US20100106767A1 - Automatically securing distributed applications - Google Patents

Automatically securing distributed applications Download PDF

Info

Publication number
US20100106767A1
US20100106767A1 US12/257,776 US25777608A US2010106767A1 US 20100106767 A1 US20100106767 A1 US 20100106767A1 US 25777608 A US25777608 A US 25777608A US 2010106767 A1 US2010106767 A1 US 2010106767A1
Authority
US
United States
Prior art keywords
client
application
replica
events
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US12/257,776
Inventor
Benjamin Livshits
Henricus Johannes Maria Meijer
Cedric Fournet
Jeffrey van Gogh
Danny van Velzen
Krishnaprasad Vikram
Abhishek Prateek
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microsoft Technology Licensing LLC
Original Assignee
Microsoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Corp filed Critical Microsoft Corp
Priority to US12/257,776 priority Critical patent/US20100106767A1/en
Assigned to MICROSOFT CORPORATION reassignment MICROSOFT CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: VIKRAM, KRISHNAPRASAD, FOURNET, CEDRIC, LIVSHITS, BENJAMIN, MEIJER, HENRICUS JOHANNES MARIA, VAN GOGH, JEFFREY, VAN VELZEN, DANNY
Publication of US20100106767A1 publication Critical patent/US20100106767A1/en
Priority to US14/247,418 priority patent/US9917822B2/en
Assigned to MICROSOFT TECHNOLOGY LICENSING, LLC reassignment MICROSOFT TECHNOLOGY LICENSING, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MICROSOFT CORPORATION
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect

