Movatterモバイル変換


[0]ホーム

URL:


US20180121680A1 - Obfuscating web code - Google Patents

Obfuscating web code
Download PDF

Info

Publication number
US20180121680A1
US20180121680A1US15/859,694US201815859694AUS2018121680A1US 20180121680 A1US20180121680 A1US 20180121680A1US 201815859694 AUS201815859694 AUS 201815859694AUS 2018121680 A1US2018121680 A1US 2018121680A1
Authority
US
United States
Prior art keywords
expressions
code
computer
data
replacement
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US15/859,694
Inventor
Xinran Wang
Yao Zhao
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shape Security Inc
Original Assignee
Shape Security Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shape Security IncfiledCriticalShape Security Inc
Priority to US15/859,694priorityCriticalpatent/US20180121680A1/en
Publication of US20180121680A1publicationCriticalpatent/US20180121680A1/en
Assigned to SHAPE SECURITY, INC.reassignmentSHAPE SECURITY, INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: WANG, XINRAN, ZHAO, YAO
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A computer-implemented method, the method includes identifying a piece of data to be served from a server system to a client device that is remote from the server system; creating a plurality of expressions that, when executed, provide a result that corresponds to the piece of data; and providing the plurality of expressions to the client device with code for executing the plurality of expressions.

Description

Claims (20)

What is claimed is:
1. A computer-implemented method, comprising:
identifying a piece of data for serving from a server system to a client device that is remote from the server system, the piece of data being part of executable code requested from the server from the client device;
creating a plurality of expressions that, when executed, provide a result that corresponds to the piece of data; and
providing, to the client device and as part of the executable code, the plurality of expressions along with code for executing the plurality of expressions, so that when the plurality of expressions are executed on the client device, the identified piece of data is returned on the client device without a need to serve the identified piece of data to the client device.
2. The computer-implemented method ofclaim 1, further comprising performing a permutation on the plurality of expressions so that the plurality of expressions are ordered in the executable code in an order different than they were created.
3. The computer-implemented method ofclaim 2, wherein the order of the expressions is selected randomly as part of the permutation.
4. The computer-implemented method ofclaim 1, further comprising:
creating one or more additional expressions whose executed results are not used by other code that is part of the executable code served to the client device; and
providing to the client device the plurality of expressions with the one or more additional expressions.
5. The computer-implemented method ofclaim 1, further comprising:
identifying, in the piece of data, data that needs to be kept away from malware that may be in the client device, and
wherein creating a plurality of expressions comprises creating one or more replacement statements that when executed, provide a result that corresponds to the potentially sensitive data.
6. The computer-implemented method ofclaim 5, wherein the one or more replacement statements comprise one or more expressions that do not execute on the client device when the executable code is executed.
7. The computer-implemented method ofclaim 1, further comprising identifying, in the piece of data, a first expression and a second expression to be replaced, wherein creating a plurality of expressions comprises creating a first set of replacement expressions corresponding to the first expression and a second set of expressions corresponding to the second expressions; and
interleaving the replacement expressions of the first set of replacement expressions with the replacement expressions of the second set of replacement expressions,
wherein the plurality of expressions provided to the client device comprise the interleaved replacement expressions.
8. The computer-implemented method ofclaim 1, wherein creating a plurality of expressions comprises:
creating a first set of replacement expressions;
identifying a first replacement expression in the first set of replacement expressions;
creating a second set of replacement expressions that, when executed, provide a result that corresponds to the first replacement expression; and
replacing the first replacement expression with the second set of replacement expressions.
9. The computer-implemented method ofclaim 1, wherein the piece of data to be served comprises formats of code in HTML, CSS, and JavaScript, and wherein each of the formats interoperates with the other formats.
10. A computer-implemented method, the method comprising:
receiving, from a server system, web content comprising original code, wherein the web content is requested by a client device that is remote from the server system;
identifying a piece of data in the code;
creating a plurality of expressions that, when executed, provide a result that corresponds to the piece of data;
generating modified code comprising the original code with the piece of data replaced with the plurality of expressions; and
providing the modified code to the client device, wherein, when executed, the modified code provides a result that corresponds to the original code.
11. The computer-implemented method ofclaim 10, wherein generating modified code comprises:
interleaving the plurality of expressions into the original code with the identified piece of data removed.
12. The computer-implemented method ofclaim 11,
wherein the plurality of expressions are created in a first ordering, and
wherein the plurality of expressions are interleaved into the original code so that the plurality of expressions maintain the first ordering.
13. The computer-implemented method ofclaim 11,
wherein the plurality of expressions are created in a first ordering, and
wherein the plurality of expressions are interleaved into the original code so that the plurality of expressions are in a second ordering that is different than the first ordering.
14. The computer-implemented method ofclaim 10, wherein the plurality of expressions comprises one or more junk expressions that do not execute.
15. The computer-implemented method ofclaim 10, further comprising:
selecting a first expression among the plurality of expressions; and
creating a second plurality of expressions that, when executed, provide a result that corresponds to the selected first expression,
wherein the generated modified code comprises the original code with the piece of data replaced with the plurality of expressions, with the selected first expression replaced with the second plurality of expressions.
16. A computer system for recoding web content served to client computers, the system comprising:
an interface for receiving information from a web server system configured to provide computer code in multiple different formats in response to requests from client computing devices; and
a security intermediary that is arranged to (i) receive the computer code from the interface before the computer code is provided to the client computing devices, (ii) identify a piece of data in the computer code that is to be replaced; (iii) create a plurality of expressions that, when executed, provide a result that corresponds to the piece of data; and (iv) provide the plurality of expressions to the client computing devices with code for executing the plurality of expressions.
17. The computer-implemented system ofclaim 16, wherein the piece of data in the computer code that is to be replaced is identified as potentially sensitive data.
18. The computer-implemented system ofclaim 16, wherein the security intermediary is further arranged to perform a permutation of the plurality of expressions.
19. The computer-implemented system ofclaim 16, wherein the plurality of expressions comprise one or more expressions that do not execute.
20. The computer-implemented system ofclaim 16, wherein the security intermediary is further arranged to interleave the plurality of expressions with the code of executing the plurality of expressions.
US15/859,6942014-05-232018-01-01Obfuscating web codeAbandonedUS20180121680A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US15/859,694US20180121680A1 (en)2014-05-232018-01-01Obfuscating web code

