • US08756697B2
    • 2014-06-17
    • US13436818
    • 2012-03-30
    • Steven R. OcepekWendel Guglielmetti Henrique
    • Steven R. OcepekWendel Guglielmetti Henrique
    • H04L29/06G06F11/00G06F12/14G06F12/16G08B23/00
    • G06F21/552H04L63/1433H04L63/1466
    • Systems and methods for determining vulnerability to session stealing are disclosed. An example method includes intercepting, at a first computing device, an intercepted packet sent from a client to a second computing device different than the first computing device, the intercepted packet including a first instruction in a first portion of the intercepted packet, determining, using a template, a second portion of the intercepted packet that is a value that is changed by a calculated amount each time that the client sends a packet, changing the value by the calculated amount to determine a next value for a next packet, replacing the second portion of the intercepted packet with the next value to generate a modified packet, replacing the first portion of the modified packet with a second instruction, and transmitting the modified packet to the second computing device.
    • 公开了确定会话窃取漏洞的系统和方法。 示例性方法包括在第一计算设备处拦截从客户端发送到与第一计算设备不同的第二计算设备的被拦截的分组,所截获的分组包括被截获的分组的第一部分中的第一指令,使用 截取的分组的第二部分是每当客户端发送分组时改变计算量的值,将该值改变计算量以确定下一个分组的下一个值,将第二个 截取的分组的部分具有下一个值以生成修改的分组,用第二指令替换修改的分组的第一部分,并将修改的分组发送到第二计算设备。
    • 34. 发明授权
    • Method and apparatus for predictive and actual intrusion detection on a network
    • 网络上预测和实际入侵检测的方法和装置
    • US08640234B2
    • 2014-01-28
    • US10838863
    • 2004-05-04
    • Derek GassenThomas P. Donahue
    • Derek GassenThomas P. Donahue
    • G06F12/14
    • G06F21/606G06F21/554G06F21/56G06F21/6209H04L63/1416H04L63/1441
    • A method of managing network usage by defining a set of linguistic patterns, where each linguistic pattern is associated with a condition that is to be monitored. Network packets are captured during transmission and analyzed to identify linguistic patterns. Captured network packets are scored based on similarity of at least one linguistic pattern to one or more of the defined set of linguistic patterns. When a packet that is scored above a specified threshold value is identified, at least one responsive action is implemented. In this manner, a system implementing the method is able to identify network traffic that is associated with prospective malicious activity and thereby provide an early warning before damage has occurred.
    • 一种通过定义一组语言模式来管理网络使用的方法,其中每个语言模式与待监视的条件相关联。 在传输过程中捕获网络数据包并进行分析,以识别语言模式。 基于至少一个语言模式与所定义的一组语言模式中的一个或多个的相似性来对获取的网络分组进行评分。 当识别到高于指定阈值的分组时,实现至少一个响应动作。 以这种方式,实现该方法的系统能够识别与预期恶意活动相关联的网络流量,从而在发生损害之前提供预警。