首页> 外国专利> Detecting malicious code received from malicious client side injection vectors

Detecting malicious code received from malicious client side injection vectors

机译:检测从恶意客户端注入向量收到的恶意代码

摘要

There are disclosed devices, system and methods for detecting malicious scripts received from malicious client side vectors. First, a script received from a client side injection vector and being displayed to a user in a published webpage is detected. The script may have malicious code configured to cause a browser unwanted action without user action. The script is wrapped in a java script (JS) closure and/or stripped of hyper-text markup language (HTML). The script is then executed in a browser sandbox that is capable of activating the unwanted action, displaying execution of the script, and stopping execution of the unwanted action if a security error resulting from the unwanted action is detected. When a security error results from this execution in the sandbox, executing the malicious code is discontinued, displaying the malicious code is discontinued, and execution of the unwanted action is stopped.
机译:透露了用于检测从恶意客户端侧向向量接收的恶意脚本的设备,系统和方法。 首先,检测从客户端注射矢量接收并在发布的网页中显示给用户的脚本。 脚本可能具有恶意代码,配置为在没有用户操作的情况下导致浏览器不需要的操作。 该脚本以Java脚本(JS)封闭和/或剥离超文本标记语言(HTML)包装。 然后,脚本在浏览器沙箱中执行,该浏览器沙箱能够激活不需要的动作,显示脚本的执行,并且如果检测到由不需要的动作产生的安全错误,则停止执行不需要的动作。 在Sandbox中的此执行中断的安全错误时,已停止执行恶意代码,则停止显示恶意代码,并停止执行不需要的动作。

著录项

  • 公开/公告号US11222110B2

    专利类型

  • 公开/公告日2022-01-11

    原文格式PDF

  • 申请/专利权人 CLEAN.IO INC.;

    申请/专利号US202016875463

  • 发明设计人 ALEXEY STOLETNY;SETH DEMSEY;IVÁN SOROKA;

    申请日2020-05-15

  • 分类号G06F21/53;H04L29/06;G06F21/56;

  • 国家 US

  • 入库时间 2022-08-24 23:18:05

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号