G06F2221/033

Security assessment scheduling tool

A security assessment scheduling tool uses a configuration file that is configurable via a user interface, to specify one or more elements of an application to be analyzed during the scoping process. Further, the security assessment scheduling tool may automatically schedule assessments for large numbers of applications using one or more constraining optimization techniques and/or via modeling the scheduling problem as an RCPSP problem. The security assessment scheduling tool processes the RCPSP problem for a defined period of time and then schedules remaining unscheduled applications within a specified time period thereby allowing the security assessment scheduling tool to schedule assessments of tens of thousands of applications.

DYNAMIC SECURITY MODULE TERMINAL DEVICE AND METHOD OF OPERATING SAME
20180012025 · 2018-01-11 ·

Disclosed herein are a dynamic security module terminal device for receiving a dynamic security module and transmitting a security management event to a security server, and a method of operating the dynamic security module terminal device. The dynamic security module terminal device includes a communication unit configured to transmit and receive a security management event over a network, and a processor configured to control the communication unit. The processor is configured to create a security session with a security server, and to receive the dynamic security module from the security server so that part or all of code of the dynamic security module performing security management has a predetermined valid period.

Application Code Hiding Apparatus by Modifying Code in Memory and Method of Hiding Application Code Using the Same

An application code hiding apparatus includes a secret code dividing part, a secret code caller generating part, a code analyzing part, a dummy code generating part, a code encrypting part, a code disposing part, a code decryptor generating part, a disposed code importer generating part, a code loader generating part, a memory inner code modifier generating part and a decrypted code caller generating part.

Shadow stack violation enforcement at module granularity

Enforcing shadow stack violations at module granularity, rather than at thread or process granularity. An exception is processed during execution of a thread based on code of an application binary, which is enabled for shadow stack enforcement, that calls an external module. The exception results from a mismatch between a return address popped from the thread's call stack and a return address popped from the thread's shadow stack. Processing the exception includes determining that the exception resulted from execution of an instruction in the external module, and determining whether or not the external module is enabled for shadow stack enforcement. Based at least on these determinations, execution of the thread is terminated when the external module is enabled for shadow stack enforcement, or the thread is permitted to continue executing when the external module is not enabled for shadow stack enforcement.

Software verification of dynamically generated code

In an embodiment, dynamically-generated code may be supported in the system by ensuring that the code either remains executing within a predefined region of memory or exits to one of a set of valid exit addresses. Software embodiments are described in which the dynamically-generated code is scanned prior to permitting execution of the dynamically-generated code to ensure that various criteria are met including exclusion of certain disallowed instructions and control of branch target addresses. Hardware embodiments are described in which the dynamically-generated code is permitted to executed but is monitored to ensure that the execution criteria are met.

Electronic control system for vehicle, program update approval determination method and program update approval determination program

An electronic control system for vehicle includes a center device that manages a program update of a vehicle, and a vehicular master device that is communicable with the center device. The center device, responsive to a user giving approval for program update by using a device not being a possession owned by the user, receives approval information of the user, and stores and manages the approval information in association with vehicle information of the user. The center device transmits the approval information to the user's vehicle side. When the vehicular master device receives the approval information, the vehicular master device performs rewriting of the program.

Autonomous generation of attack signatures to detect malicious network activity
11711383 · 2023-07-25 · ·

Methods and systems for detecting malicious activity on a network. The methods described herein involve gathering data regarding a first state of a computing environment, executing an attack tool to simulate malicious activity in the computing environment, and then gathering data regarding a second state of the computing environment. The methods described herein may then involve generating a signature based on changes between the first and second states, and then using the generated signature to detect malicious activity in a target network.

Open source library security rating
11709949 · 2023-07-25 · ·

An open source library rating is generated for an open source library based on dependencies of the library, vulnerabilities of the library, an age of the library, a popularity of the library, a history of the library, or any suitable combination thereof. The rating of a specific version of a library may be generated based on a base score for all versions of the library and a version score for the specific version of the library. An authorization system receives a request from a developer to add a library to a software application. In response, the authorization system accesses a rating for the library. Based on the rating, the authorization system approves the request, denies the request, or recommends an alternative library.

SYSTEMS AND METHODS FOR EVENT-BASED APPLICATION CONTROL
20230237149 · 2023-07-27 ·

Systems and methods are disclosed for event-based application control. A system extension is configured to leverage an endpoint security API for monitoring event activity within operating system kernel processes. The system extension registers with the endpoint security API particular event types for which the system extension would like to receive notifications. In response to receiving notifications regarding detected events corresponding to the registered event types, the system extension determines if the event, and its corresponding process, are safe and allowable to execute. In various embodiments, the system leverages whitelists, blacklists, and rules policies for making a safeness determination regarding the event notification. The system extension transmits this determination to the operating system via the endpoint security API.

SYSTEMS AND METHODS FOR PROACTIVE AND REACTIVE DATA SECURITY

Disclosed herein are systems, methods, and storage media for distributed system security. In an example embodiment, a computer-executable method includes receiving a first item of executable code, calculating a hash of the first item of executable code, and comparing the calculated hash to a database of hashes. Responsive to a determination that the calculated hash does not match any hash in the database of hashes, a first security policy is applied to the first item of executable code. Triggering of the first policy indicates that the first item of executable code should be blocked from execution. If the first item of executable code does not trigger the first security policy, the method includes executing the first item of executable code and intercepting a request initiated by the first item of executable code during execution. In the request matches a second security policy, the request is blocked and/or filtered or sanitized, based on attribute-based access control policies.