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
US14/286,324US9858440B1 (en)2014-05-232014-05-23Encoding of sensitive data
US15/859,694US20180121680A1 (en)2014-05-232018-01-01Obfuscating web code

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US14/286,324ContinuationUS9858440B1 (en)2014-05-232014-05-23Encoding of sensitive data

Publications (1)

Publication NumberPublication Date
US20180121680A1true US20180121680A1 (en)2018-05-03

Family

ID=60971724

Family Applications (2)

Application NumberTitlePriority DateFiling Date
US14/286,324ActiveUS9858440B1 (en)2014-05-232014-05-23Encoding of sensitive data
US15/859,694AbandonedUS20180121680A1 (en)2014-05-232018-01-01Obfuscating web code

Family Applications Before (1)

Application NumberTitlePriority DateFiling Date
US14/286,324ActiveUS9858440B1 (en)2014-05-232014-05-23Encoding of sensitive data

Country Status (1)

CountryLink
US (2)US9858440B1 (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US10216488B1 (en)2016-03-142019-02-26Shape Security, Inc.Intercepting and injecting calls into operations and objects
US10230718B2 (en)2015-07-072019-03-12Shape Security, Inc.Split serving of computer code
CN110263533A (en)*2019-04-282019-09-20清华大学Safe web page means of defence
US10834101B2 (en)2016-03-092020-11-10Shape Security, Inc.Applying bytecode obfuscation techniques to programs written in an interpreted language
US20210334342A1 (en)*2020-04-272021-10-28Imperva, Inc.Procedural code generation for challenge code
US11349816B2 (en)2016-12-022022-05-31F5, Inc.Obfuscating source code sent, from a server computer, to a browser on a client computer
EP4209938A1 (en)*2022-01-052023-07-12Irdeto B.V.Systems, methods, and storage media for creating secured computer code
US20230239323A1 (en)*2022-01-242023-07-27Cloud Linux Software Inc.Systems and methods for automated malicious code replacement
US11741197B1 (en)2019-10-152023-08-29Shape Security, Inc.Obfuscating programs using different instruction set architectures

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US10657262B1 (en)*2014-09-282020-05-19Red Balloon Security, Inc.Method and apparatus for securing embedded device firmware
US10868665B1 (en)*2015-05-182020-12-15Amazon Technologies, Inc.Mitigating timing side-channel attacks by obscuring accesses to sensitive data
US10311229B1 (en)*2015-05-182019-06-04Amazon Technologies, Inc.Mitigating timing side-channel attacks by obscuring alternatives in code
US10380355B2 (en)*2017-03-232019-08-13Microsoft Technology Licensing, LlcObfuscation of user content in structured user data files
US10410014B2 (en)2017-03-232019-09-10Microsoft Technology Licensing, LlcConfigurable annotations for privacy-sensitive user content
US11042634B2 (en)*2018-12-212021-06-22Fujitsu LimitedDetermining information leakage of computer-readable programs
US11677783B2 (en)*2019-10-252023-06-13Target Brands, Inc.Analysis of potentially malicious emails
US20210303662A1 (en)*2020-03-312021-09-30Irdeto B.V.Systems, methods, and storage media for creating secured transformed code from input code using a neural network to obscure a transformation function
US11611629B2 (en)*2020-05-132023-03-21Microsoft Technology Licensing, LlcInline frame monitoring
US20240333809A1 (en)*2022-12-162024-10-03Gudea, Inc.Information Monitoring System and Method