Definitions

  • AJAX Asynchronous JavaScript and XML
  • Hotmail such as Hotmail, Google Maps, Facebook, and many others.
  • a typical multi-tier AJAX application consists of a server component implemented in Java J2EE or Microsoft .NET for example and a client-side component executing in the browser.
  • the resulting application is more performant and responsive, since computation is moved closer to the client, thus avoiding unnecessary network round trips. Unlike a computation performed entirely on the server however, when a portion of the code is moved to the client, the overall computation can no longer be trusted.
  • a malicious client can easily manipulates data that resides on and code that runs within the browser using one of many readily available data tampering or debugging tools.
  • a JavaScript-based shopping cart within a typical e-commerce retail site such as Amazon.com that allows the user to add items, adjust their quantities, add coupons, compute the shopping cart totals, and so forth.
  • this application can be compromised in a variety of ways. For instance, coupon validation checks can be dodged, allowing the user to reduce the total. Even simpler, the total computation can be compromised to set the total to an arbitrary, potentially even negative amount.
  • a distributed execution system employs replicated application execution to automatically preserve the integrity of distributed computations between client and server applications.
  • the system replicates a copy of client-side computations on a trusted server tier and captures user events such as keyboard or other command inputs (e.g., text inputs from a cell-phone client application).
  • the captured user-initiated events are transferred to an abstract replica of the client (operated at the server) for execution, where the system observes results of the computation, both as computed on the client-side and on the server side utilizing the replica of the client-side code. Any discrepancy between server side execution via the replica and client execution results that are sent via messages are flagged as a potential violation of computational integrity.
  • FIG. 1 is a schematic block diagram illustrating a system for validating security of remote applications.
  • FIG. 2 is a block diagram that illustrates an example tier-split application.
  • FIG. 3 illustrates an example security validation system.
  • FIG. 4 illustrates example event transfer diagrams.
  • FIG. 5 illustrates audit logs for a security checker.
  • FIG. 6 illustrates an example threat model for a security validation system.
  • FIG. 7 illustrates miscellaneous considerations for a security validation system.
  • FIG. 8 illustrates an exemplary process for verifying security of remote applications.
  • FIG. 9 is a schematic block diagram illustrating a suitable operating environment.
  • FIG. 10 is a schematic block diagram of a sample-computing environment.
  • a distributed processing system for remote applications includes a server component that executes an abstract replica of a client-side application, where a client component executes the client-side application. It is noted that the replica only has to mimic the relevant details, but can omit many others such as the actual graphical rendering of the client-side user interface on the server, for example.
  • the client component captures events from the client-side application and transmits the events to the replica to validate security of the client-side application. The events can be generated by a user or an application component. Security can be validated by comparing execution messages or observed states between the replica and the client side application.
  • a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer.
  • an application running on a server and the server can be a component.
  • One or more components may reside within a process and/or thread of execution and a component may be localized on one computer and/or distributed between two or more computers. Also, these components can execute from various computer readable media having various data structures stored thereon.
  • the components may communicate via local and/or remote processes such as in accordance with a signal having one or more data packets (e.g., data from one component interacting with another component in a local system, distributed system, and/or across a network such as the Internet with other systems via the signal).
  • a signal having one or more data packets (e.g., data from one component interacting with another component in a local system, distributed system, and/or across a network such as the Internet with other systems via the signal).
  • a system 100 is illustrated for validating security of remote applications.
  • the system 100 provides security for applications that are split between a client tier operated by a client component 110 that executes a remote client application.
  • a server tier 114 employs a server component 120 that operates in conjunction with the client component 110 to service the overall application that has been segmented between tiers.
  • events 130 are monitored and transmitted back to an abstract replica 140 that mimics operation of the client application at the server tier 114 .
  • the events 130 are typically user generated and can come from a plurality of sources such as keyboards, mice, voice commands, touch screen commands, biometric operations, and so forth and are generally employed to control or direct the client application.
  • the events 130 are typically generated by a user, that the events can also be machine or component-generated as well.
  • a message 150 is transmitted to a checker 160 .
  • the message 150 is constructed from actions of the client component 110 as it executes the client application and responds to the events 130 .
  • the replica executes as if it were the client application.
  • the replica generates a subsequent message and submits the message to the checker 160 .
  • the checker 160 compares the message generated by the replica 140 and the message 150 generated by the client component 110 . If the messages are the same (or within some predetermined threshold) then the checker can notify the client and the server that security is valid. If the respective messages are different, the checker can notify the client and the server that a security error has been detected. If an error is detected, several actions can occur. Error notifications can cause the client and the server to shut down.
  • a re-boot message could be transmitted to the client and the application could be restarted where further checks could be employed by the checker to determine if security is valid.
  • the client component 110 could be notified that a previous message checked invalid and that a previous section or portion of an application would need to be re-executed. As can be appreciated, a plurality of differing actions could occur upon error detection.
  • the system 100 employs replicated execution to automatically preserve the integrity of a distributed computation.
  • the system 100 replicates an abstract replica of the client-side computation on the trusted server tier 114 .
  • Client-side events 130 are transferred to the replica 140 of the client for execution.
  • the system 100 observes results of the computation, both as computed on the client-side and on the server side using the replica 140 of the client-side code. Any discrepancy is flagged as a potential violation of computational integrity. It is noted that checking may occur online, e.g., concurrently when the application is executed, or after the fact, as part of security auditing. In general, substantially any segmented application is supported for security verification and validation by the system 100 .
  • a distributed Web application can be highly responsive because of client-side execution, but the results of this execution do not have to be trusted because they are replayed on the server via the abstract replica 140 .
  • the integrity of the overall distributed computation is the same as if the application had been run entirely on the server 120 .
  • the system 100 can even lead to better performance since the application is replicated on the server, which typically runs faster than the client.
  • Remote procedure calls (RPCs) from the client can be anticipated and delivered to the client browser ahead of time, leading to low-latency RPCs and further enhancements in responsiveness.
  • the system 100 capitalizes on a recent trend towards distributing compilers such as GWT, Links, Hilda, Swift, and Volta, for example.
  • Distributing compilers allows both the client- and the server portion of the distributed application to be developed concurrently.
  • the system 100 can be integrated with a Volta compiler, a distributing compiler that tier-splits .NET applications and translates them into JavaScript as needed. Integration with Volta significantly simplifies the process of code replication since the distributed application is given to the Volta compiler at the time of compilation.
  • the system 100 also integrates into the RPC infrastructure of Volta, making the process of communication between remote system components on different tiers convenient. It is to be appreciated that Volta or other example applications described herein are but one example of a distributed application and means of creating them and substantially any application that can be segmented between remote computing systems or ways to create such an application are within the scope of the claimed subject matter.
  • An application 200 is split into a server-side component S 210 and a client-side component C 220 .
  • the client-side component C can be translated into JavaScript C′ to be run within a browser. While the system approach described above with respect to FIG. 1 , can be used for general AJAX-based Web applications (or others), integrating with Volta, for example, provides a number of clear advantages.
  • a Volta compiler is a distributing compiler that takes a .NET application as input and tier-splits it into a client and a server component by replacing appropriate cross-tier method calls by AJAX RPCs. Data is serialized before being sent to the server and de-serialized on the server when received.
  • the client-side component is translated into JavaScript for execution within a standard browser.
  • Volta generally requires the developer to declaratively define which portion of the application runs on the server 210 and which part on the client 220 with the help of class-level annotations. Tier-splitting is performed subsequently as a .NET byte-code rewriting pass that reads the placement annotations, introducing RPCs as needed. To implement the system, the Volta tier-splitter can be augmented to perform additional rewriting steps described below. Base Volta libraries can also be augmented to provide support for browser emulation. As noted previously, Volta provides one possible implementation of a tier-split application but other types of implementations are possible.
  • FIG. 3 an example security validation system 300 is illustrated.
  • the system 300 enhances the Volta application described above in the following manner: Capture user events: For example, the system 300 captures user events on a client C′ 310 within a browser; Transmit events to the server for replay at 320 : Events are transmitted to the client's replica C at 330 for replay; and Compare server and client results at 340 .
  • a server component S 350 is augmented with a checker 340 that compares arriving RPCs m′ 360 and m 370 received from the client C′ 310 and server-based client replica C 330 , respectively, monitoring for discrepancies.
  • the system 300 relies on re-execution to produce the correct result within C 330 based on user events that it receives, effectively ignoring malicious data changes that occur on the client 310 . If the malicious changes result in different RPCs issued to the server 350 , which constitutes the observable state, the checker 340 will flag a potential exploit and terminate that client's connection.
  • the system 300 can be implemented as an optional addition to the Volta tier-splitting process that takes the original application and produces S 350 and C 330 , then optionally translating C 330 into C′ 310 that runs in JavaScript.
