G06F2221/03

BROWSER EMULATOR DEVICE, CONSTRUCTION DEVICE, BROWSER EMULATION METHOD, BROWSER EMULATION PROGRAM, CONSTRUCTION METHOD, AND CONSTRUCTION PROGRAM

A browser emulator is caused to emulate a client environment that is arbitrary values of types and versions of an OS, a browser, and a plugin. Further, the browser emulator monitors execution of a script or a plugin. A browser emulator manager then causes the browser emulator to patrol a predetermined Web site, and accumulates, in an analysis information database, results of access to the Web site in association with information on client environments emulated upon the access to the Web site. The browser emulator manager then refers to the accumulated results of access, and identifies a Web site that causes a difference between results of access according to a difference between client environments.

Classifier Bypass Based On Message Sender Trust and Verification

In some embodiments, techniques for computer security comprise receiving an email message; determining a sender of the email message; determining whether the sender of the email message is trusted, wherein determining whether the sender of the email message is trusted includes determining whether the sender of the email message is associated with a whitelist; retrieving domain-related information by performing a DNS query on a domain associated with the sender; based at least in part on the domain-related information, determining whether the sender of the email message is verified; determining whether the sender is both trusted and verified; and when it is determined that the sender is both trusted and verified, treating the email message as trustworthy, wherein treating the email message as trustworthy includes bypassing a classifier.

CRYPTOGRAPHY MODULE AND METHOD FOR OPERATING SAME

A cryptography module for at least temporarily controlling an operation of at least one computing device. The cryptography module is designed to check at least one memory area of a memory unit capable of being accessed by the computing device, and to control the operation of the at least one computing device as a function of the check. The cryptography module is designed to receive a first control command from the computing device, which characterizes at least one memory area of the memory unit to be checked, and to check the memory area characterized by the first control command.

Cryptography module and method for operating same

A cryptography module for at least temporarily controlling an operation of at least one computing device. The cryptography module is designed to check at least one memory area of a memory unit capable of being accessed by the computing device, and to control the operation of the at least one computing device as a function of the check. The cryptography module is designed to receive a first control command from the computing device, which characterizes at least one memory area of the memory unit to be checked, and to check the memory area characterized by the first control command.

ENHANCING INTELLIGENCE IN PARENTAL CONTROL
20220171845 · 2022-06-02 ·

Systems and methods are provided for automatically implementing parental controls at a computing device. One example method includes identifying a user profile and determining a baseline user behavior associated with the user profile. Deviations from the baseline user behavior at a computing device associated with the user profile are monitored for. A confidence value is generated based on the deviations from the baseline user behavior. An action to perform at the computing device is determined based on the user behavior and the confidence value. The action is performed.

DETERMINING SECURITY RISKS IN BINARY SOFTWARE CODE USING A SOFTWARE RELATIONSHIP MODEL
20230297688 · 2023-09-21 · ·

Systems, methods, and software can be used to determine security risks in binary software using a software relationship model. In some aspects, a method comprises: receiving a software relationship model that identifies: (i) a set of software components, and (ii) communication interfaces between software components in the set of software components; receiving a set of binary software code; generating a risk assessment for the set of binary software code based on the software relationship model; and generating a notification, based on the risk assessment for the set of binary software code, that indicates security risks associated with the set of binary software code.

SECURE MODULAR MACHINE LEARNING PLATFORM

A secure, modular multi-tenant machine learning platform is configured to: receive untrusted code supplied by a first tenant; perform a security scan of the untrusted code to determine whether the untrusted code satisfies a set of one or more security requirements; responsive to determining that the untrusted code satisfies the security requirement(s): deploy the untrusted code to a runtime execution environment; deploy a machine learning model associated with the first tenant to the runtime execution environment, the untrusted code being configured to perform one or more functions using the machine learning model; receive a set of untrusted code supplied by a second tenant; perform a security scan of the untrusted code to determine whether the untrusted code satisfies the security requirement(s); and responsive to determining that the untrusted code does not satisfy the security requirement(s): refraining from deploying the untrusted code to a runtime execution environment.

Cryptography module and method for operating same

A cryptography module for a computing device. The cryptography module is designed to check at least one memory area of a memory device which the computing device may access, as the result of which a result of the check is obtained, and to store the result at least temporarily.

Computing device and method for operating same

A computing device that includes at least one processor core for executing a first computer program, the computing device being designed to access a memory device, in particular in order to load the first computer program. The computing device is designed to transmit a first control command, which characterizes the first computer program and/or a memory area of the memory device associated with the first computer program, to at least one cryptography module. The cryptography module is designed in particular to check the computer program, or the memory area of the memory device associated with the first computer program, characterized by the first control command, and the computing device is designed to execute the first computer program.

AUTHENTICATION OF WRITE REQUESTS

Examples of computing devices for authenticating a write request to a controller of a computing device are described herein, in an example, a computing device may include a controller having a first authentication key and a firmware having a copy of the first authentication key. The copy of the first authentication key being editable. The controller may randomly generate a second authentication key. Using the first authentication key and the second authentication key, the controller may compute a first hash value. The firmware may compute a second hash value using the copy of the first authentication key and the second authentication key. When the controller receives a write request, the controller may compare the first hash value and the second hash value and allow the write request upon successful comparison.