System and method for web application security
First Claim
1. A method for generating a transformed web application code, the method comprising:
- intercepting a web application code sent by at least one web server;
providing at least one script;
embedding the at least one script along with the intercepted web application code resulting in a transformed web application code, wherein the script collects and sends a representation of at least one client document object model (DOM) structure of the transformed web application code at least once when executed on a client; and
building a deemed clean representation of the DOM structure of the transformed web application code, for comparison with the representation sent by the script at the server.
1 Assignment
0 Petitions
Accused Products
Abstract
A system for detection and mitigation of client-side initiated security attack(s) to a web application is disclosed. A server component (SC) of the system is configured to intercept at least partially a web application code and/or data exchanged between a web server and one or more web browsers running on client devices respectively. The SC installs a script in the web application code intercepted from a web server before forwarding a transformed web application code to the a web browser. The CS when executed in a web browser of a client, causes the web browser to execute a loop which sweeps the document object model (DOM) structure of the webpage. Further, the CS sends a report containing the DOM structure and/or details on data to the SC. Using the received reports, SC concludes if tampering occurred at the client-side.
-
Citations
19 Claims
-
1. A method for generating a transformed web application code, the method comprising:
-
intercepting a web application code sent by at least one web server; providing at least one script; embedding the at least one script along with the intercepted web application code resulting in a transformed web application code, wherein the script collects and sends a representation of at least one client document object model (DOM) structure of the transformed web application code at least once when executed on a client; and building a deemed clean representation of the DOM structure of the transformed web application code, for comparison with the representation sent by the script at the server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for executing a transformed web application code, the method comprising:
-
receiving the transformed web application code, wherein the transformed web application code comprises at least a web application code and a script wherein the script collects and sends a representation of at least one client document object model (DOM) structure of the transformed web application code at least once when executed on a client; executing the script to generate a loop for sweeping at least once a client document object model (DOM) structure of the web application code; and transmitting at least one representation of the client DOM structure to at least one web server for comparison with a deemed clean representation of the DOM structure of the transformed web application code at the server. - View Dependent Claims (12)
-
-
13. A web application protection system of a server configured to detect and mitigate security attacks on a web application code, the system comprising:
-
a communication interface to intercept the web application code sent to a web server via a network; a processor configured to; build a deemed clean representation of a DOM structure of an intercepted web application code; embed at least one script with the intercepted web application code to produce the transformed web application code, wherein the at least one script triggers a loop to collect and send one or more client document object model (DOM) structures of the transformed web application code at least once when executed on the client; compare at least one representation of at least one client DOM structure received from a client with the deemed clean representation of the DOM structure, wherein the at least one representation of the at least one DOM structure is received subsequent to the execution of a transformed web application code on the client; and determine one or more tampering events that signify one or more security threats to the transformed web application code based upon the comparison.
-
-
14. A web application protection system of a server configured to detect and mitigate security attacks on a web application code, the system comprising:
-
a communication interface to intercept the web application code sent to a web server via a network; a processor configured to; build a deemed clean representation of a DOM structure of an intercepted web application code; embed at least one script with the intercepted web application code to produce the transformed web application code, wherein the at least one script triggers a loop to collect and send one or more representations of client document object model (DOM) structures of the transformed web application code at least once when executed on the client; compare at least one representation of at least one client DOM structure received from a client with the deemed clean representation of the DOM structure, wherein the at least one representation of the at least one DOM structure is received subsequent to the execution of a transformed web application code on the client; and determine one or more tampering events that signify one or more security threats to the transformed web application code based upon the comparison. - View Dependent Claims (15, 16, 17, 18, 19)
-
Specification