  • event capture can be performed with the help of the cooperating JavaScript interpreter or by introducing additional browser support. In the absence of such, event capture can be implemented differently. It is to be appreciated that the event capture examples shown and described herein are but one example implementation and various others are possible within the scope of the claimed subject matter. Integrating with the Volta tier-splitter allows the system to be implemented as several simple IL-to-IL byte-code rewriting passes. From the standpoint of the developer, enabling the system on an existing Volta application is straight-forward as ticking a checkbox in a Volta project configuration.
  • the client binary C 330 generated by the tier-splitter is rewritten to capture client-side user events.
  • events 320 are classified into two types - primitive events and custom events. Primitive events include each key press and mouse click event, regardless of whether the application actually has registered any handlers for them. Custom events are those that the application has registered explicit handlers for. A typical handler for a button click event is shown in code Fragment (A) above.
  • the events 320 are intercepted on the client 310 and relayed to C 330 for replay.
  • Tracking primitive events 320 helps maintain state of elements such as text areas and radio buttons, for example. For instance, each keystroke a user types into an HTML form can produce a separate keyboard event that is intercepted by the system and transferred to the replica 330 . Note that not all JavaScript events that occur on the client have to be processed as doing so would involve listening to all MouseMove events, for example, which occur every time the user repositions the mouse pointer. This may be prohibitively expensive.
  • Primitive events 320 can be intercepted by registering a handler for each on the HTML BODY element. Since in the HTML event model, all events bubble up (or propagate) to the top-level document BODY element, it is a convenient point to intercept them. To intercept custom events 320 , the system registers an extra handler shown in pseudo-code in code Fragment (B) above for each event of interest.
  • System-generated event handlers queue details about the event into an application-specific queue.
  • the serialized event details include the key code for keyboard-related events, mouse button information for mouse events, and so forth.
  • the unique identifier corresponding to the object which raised the event can also be sent over.
  • Diagrams 410 and 420 show two scenarios of how events may be batched on the client and transmitted to the server. There is a natural trade-off between eager and lazy event transfer for example. As diagram 410 demonstrates, sending events eagerly results in excess network usage, which may be costly on a mobile connection, for instance, but can ensure speedy replication on the server. On the other hand, batching events longer as in the diagram 420 results in minimal network usage, but can delay the integrity checking and resulting server updates and responses.
  • a simple middle-path strategy can be adopted. For efficiency, events can be batched until a queue reaches the maximum size of a network packet, in which case they are sent. Otherwise, when there is an RPC, events in the queue are flushed to the server.
  • audit logs for a security checker are illustrated.
  • the system 300 described above modifies the server binary S to receive and properly handle events arriving from the client and relay them to the client replica C for replay. Events are de-serialized from the wire before being delivered to C.
  • the system intercepts RPCs that are received from the JavaScript client and the replica and records them into audit logs 510 and 520 . By default, the system waits until it receives and compares RPCs m and m′. Only when they are equivalent does the runtime relay the RPC call to the application server code.
  • the return response from the server is again intercepted as a string at the HTTP level. Copies of the response are relayed to both the client replica C and the actual client C′ over the network.
  • lock-step execution fashion is not the only option.
  • the system could allow the server-side client replica C to move ahead, by relaying m to the server and sending back the response.
  • the server can confirm its equivalence with m. This is a likely scenario with over-provisioned servers and relatively slow clients.
  • An alternative approach consists of keeping audit logs for messages arriving from C and C′ and to perform periodic cross-checking. Moreover, if RPCs are large, sending the entire RPCs is unnecessary-to save bandwidth, simply compute Message Authentication Codes (MAC) and send them over. Since there could be multiple clients connected to the same server, the client replica C is executed in its own AppDomain, a lightweight process-like abstraction in the .NET runtime. At runtime, the system maintains a separate AppDomain associated with each user session, and looks it up when a batch of events is received from the client.
  • An advantage of using separate AppDomains is memory isolation: each uses its own heap and loads its own copy of dynamically linked libraries and maintains its copy of global data structures. Moreover, cross-AppDomain communications are cheaper than inter-process communication in general as they do not require a process context switch and AppDomains can share DLLs.
  • an example security threat model 600 is illustrated.
  • Data manipulation threats are considered.
  • the most obvious kind of attack against a distributed Web application involves manipulation of data that is sent to the server.
  • any piece of data that is transferred to the server can be easily manipulated within the browser using one of many readily available data tampering and debugging tools.
  • the integrity of data may also be compromised on the wire by a man-in-the-middle attack.
  • a malicious client change existing data before it is sent over to the server, it can also choose to manufacture new messages. If considering the interface the server exposes as a set of commands, the client may choose to “drive” the server by invoking them out of order, potentially violating internal application logic.
  • Protection scheme for data manipulation As mentioned above, the system uses re-execution to produce the correct result within the replica C based on user events that it receives, effectively ignoring malicious data changes that occur on the client. If the malicious changes result in discrepancies in the RPCs, this can cause the system to flag a potential exploit.
  • Code manipulation is considered.
  • the code sent over to the client can be easily edited within the browser to produce a variety of undesired effects. For instance, consistency or input validation check can be easily removed, which is why these checks have been traditionally relegated to the server, thus making even the benign users incur a round trip overhead.
  • the user may manipulate the code to make it possible to circumvent the rules of the game. Often these changes are as simple as replacing the conditional of an if statement with true.
  • code changes may affect not only the current application, but others running within the same interpreter.
  • a prime example of this is the prototype hijacking vulnerability, where a malicious widget in a mash-up overrides the Array constructor, thus allowing it to snoop on any of the other widgets.
  • Protection scheme for code manipulation Note that the system does not try to prevent code tampering in general; indeed, adding a semicolon that does not change the program semantics cannot be detected. However, the system prevents code modifications that result in different RPCs being issued by the client.
  • Script injections and JavaScript worms are considered. While the threats above deal with the case of a malicious user, the system can actually help detect situations when benign users are affected by a malicious environment. Two examples of such a situation are injection attacks such as cross-site scripting and JavaScript worms, both of which allow for potentially malicious actions to be executed on part of an innocent user.
  • injection attacks such as cross-site scripting and JavaScript worms, both of which allow for potentially malicious actions to be executed on part of an innocent user.
  • an auction site such as eBay.com where users are either buyers or sellers.
  • a malicious seller may embed JavaScript in the item description page so that when the item description page is viewed, a bid would be placed automatically on behalf of the viewer.
  • Another common case is a worm on a social networking site such as the Samy worm on MySpace.com. When a particular page was viewed, a hidden embedded malicious script would add the viewer as Samy's MySpace friend.
  • the replica C executes in the .NET CLR, not JavaScript, thus rendering injected JavaScript code non-executable when run within C.
  • the client-side component C′ produces an RPC which will not even be issued by C, thus causing the system to observe a discrepancy.
  • basic security assumptions are considered.
  • One basic assumption is that code executing on the server tier is believed to be uncompromised and trusted, whereas the client tier may be compromised.
  • the event stream received from the client is a faithful representation of events that are generated by the user. If the application is running alongside malicious code in the browser that either suppresses, changes, or generates new events, there is little the system can do towards insuring the integrity of this computation.
  • user events are captured by instrumenting the client code, but its trustworthiness can be enhanced by modifications to existing browsers that can ensure a path from the user's keyboard and mouse to the server runtime that cannot be tampered with using JavaScript. This may be easily implemented using an extension technology such as ActiveX controls for Internet Explorer or plug-ins for Firefox, for example.
  • program execution is considered deterministic. Allowing non-determinism will lead to differences in the execution of C and C′ that are not captured by the system, thus resulting in false positives. Fortunately, there is a way to “virtualize” sources of randomness that are discussed below. For instance, if a random number generator is used, the client can block its execution until it gets the random number from the server. Similarly, for a computation that accesses local time, the server component can block until the time measurement arrives from the client.
  • miscellaneous security considerations 700 are described.
  • Secure Event Capture is provided.
  • the system can faithfully capture and transfer events on the client side to the replica. Since the malicious client may attempt to suppress or change the user event stream, it is best to implement this support at the level of either the browser or the JavaScript interpreter. This situation is not unlike what happens in the case of a remote display session.
  • the remote display client can communicate with the server. If the machine running client software has a key logger of a piece of malware installed that manipulates events destined for the remote computer, clearly the remote session will be affected by the malicious event stream.
  • non-determinism is considered. Reliance of having non-deterministic execution specified can be removed through additional instrumentation. The following sources of non-determinism are most common in Web applications, discussed in turn below:
  • Reading and measuring time is provided through the Date object in JavaScript. Similarly to the approach described above, access to time routines can be instrumented and the replica can be blocked until the time measured on the client is delivered to continue the computation.
  • Accessing third-party servers A systematic approach to deal with accessing third-party servers is to require that these accesses be tunneled through the server. For servers in a different domain, this may be necessary anyway, because of the same origin policy in JavaScript. This allows for easy centralized access to outside data for both the replica and the client-side code. Since calls to external services are performed once, this also deals with the issue of non-idempotent calls with side-effects.
  • Performance and Scalability is considered.
  • Other system optimizations include: Actively “pushing” results to the client.