Citations (77)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5003596A (en)*1989-08-171991-03-26Cryptech, Inc.Method of cryptographically transforming electronic digital data from one form to another
US5315657A (en)*1990-09-281994-05-24Digital Equipment CorporationCompound principals in access control lists
US5892899A (en)*1996-06-131999-04-06Intel CorporationTamper resistant methods and apparatus
US6006328A (en)*1995-07-141999-12-21Christopher N. DrakeComputer software authentication, protection, and security system
US6088452A (en)*1996-03-072000-07-11Northern Telecom LimitedEncoding technique for software and hardware
US6594761B1 (en)*1999-06-092003-07-15Cloakware CorporationTamper resistant software encoding
US20030159063A1 (en)*2002-02-072003-08-21Larry ApfelbaumAutomated security threat testing of web pages
US20030163718A1 (en)*2000-04-122003-08-28Johnson Harold J.Tamper resistant software-mass data encoding
US6668325B1 (en)*1997-06-092003-12-23Intertrust TechnologiesObfuscation techniques for enhancing software security
US20040101142A1 (en)*2001-07-052004-05-27Nasypny Vladimir VladimirovichMethod and system for an integrated protection system of data distributed processing in computer networks and system for carrying out said method
US20040139340A1 (en)*2000-12-082004-07-15Johnson Harold JSystem and method for protecting computer software from a white box attack
US6779114B1 (en)*1999-08-192004-08-17Cloakware CorporationTamper resistant software-control flow encoding
US20050002532A1 (en)*2002-01-302005-01-06Yongxin ZhouSystem and method of hiding cryptographic private keys
US20050166191A1 (en)*2004-01-282005-07-28Cloakware CorporationSystem and method for obscuring bit-wise and two's complement integer computations in software
US20050183072A1 (en)*1999-07-292005-08-18Intertrust Technologies CorporationSoftware self-defense systems and methods
US20060031686A1 (en)*1999-09-032006-02-09Purdue Research FoundationMethod and system for tamperproofing software
US20060034455A1 (en)*2004-08-122006-02-16Damgaard Ivan BPermutation data transform to enhance security
US20060101047A1 (en)*2004-07-292006-05-11Rice John RMethod and system for fortifying software
US20060195703A1 (en)*2005-02-252006-08-31Microsoft CorporationSystem and method of iterative code obfuscation
US20060195588A1 (en)*2005-01-252006-08-31Whitehat Security, Inc.System for detecting vulnerabilities in web applications using client-side application interfaces
US7103180B1 (en)*2001-10-252006-09-05Hewlett-Packard Development Company, L.P.Method of implementing the data encryption standard with reduced computation
US20060253687A1 (en)*2005-05-092006-11-09Microsoft CorporationOverlapped code obfuscation
US20070039048A1 (en)*2005-08-122007-02-15Microsoft CorporationObfuscating computer code to prevent an attack
US20070064617A1 (en)*2005-09-152007-03-22Reves Joseph PTraffic anomaly analysis for the detection of aberrant network code
US20080025496A1 (en)*2005-08-012008-01-31Asier Technology Corporation, A Delaware CorporationEncrypting a plaintext message with authentication
US20080208560A1 (en)*2007-02-232008-08-28Harold Joseph JohnsonSystem and method of interlocking to protect software - mediated program and device behaviors
US20080222736A1 (en)*2007-03-072008-09-11Trusteer Ltd.Scrambling HTML to prevent CSRF attacks and transactional crimeware attacks
US20080229394A1 (en)*2006-07-102008-09-18Sci GroupMethod and System For Securely Protecting Data During Software Application Usage
US7472413B1 (en)*2003-08-112008-12-30F5 Networks, Inc.Security for WAP servers
US7506177B2 (en)*2001-05-242009-03-17Cloakware CorporationTamper resistant software encoding and analysis
US20090077383A1 (en)*2007-08-062009-03-19De Monseignat BernardSystem and method for authentication, data transfer, and protection against phishing
US20090119515A1 (en)*2005-10-282009-05-07Matsushita Electric Industrial Co., Ltd.Obfuscation evaluation method and obfuscation method
US20090193513A1 (en)*2008-01-262009-07-30Puneet AgarwalPolicy driven fine grain url encoding mechanism for ssl vpn clientless access
US7580521B1 (en)*2003-06-252009-08-25Voltage Security, Inc.Identity-based-encryption system with hidden public key attributes
US20090235089A1 (en)*2008-03-122009-09-17Mathieu CietComputer object code obfuscation using boot installation
US20090249492A1 (en)*2006-09-212009-10-01Hans Martin Boesgaard SorensenFabrication of computer executable program files from source code
US20090254572A1 (en)*2007-01-052009-10-08Redlich Ron MDigital information infrastructure and method
US20090307500A1 (en)*2006-02-062009-12-10Taichi SatoProgram obfuscator
US20100058301A1 (en)*2008-08-262010-03-04Apple Inc.System and method for branch extraction obfuscation
US20100083072A1 (en)*2008-09-302010-04-01Freescale Semiconductor, Inc.Data interleaver
US20100107245A1 (en)*2008-10-292010-04-29Microsoft CorporationTamper-tolerant programs
US20100186089A1 (en)*2009-01-222010-07-22International Business Machines CorporationMethod and system for protecting cross-domain interaction of a web application on an unmodified browser
US20100257354A1 (en)*2007-09-072010-10-07Dis-Ent, LlcSoftware based multi-channel polymorphic data obfuscation
US20100281459A1 (en)*2009-05-012010-11-04Apple Inc.Systems, methods, and computer-readable media for fertilizing machine-executable code
US20110131416A1 (en)*2009-11-302011-06-02James Paul SchneiderMultifactor validation of requests to thw art dynamic cross-site attacks
US20110129089A1 (en)*2009-11-302011-06-02Electronics And Telecommunications Research InstituteMethod and apparatus for partially encoding/decoding data for commitment service and method of using encoded data
US20110167407A1 (en)*2010-01-062011-07-07Apple Inc.System and method for software data reference obfuscation
US20110302424A1 (en)*2001-06-132011-12-08Intertrust Technologies Corp.Software Self-Checking Systems and Methods
US20120022942A1 (en)*2010-04-012012-01-26Lee Hahn HollowayInternet-based proxy service to modify internet responses
US8185749B2 (en)*2008-09-022012-05-22Apple Inc.System and method for revising boolean and arithmetic operations
US8266243B1 (en)*2010-03-302012-09-11Amazon Technologies, Inc.Feedback mechanisms providing contextual information
US8347398B1 (en)*2009-09-232013-01-01Savvystuff Property TrustSelected text obfuscation and encryption in a local, network and cloud computing environment
US20130046995A1 (en)*2010-02-232013-02-21David MovshovitzMethod and computer program product for order preserving symbol based encryption
US8392910B1 (en)*2007-04-102013-03-05AT & T Intellectual Property II, LLPStochastic method for program security using deferred linking
US8393003B2 (en)*2006-12-212013-03-05Telefonaktiebolaget L M Ericsson (Publ)Obfuscating computer program code
US20130061323A1 (en)*2008-04-232013-03-07Trusted Knight CorporationSystem and method for protecting against malware utilizing key loggers
US20130067225A1 (en)*2008-09-082013-03-14Ofer ShochetAppliance, system, method and corresponding software components for encrypting and processing data
US20130179985A1 (en)*2012-01-052013-07-11Vmware, Inc.Securing user data in cloud computing environments
US20130232578A1 (en)*2012-03-022013-09-05Apple Inc.Method and apparatus for obfuscating program source codes
US8615804B2 (en)*2010-02-182013-12-24Polytechnic Institute Of New York UniversityComplementary character encoding for preventing input injection in web applications
US20140013427A1 (en)*2011-03-242014-01-09Irdeto B.V.System And Method Providing Dependency Networks Throughout Applications For Attack Resistance
US20140165197A1 (en)*2012-12-062014-06-12Empire Technology Development, LlcMalware attack prevention using block code permutation
US8762705B2 (en)*2008-07-242014-06-24Alibaba Group Holding LimitedSystem and method for preventing web crawler access
US20140282872A1 (en)*2013-03-152014-09-18Shape Security Inc.Stateless web content anti-automation
US20140281535A1 (en)*2013-03-152014-09-18Munibonsoftware.com, LLCApparatus and Method for Preventing Information from Being Extracted from a Webpage
US20140283069A1 (en)*2013-03-152014-09-18Shape Security Inc.Protecting against the introduction of alien content
US20150039962A1 (en)*2010-09-102015-02-05John P. FonsekaMethods, apparatus, and systems for coding with constrained interleaving
US20150180509A9 (en)*2010-09-102015-06-25John P. FonsekaMethods, apparatus, and systems for coding with constrained interleaving
US20150350243A1 (en)*2013-03-152015-12-03Shape Security Inc.Safe Intelligent Content Modification
US9241004B1 (en)*2014-03-112016-01-19Trend Micro IncorporatedAlteration of web documents for protection against web-injection attacks
US9270647B2 (en)*2013-12-062016-02-23Shape Security, Inc.Client/server security by an intermediary rendering modified in-memory objects
US20170041341A1 (en)*2014-05-232017-02-09Shape Security, Inc.Polymorphic Treatment of Data Entered At Clients
US9582666B1 (en)*2015-05-072017-02-28Shape Security, Inc.Computer system for improved security of server computers interacting with client computers
US9602543B2 (en)*2014-09-092017-03-21Shape Security, Inc.Client/server polymorphism using polymorphic hooks
US9712561B2 (en)*2014-01-202017-07-18Shape Security, Inc.Intercepting and supervising, in a runtime environment, calls to one or more objects in a web page
US10122747B2 (en)*2013-12-062018-11-06Lookout, Inc.Response generation after distributed monitoring and evaluation of multiple devices
US10216488B1 (en)*2016-03-142019-02-26Shape Security, Inc.Intercepting and injecting calls into operations and objects

