发明名称 Monitoring and mitigating client-side exploitation of application flaws
摘要 A system for monitoring and mitigating client-side exploitation of application flaws, the system comprising a client device operating an application, a server communicatively coupled to the client device, and an application flaw service module communicatively coupled to the client device and server in which the application flaw service module receives a request from the client device comprising transactional metadata and inspecting the transactional metadata for malicious content within the request. A method of monitoring and mitigating client-side exploitation of application flaws by adding computer usable program code to the response to a first request from a client, receiving a second request from the client, determining that transactional metadata within the response contains an attack vector, and returning a response to the browser including attack vector countermeasures embedded in the response.
申请公布号 US9083736(B2) 申请公布日期 2015.07.14
申请号 US201313751695 申请日期 2013.01.28
申请人 HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. 发明人 Decime Jerry Brent;Smith Cale
分类号 G06F12/00;G06F17/30;G11C7/00;H04L29/06;H04N7/167 主分类号 G06F12/00
代理机构 Van Cott, Bagley, Cornwall & McCarthy 代理人 Van Cott, Bagley, Cornwall & McCarthy
主权项 1. A system for monitoring and mitigating client-side exploitation of application flaws, the system comprising: a server to operate a first application, the first application to communicate with a client device operating a second application to execute an application flaw script and the application flaw script to cause the client device to produce a first request associated with vulnerability of the first application; an application flaw service module communicatively coupled to the server, the application flaw service module to: receive the first request from the client device comprising transactional metadata based on the application flaw script; andinspect the transactional metadata in a header of the first request for malicious content within the first request by using a header and location inspection module that refers to a filter rules and logic database, wherein prior to the application flaw service module receiving and inspecting the transactional metadata within the first request, the server causes the application flaw script to be added to the transactional metadata of a response to a second request sent by the client device; and a vulnerability tracking module that tracks attack vectors in the received requests that are detected by the header and location inspection module.
地址 Houston TX US