  • An advantage of the system described above is that, once computed, RPC results can be actively pushed to the client. This way, when the RPC is finally issued on the client, its result will already be available, leading to low-latency RPCs. This demonstrates that not only does the system make the application more secure in many cases it can also make it more responsive.
  • Deployment strategy for the system meshes nicely with the traditional load-balancing approach to deployment of large-scale Web applications.
  • a load balancer could be used to repeatedly direct the same user to the server where both its replica and the corresponding server threads run. Currently, this functionality is implemented in the checker, which looks up the appropriate AppDomain for a user session.
  • both the server thread and the replica can be serialized on high server load for long-running sessions and then brought back from disk.
  • FIG. 8 illustrates an exemplary process 800 for providing security in remote client and server applications. While, for purposes of simplicity of explanation, the process is shown and described as a series or number of acts, it is to be understood and appreciated that the subject processes are not limited by the order of acts, as some acts may, in accordance with the subject processes, occur in different orders and/or concurrently with other acts from that shown and described herein. For example, those skilled in the art will understand and appreciate that a methodology could alternatively be represented as a series of interrelated states or events, such as in a state diagram. Moreover, not all illustrated acts may be required to implement a methodology in accordance with the subject processes described herein.
  • a client application replica is generated that is executable on a server that is remote from the client component or machine.
  • a tier-splitting application can be employed to generate the remote client application and the replica.
  • client events are monitored and processed by the client component and by the replica. As noted previously, these can include keyboard activities, mouse activities, or substantially any input that alter the state of the remote client application. After the inputs events have been monitored, a message is generated that indicates how the client responded to the respective events. At 830 , the message indicating client activity is transmitted to the server application. Concurrently to the client, the replica also processes the received events and generates its own execution message at 840 .
  • the replica message and the client-generated message of 830 are compared. If the messages compare, execution of the remote application can continue in a substantially unimpeded manner. If a discrepancy is detected between messages at 850 , error events can be generated. As noted previously, various responses to errors can be set up including retries, reboots, or prevention of further remote client activity until the source of the security violation is detected. Remote troubleshooting and guidance can be optionally generated and delivered to the user in order to help them determine the source of the respective security violation or other detected error. Alternatively, means of error recovery can be provided.
  • FIGS. 9 and 10 are intended to provide a brief, general description of a suitable environment in which the various aspects of the disclosed subject matter may be implemented. While the subject matter has been described above in the general context of computer-executable instructions of a computer program that runs on a computer and/or computers, those skilled in the art will recognize that the invention also may be implemented in combination with other program modules. Generally, program modules include routines, programs, components, data structures, etc. that performs particular tasks and/or implements particular abstract data types.
  • inventive methods may be practiced with other computer system configurations, including single-processor or multiprocessor computer systems, mini-computing devices, mainframe computers, as well as personal computers, hand-held computing devices (e.g., personal digital assistant (PDA), phone, watch . . . ), microprocessor-based or programmable consumer or industrial electronics, and the like.
  • PDA personal digital assistant
  • the illustrated aspects may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. However, some, if not all aspects of the invention can be practiced on stand-alone computers.
  • program modules may be located in both local and remote memory storage devices.
  • an exemplary environment 910 for implementing various aspects described herein includes a computer 912 .
  • the computer 912 includes a processing unit 914 , a system memory 916 , and a system bus 918 .
  • the system bus 918 couple system components including, but not limited to, the system memory 916 to the processing unit 914 .
  • the processing unit 914 can be any of various available processors. Dual microprocessors and other multiprocessor architectures also can be employed as the processing unit 914 .
  • the system bus 918 can be any of several types of bus structure(s) including the memory bus or memory controller, a peripheral bus or external bus, and/or a local bus using any variety of available bus architectures including, but not limited to, 64-bit bus, Industrial Standard Architecture (ISA), Micro-Channel Architecture (MSA), Extended ISA (EISA), Intelligent Drive Electronics (IDE), VESA Local Bus (VLB), Peripheral Component Interconnect (PCI), Universal Serial Bus (USB), Advanced Graphics Port (AGP), Personal Computer Memory Card International Association bus (PCMCIA), and Small Computer Systems Interface (SCSI).
  • ISA Industrial Standard Architecture
  • MSA Micro-Channel Architecture
  • EISA Extended ISA
  • IDE Intelligent Drive Electronics
  • VLB VESA Local Bus
  • PCI Peripheral Component Interconnect
  • USB Universal Serial Bus
  • AGP Advanced Graphics Port
  • PCMCIA Personal Computer Memory Card International Association bus
  • SCSI Small Computer Systems Interface
  • the system memory 916 includes volatile memory 920 and nonvolatile memory 922 .
  • the basic input/output system (BIOS) containing the basic routines to transfer information between elements within the computer 912 , such as during start-up, is stored in nonvolatile memory 922 .
  • nonvolatile memory 922 can include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM), or flash memory.
  • Volatile memory 920 includes random access memory (RAM), which acts as external cache memory.
  • RAM is available in many forms such as synchronous RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), and direct Rambus RAM (DRRAM).
  • SRAM synchronous RAM
  • DRAM dynamic RAM
  • SDRAM synchronous DRAM
  • DDR SDRAM double data rate SDRAM
  • ESDRAM enhanced SDRAM
  • SLDRAM Synchlink DRAM
  • DRRAM direct Rambus RAM
  • Disk storage 924 includes, but is not limited to, devices like a magnetic disk drive, floppy disk drive, tape drive, Jaz drive, Zip drive, LS-100 drive, flash memory card, or memory stick.
  • disk storage 924 can include storage media separately or in combination with other storage media including, but not limited to, an optical disk drive such as a compact disk ROM device (CD-ROM), CD recordable drive (CD-R Drive), CD rewritable drive (CD-RW Drive) or a digital versatile disk ROM drive (DVD-ROM).
  • an optical disk drive such as a compact disk ROM device (CD-ROM), CD recordable drive (CD-R Drive), CD rewritable drive (CD-RW Drive) or a digital versatile disk ROM drive (DVD-ROM).
  • a removable or non-removable interface is typically used such as interface 926 .
  • FIG. 9 describes software that acts as an intermediary between users and the basic computer resources described in suitable operating environment 910 .
  • Such software includes an operating system 928 .
  • Operating system 928 which can be stored on disk storage 924 , acts to control and allocate resources of the computer system 912 .
  • System applications 930 take advantage of the management of resources by operating system 928 through program modules 932 and program data 934 stored either in system memory 916 or on disk storage 924 . It is to be appreciated that various components described herein can be implemented with various operating systems or combinations of operating systems.
  • Input devices 936 include, but are not limited to, a pointing device such as a mouse, trackball, stylus, touch pad, keyboard, microphone, joystick, game pad, satellite dish, scanner, TV tuner card, digital camera, digital video camera, web camera, and the like. These and other input devices connect to the processing unit 914 through the system bus 918 via interface port(s) 938 .
  • Interface port(s) 938 include, for example, a serial port, a parallel port, a game port, and a universal serial bus (USB).
  • Output device(s) 940 use some of the same type of ports as input device(s) 936 .
  • a USB port may be used to provide input to computer 912 and to output information from computer 912 to an output device 940 .
  • Output adapter 942 is provided to illustrate that there are some output devices 940 like monitors, speakers, and printers, among other output devices 940 that require special adapters.
  • the output adapters 942 include, by way of illustration and not limitation, video and sound cards that provide a means of connection between the output device 940 and the system bus 918 . It should be noted that other devices and/or systems of devices provide both input and output capabilities such as remote computer(s) 944 .
  • Computer 912 can operate in a networked environment using logical connections to one or more remote computers, such as remote computer(s) 944 .
  • the remote computer(s) 944 can be a personal computer, a server, a router, a network PC, a workstation, a microprocessor based appliance, a peer device or other common network node and the like, and typically includes many or all of the elements described relative to computer 912 .
  • only a memory storage device 946 is illustrated with remote computer(s) 944 .
  • Remote computer(s) 944 is logically connected to computer 912 through a network interface 948 and then physically connected via communication connection 950 .
  • Network interface 948 encompasses communication networks such as local-area networks (LAN) and wide-area networks (WAN).
  • LAN technologies include Fiber Distributed Data Interface (FDDI), Copper Distributed Data Interface (CDDI), Ethernet/IEEE 802.3, Token Ring/IEEE 802.5 and the like.
  • WAN technologies include, but are not limited to, point-to-point links, circuit switching networks like Integrated Services Digital Networks (ISDN) and variations thereon, packet switching networks, and Digital Subscriber Lines (DSL).
  • ISDN Integrated Services Digital Networks
  • DSL Digital Subscriber Lines
  • Communication connection(s) 950 refers to the hardware/software employed to connect the network interface 948 to the bus 918 . While communication connection 950 is shown for illustrative clarity inside computer 912 , it can also be external to computer 912 .
  • the hardware/software necessary for connection to the network interface 948 includes, for exemplary purposes only, internal and external technologies such as, modems including regular telephone grade modems, cable modems and DSL modems, ISDN adapters, and Ethernet cards.
  • FIG. 10 is a schematic block diagram of a sample-computing environment 1000 that can be employed.
  • the system 1000 includes one or more client(s) 1010 .
  • the client(s) 1010 can be hardware and/or software (e.g., threads, processes, computing devices).
  • the system 1000 also includes one or more server(s) 1030 .
  • the server(s) 1030 can also be hardware and/or software (e.g., threads, processes, computing devices).
  • the servers 1030 can house threads to perform transformations by employing the components described herein, for example.
  • One possible communication between a client 1010 and a server 1030 may be in the form of a data packet adapted to be transmitted between two or more computer processes.
  • the system 1000 includes a communication framework 1050 that can be employed to facilitate communications between the client(s) 1010 and the server(s) 1030 .
  • the client(s) 1010 are operably connected to one or more client data store(s) 1060 that can be employed to store information local to the client(s) 1010 .
  • the server(s) 1030 are operably connected to one or more server data store(s) 1040 that can be employed to store information local to the servers 1030 .