Family Cites Families (70)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN101398871B (en)1995-02-132011-05-18英特特拉斯特技术公司Systems and methods for secure transaction management and electronic rights protection
US6865735B1 (en)1997-10-072005-03-08University Of WashingtonProcess for rewriting executable content on a network server or desktop machine in order to enforce site specific properties
SE512672C2 (en)1998-06-122000-04-17Ericsson Telefon Ab L M Procedure and system for transferring a cookie
US6697948B1 (en)1999-05-052004-02-24Michael O. RabinMethods and apparatus for protecting information
WO2001086372A2 (en)2000-05-122001-11-15Xtreamlok Pty. Ltd.Information security method and system
US6938170B1 (en)2000-07-172005-08-30International Business Machines CorporationSystem and method for preventing automated crawler access to web-based data sources using a dynamic data transcoding scheme
US7117239B1 (en)2000-07-282006-10-03Axeda CorporationReporting the state of an apparatus to a remote computer
WO2002088951A1 (en)2001-04-262002-11-07Telefonaktiebolaget Lm Ericsson (Publ)Stateless server
WO2002093393A1 (en)2001-05-112002-11-21Sap Portals, Inc.Browser with messaging capability and other persistent connections
US7028305B2 (en)2001-05-162006-04-11Softricity, Inc.Operating system abstraction and protection layer
US7010779B2 (en)2001-08-162006-03-07Knowledge Dynamics, Inc.Parser, code generator, and data calculation and transformation engine for spreadsheet calculations
US20040162994A1 (en)2002-05-132004-08-19Sandia National LaboratoriesMethod and apparatus for configurable communication network defenses
US7117429B2 (en)2002-06-122006-10-03Oracle International CorporationMethods and systems for managing styles electronic documents
US7333072B2 (en)2003-03-242008-02-19Semiconductor Energy Laboratory Co., Ltd.Thin film integrated circuit device
US8510571B1 (en)2003-03-242013-08-13Hoi ChangSystem and method for inserting security mechanisms into a software program
US7735144B2 (en)2003-05-162010-06-08Adobe Systems IncorporatedDocument modification detection and prevention
US7500099B1 (en)2003-05-162009-03-03Microsoft CorporationMethod for mitigating web-based “one-click” attacks
WO2004109532A1 (en)2003-06-052004-12-16Cubicice (Pty) LtdA method of collecting data regarding a plurality of web pages visited by at least one user
US8806187B1 (en)2009-12-032014-08-12Google Inc.Protecting browser-viewed content from piracy
US7624449B1 (en)2004-01-222009-11-24Symantec CorporationCountering polymorphic malicious computer code through code optimization
US7475341B2 (en)2004-06-152009-01-06At&T Intellectual Property I, L.P.Converting the format of a portion of an electronic document
US7480385B2 (en)2004-11-052009-01-20Cable Television Laboratories, Inc.Hierarchical encryption key system for securing digital media
US7707223B2 (en)2005-04-282010-04-27Cisco Technology, Inc.Client-side java content transformation
US7770185B2 (en)2005-09-262010-08-03Bea Systems, Inc.Interceptor method and system for web services for remote portlets
US8170020B2 (en)2005-12-082012-05-01Microsoft CorporationLeveraging active firewalls for network intrusion detection and retardation of attack
GB0620855D0 (en)2006-10-192006-11-29Dovetail Software Corp LtdData processing apparatus and method
JP5133973B2 (en)2007-01-182013-01-30パナソニック株式会社 Obfuscation support device, obfuscation support method, program, and integrated circuit
US8290800B2 (en)2007-01-302012-10-16Google Inc.Probabilistic inference of site demographics from aggregate user internet usage and source demographic information
WO2008095018A2 (en)2007-01-312008-08-07Omniture, Inc.Page grouping for site traffic analysis reports
CN101681340A (en)2007-04-172010-03-24肯尼思·托拉Non-intrusive method and system for collecting information transmitted over a network
US8527757B2 (en)2007-06-222013-09-03Gemalto SaMethod of preventing web browser extensions from hijacking user information
US7941382B2 (en)2007-10-122011-05-10Microsoft CorporationMethod of classifying and active learning that ranks entries based on multiple scores, presents entries to human analysts, and detects and/or prevents malicious behavior
US8260845B1 (en)2007-11-212012-09-04Appcelerator, Inc.System and method for auto-generating JavaScript proxies and meta-proxies
US8347396B2 (en)2007-11-302013-01-01International Business Machines CorporationProtect sensitive content for human-only consumption
US9317255B2 (en)2008-03-282016-04-19Microsoft Technology Licensing, LCCAutomatic code transformation with state transformer monads
CA2630388A1 (en)2008-05-052009-11-05Nima SharifmehrApparatus and method to prevent man in the middle attack
KR100987354B1 (en)2008-05-222010-10-12주식회사 이베이지마켓 System and method for checking fraudulent code in web site
US9405555B2 (en)2008-05-232016-08-02Microsoft Technology Licensing, LlcAutomated code splitting and pre-fetching for improving responsiveness of browser-based applications
KR101027928B1 (en)2008-07-232011-04-12한국전자통신연구원 Obfuscated malicious web page detection method and device
EP2342862A2 (en)2008-10-032011-07-13Limelight Networks, Inc.Content delivery network encryption
US8020193B2 (en)2008-10-202011-09-13International Business Machines CorporationSystems and methods for protecting web based applications from cross site request forgery attacks
US8434068B2 (en)2008-10-232013-04-30XMOS Ltd.Development system
US8225401B2 (en)2008-12-182012-07-17Symantec CorporationMethods and systems for detecting man-in-the-browser attacks
CN101482882A (en)2009-02-172009-07-15阿里巴巴集团控股有限公司Method and system for cross-domain treatment of COOKIE
US9311425B2 (en)2009-03-312016-04-12Qualcomm IncorporatedRendering a page using a previously stored DOM associated with a different page
US8332952B2 (en)2009-05-222012-12-11Microsoft CorporationTime window based canary solutions for browser security
US8527774B2 (en)2009-05-282013-09-03Kaazing CorporationSystem and methods for providing stateless security management for web applications using non-HTTP communications protocols
US8924943B2 (en)2009-07-172014-12-30Ebay Inc.Browser emulator system
US8438312B2 (en)2009-10-232013-05-07Moov CorporationDynamically rehosting web content
US8539224B2 (en)2009-11-052013-09-17International Business Machines CorporationObscuring form data through obfuscation
US8353037B2 (en)2009-12-032013-01-08International Business Machines CorporationMitigating malicious file propagation with progressive identifiers
US8660976B2 (en)2010-01-202014-02-25Microsoft CorporationWeb content rewriting, including responses
US20110255689A1 (en)2010-04-152011-10-20Lsi CorporationMultiple-mode cryptographic module usable with memory controllers
US8739150B2 (en)2010-05-282014-05-27Smartshift GmbhSystems and methods for dynamically replacing code objects via conditional pattern templates
US8914879B2 (en)2010-06-112014-12-16Trustwave Holdings, Inc.System and method for improving coverage for web code
US20120124372A1 (en)2010-10-132012-05-17Akamai Technologies, Inc.Protecting Websites and Website Users By Obscuring URLs
US8631091B2 (en)2010-10-152014-01-14Northeastern UniversityContent distribution network using a web browser and locally stored content to directly exchange content between users
US8751822B2 (en)2010-12-202014-06-10Motorola Mobility LlcCryptography using quasigroups
AU2011200413B1 (en)2011-02-012011-09-15Symbiotic Technologies Pty LtdMethods and Systems to Detect Attacks on Internet Transactions
US8590041B2 (en)2011-11-282013-11-19Mcafee, Inc.Application sandboxing using a dynamic optimization framework
US8904279B1 (en)2011-12-072014-12-02Amazon Technologies, Inc.Inhibiting automated extraction of data from network pages
WO2013091709A1 (en)2011-12-222013-06-27Fundació Privada Barcelona Digital Centre TecnologicMethod and apparatus for real-time dynamic transformation of the code of a web document
US10049168B2 (en)2012-01-312018-08-14Openwave Mobility, Inc.Systems and methods for modifying webpage data
US9111090B2 (en)2012-04-022015-08-18Trusteer, Ltd.Detection of phishing attempts
US20140089786A1 (en)2012-06-012014-03-27Atiq HashmiAutomated Processor For Web Content To Mobile-Optimized Content Transformation
US8595613B1 (en)2012-07-262013-11-26Viasat Inc.Page element identifier pre-classification for user interface behavior in a communications system
US8806627B1 (en)2012-12-172014-08-12Emc CorporationContent randomization for thwarting malicious software attacks
US9294502B1 (en)2013-12-062016-03-22Radware, Ltd.Method and system for detection of malicious bots
GB201415860D0 (en)2014-09-082014-10-22User Replay LtdSystems and methods for recording and recreating interactive user-sessions involving an on-line server
WO2017156158A1 (en)2016-03-092017-09-14Shape Security, Inc.Applying bytecode obfuscation techniques to programs written in an interpreted language

