METHOD AND APPARATUS FOR PREVENTING UNWANTED CODE EXECUTION
First Claim
1. A method of preventing unwanted code execution, the method comprising:
- identifying, by the computer system, at risk portions of an associated scripting environment, wherein a portion of the associated scripting environment comprises any instance of the functions, objects and properties of the associated scripting environment;
identifying, by the computer system, at least one trusted server-side resource;
receiving trusted and untrusted scripts by the computer system, wherein trusted refers to responses received from the trusted server-side resource, and untrusted refers to responses received from other external script sources;
receiving from the trusted server-side resource at least one further message containing one or more passwords; and
preventing, by the computer system, unwanted code execution by;
re-writing said at risk portions of the associated scripting environment to require presentation of the one or more passwords in order to execute.
2 Assignments
0 Petitions
Accused Products
Abstract
There is provided a method of preventing unwanted code execution in a computing environment executing a scripting language and associated environment, wherein said computing environment comprises at least one server-side resource and a client side resource, comprising determining “safe” and “at risk” or “restricted” portions of the scripting language and associated environment, determining “trusted” and “untrusted” portions of the scripting language and associated environment, determining at least one “trusted” server-side resource, receiving from the “trusted” server-side resource an initial message containing one or more high-entropy secrets, and providing an unwanted code execution protection mechanism by reconfiguring said “at risk” or “restricted” portions of the scripting language and associated environment to require presentation of the one or more high-entropy secrets in order to execute.
68 Citations
20 Claims
-
1. A method of preventing unwanted code execution, the method comprising:
-
identifying, by the computer system, at risk portions of an associated scripting environment, wherein a portion of the associated scripting environment comprises any instance of the functions, objects and properties of the associated scripting environment; identifying, by the computer system, at least one trusted server-side resource; receiving trusted and untrusted scripts by the computer system, wherein trusted refers to responses received from the trusted server-side resource, and untrusted refers to responses received from other external script sources; receiving from the trusted server-side resource at least one further message containing one or more passwords; and preventing, by the computer system, unwanted code execution by; re-writing said at risk portions of the associated scripting environment to require presentation of the one or more passwords in order to execute. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A client/server environment for preventing unwanted code execution, the environment comprising:
-
at least one processor operatively connected to a memory, the at least one processor when executing instructions stored in memory is configured to identify at risk portions of an associated scripting environment, wherein a portion of the associated scripting environment comprises any instance of the functions, objects and properties of the associated scripting environment; identify at least one trusted server-side resource; receive trusted and untrusted scripts, wherein trusted refers to responses received from the trusted server-side resource, and untrusted refers to responses received from other external script sources; receive from the trusted server-side resource at least one further message containing one or more passwords; and prevent unwanted code execution by re-writing said at risk portions of the associated scripting environment to require presentation of the one or more passwords in order to execute. - View Dependent Claims (18, 19)
-
-
20. A non-transitory computer readable medium containing instructions, which when executed by at least one processor is operable to carry out a method for preventing unwanted code execution, the method comprising
identifying at risk portions of an associated scripting environment, wherein a portion of the associated scripting environment comprises any instance of the functions, objects and properties of the associated scripting environment; -
identifying at least one trusted server-side resource; receiving trusted and untrusted scripts, wherein trusted refers to responses received from the trusted server-side resource, and untrusted refers to responses received from other external script sources; receiving from the trusted server-side resource at least one further message containing one or more passwords; and preventing unwanted code execution by re-writing said at risk portions of the associated scripting environment to require presentation of the one or more passwords in order to execute.
-
Specification