Abstract

A processing system for distributed multi-tier applications is provided. The system includes a server component that executes a replica of a client-side application, where a client component executes the client-side application. The client component captures events from the client-side application and transmits the events to the replica to validate the computational integrity security of the application.

Description

    BACKGROUND
  • Web applications are becoming increasingly distributed, marked by the emergence of popular AJAX (Asynchronous JavaScript and XML) applications such as Hotmail, Google Maps, Facebook, and many others. A typical multi-tier AJAX application consists of a server component implemented in Java J2EE or Microsoft .NET for example and a client-side component executing in the browser. The resulting application is more performant and responsive, since computation is moved closer to the client, thus avoiding unnecessary network round trips. Unlike a computation performed entirely on the server however, when a portion of the code is moved to the client, the overall computation can no longer be trusted.
  • Indeed, a malicious client can easily manipulates data that resides on and code that runs within the browser using one of many readily available data tampering or debugging tools. For example, consider a JavaScript-based shopping cart within a typical e-commerce retail site such as Amazon.com that allows the user to add items, adjust their quantities, add coupons, compute the shopping cart totals, and so forth. When run on the client, this application can be compromised in a variety of ways. For instance, coupon validation checks can be dodged, allowing the user to reduce the total. Even simpler, the total computation can be compromised to set the total to an arbitrary, potentially even negative amount.
  • Due to the possibility of these attacks, almost every action in a typical shopping cart application today requires a round trip to the server, the latency of which can be quite noticeable, especially on mobile or long-distance connections. For non-malicious users, who constitute the majority, this unnecessary precaution leads to a much less responsive user experience. Moreover, the developer of the distributed application currently is responsible for splitting the application in a manner that places all security-sensitive operations on the server. While some language-based approaches have recently been proposed to address this problem, these techniques still require a great deal of developer involvement, making them difficult to use for existing large-scale projects.
  • SUMMARY
  • The following presents a simplified summary in order to provide a basic understanding of some aspects described herein. This summary is not an extensive overview nor is intended to identify key/critical elements or to delineate the scope of the various aspects described herein. Its sole purpose is to present some concepts in a simplified form as a prelude to the more detailed description that is presented later.
  • A distributed execution system is provided that employs replicated application execution to automatically preserve the integrity of distributed computations between client and server applications. The system replicates a copy of client-side computations on a trusted server tier and captures user events such as keyboard or other command inputs (e.g., text inputs from a cell-phone client application). The captured user-initiated events are transferred to an abstract replica of the client (operated at the server) for execution, where the system observes results of the computation, both as computed on the client-side and on the server side utilizing the replica of the client-side code. Any discrepancy between server side execution via the replica and client execution results that are sent via messages are flagged as a potential violation of computational integrity. Most existing approaches for ensuring integrity of client computation involve the client sending a proof of certain properties that its execution state holds. The server efficiently validates these proofs convincing itself of the integrity of the client execution. For instance, the client could periodically send over its stack traces to the server, and the server could check the traces for any properties it desires. These techniques only provide a partial enforcement of integrity of client execution. The distributed execution system provides a more complete solution where integrity is guaranteed under a reasonable set of design assumptions.
  • To the accomplishment of the foregoing and related ends, certain illustrative aspects are described herein in connection with the following description and the annexed drawings. These aspects are indicative of various ways which can be practiced, all of which are intended to be covered herein. Other advantages and novel features may become apparent from the following detailed description when considered in conjunction with the drawings.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a schematic block diagram illustrating a system for validating security of remote applications.
  • FIG. 2 is a block diagram that illustrates an example tier-split application.
  • FIG. 3 illustrates an example security validation system.
  • FIG. 4 illustrates example event transfer diagrams.
  • FIG. 5 illustrates audit logs for a security checker.
  • FIG. 6 illustrates an example threat model for a security validation system.
  • FIG. 7 illustrates miscellaneous considerations for a security validation system.
  • FIG. 8 illustrates an exemplary process for verifying security of remote applications.
  • FIG. 9 is a schematic block diagram illustrating a suitable operating environment.
  • FIG. 10 is a schematic block diagram of a sample-computing environment.
  • DETAILED DESCRIPTION
  • Systems and methods are provided for validating security of remote applications. In one aspect, a distributed processing system for remote applications is provided. The system includes a server component that executes an abstract replica of a client-side application, where a client component executes the client-side application. It is noted that the replica only has to mimic the relevant details, but can omit many others such as the actual graphical rendering of the client-side user interface on the server, for example. The client component captures events from the client-side application and transmits the events to the replica to validate security of the client-side application. The events can be generated by a user or an application component. Security can be validated by comparing execution messages or observed states between the replica and the client side application.
  • As used in this application, the terms “component,” “application,” “event,” “replica,” and the like are intended to refer to a computer-related entity, either hardware, a combination of hardware and software, software, or software in execution. For example, a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer. By way of illustration, both an application running on a server and the server can be a component. One or more components may reside within a process and/or thread of execution and a component may be localized on one computer and/or distributed between two or more computers. Also, these components can execute from various computer readable media having various data structures stored thereon. The components may communicate via local and/or remote processes such as in accordance with a signal having one or more data packets (e.g., data from one component interacting with another component in a local system, distributed system, and/or across a network such as the Internet with other systems via the signal).
  • Referring initially to FIG. 1, a system 100 is illustrated for validating security of remote applications. The system 100 provides security for applications that are split between a client tier operated by a client component 110 that executes a remote client application. A server tier 114 employs a server component 120 that operates in conjunction with the client component 110 to service the overall application that has been segmented between tiers. As the client component 110 is executing the client application, events 130 are monitored and transmitted back to an abstract replica 140 that mimics operation of the client application at the server tier 114. The events 130 are typically user generated and can come from a plurality of sources such as keyboards, mice, voice commands, touch screen commands, biometric operations, and so forth and are generally employed to control or direct the client application. It is noted that although the events 130 are typically generated by a user, that the events can also be machine or component-generated as well. As the client application executes on the client component 130, a message 150 is transmitted to a checker 160. The message 150 is constructed from actions of the client component 110 as it executes the client application and responds to the events 130.
  • Concurrently, as the events 130 are transmitted to the replica 140, the replica executes as if it were the client application. The replica generates a subsequent message and submits the message to the checker 160. The checker 160 then compares the message generated by the replica 140 and the message 150 generated by the client component 110. If the messages are the same (or within some predetermined threshold) then the checker can notify the client and the server that security is valid. If the respective messages are different, the checker can notify the client and the server that a security error has been detected. If an error is detected, several actions can occur. Error notifications can cause the client and the server to shut down. In another aspect, a re-boot message could be transmitted to the client and the application could be restarted where further checks could be employed by the checker to determine if security is valid. In yet another aspect, the client component 110 could be notified that a previous message checked invalid and that a previous section or portion of an application would need to be re-executed. As can be appreciated, a plurality of differing actions could occur upon error detection.
  • When a portion of application code is moved to the client, a malicious user can easily subvert the client side of the computation and potentially jeopardize sensitive server states. The system 100 employs replicated execution to automatically preserve the integrity of a distributed computation. The system 100 replicates an abstract replica of the client-side computation on the trusted server tier 114. Client-side events 130 are transferred to the replica 140 of the client for execution. The system 100 observes results of the computation, both as computed on the client-side and on the server side using the replica 140 of the client-side code. Any discrepancy is flagged as a potential violation of computational integrity. It is noted that checking may occur online, e.g., concurrently when the application is executed, or after the fact, as part of security auditing. In general, substantially any segmented application is supported for security verification and validation by the system 100.
  • A distributed Web application can be highly responsive because of client-side execution, but the results of this execution do not have to be trusted because they are replayed on the server via the abstract replica 140. Thus, the integrity of the overall distributed computation is the same as if the application had been run entirely on the server 120. The system 100 can even lead to better performance since the application is replicated on the server, which typically runs faster than the client. Remote procedure calls (RPCs) from the client can be anticipated and delivered to the client browser ahead of time, leading to low-latency RPCs and further enhancements in responsiveness. The system 100 capitalizes on a recent trend towards distributing compilers such as GWT, Links, Hilda, Swift, and Volta, for example. Distributing compilers allows both the client- and the server portion of the distributed application to be developed concurrently. As will be described in more detail below, the system 100 can be integrated with a Volta compiler, a distributing compiler that tier-splits .NET applications and translates them into JavaScript as needed. Integration with Volta significantly simplifies the process of code replication since the distributed application is given to the Volta compiler at the time of compilation. The system 100 also integrates into the RPC infrastructure of Volta, making the process of communication between remote system components on different tiers convenient. It is to be appreciated that Volta or other example applications described herein are but one example of a distributed application and means of creating them and substantially any application that can be segmented between remote computing systems or ways to create such an application are within the scope of the claimed subject matter.
  • Referring now to FIG. 2, an example tier-split application 200 is illustrated. An application 200 is split into a server-side component S 210 and a client-side component C 220. The client-side component C can be translated into JavaScript C′ to be run within a browser. While the system approach described above with respect to FIG. 1, can be used for general AJAX-based Web applications (or others), integrating with Volta, for example, provides a number of clear advantages. As illustrated in FIG. 2, a Volta compiler is a distributing compiler that takes a .NET application as input and tier-splits it into a client and a server component by replacing appropriate cross-tier method calls by AJAX RPCs. Data is serialized before being sent to the server and de-serialized on the server when received. The client-side component is translated into JavaScript for execution within a standard browser.
  • Volta generally requires the developer to declaratively define which portion of the application runs on the server 210 and which part on the client 220 with the help of class-level annotations. Tier-splitting is performed subsequently as a .NET byte-code rewriting pass that reads the placement annotations, introducing RPCs as needed. To implement the system, the Volta tier-splitter can be augmented to perform additional rewriting steps described below. Base Volta libraries can also be augmented to provide support for browser emulation. As noted previously, Volta provides one possible implementation of a tier-split application but other types of implementations are possible.