Patent Citations (108)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5003596A (en)*1989-08-171991-03-26Cryptech, Inc.Method of cryptographically transforming electronic digital data from one form to another
US5315657A (en)*1990-09-281994-05-24Digital Equipment CorporationCompound principals in access control lists
US6006328A (en)*1995-07-141999-12-21Christopher N. DrakeComputer software authentication, protection, and security system
US6088452A (en)*1996-03-072000-07-11Northern Telecom LimitedEncoding technique for software and hardware
US5892899A (en)*1996-06-131999-04-06Intel CorporationTamper resistant methods and apparatus
US6668325B1 (en)*1997-06-092003-12-23Intertrust TechnologiesObfuscation techniques for enhancing software security
US6594761B1 (en)*1999-06-092003-07-15Cloakware CorporationTamper resistant software encoding
US6842862B2 (en)*1999-06-092005-01-11Cloakware CorporationTamper resistant software encoding
US7779394B2 (en)*1999-07-292010-08-17Intertrust Technologies CorporationSoftware self-defense systems and methods
US20150278491A1 (en)*1999-07-292015-10-01Intertrust Technologies CorporationSoftware self-defense systems and methods
US20070234070A1 (en)*1999-07-292007-10-04Intertrust Technologies Corp.Software self-defense systems and methods
US9064099B2 (en)*1999-07-292015-06-23Intertrust Technologies CorporationSoftware self-defense systems and methods
US7779270B2 (en)*1999-07-292010-08-17Intertrust Technologies CorporationSoftware self-defense systems and methods
US20130232343A1 (en)*1999-07-292013-09-05Intertrust Technologies CorporationSoftware self-defense systems and methods
US7430670B1 (en)*1999-07-292008-09-30Intertrust Technologies Corp.Software self-defense systems and methods
US20050183072A1 (en)*1999-07-292005-08-18Intertrust Technologies CorporationSoftware self-defense systems and methods
US20050204348A1 (en)*1999-07-292005-09-15Inter Trust Technologies CorporationSoftware self-defense systems and methods
US20050210275A1 (en)*1999-07-292005-09-22Intertrust Technologies CorporationSoftware self-defense systems and methods
US7823135B2 (en)*1999-07-292010-10-26Intertrust Technologies CorporationSoftware self-defense systems and methods
US20110035733A1 (en)*1999-07-292011-02-10Intertrust Technologies Corp.Software Self-Defense Systems and Methods
US8387022B2 (en)*1999-07-292013-02-26Intertrust Technologies Corp.Software self-defense systems and methods
US6779114B1 (en)*1999-08-192004-08-17Cloakware CorporationTamper resistant software-control flow encoding
US20060031686A1 (en)*1999-09-032006-02-09Purdue Research FoundationMethod and system for tamperproofing software
US20030163718A1 (en)*2000-04-122003-08-28Johnson Harold J.Tamper resistant software-mass data encoding
US20040139340A1 (en)*2000-12-082004-07-15Johnson Harold JSystem and method for protecting computer software from a white box attack
US7506177B2 (en)*2001-05-242009-03-17Cloakware CorporationTamper resistant software encoding and analysis
US20110302424A1 (en)*2001-06-132011-12-08Intertrust Technologies Corp.Software Self-Checking Systems and Methods
US20040101142A1 (en)*2001-07-052004-05-27Nasypny Vladimir VladimirovichMethod and system for an integrated protection system of data distributed processing in computer networks and system for carrying out said method
US7103180B1 (en)*2001-10-252006-09-05Hewlett-Packard Development Company, L.P.Method of implementing the data encryption standard with reduced computation
US20050002532A1 (en)*2002-01-302005-01-06Yongxin ZhouSystem and method of hiding cryptographic private keys
US20030159063A1 (en)*2002-02-072003-08-21Larry ApfelbaumAutomated security threat testing of web pages
US7580521B1 (en)*2003-06-252009-08-25Voltage Security, Inc.Identity-based-encryption system with hidden public key attributes
US7961879B1 (en)*2003-06-252011-06-14Voltage Security, Inc.Identity-based-encryption system with hidden public key attributes
US7472413B1 (en)*2003-08-112008-12-30F5 Networks, Inc.Security for WAP servers
US20050166191A1 (en)*2004-01-282005-07-28Cloakware CorporationSystem and method for obscuring bit-wise and two's complement integer computations in software
US20060101047A1 (en)*2004-07-292006-05-11Rice John RMethod and system for fortifying software
US20060034455A1 (en)*2004-08-122006-02-16Damgaard Ivan BPermutation data transform to enhance security
US8077861B2 (en)*2004-08-122011-12-13Cmla, LlcPermutation data transform to enhance security
US20060195588A1 (en)*2005-01-252006-08-31Whitehat Security, Inc.System for detecting vulnerabilities in web applications using client-side application interfaces
US7587616B2 (en)*2005-02-252009-09-08Microsoft CorporationSystem and method of iterative code obfuscation
US20060195703A1 (en)*2005-02-252006-08-31Microsoft CorporationSystem and method of iterative code obfuscation
US20060253687A1 (en)*2005-05-092006-11-09Microsoft CorporationOverlapped code obfuscation
US20080025496A1 (en)*2005-08-012008-01-31Asier Technology Corporation, A Delaware CorporationEncrypting a plaintext message with authentication
US20100172494A1 (en)*2005-08-012010-07-08Kevin Martin HensonEncrypting a plaintext message with authenticaion
US7620987B2 (en)*2005-08-122009-11-17Microsoft CorporationObfuscating computer code to prevent an attack
US20070039048A1 (en)*2005-08-122007-02-15Microsoft CorporationObfuscating computer code to prevent an attack
US20070064617A1 (en)*2005-09-152007-03-22Reves Joseph PTraffic anomaly analysis for the detection of aberrant network code
US20090119515A1 (en)*2005-10-282009-05-07Matsushita Electric Industrial Co., Ltd.Obfuscation evaluation method and obfuscation method
US20090307500A1 (en)*2006-02-062009-12-10Taichi SatoProgram obfuscator
US20080229394A1 (en)*2006-07-102008-09-18Sci GroupMethod and System For Securely Protecting Data During Software Application Usage
US20090249492A1 (en)*2006-09-212009-10-01Hans Martin Boesgaard SorensenFabrication of computer executable program files from source code
US8393003B2 (en)*2006-12-212013-03-05Telefonaktiebolaget L M Ericsson (Publ)Obfuscating computer program code
US20090254572A1 (en)*2007-01-052009-10-08Redlich Ron MDigital information infrastructure and method
US20150213239A1 (en)*2007-02-232015-07-30Irdeto Canada CorporationSystem and method of interlocking to protect software-mediated program and device behaviours
US8752032B2 (en)*2007-02-232014-06-10Irdeto Canada CorporationSystem and method of interlocking to protect software-mediated program and device behaviours
US20080216051A1 (en)*2007-02-232008-09-04Harold Joseph JohnsonSystem and method of interlocking to protect software-mediated program and device behaviours
