Determining the vulnerability of computer software applications to privilege-escalation attacks

    公开(公告)号:GB2499353A

    公开(公告)日:2013-08-14

    申请号:GB201310455

    申请日:2012-01-30

    Applicant: IBM

    Abstract: Determining the vulnerability of computer software applications to privilege-escalation attacks, such as where an instruction classifier is configured to be used for identifying a candidate access-restricted area of the instructions of a computer software application, and a static analyzer is configured to statically analyze the candidate access-restricted area to determine if there is a conditional instruction that controls execution flow into the candidate access-restricted area, perform static analysis to determine if the conditional instruction is dependent on a data source within the computer software application, and designate the candidate access-restricted area as vulnerable to privilege-escalation attacks absent either of the conditional instruction and the date source.

    Testing web application for security vulnerabilities by identifying known payload in DOM

    公开(公告)号:GB2496730A

    公开(公告)日:2013-05-22

    申请号:GB201218726

    申请日:2012-10-18

    Applicant: IBM

    Abstract: A client 120 request 130 comprising a payload 132 an injected script for example is communicated to a web-based application 112. The payload has a unique identifier. Response HTML 134 with an associated Document Object Model (DOM) object 136 is received from the web-based application and content corresponding to the payload is identified in the DOM object via its unique identifier. A section of the DOM object comprising the payload is then identified as un-trusted. A DOM abstraction 126 may be generated from the DOM object comprising a section of the DOM object containing the content corresponding to the payload whilst, preferably, excluding sections of the DOM object not comprising said content. The response HTML is then preferably rendered using the DOM abstraction in lieu of the DOM object. A static security analysis of the response HTML may be performed when rendering to identify whether any access to a DOM abstraction retrieves content corresponding to the payload and, if so, a flag is generated to indicate that a vulnerability exists within the web-based application.

    Method, apparatus and computer program product providing performance and energy optimization for mobile computing

    公开(公告)号:GB2529363A

    公开(公告)日:2016-02-17

    申请号:GB201521768

    申请日:2014-05-22

    Applicant: IBM

    Abstract: A method to share a computation task amongst a plurality of devices including at least one mobile device. The method includes estimating a cost to perform a computation task on a data set. If the estimated cost is greater than a threshold cost, the method further includes forming an ad-hoc wireless network comprised of a plurality of devices; downloading a portion of the data set to individual ones of the devices; performing a computation task by each device on the downloaded portion of the data set; and wirelessly transferring a result of the computation task from each device to all other devices of the network. The method can be performed by execution of an application program stored in mobile devices configured for local area wireless connectivity with neighboring mobile devices and for wireless connectivity to a remote server from which the portion of the data set is downloaded.

    Security testing of web applications with specialised payloads

    公开(公告)号:GB2519159A

    公开(公告)日:2015-04-15

    申请号:GB201318119

    申请日:2013-10-14

    Applicant: IBM

    Abstract: Method and system for security testing of web applications comprises; submitting 304 a test to a web application, wherein the test has a payload with a (possibly empty) set of constraints or variables. It further comprises receiving 305 a response from the web application, deriving 308 at least one constraint from the response, and using these to update the previous set of constraints and synthesize 310 a new payload. The test is then repeated 304 by submitting the new payload, and iterating this method until a security vulnerability is discovered 307 or a new payload cannot be constructed under all determined constraints and which possibly respects the grammar of a computer language used. This method may be used to check for input or script that is not sanitised by the web application and thus may be used as a cross-site scripting (XSS) attack. The constraints may be regarded as tokens, and tokens may be replaced with new tokens when generating the new payload.

    Detecting security vulnerabilities in web applications

    公开(公告)号:GB2505623B

    公开(公告)日:2014-06-11

    申请号:GB201400029

    申请日:2012-06-26

    Applicant: IBM

    Abstract: Method to detect security vulnerabilities includes: interacting with a web application during its execution to identify a web page exposed by the web application; statically analyzing the web page to identify a parameter within the web page that is constrained by a client-side validation measure and that is to be sent to the web application; determining a server-side validation measure to be applied to the parameter in view of the constraint placed upon the parameter by the client-side validation measure; statically analyzing the web application to identify a location within the web application where the parameter is input into the web application; determining whether the parameter is constrained by the server-side validation measure prior to the parameter being used in a security-sensitive operation; and identifying the parameter as a security vulnerability.

