G06F2221/2123

DEVICE AND METHOD FOR BYPASSING ANALYSIS EVASION TECHNIQUE, AND RECORDING MEDIUM FOR A PROGRAM FOR PERFORMING THE SAME
20210056182 · 2021-02-25 ·

Provided is a method for bypassing an analysis evasion technique, which includes: loading a dummy DEX file; parsing a dummy method containing a dummy code from the dummy DEX file; a bypass point identifying step of determining whether a function to be currently called is a bypass target function to which the analysis evasion technique is applied; a branch target point changing step of changing information according to the determination result so that the dummy code is executed instead of the call target function; and a dummy code executing step of transmitting the dummy code to a framework of the application, so that a modulated framework is executed with a bypass code.

Session control for client-side applications in proxy solutions

Methods, systems, and media are shown for session control by a proxy service of client-side applications in a client. A service request from a client is received by the proxy service and forwarded to a service provider, which sends a service response with a document. Event monitoring code is injected into the document and the response is forwarded to the client. The event monitoring code intercepts a user action and sends a query to the proxy service to determine whether the user action is permitted. The proxy service checks the user action against access data defined for the document and sends a query response to the event monitoring code indicating whether the user action is permitted. If the user action is permitted, the event monitoring code allows normal execution flow. If the user action is denied, the code blocks further execution.

Obfuscating network page structure
10909212 · 2021-02-02 · ·

Disclosed are various embodiments for inhibiting or preventing automated data extraction from network pages. A form is provided to a client, where the form includes a set of form elements and a randomization. A form submission of the form is obtained from the client, where the form submission includes the randomization. A set of form parameters is obtained from the form submission. The set of form parameters is processed to yield a form result. A network page is generated based at least in part on the form result. The network page is provided to a network page obfuscation application to be obfuscated.

System and method for implementing user watermarks

A data privacy protecting tool operates on behalf of a user to watermark or otherwise fingerprint selected data provided to a digital service provider (DSP) sites/apps. The watermarked data can then be used to monitor a DSP's compliance with distribution or access rules for the user data.

SECURE AUTHENTICATION USING PUNCTURING

Disclosed are systems, methods, and non-transitory computer-readable media for secure authentication using puncturing. An authentication system receives an encoded obfuscated authentication credential as part of an authentication request and accesses a stored authentication credential. The authentication system performs a puncturing of the encoded obfuscated authentication credential. The resulting punctured authentication credential includes a subset of individual values from the encoded obfuscated authentication credential. The authentication determines whether the punctured encoded data input corresponds to at least a portion of the stored authentication credential. In response to determining that the punctured encoded data input corresponds to at least a portion of the stored authentication credential, the authentication system approves the authentication request.

MALWARE DETECTION AND PREVENTION SYSTEM
20210014244 · 2021-01-14 · ·

Aspects of the present disclosure involve systems and methods computing devices to access a public network posing as a user to the network to detect one or more malware programs available for downloading through the network. More particularly, a malware detection control system utilizes a browser executed on a computing device to access a public network, such as the Internet. Through the browser, sites or nodes of the public network are accessed by the control system with the interactions with the sites of the public network designed to mimic or approximate a human user of the browser. More particularly, the control system may apply the one or more personality profiles to the browser of the computing device to access and interact with the nodes of the public network. Further, the control system may monitor the information retrieved from the network sites to detect the presence of malware within the nodes.

Obfuscated haptic interfaces with natural interaction steganography

Disclosed embodiments provide techniques for improvements in electronic communications. A mobile electronic device associated with a user measures crowd density proximate to the user. When the crowd density exceeds a threshold, a haptic signal, such as a vibration or pneumatic output, is discretely provided to the user. After issuing the haptic signal, the device listens for false data. False data is data entered by the user that is not part of the expected data sequence. The false data is used to obfuscate the true data. The randomness of the false data can be used to generate a keypair used for communication. The keypair is used for asymmetric encryption that provides an extra level of security for electronic communications from the mobile electronic device.

System and method for controlling access to a cyber-physical system
10870412 · 2020-12-22 · ·

Systems and methods for controlling access to a cyber-physical system (CPS). A security tool can perform access authorization by analyzing messages sent through the CPS, creating a plurality of fictitious messages, sending the plurality of fictitious messages though the CPS, and checking whether correct authorization data is included in the analyzed messages to determine authorized or unauthorized access to the CPS. An access monitoring tool can detect a change in a functional CPS module related to unauthorized access to the CPS, and responsive to the detection of a change in a functional CPS module related to unauthorized access to the CPS, change a state of a functional CPS module using a monitoring rule.

INFORMATION DISPLAY CONSIDERING PRIVACY ON PUBLIC DISPLAY

According to one embodiment, a method, computer system, and computer program product for displaying information on a public device is provided. The present invention may include displaying, based on information received from a connected mobile device, user information and dummy information on a display device. The present invention may further include displaying an indicator alongside the user information and a dummy indicator alongside the dummy information. The present invention may further include transmitting user information and dummy information to a display device, synchronizing display of the user information to the display device, and synchronizing haptic feedback based on a received visual pattern. The present invention may further include generating dummy information according to the type of information.

Generating and executing protected items of software
10867032 · 2020-12-15 · ·

A method of generating a protected item of software, there being an execution path within code for the protected item of software that causes code for one or more second functions to be executed before executing code for a first function, wherein execution of the code for the one or more second functions causes data to be stored at one or more memory locations, the data satisfying a set of one or more predetermined properties, wherein, in the absence of an attack against the protected item of software when the code for the protected item of software is being executed, the first function is arranged to provide first functionality, the method comprising: configuring the code for the first function so that execution, by one or more processors, of the code for the first function provides the first functionality only if the set of one or more predetermined properties is satisfied by data being stored, when the first function is executed, at the one or more memory locations.