Methods of attack on a content screening algorithm based on adulteration of marked content
First Claim
1. A method of attacking a screening algorithm, the method comprising the steps of:
- marking content to be downloaded;
inserting at least one section of legitimate content into the marked content; and
subjecting the marked content, having the at least one section of legitimate content inserted therein, to a screening algorithm.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and apparatus for attacking a screening algorithm. The methods include the steps of marking content to be downloaded, inserting at least one section of legitimate content into the marked content, and subjecting the content to a screening algorithm. The screening algorithm may include the steps of determining a number of segments that are included within the content, selecting at least two segments within the content, screening the two segments to determine whether the two segments verify correctly through the screening algorithm, and downloading the content when it is determined that the two segments verify correctly through the screening algorithm. Once the content has been successfully downloaded, the integrity of the downloaded content may be restored by removing the legitimate content that was previously inserted into the downloaded content.
-
Citations
20 Claims
-
1. A method of attacking a screening algorithm, the method comprising the steps of:
-
marking content to be downloaded;
inserting at least one section of legitimate content into the marked content; and
subjecting the marked content, having the at least one section of legitimate content inserted therein, to a screening algorithm. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An apparatus for attacking a screening algorithm comprising:
a processor device for marking content to be downloaded and for inserting at least one section of legitimate content into the marked content, wherein the marked content having at least one section of legitimate content therein is subjected to a screening algorithm. - View Dependent Claims (12, 13, 15, 16, 17, 18, 19, 20)
-
14. An article of manufacture for attacking a screening algorithm, the article comprising a machine readable medium containing one or more programs which when executed implement the steps of:
-
marking content to be downloaded;
inserting at least one section of legitimate content into the marked content; and
subjecting the marked content, having the at least one section of legitimate content inserted therein, to a screening algorithm.
-
Specification