    Finding services in a service registry system of a service-oriented architecture

    公开(公告)号:GB2503696A

    公开(公告)日:2014-01-08

    申请号:GB201211872

    申请日:2012-07-04

    Applicant: IBM

    Abstract: A method (400) of searching a service registry system (200) comprising a plurality of services (120) identified by respective service names is disclosed in which at least some of said service names are associated with a set of client identifiers. The method at least comprises receiving (410) a search request (250) at said service registry system, said request including a service name (121) and a further set of client identifiers (251); searching (420) the service registry system for a match between the requested service name and a service name of one of said services in the service registry system; and in the absence of such a match, searching (250) the service registry system for services that have an association with at least some of the client identifiers in said further set; and returning a search result (260).

    Wirksames Testen einer Berechtigungslogik von WEB-Komponenten, die eine Berechtigung auf der Grundlage von Ansprüchen einsetzen

    公开(公告)号:DE102012216597A1

    公开(公告)日:2013-04-11

    申请号:DE102012216597

    申请日:2012-09-18

    Applicant: IBM

    Abstract: Es kann ein Berechtigungsalgorithmus einer Software-Komponente ausgewählt werden. Eine statische Codeanalyse kann durchgeführt werden, um eine bedingte Anweisung innerhalb eines Algorithmus der Software-Komponente zu ermitteln. Das Ergebnis der bedingten Anweisung kann auf der Grundlage einer Eingabe und eines Kriteriums mithilfe einer dynamischen Codeanalyse ermittelt werden. Bei der Eingabe kann es sich um einen Wert handeln, der einem Anspruchssatz einer Berechtigungsprüfungsrichtlinie auf der Grundlage von Ansprüchen zugehörig ist. Bei dem Kriterium kann es sich um ein Berechtigungsprüfungskriterium handeln, das innerhalb des Algorithmus angegeben ist. In Reaktion auf das Ergebnis kann ein Ausführungspfad ermittelt werden, der dem Ergebnis zugehörig ist, und ein Codeabdeckungskriterium kann für die bedingte Anweisung erfüllt werden.

    Detecting security vulnerabilities in web applications using a black-box tester

    公开(公告)号:GB2494738A

    公开(公告)日:2013-03-20

    申请号:GB201209473

    申请日:2012-05-29

    Applicant: IBM

    Abstract: A system for detecting security vulnerabilities in web applications, the system including, a black-box tester 100 configured to provide a payload 110 to a web application 102 during a first interaction with the web application at a computer server, where the payload includes a payload instruction and an identifier, and an execution engine 114 configured to detect the identifier within the payload received during an interaction with the web application subsequent to the first interaction, and determine, responsive to detecting the identifier within the payload 110, whether the payload instruction underwent a security check such as a validator or a sanitizer prior to execution of the payload instruction. The interaction initiating instruction is preferably an AJAX request and the invention is preferably used to detect vulnerability to stored cross site scripting (XSS) attacks.

    System, Verfahren und Vorrichtung für eine Gleichzeitige Festlegung und Durchsetzung von Richtlinien zur Zugriffskontrolle und Integrität

    公开(公告)号:DE112010004526T5

    公开(公告)日:2012-10-31

    申请号:DE112010004526

    申请日:2010-09-14

    Applicant: IBM

    Abstract: Richtlinien zur Zugriffskontrolle und Integrität von Informationsflüssen werden in einem Computersystem durchgesetzt, indem sicherheitsrelevante Senken im Software-Code für eine Anwendung ermittelt werden, die auf dem Computersystem ausgeführt wird, und eine Richtlinie zur Zugriffskontrolle aus einer Datenbank abgerufen wird, auf die das Computersystem zugreifen kann. Die Richtlinie zur Zugriffskontrolle bildet einen Satz von Zugriffsberechtigungen in dem Computersystem auf jeden einer Vielzahl von Prinzipalen ab. Für jede ermittelte sicherheitsrelevante Senke werden alle Prinzipale ermittelt, die diese sicherheitsrelevante Senke beeinflussen, und jeder sicherheitsrelevanten Senke wird eine umfassende Zugriffsberechtigung zugeordnet, indem die Schnittmenge der Zugriffsberechtigungssätze für alle Einfluss nehmenden Prinzipale dieser sicherheitsrelevanten Senke gebildet wird. Wenn dieser Berechtigungssatz nicht ausreicht, wird eine Verletzung der Integrität gemeldet. Darüber hinaus werden jedem Wert von Variablen, die in den sicherheitsrelevanten Senken verwendet werden, Berechtigungslabels zugeordnet. Jedes Berechtigungslabel ist ein Berechtigungssatz.

Patent Agency Ranking