US20080208560A1 (en)*2007-02-232008-08-28Harold Joseph JohnsonSystem and method of interlocking to protect software - mediated program and device behaviors
US20150074803A1 (en)*2007-02-232015-03-12Irdeto Canada CorportationSystem and method of interlocking to protect software-mediated program and device behaviours
US8161463B2 (en)*2007-02-232012-04-17Irdeto Canada CorporationSystem and method of interlocking to protect software—mediated program and device behaviors
US20080222736A1 (en)*2007-03-072008-09-11Trusteer Ltd.Scrambling HTML to prevent CSRF attacks and transactional crimeware attacks
US20130152071A1 (en)*2007-04-102013-06-13At & T Intellectual Property Ii, L.P.Stochastic Method for Program Security Using Deferred Linking
US8392910B1 (en)*2007-04-102013-03-05AT & T Intellectual Property II, LLPStochastic method for program security using deferred linking
US20090077383A1 (en)*2007-08-062009-03-19De Monseignat BernardSystem and method for authentication, data transfer, and protection against phishing
US20100257354A1 (en)*2007-09-072010-10-07Dis-Ent, LlcSoftware based multi-channel polymorphic data obfuscation
US20090193513A1 (en)*2008-01-262009-07-30Puneet AgarwalPolicy driven fine grain url encoding mechanism for ssl vpn clientless access
US20090235089A1 (en)*2008-03-122009-09-17Mathieu CietComputer object code obfuscation using boot installation
US20130061323A1 (en)*2008-04-232013-03-07Trusted Knight CorporationSystem and method for protecting against malware utilizing key loggers
US8762705B2 (en)*2008-07-242014-06-24Alibaba Group Holding LimitedSystem and method for preventing web crawler access
US20150195305A1 (en)*2008-07-242015-07-09Alibaba Group Holding LimitedSystem and method for preventing web crawler access
US20100058301A1 (en)*2008-08-262010-03-04Apple Inc.System and method for branch extraction obfuscation
US8185749B2 (en)*2008-09-022012-05-22Apple Inc.System and method for revising boolean and arithmetic operations
US20130067225A1 (en)*2008-09-082013-03-14Ofer ShochetAppliance, system, method and corresponding software components for encrypting and processing data
US20100083072A1 (en)*2008-09-302010-04-01Freescale Semiconductor, Inc.Data interleaver
US20100107245A1 (en)*2008-10-292010-04-29Microsoft CorporationTamper-tolerant programs
US20100186089A1 (en)*2009-01-222010-07-22International Business Machines CorporationMethod and system for protecting cross-domain interaction of a web application on an unmodified browser
US20100281459A1 (en)*2009-05-012010-11-04Apple Inc.Systems, methods, and computer-readable media for fertilizing machine-executable code
US8347398B1 (en)*2009-09-232013-01-01Savvystuff Property TrustSelected text obfuscation and encryption in a local, network and cloud computing environment
US20110129089A1 (en)*2009-11-302011-06-02Electronics And Telecommunications Research InstituteMethod and apparatus for partially encoding/decoding data for commitment service and method of using encoded data
US20110131416A1 (en)*2009-11-302011-06-02James Paul SchneiderMultifactor validation of requests to thw art dynamic cross-site attacks
US20110167407A1 (en)*2010-01-062011-07-07Apple Inc.System and method for software data reference obfuscation
US8615804B2 (en)*2010-02-182013-12-24Polytechnic Institute Of New York UniversityComplementary character encoding for preventing input injection in web applications
US20130046995A1 (en)*2010-02-232013-02-21David MovshovitzMethod and computer program product for order preserving symbol based encryption
US8266243B1 (en)*2010-03-302012-09-11Amazon Technologies, Inc.Feedback mechanisms providing contextual information
US20120022942A1 (en)*2010-04-012012-01-26Lee Hahn HollowayInternet-based proxy service to modify internet responses
US20150180509A9 (en)*2010-09-102015-06-25John P. FonsekaMethods, apparatus, and systems for coding with constrained interleaving
US20150039962A1 (en)*2010-09-102015-02-05John P. FonsekaMethods, apparatus, and systems for coding with constrained interleaving
US20140013427A1 (en)*2011-03-242014-01-09Irdeto B.V.System And Method Providing Dependency Networks Throughout Applications For Attack Resistance
US20130179985A1 (en)*2012-01-052013-07-11Vmware, Inc.Securing user data in cloud computing environments
US20130232578A1 (en)*2012-03-022013-09-05Apple Inc.Method and apparatus for obfuscating program source codes
US8661549B2 (en)*2012-03-022014-02-25Apple Inc.Method and apparatus for obfuscating program source codes
US20140165197A1 (en)*2012-12-062014-06-12Empire Technology Development, LlcMalware attack prevention using block code permutation
US20140283069A1 (en)*2013-03-152014-09-18Shape Security Inc.Protecting against the introduction of alien content
US20180041527A1 (en)*2013-03-152018-02-08Shape Security, Inc.Using instrumentation code to detect bots or malware
US20140282872A1 (en)*2013-03-152014-09-18Shape Security Inc.Stateless web content anti-automation
US9178908B2 (en)*2013-03-152015-11-03Shape Security, Inc.Protecting against the introduction of alien content
US20150350243A1 (en)*2013-03-152015-12-03Shape Security Inc.Safe Intelligent Content Modification
US20140281535A1 (en)*2013-03-152014-09-18Munibonsoftware.com, LLCApparatus and Method for Preventing Information from Being Extracted from a Webpage
US20160197945A1 (en)*2013-03-152016-07-07Shape Security, Inc.Protecting against the introduction of alien content
US20190243971A1 (en)*2013-03-152019-08-08Shape Security, Inc.Using instrumentation code to detect bots or malware
US9270647B2 (en)*2013-12-062016-02-23Shape Security, Inc.Client/server security by an intermediary rendering modified in-memory objects
US10122747B2 (en)*2013-12-062018-11-06Lookout, Inc.Response generation after distributed monitoring and evaluation of multiple devices
US10027628B2 (en)*2013-12-062018-07-17Shape Security, Inc.Client/server security by an intermediary rendering modified in-memory objects
US9712561B2 (en)*2014-01-202017-07-18Shape Security, Inc.Intercepting and supervising, in a runtime environment, calls to one or more objects in a web page
US9241004B1 (en)*2014-03-112016-01-19Trend Micro IncorporatedAlteration of web documents for protection against web-injection attacks
US20170041341A1 (en)*2014-05-232017-02-09Shape Security, Inc.Polymorphic Treatment of Data Entered At Clients
US9602543B2 (en)*2014-09-092017-03-21Shape Security, Inc.Client/server polymorphism using polymorphic hooks
US9582666B1 (en)*2015-05-072017-02-28Shape Security, Inc.Computer system for improved security of server computers interacting with client computers
US10216488B1 (en)*2016-03-142019-02-26Shape Security, Inc.Intercepting and injecting calls into operations and objects

