MONITORING AND MITIGATING CLIENT-SIDE EXPLOITATION OF APPLICATION FLAWS
First Claim
1. A system for monitoring and mitigating client-side exploitation of application flaws, the system comprising:
- a server to operate a first application, the first application to communicate with a client device operating a second application to execute an application flaw script and the application flaw script to cause the client device to produce a first request associated with vulnerability of the first application; and
an application flaw service module communicatively coupled to the server, the application flaw service module to;
receive the first request from the client device comprising transactional metadata based on the application flaw script; and
inspect the transactional metadata for malicious content within the first request.
2 Assignments
0 Petitions
Accused Products
Abstract
A system for monitoring and mitigating client-side exploitation of application flaws includes a server to operate a first application. The first application communicates with a client device operating a second application to execute an application flaw script. The application flaw script causes the client device to produce a first request associated with vulnerability of the first application. An application flaw service module, communicatively coupled to the server, receives the first request from the client device comprising transactional metadata based on the application flaw script and inspects the transactional metadata for malicious content within the first request.
-
Citations
18 Claims
-
1. A system for monitoring and mitigating client-side exploitation of application flaws, the system comprising:
-
a server to operate a first application, the first application to communicate with a client device operating a second application to execute an application flaw script and the application flaw script to cause the client device to produce a first request associated with vulnerability of the first application; and an application flaw service module communicatively coupled to the server, the application flaw service module to; receive the first request from the client device comprising transactional metadata based on the application flaw script; and inspect the transactional metadata for malicious content within the first request. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of monitoring and mitigating client-side exploitation of application flaws comprising:
-
adding computer usable program code to the beginning of a first response to a first request from a client, the computer usable program code to perform a basic inspection of the first response; receiving a second request from the client; determining that transactional metadata within the second request response contains an attack vector; and returning a second response to the second request to the client including attack vector countermeasures embedded in the second response. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A computer program product for monitoring and mitigating client-side exploitation of application flaws, the computer program product comprising:
-
a non-transitory computer readable storage medium comprising computer usable program code embodied therewith, the computer usable program code comprising; computer usable program code to, when executed by a processor, add computer usable program code to a beginning of a first response to a first request from a client, the computer usable program code to perform a basic inspection of the first response; computer usable program code to, when executed by a processor, receive a second request from the client; computer usable program code to, when executed by a processor, determine that transactional metadata within the second request contains an attack vector; and computer usable program code to, when executed by a processor, return a second response to the second request to the client including attack vector countermeasures embedded in the response. - View Dependent Claims (16, 17, 18)
-
Specification