  • Turning to FIG. 3, an example security validation system 300 is illustrated. The system 300 enhances the Volta application described above in the following manner: Capture user events: For example, the system 300 captures user events on a client C′ 310 within a browser; Transmit events to the server for replay at 320: Events are transmitted to the client's replica C at 330 for replay; and Compare server and client results at 340. A server component S 350 is augmented with a checker 340 that compares arriving RPCs m′ 360 and m 370 received from the client C′ 310 and server-based client replica C 330, respectively, monitoring for discrepancies.
  • In general, the system 300 relies on re-execution to produce the correct result within C 330 based on user events that it receives, effectively ignoring malicious data changes that occur on the client 310. If the malicious changes result in different RPCs issued to the server 350, which constitutes the observable state, the checker 340 will flag a potential exploit and terminate that client's connection.
  • Fragment (A) Fragment (B)
    // a custom button handler // our rewriter adds the following
    this.button.Click += delegate { handler this.button.Click += delegate {
     var name = this.userName.Value;  // capture the event
     var pass = this.passWord.Value;  HtmlEventArgs evt = this.Window.Event;
     Login l = new Login( );  // read target object ID
     l.attempt(name, pass);  var id = evt._ObjectId;
    }  // event type: keyboard, click, etc.
     var type = evt.Type;
     // extra event-specific data
     var data = serializeData(evt);
     // enqueue event for transfer_ClientManager.
      enqueueEvent(type, data, id);
    }
  • In general, the system 300 can be implemented as an optional addition to the Volta tier-splitting process that takes the original application and produces S 350 and C 330, then optionally translating C 330 into C′ 310 that runs in JavaScript. It is noted that event capture can be performed with the help of the cooperating JavaScript interpreter or by introducing additional browser support. In the absence of such, event capture can be implemented differently. It is to be appreciated that the event capture examples shown and described herein are but one example implementation and various others are possible within the scope of the claimed subject matter. Integrating with the Volta tier-splitter allows the system to be implemented as several simple IL-to-IL byte-code rewriting passes. From the standpoint of the developer, enabling the system on an existing Volta application is straight-forward as ticking a checkbox in a Volta project configuration.
  • Prior to being translated to JavaScript, the client binary C 330 generated by the tier-splitter is rewritten to capture client-side user events. In the system 300, events 320 are classified into two types - primitive events and custom events. Primitive events include each key press and mouse click event, regardless of whether the application actually has registered any handlers for them. Custom events are those that the application has registered explicit handlers for. A typical handler for a button click event is shown in code Fragment (A) above. The events 320 are intercepted on the client 310 and relayed to C 330 for replay.
  • Tracking primitive events 320 helps maintain state of elements such as text areas and radio buttons, for example. For instance, each keystroke a user types into an HTML form can produce a separate keyboard event that is intercepted by the system and transferred to the replica 330. Note that not all JavaScript events that occur on the client have to be processed as doing so would involve listening to all MouseMove events, for example, which occur every time the user repositions the mouse pointer. This may be prohibitively expensive.
  • Primitive events 320 can be intercepted by registering a handler for each on the HTML BODY element. Since in the HTML event model, all events bubble up (or propagate) to the top-level document BODY element, it is a convenient point to intercept them. To intercept custom events 320, the system registers an extra handler shown in pseudo-code in code Fragment (B) above for each event of interest.
  • System-generated event handlers queue details about the event into an application-specific queue. In addition to the event type (key press, key release, and so forth), the serialized event details include the key code for keyboard-related events, mouse button information for mouse events, and so forth. Finally, the unique identifier corresponding to the object which raised the event can also be sent over.
  • Referring now to FIG. 4, example event transfer diagrams are illustrated. To reduce the number of round trips to the server, which is likely to become a bottleneck on high-latency connections, events are relayed to the server in batches. Diagrams 410 and 420 show two scenarios of how events may be batched on the client and transmitted to the server. There is a natural trade-off between eager and lazy event transfer for example. As diagram 410 demonstrates, sending events eagerly results in excess network usage, which may be costly on a mobile connection, for instance, but can ensure speedy replication on the server. On the other hand, batching events longer as in the diagram 420 results in minimal network usage, but can delay the integrity checking and resulting server updates and responses. To resolve this trade-off between responsiveness and network usage, a simple middle-path strategy can be adopted. For efficiency, events can be batched until a queue reaches the maximum size of a network packet, in which case they are sent. Otherwise, when there is an RPC, events in the queue are flushed to the server.
  • Referring to FIG. 5, audit logs for a security checker are illustrated. The system 300 described above modifies the server binary S to receive and properly handle events arriving from the client and relay them to the client replica C for replay. Events are de-serialized from the wire before being delivered to C. The system intercepts RPCs that are received from the JavaScript client and the replica and records them into audit logs 510 and 520. By default, the system waits until it receives and compares RPCs m and m′. Only when they are equivalent does the runtime relay the RPC call to the application server code. The return response from the server is again intercepted as a string at the HTTP level. Copies of the response are relayed to both the client replica C and the actual client C′ over the network. Note that lock-step execution fashion is not the only option. Alternatively, the system could allow the server-side client replica C to move ahead, by relaying m to the server and sending back the response. When m′ arrives, the server can confirm its equivalence with m. This is a likely scenario with over-provisioned servers and relatively slow clients.
  • An alternative approach consists of keeping audit logs for messages arriving from C and C′ and to perform periodic cross-checking. Moreover, if RPCs are large, sending the entire RPCs is unnecessary-to save bandwidth, simply compute Message Authentication Codes (MAC) and send them over. Since there could be multiple clients connected to the same server, the client replica C is executed in its own AppDomain, a lightweight process-like abstraction in the .NET runtime. At runtime, the system maintains a separate AppDomain associated with each user session, and looks it up when a batch of events is received from the client. An advantage of using separate AppDomains is memory isolation: each uses its own heap and loads its own copy of dynamically linked libraries and maintains its copy of global data structures. Moreover, cross-AppDomain communications are cheaper than inter-process communication in general as they do not require a process context switch and AppDomains can share DLLs.
  • Proceeding to FIG. 6, an example security threat model 600 is illustrated. At 610, Data manipulation threats are considered. The most obvious kind of attack against a distributed Web application involves manipulation of data that is sent to the server. As in a shopping cart example, where the cart total could be forged easily, any piece of data that is transferred to the server can be easily manipulated within the browser using one of many readily available data tampering and debugging tools. Moreover, the integrity of data may also be compromised on the wire by a man-in-the-middle attack. Not only can a malicious client change existing data before it is sent over to the server, it can also choose to manufacture new messages. If considering the interface the server exposes as a set of commands, the client may choose to “drive” the server by invoking them out of order, potentially violating internal application logic.
  • Protection scheme for data manipulation: As mentioned above, the system uses re-execution to produce the correct result within the replica C based on user events that it receives, effectively ignoring malicious data changes that occur on the client. If the malicious changes result in discrepancies in the RPCs, this can cause the system to flag a potential exploit.
  • At 620, Code manipulation is considered. The code sent over to the client can be easily edited within the browser to produce a variety of undesired effects. For instance, consistency or input validation check can be easily removed, which is why these checks have been traditionally relegated to the server, thus making even the benign users incur a round trip overhead. In a game application for example, the user may manipulate the code to make it possible to circumvent the rules of the game. Often these changes are as simple as replacing the conditional of an if statement with true. In a language as dynamic as JavaScript, code changes may affect not only the current application, but others running within the same interpreter. A prime example of this is the prototype hijacking vulnerability, where a malicious widget in a mash-up overrides the Array constructor, thus allowing it to snoop on any of the other widgets.
  • Protection scheme for code manipulation: Note that the system does not try to prevent code tampering in general; indeed, adding a semicolon that does not change the program semantics cannot be detected. However, the system prevents code modifications that result in different RPCs being issued by the client.
  • At 630, Script injections and JavaScript worms are considered. While the threats above deal with the case of a malicious user, the system can actually help detect situations when benign users are affected by a malicious environment. Two examples of such a situation are injection attacks such as cross-site scripting and JavaScript worms, both of which allow for potentially malicious actions to be executed on part of an innocent user. As an example, consider an auction site such as eBay.com where users are either buyers or sellers. A malicious seller may embed JavaScript in the item description page so that when the item description page is viewed, a bid would be placed automatically on behalf of the viewer. Another common case is a worm on a social networking site such as the Samy worm on MySpace.com. When a particular page was viewed, a hidden embedded malicious script would add the viewer as Samy's MySpace friend.
  • Protection scheme for script injections and worms: Referring to FIG. 3 above, the replica C executes in the .NET CLR, not JavaScript, thus rendering injected JavaScript code non-executable when run within C. Thus, if the example above, the client-side component C′ produces an RPC which will not even be issued by C, thus causing the system to observe a discrepancy.
  • At 640, basic security assumptions are considered. One basic assumption is that code executing on the server tier is believed to be uncompromised and trusted, whereas the client tier may be compromised. In one aspect, the event stream received from the client is a faithful representation of events that are generated by the user. If the application is running alongside malicious code in the browser that either suppresses, changes, or generates new events, there is little the system can do towards insuring the integrity of this computation. Currently, user events are captured by instrumenting the client code, but its trustworthiness can be enhanced by modifications to existing browsers that can ensure a path from the user's keyboard and mouse to the server runtime that cannot be tampered with using JavaScript. This may be easily implemented using an extension technology such as ActiveX controls for Internet Explorer or plug-ins for Firefox, for example.
  • In another aspect, program execution is considered deterministic. Allowing non-determinism will lead to differences in the execution of C and C′ that are not captured by the system, thus resulting in false positives. Fortunately, there is a way to “virtualize” sources of randomness that are discussed below. For instance, if a random number generator is used, the client can block its execution until it gets the random number from the server. Similarly, for a computation that accesses local time, the server component can block until the time measurement arrives from the client.
  • Referring now to FIG. 7, miscellaneous security considerations 700 are described. At 710, Secure Event Capture is provided. According to one assumption, the system can faithfully capture and transfer events on the client side to the replica. Since the malicious client may attempt to suppress or change the user event stream, it is best to implement this support at the level of either the browser or the JavaScript interpreter. This situation is not unlike what happens in the case of a remote display session. Once authenticated, the remote display client can communicate with the server. If the machine running client software has a key logger of a piece of malware installed that manipulates events destined for the remote computer, clearly the remote session will be affected by the malicious event stream.
  • At 720, non-determinism is considered. Reliance of having non-deterministic execution specified can be removed through additional instrumentation. The following sources of non-determinism are most common in Web applications, discussed in turn below:
  • Using the Random family of functions. JavaScript exposes a random number generator through function Math.Random. Unless additional measures are taken, the value returned by calls to this function on the client and the replica can disagree. A uniform approach to treating randomness is to perform the computation on one, “canonical” tier. In this case, instrument the client-side code C′ to send the result of the call to Math.Random in the event stream. Provide a further instrument on the replica C to block until the outcome of the random call is received. When received, the result of the call is substituted in place.
  • Reading and measuring time. Access to time is provided through the Date object in JavaScript. Similarly to the approach described above, access to time routines can be instrumented and the replica can be blocked until the time measured on the client is delivered to continue the computation.
  • Accessing third-party servers. A systematic approach to deal with accessing third-party servers is to require that these accesses be tunneled through the server. For servers in a different domain, this may be necessary anyway, because of the same origin policy in JavaScript. This allows for easy centralized access to outside data for both the replica and the client-side code. Since calls to external services are performed once, this also deals with the issue of non-idempotent calls with side-effects.
  • In fact, a set of small changes to the JavaScript interpreter solves the issue of event delivery and also addresses the issues of non-determinism defined above. In particular, instrumenting Math.Random and Date routines as well as event handlers in the interpreter a systematic way to treat these issues that ensures that malicious JavaScript code co-existing within the same page—which is an attack model—is unable to gain access to this data. This effectively makes a portion of the browser or the JavaScript interpreter part of the trusted computing base. Since event capture is performed outside of JavaScript, it can also ensure that the overhead of this instrumentation is low. To ensure that event streams are not tampered with, standard techniques such as Message Authentication Codes can be employed. It is noted that the claimed subject matter provides the ability to virtualize client-side code execution by:
      • Capturing user events
      • Third-party interactions
      • Compensating for sources of non-determinism and timing. These features and others facilitate JavaScript or .NET runtime design.
  • At 730, Performance and Scalability is considered. Other system optimizations include: Actively “pushing” results to the client. An advantage of the system described above is that, once computed, RPC results can be actively pushed to the client. This way, when the RPC is finally issued on the client, its result will already be available, leading to low-latency RPCs. This demonstrates that not only does the system make the application more secure in many cases it can also make it more responsive. Deployment strategy for the system meshes nicely with the traditional load-balancing approach to deployment of large-scale Web applications. In particular, a load balancer could be used to repeatedly direct the same user to the server where both its replica and the corresponding server threads run. Currently, this functionality is implemented in the checker, which looks up the appropriate AppDomain for a user session. Moreover, to save memory, both the server thread and the replica can be serialized on high server load for long-running sessions and then brought back from disk.
  • FIG. 8 illustrates an exemplary process 800 for providing security in remote client and server applications. While, for purposes of simplicity of explanation, the process is shown and described as a series or number of acts, it is to be understood and appreciated that the subject processes are not limited by the order of acts, as some acts may, in accordance with the subject processes, occur in different orders and/or concurrently with other acts from that shown and described herein. For example, those skilled in the art will understand and appreciate that a methodology could alternatively be represented as a series of interrelated states or events, such as in a state diagram. Moreover, not all illustrated acts may be required to implement a methodology in accordance with the subject processes described herein.
  • Proceeding to 810, a client application replica is generated that is executable on a server that is remote from the client component or machine. As noted above, a tier-splitting application can be employed to generate the remote client application and the replica. At 820, client events are monitored and processed by the client component and by the replica. As noted previously, these can include keyboard activities, mouse activities, or substantially any input that alter the state of the remote client application. After the inputs events have been monitored, a message is generated that indicates how the client responded to the respective events. At 830, the message indicating client activity is transmitted to the server application. Concurrently to the client, the replica also processes the received events and generates its own execution message at 840. Proceeding to 850, the replica message and the client-generated message of 830 are compared. If the messages compare, execution of the remote application can continue in a substantially unimpeded manner. If a discrepancy is detected between messages at 850, error events can be generated. As noted previously, various responses to errors can be set up including retries, reboots, or prevention of further remote client activity until the source of the security violation is detected. Remote troubleshooting and guidance can be optionally generated and delivered to the user in order to help them determine the source of the respective security violation or other detected error. Alternatively, means of error recovery can be provided.
  • In order to provide a context for the various aspects of the disclosed subject matter, FIGS. 9 and 10 as well as the following discussion are intended to provide a brief, general description of a suitable environment in which the various aspects of the disclosed subject matter may be implemented. While the subject matter has been described above in the general context of computer-executable instructions of a computer program that runs on a computer and/or computers, those skilled in the art will recognize that the invention also may be implemented in combination with other program modules. Generally, program modules include routines, programs, components, data structures, etc. that performs particular tasks and/or implements particular abstract data types. Moreover, those skilled in the art will appreciate that the inventive methods may be practiced with other computer system configurations, including single-processor or multiprocessor computer systems, mini-computing devices, mainframe computers, as well as personal computers, hand-held computing devices (e.g., personal digital assistant (PDA), phone, watch . . . ), microprocessor-based or programmable consumer or industrial electronics, and the like. The illustrated aspects may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. However, some, if not all aspects of the invention can be practiced on stand-alone computers. In a distributed computing environment, program modules may be located in both local and remote memory storage devices.
  • With reference to FIG. 9, an exemplary environment 910 for implementing various aspects described herein includes a computer 912. The computer 912 includes a processing unit 914, a system memory 916, and a system bus 918. The system bus 918 couple system components including, but not limited to, the system memory 916 to the processing unit 914. The processing unit 914 can be any of various available processors. Dual microprocessors and other multiprocessor architectures also can be employed as the processing unit 914.
  • The system bus 918 can be any of several types of bus structure(s) including the memory bus or memory controller, a peripheral bus or external bus, and/or a local bus using any variety of available bus architectures including, but not limited to, 64-bit bus, Industrial Standard Architecture (ISA), Micro-Channel Architecture (MSA), Extended ISA (EISA), Intelligent Drive Electronics (IDE), VESA Local Bus (VLB), Peripheral Component Interconnect (PCI), Universal Serial Bus (USB), Advanced Graphics Port (AGP), Personal Computer Memory Card International Association bus (PCMCIA), and Small Computer Systems Interface (SCSI).
  • The system memory 916 includes volatile memory 920 and nonvolatile memory 922. The basic input/output system (BIOS), containing the basic routines to transfer information between elements within the computer 912, such as during start-up, is stored in nonvolatile memory 922. By way of illustration, and not limitation, nonvolatile memory 922 can include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM), or flash memory. Volatile memory 920 includes random access memory (RAM), which acts as external cache memory. By way of illustration and not limitation, RAM is available in many forms such as synchronous RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), and direct Rambus RAM (DRRAM).
  • Computer 912 also includes removable/non-removable, volatile/non-volatile computer storage media. FIG. 9 illustrates, for example a disk storage 924. Disk storage 924 includes, but is not limited to, devices like a magnetic disk drive, floppy disk drive, tape drive, Jaz drive, Zip drive, LS-100 drive, flash memory card, or memory stick. In addition, disk storage 924 can include storage media separately or in combination with other storage media including, but not limited to, an optical disk drive such as a compact disk ROM device (CD-ROM), CD recordable drive (CD-R Drive), CD rewritable drive (CD-RW Drive) or a digital versatile disk ROM drive (DVD-ROM). To facilitate connection of the disk storage devices 924 to the system bus 918, a removable or non-removable interface is typically used such as interface 926.
  • It is to be appreciated that FIG. 9 describes software that acts as an intermediary between users and the basic computer resources described in suitable operating environment 910. Such software includes an operating system 928. Operating system 928, which can be stored on disk storage 924, acts to control and allocate resources of the computer system 912. System applications 930 take advantage of the management of resources by operating system 928 through program modules 932 and program data 934 stored either in system memory 916 or on disk storage 924. It is to be appreciated that various components described herein can be implemented with various operating systems or combinations of operating systems.
  • A user enters commands or information into the computer 912 through input device(s) 936. Input devices 936 include, but are not limited to, a pointing device such as a mouse, trackball, stylus, touch pad, keyboard, microphone, joystick, game pad, satellite dish, scanner, TV tuner card, digital camera, digital video camera, web camera, and the like. These and other input devices connect to the processing unit 914 through the system bus 918 via interface port(s) 938. Interface port(s) 938 include, for example, a serial port, a parallel port, a game port, and a universal serial bus (USB). Output device(s) 940 use some of the same type of ports as input device(s) 936. Thus, for example, a USB port may be used to provide input to computer 912 and to output information from computer 912 to an output device 940. Output adapter 942 is provided to illustrate that there are some output devices 940 like monitors, speakers, and printers, among other output devices 940 that require special adapters. The output adapters 942 include, by way of illustration and not limitation, video and sound cards that provide a means of connection between the output device 940 and the system bus 918. It should be noted that other devices and/or systems of devices provide both input and output capabilities such as remote computer(s) 944.
  • Computer 912 can operate in a networked environment using logical connections to one or more remote computers, such as remote computer(s) 944. The remote computer(s) 944 can be a personal computer, a server, a router, a network PC, a workstation, a microprocessor based appliance, a peer device or other common network node and the like, and typically includes many or all of the elements described relative to computer 912. For purposes of brevity, only a memory storage device 946 is illustrated with remote computer(s) 944. Remote computer(s) 944 is logically connected to computer 912 through a network interface 948 and then physically connected via communication connection 950. Network interface 948 encompasses communication networks such as local-area networks (LAN) and wide-area networks (WAN). LAN technologies include Fiber Distributed Data Interface (FDDI), Copper Distributed Data Interface (CDDI), Ethernet/IEEE 802.3, Token Ring/IEEE 802.5 and the like. WAN technologies include, but are not limited to, point-to-point links, circuit switching networks like Integrated Services Digital Networks (ISDN) and variations thereon, packet switching networks, and Digital Subscriber Lines (DSL).
  • Communication connection(s) 950 refers to the hardware/software employed to connect the network interface 948 to the bus 918. While communication connection 950 is shown for illustrative clarity inside computer 912, it can also be external to computer 912. The hardware/software necessary for connection to the network interface 948 includes, for exemplary purposes only, internal and external technologies such as, modems including regular telephone grade modems, cable modems and DSL modems, ISDN adapters, and Ethernet cards.
  • FIG. 10 is a schematic block diagram of a sample-computing environment 1000 that can be employed. The system 1000 includes one or more client(s) 1010. The client(s) 1010 can be hardware and/or software (e.g., threads, processes, computing devices). The system 1000 also includes one or more server(s) 1030. The server(s) 1030 can also be hardware and/or software (e.g., threads, processes, computing devices). The servers 1030 can house threads to perform transformations by employing the components described herein, for example. One possible communication between a client 1010 and a server 1030 may be in the form of a data packet adapted to be transmitted between two or more computer processes. The system 1000 includes a communication framework 1050 that can be employed to facilitate communications between the client(s) 1010 and the server(s) 1030. The client(s) 1010 are operably connected to one or more client data store(s) 1060 that can be employed to store information local to the client(s) 1010. Similarly, the server(s) 1030 are operably connected to one or more server data store(s) 1040 that can be employed to store information local to the servers 1030.
  • What has been described above includes various exemplary aspects. It is, of course, not possible to describe every conceivable combination of components or methodologies for purposes of describing these aspects, but one of ordinary skill in the art may recognize that many further combinations and permutations are possible. Accordingly, the aspects described herein are intended to embrace all such alterations, modifications and variations that fall within the spirit and scope of the appended claims. Furthermore, to the extent that the term “includes” is used in either the detailed description or the claims, such term is intended to be inclusive in a manner similar to the term “comprising” as “comprising” is interpreted when employed as a transitional word in a claim.