Cited By (11)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US10230718B2 (en)2015-07-072019-03-12Shape Security, Inc.Split serving of computer code
US10834101B2 (en)2016-03-092020-11-10Shape Security, Inc.Applying bytecode obfuscation techniques to programs written in an interpreted language
US10216488B1 (en)2016-03-142019-02-26Shape Security, Inc.Intercepting and injecting calls into operations and objects
US11349816B2 (en)2016-12-022022-05-31F5, Inc.Obfuscating source code sent, from a server computer, to a browser on a client computer
CN110263533A (en)*2019-04-282019-09-20清华大学Safe web page means of defence
US11741197B1 (en)2019-10-152023-08-29Shape Security, Inc.Obfuscating programs using different instruction set architectures
US20210334342A1 (en)*2020-04-272021-10-28Imperva, Inc.Procedural code generation for challenge code
US11748460B2 (en)*2020-04-272023-09-05Imperva, Inc.Procedural code generation for challenge code
EP4209938A1 (en)*2022-01-052023-07-12Irdeto B.V.Systems, methods, and storage media for creating secured computer code
US20230239323A1 (en)*2022-01-242023-07-27Cloud Linux Software Inc.Systems and methods for automated malicious code replacement
US12273385B2 (en)*2022-01-242025-04-08Cloud Linux Software Inc.Systems and methods for automated malicious code replacement

