Runtime protection of web services
First Claim
Patent Images
1. A method for protecting a runtime Web service application comprising:
- enabling the Web service application to log its operation and create an execution trace;
identifying a trace point vulnerability using one or more data payloads and one or more security rules;
identifying a candidate trace point operation associated with the trace point vulnerability;
computing a supplementary candidate operation based on the existing trace point operation and the trace point vulnerability; and
further enabling the Web service application with the supplementary candidate operation, wherein each data payload comprises an example set of data, and wherein the identifying the candidate trace point operation associated with the trace point vulnerability is performed by checking data flow through an application and an instrumented version of the application using one of the one or more data payloads and specifying a security rule to define the data flow, and wherein the candidate trace point operation is an operation for which a payload value has been rejected by a validator or has been sanitized by a sanitizer, and wherein the trace point vulnerability is reported, and wherein a vulnerability detector performs further vulnerabilities testing after the Web service application has been further instrumented with one or more supplementary candidate operations.
1 Assignment
0 Petitions
Accused Products
Abstract
Protecting a runtime Web service application. A web service application is instrumented to log its operation and allow recreation of its execution trace. Trace point vulnerabilities are identified using one or more data payloads. Candidate trace point operations associated with the trace point vulnerabilities are identified. Supplementary candidate operations are computed based on the existing trace point operations and the one or more data payloads. The Web service application is further instrumented with the one or more supplementary candidate operations.
-
Citations
1 Claim
-
1. A method for protecting a runtime Web service application comprising:
-
enabling the Web service application to log its operation and create an execution trace; identifying a trace point vulnerability using one or more data payloads and one or more security rules; identifying a candidate trace point operation associated with the trace point vulnerability; computing a supplementary candidate operation based on the existing trace point operation and the trace point vulnerability; and further enabling the Web service application with the supplementary candidate operation, wherein each data payload comprises an example set of data, and wherein the identifying the candidate trace point operation associated with the trace point vulnerability is performed by checking data flow through an application and an instrumented version of the application using one of the one or more data payloads and specifying a security rule to define the data flow, and wherein the candidate trace point operation is an operation for which a payload value has been rejected by a validator or has been sanitized by a sanitizer, and wherein the trace point vulnerability is reported, and wherein a vulnerability detector performs further vulnerabilities testing after the Web service application has been further instrumented with one or more supplementary candidate operations.
-
Specification