G06F21/128

Analysis apparatus, analysis method, and analysis program

An analysis apparatus includes a category classification unit that accesses a URL of an analysis target Web page and classifies the analysis target Web page into a category, an operation target detection unit that detects an operation target of user operation from the analysis target Web page in accordance with a detection method that is set in advance for the classified category, an operation execution unit that performs operation on the detected operation target, a function hook unit that detects an operation event that occurs after the operation has been performed on the operation target, and a log output unit that outputs log data in which communication that has occurred due to the operation, the detected operation event, and a Web browser screen that has been changed due to the operation are associated with the URL of the analysis target Web page.

System and method for detecting unauthorized activity at an electronic device

A method and a system for detecting an unauthorized activity at a user device are provided. The method comprises: analyzing a first request from the user device, the first request including original client cookie; in response to the original client cookie meeting a predetermined threshold: causing the user device to receive a Java Script Module, thereby enabling the user device to generate a second request, by: receiving server cookie indicative of a given activity associated with the user device being one of: a user activity and a bot activity; generating the second request including first client cookie and the server cookie; determining if the second request is to be transmitted to a web content server associated with the first web page; in response to the server cookie data being indicative of the bot activity: the second request is blocked.

SYSTEMS AND METHODS FOR CAUSING NONPREDICTABLE ENVIRONMENT STATES FOR EXPLOIT PREVENTION AND MALICIOUS CODE NEUTRALIZATION FOR JAVASCRIPT-ENABLED APPLICATIONS
20220164441 · 2022-05-26 ·

Systems, methods, and computer-readable media for cybersecurity are disclosed. The systems and methods may involve receiving, by an application capable of JavaScript execution, code for execution; executing, before execution of the received code, an intercepting code, wherein the intercepting code is configured to intercept at least one application programming interface (API) invocation by the received code; intercepting, by the intercepting code, an API invocation by the received code; determining that the intercepted API invocation results in a manipulation of a backing store object; and modifying an execution of the intercepted API invocation, wherein the modified execution results in a nonpredictable environment state.

Providing enhanced functionality in an interactive electronic technical manual

Embodiments of the present disclosure provide methods, apparatus, systems, computer program products for performing functionality requiring network connectivity in an interactive electronic technical manual system (IETM) configured to provide electronic and credentialed access to technical documentation for an item. In one embodiment, a method is provided comprising: receiving input comprising informational data; and responsive to receiving the data: generating a graphical security code; receiving input indicating a scanning of the code, wherein the scanning of the code (1) is performed by a user using a remote device connected to a network and (2) causes access to scanning functionality provided by an application installed on the device; and responsive to receiving the input: generating a graphical form code comprising the data; and causing display of a third window comprising the code, wherein the code can be scanned using the application to send the data to a third party over the network.

MULTI -TENANT ACTOR SYSTEMS WITH WEB ASSEMBLY
20220156363 · 2022-05-19 ·

Some embodiments may be associated with a cloud-based actor framework. A dispatcher platform may determine that a first tenant actor is to be created for a first tenant in connection with a workload associated with a plurality of tenant identifiers. The first tenant may be, for example, associated with a first tenant identifier. The dispatch platform may then select a first thread for the first tenant actor from a pool of available threads and spin a first web assembly module such that execution of the first web assembly module is associated with a first web assembly browser sandbox. The dispatcher platform can then securely create the first tenant actor within the first web assembly browser sandbox to execute the workflow for the first tenant identifier. Similarly, a second web assembly browser sandbox may execute a second tenant actor for a second tenant identifier.

SYSTEMS AND METHODS FOR REMOTELY VERIFYING IDENTITY OF NON-RESIDENT ALIENS
20220156348 · 2022-05-19 ·

A method for remotely verifying a non-resident alien's identity, includes: receiving a request to establish a communication session from a user device; analyzing the request to determine whether the user device is compromised; in response to determining that the user device is not compromised, providing a page flow to the user device to solicit information from the non-resident alien, the information including identity information associated with a local foreign government identification document (ID), and other information not shown on the local foreign government ID; querying one or more foreign governmental data stores to identify foreign data associated with the non-resident alien based on a unique identifier associated with the local foreign government ID; comparing the information with the foreign data; and verifying an identity of the non-resident alien based on the comparing, wherein the verifying includes determining that at least one of the other information matches the foreign data.

Systems and methods for computer security
11188622 · 2021-11-30 ·

Computer security techniques are described. One example determines whether to allow a program (e.g., native executable, script, etc.) to execute. This decision is based at least in part on the source of the program, such as whether the program is provided by a privileged source. A privileged program source may be any module, mechanism, or process that can provide executable instructions, such as directory or folder (e.g., on a local disk or network-accessible store), a computing device (e.g., server computer), another program (e.g., a Web server), or the like.

Application framework for integrating APPs for editing content of a content management system

An application framework for interfacing applications with a content management system (CMS), includes: the CMS configured to provide access to create or update a content project via a content management API; providing an interface to enable adding of an APP to the CMS, the APP is configured to provide a service to be used within the CMS; providing, over a network, a web editor of the CMS to access the content project, wherein responsive to execution of the web editor for the content project in a client browser, the APP is launched in an APP runtime environment that is independent of a web editor runtime environment in which the web editor is executed; wherein API calls received from the APP for the content management API of the CMS are automatically run through a security process of the application framework, the security process is configured to apply a checking process to API calls of the APP.

HASH-BASED DYNAMIC RESTRICTION OF CONTENT ON INFORMATION RESOURCES
20210349976 · 2021-11-11 · ·

Systems and methods for restricting content inserted into information resources are provided herein. A computing device can identify a content element included in an information resource. The computing device can identify a bit stream corresponding to the content element included in the information resource. The computing device can hash the identified bit stream to generate an element identifier corresponding to the content element. The computing device can access a restricted content database using the element identifier. The computing device can modify, responsive to finding the element identifier in the restricted content database, the presentation of the content element on the information resource in accordance with the content restriction policy.

SYSTEMS AND METHODS FOR IMPROVED CYBERSECURITY NAMED-ENTITY-RECOGNITION CONSIDERING SEMANTIC SIMILARITY

Various embodiments of a system and associated method for generating and training a name-entity recognition model for automatic dataset labeling and corpus generation for cybersecurity related entities are disclosed.