Movatterモバイル変換


[0]ホーム

URL:


US20220164270A1 - Automatic optimization and hardening of application images - Google Patents

Automatic optimization and hardening of application images
Download PDF

Info

Publication number
US20220164270A1
US20220164270A1US17/103,043US202017103043AUS2022164270A1US 20220164270 A1US20220164270 A1US 20220164270A1US 202017103043 AUS202017103043 AUS 202017103043AUS 2022164270 A1US2022164270 A1US 2022164270A1
Authority
US
United States
Prior art keywords
target application
application
network
files
isolated
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US17/103,043
Other versions
US11360871B1 (en
Inventor
Mehran Farimani
Rajeev Thakur
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Rapidfort Inc
Original Assignee
Rapidfort Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Rapidfort IncfiledCriticalRapidfort Inc
Priority to US17/103,043priorityCriticalpatent/US11360871B1/en
Assigned to RapidFort, Inc.reassignmentRapidFort, Inc.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: FARIMANI, MEHRAN, THAKUR, RAJEEV
Publication of US20220164270A1publicationCriticalpatent/US20220164270A1/en
Application grantedgrantedCritical
Publication of US11360871B1publicationCriticalpatent/US11360871B1/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Classifications

Definitions

Landscapes

Abstract

Computer receives, from within system application comprising application(s) that communicate with operating system(s) (OS), selection of target application. Computer creates stub application for target application that mimics entry and exit points of target application. Computer isolates target application externally to system application. Computer establishes network connection(s) connecting isolated target application and stub application to process communication between isolated target application and system application. Computer generates OS tracing system that logs file and directory accesses of isolated target application. Computer monitors runtime behavior of isolated target application, using logs of OS tracing system, to identify files used by target application. Computer determines set of files not used by target application. Computer hardens the target application by either removing the determined set of files not used by target application or monitoring access to determined set of files and generating alert upon such access.

Description

Claims (20)

1. A method comprising:
receiving, from within a system application comprising one or more applications that communicate with one or more operating systems (OS), a selection of a target application;
creating a stub application for the target application that mimics entry and exit points of the target application;
isolating the target application externally to the system application;
establishing one or more network connections connecting the isolated target application and the stub application to process communication between the isolated target application and the system application, wherein the stub application mirrors the target application and transmits input/output data between the isolated target application and the system application;
generating an OS tracing system, the OS tracing system logging file and directory accesses of the isolated target application;
monitoring runtime behavior of the isolated target application, using logs of the OS tracing system, to identify files used by the target application to operate;
determining, based on the identified files used by the target application, a set of files not used by the target application;
in response to determining that monitoring of the isolated target application is completed, hardening the target application by either (i) removing the determined set of files not used by the target application or (ii) monitoring access to the determined set of files and generating an alert upon such access;
providing an output representing the hardened target application;
generating a network tracing system, the network tracing system logging network activity between the isolated target application and the system application;
monitoring the runtime behavior of the isolated target application, using logs of the network tracing system, to identify network ports used by the target application for network communication; and
determining, based on the identified network ports used by the target application, a set of network ports not used by the target application for network communication, wherein hardening the target application further comprises (i) disallowing communication over the set of network ports not used by the target application or (ii) monitoring access to the set of network ports and generating an alert upon such access.
12. A non-transitory machine-readable medium storing instructions which, when executed by one or more computing machines, cause the one or more computing machines to perform operations comprising:
receiving, from within a system application comprising one or more applications that communicate with one or more operating systems (OS), a selection of a target application;
creating a stub application for the target application that mimics entry and exit points of the target application;
isolating the target application externally to the system application;
establishing one or more network connections connecting the isolated target application and the stub application to process communication between the isolated target application and the system application, wherein the stub application mirrors
the target application and transmits input/output data between the isolated target application and the system application;
generating an OS tracing system, the OS tracing system logging file and directory accesses of the isolated target application;
monitoring runtime behavior of the isolated target application, using logs of the OS tracing system, to identify files used by the target application to operate;
determining, based on the identified files used by the target application, a set of files not used by the target application;
in response to determining that monitoring of the isolated target application is completed, hardening the target application by either (i) removing the determined set of files not used by the target application or (ii) monitoring access to the determined set of files and generating an alert upon such access;
providing an output representing the hardened target application;
identifying a set of OS packages and application packages included in the target application, along with the corresponding list of files used by each package; and
identifying a set of known vulnerabilities against the OS packages and application packages included in the target application; and
determining, based on the files used by the target application, a set of packages used by the target application; and
determining, based on packages used by the target application, a set of known vulnerabilities for packages used in the target application, and a set of known vulnerabilities for packages not used in the target application, and a set of known vulnerabilities in the hardened target application.
14. The machine-readable medium ofclaim 12, the operations further comprising:
generating a network tracing system, the network tracing system logging network activity between the isolated target application and the system application;
monitoring the runtime behavior of the isolated target application, using logs of the network tracing system, to identify network ports used by the target application for network communication; and
determining, based on the identified network ports used by the target application, a set of network ports not used by the target application for network communication, wherein hardening the target application further comprises (i) disallowing communication over the set of network ports not used by the target application or (ii) monitoring access to the set of network ports and generating an alert upon such access.
20. An apparatus comprising:
processing circuitry; and
a memory storing instructions which, when executed by the processing circuitry, cause the processing circuitry to perform operations comprising:
receiving, from within a system application comprising one or more applications that communicate with one or more operating systems (OS), a selection of a target application;
creating a stub application for the target application that mimics entry and exit points of the target application;
isolating the target application externally to the system application;
establishing one or more network connections connecting the isolated target application and the stub application to process communication between the isolated target application and the system application, wherein the stub application mirrors the target application and transmits input/output data between the mimicked entry and exit points and the isolated target application;
generating an OS tracing system, the OS tracing system logging file and directory accesses of the isolated target application;
monitoring runtime behavior of the isolated target application, using logs of the OS tracing system, to identify files used by the target application to operate;
determining, based on the identified files used by the target application, a set of files not used by the target application;
in response to determining that monitoring of the isolated target application is completed, hardening the target application by either (i) removing the determined set of files not used by the target application or (ii) monitoring access to the determined set of files and generating an alert upon such access;
providing an output representing the hardened target application;
determining that a set of network ports are not used by the target application; and
identifying, based on the determined set of network pons that are not used by the target application, a list of allowed network ports for use in a configuration profile for the hardened target application.
US17/103,0432020-11-242020-11-24Automatic optimization and hardening of application imagesActiveUS11360871B1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US17/103,043US11360871B1 (en)2020-11-242020-11-24Automatic optimization and hardening of application images