Also Published As

Publication numberPublication date
US9858440B1 (en)2018-01-02

Similar Documents

PublicationPublication DateTitle
US9858440B1 (en)Encoding of sensitive data
US11297097B2 (en)Code modification for detecting abnormal activity
US9973519B2 (en)Protecting a server computer by detecting the identity of a browser on a client computer
US20190373018A1 (en)Polymorphic Obfuscation of Executable Code
US10193909B2 (en)Using instrumentation code to detect bots or malware
US10205742B2 (en)Stateless web content anti-automation
US20190141064A1 (en)Detecting attacks against a server computer based on characterizing user interactions with the client computing device
US9489526B1 (en)Pre-analyzing served content
US9584534B1 (en)Dynamic field re-rendering
US9325734B1 (en)Distributed polymorphic transformation of served content
US9112900B1 (en)Distributed polymorphic transformation of served content
US12058170B2 (en)Code modification for detecting abnormal activity

Legal Events

DateCodeTitleDescription
STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:FINAL REJECTION MAILED

ASAssignment

Owner name:SHAPE SECURITY, INC., CALIFORNIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:WANG, XINRAN;ZHAO, YAO;REEL/FRAME:050910/0270

Effective date:20140522

STPPInformation on status: patent application and granting procedure in general

Free format text:DOCKETED NEW CASE - READY FOR EXAMINATION

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPPInformation on status: patent application and granting procedure in general

Free format text:FINAL REJECTION MAILED

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp