MONITORING AND MITIGATING CLIENT-SIDE EXPLOITATION OF APPLICATION FLAWS
First Claim
1. A system for monitoring and mitigating client-side exploitation of application flaws, the system comprising:
- a client device operating an application;
a server communicatively coupled to the client device; and
an application flaw service module communicatively coupled to the client device and server;
in which the application flaw service module receives a request from the client device comprising transactional metadata and inspecting the transactional metadata for malicious content within the request.
2 Assignments
0 Petitions
Accused Products
Abstract
A system for monitoring and mitigating client-side exploitation of application flaws, the system comprising a client device operating an application, a server communicatively coupled to the client device, and an application flaw service module communicatively coupled to the client device and server in which the application flaw service module receives a request from the client device comprising transactional metadata and inspecting the transactional metadata for malicious content within the request. A method of monitoring and mitigating client-side exploitation of application flaws by adding computer usable program code to the response to a first request from a client, receiving a second request from the client, determining that transactional metadata within the response contains an attack vector, and returning a response to the browser including attack vector countermeasures embedded in the response.
32 Citations
15 Claims
-
1. A system for monitoring and mitigating client-side exploitation of application flaws, the system comprising:
-
a client device operating an application; a server communicatively coupled to the client device; and an application flaw service module communicatively coupled to the client device and server; in which the application flaw service module receives a request from the client device comprising transactional metadata and inspecting the transactional metadata for malicious content within the request. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of monitoring and mitigating client-side exploitation of application flaws comprising:
-
adding computer usable program code to the beginning of a response to a first request from a client; receiving a second request from the client; determining that transactional metadata within the response contains an attack vector; and returning a response to the client including attack vector countermeasures embedded in the response. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A computer program product for monitoring and mitigating client-side exploitation of application flaws, the computer program product comprising:
a computer readable storage medium comprising computer usable program code embodied therewith, the computer usable program code comprising; computer usable program code to, when executed by a processor, add computer usable program code to the beginning of a response to a first request from a client; computer usable program code to, when executed by a processor, receive a second request from the client; computer usable program code to, when executed by a processor, determine that transactional metadata within the response contains an attack vector; and computer usable program code to, when executed by a processor, return a response to the client including attack vector countermeasures embedded in the response. - View Dependent Claims (14, 15)
Specification