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
US17/103,043US11360871B1 (en)2020-11-242020-11-24Automatic optimization and hardening of application images

Publications (2)

Publication NumberPublication Date
US20220164270A1true US20220164270A1 (en)2022-05-26
US11360871B1 US11360871B1 (en)2022-06-14

Family

ID=81657043

Family Applications (1)

Application NumberTitlePriority DateFiling Date
US17/103,043ActiveUS11360871B1 (en)2020-11-242020-11-24Automatic optimization and hardening of application images

Country Status (1)

CountryLink
US (1)US11360871B1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20220070197A1 (en)*2020-08-262022-03-03Cisco Technology, Inc.Systems and methods for detecting vulnerabilities in network processes during runtime

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US12380066B2 (en)2023-08-242025-08-05RapidFort, Inc.System and method for selecting instrumentation technique

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US10936725B2 (en)*2018-10-172021-03-02Accenture Global Solutions LimitedContainer image vulnerability reduction
US11550899B2 (en)*2019-07-222023-01-10Cloud Linux Software Inc.Systems and methods for hardening security systems using live patching
US11586945B2 (en)*2019-08-062023-02-21Salesforce.Com, Inc.Methods and systems for automated, intelligent application process development that recommend how to modify applications based on usage patterns of end users
US11405400B2 (en)*2019-09-082022-08-02Microsoft Technology Licensing, LlcHardening based on access capability exercise sufficiency

Cited By (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20220070197A1 (en)*2020-08-262022-03-03Cisco Technology, Inc.Systems and methods for detecting vulnerabilities in network processes during runtime
US11706239B2 (en)*2020-08-262023-07-18Cisco Technology, Inc.Systems and methods for detecting vulnerabilities in network processes during runtime

Also Published As

Publication numberPublication date
US11360871B1 (en)2022-06-14

Similar Documents

PublicationPublication DateTitle
US10534915B2 (en)System for virtual patching security vulnerabilities in software containers
US20230126212A1 (en)Virtualization Platform for Creating, Deploying, Modifying, and Relocating Applications
US20200242254A1 (en)Continuous vulnerability management for modern applications
CN111400722B (en)Method, apparatus, computer device and storage medium for scanning small program
US20140380474A1 (en)System and Method for Detecting Time-Bomb Malware
CN112929326A (en)Malicious domain name access detection method and device and computer readable storage medium
US20140337836A1 (en)Optimized resource allocation for virtual machines within a malware content detection system
CN110765464B (en)Vulnerability detection method, device, equipment and computer storage medium
US9229758B2 (en)Passive monitoring of virtual systems using extensible indexing
JP2022504030A (en) How, systems, and programs to detect security risks associated with software components
CN107580703B (en)Migration service method and module for software module
US8938648B2 (en)Multi-entity test case execution workflow
CN112528296B (en)Vulnerability detection method and device, storage medium and electronic equipment
US11360871B1 (en)Automatic optimization and hardening of application images
US20130111018A1 (en)Passive monitoring of virtual systems using agent-less, offline indexing
CN112235300B (en)Cloud virtual network vulnerability detection method, system, device and electronic equipment
CN113220572A (en)Data testing method and device and storage medium
US11055416B2 (en)Detecting vulnerabilities in applications during execution
CN111600769A (en)Site detection method and device and storage medium
CN112699034B (en)Virtual login user construction method, device, equipment and storage medium
US12321399B2 (en)System and method for a web scraping tool
CN115809120A (en)Attack simulation detection method, system, medium and electronic device for Docker container
CN114153696A (en)Cloud native application health detection method and device, computer equipment and storage medium
CN112398857A (en)Firewall testing method and device, computer equipment and storage medium
CN105653948B (en)Method and device for preventing malicious operation

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:RAPIDFORT, INC., CALIFORNIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:FARIMANI, MEHRAN;THAKUR, RAJEEV;REEL/FRAME:054459/0078

Effective date:20201124

FEPPFee payment procedure

Free format text:ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

FEPPFee payment procedure

Free format text:ENTITY STATUS SET TO SMALL (ORIGINAL EVENT CODE: SMAL); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

STCFInformation on status: patent grant

Free format text:PATENTED CASE


[8]ページ先頭

©2009-2025 Movatter.jp