Claims (20)

1. A system for securing distributed applications, comprising:
a server component that executes an abstract replica of a client-side application; and
a client component that executes the client-side application, the client component captures events from the client-side application and transmits the events to the replica to validate the integrity of application execution.
2. The system of claim 1, the events are generated by a user or an application component.
3. The system of claim 2, the integrity is facilitated by comparing messages or observable states computed by the replica and received from the client-side application.
4. The system of claim 3, further comprising a checker to compare the messages computed by the replica and received from the client-side application.
5. The system of claim 3, further comprising a component to generate an error event if a discrepancy is detected between messages.
6. The system of claim 1, further comprising tier-splitting components to automatically generate the client-side application and the replica.
7. The system of claim 1, the replica provides minimal functionality of the client-side application in order to compute a desired integrity checking result from an event stream.
8. The system of claim 1, the client-side application is an asynchronous interpreted programming language based web application.
9. The system of claim 8, the client-side application is communicated with via one or more remote procedure calls.
10. The system of claim 9, the client-side application is translated into an interpreted programming language for execution within a web browser.
11. The system of claim 1, further comprising an event handler inserted into the client-side application through code rewriting.
12. The system of claim 1, further comprising an event handler inserted into the client-side application through runtime modifications.
13. The system of claim 1, further comprising a component to batch events to reduce performance overhead.
14. The system of claim 1, further comprising an audit log that is generated to compare messages or observable states between the client-side application and the replica.
15. The system of claim 14, the audit log is examined online in real time, examined at a later time, or provides a sample for further analysis.
16. The system of claim 15, further comprising a method authentication component that is transmitted in lieu of a complete message inside of a remote procedure call.
17. A method to validate security of a remote application, comprising:
generating a replica of a remote client application;
executing the replica in conjunction with the remote client application;
monitoring events associated with the remote client application; and
comparing results between the replica and the remote client application to validate security of the application.
18. The method of claim 17, further comprising automatically instumenting the remote client application to monitor user events and communications with third-party components.
19. The method of claim 17, further comprising generating a message to indicate an execution pattern for the remote client application.
20. A system for virtualizing script/bytecode execution across tiers, comprising:
means for instrumenting user events;
means for controlling third party interactions; and
means for discovering sources of non-determinism.
US12/257,776 2008-10-24 2008-10-24 Automatically securing distributed applications Abandoned US20100106767A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US12/257,776 US20100106767A1 (en) 2008-10-24 2008-10-24 Automatically securing distributed applications
US14/247,418 US9917822B2 (en) 2008-10-24 2014-04-08 Automatically securing distributed applications

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US12/257,776 US20100106767A1 (en) 2008-10-24 2008-10-24 Automatically securing distributed applications

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US14/247,418 Division US9917822B2 (en) 2008-10-24 2014-04-08 Automatically securing distributed applications

Publications (1)

Publication Number Publication Date
US20100106767A1 true US20100106767A1 (en) 2010-04-29

Family

ID=42118524

Family Applications (2)

Application Number Title Priority Date Filing Date
US12/257,776 Abandoned US20100106767A1 (en) 2008-10-24 2008-10-24 Automatically securing distributed applications
US14/247,418 Active 2030-08-06 US9917822B2 (en) 2008-10-24 2014-04-08 Automatically securing distributed applications

Family Applications After (1)

Application Number Title Priority Date Filing Date
US14/247,418 Active 2030-08-06 US9917822B2 (en) 2008-10-24 2014-04-08 Automatically securing distributed applications

Country Status (1)

Country Link
US (2) US20100106767A1 (en)

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110067004A1 (en) * 2009-09-16 2011-03-17 International Business Machines Corporation Web-based integrated test and debugging system
US20110072262A1 (en) * 2009-09-23 2011-03-24 Idan Amir System and Method for Identifying Security Breach Attempts of a Website
WO2012054197A3 (en) * 2010-10-22 2012-06-21 Microsoft Corporation Coordinated upgrades in distributed systems
US8769059B1 (en) * 2012-05-23 2014-07-01 Amazon Technologies, Inc. Best practice analysis, third-party plug-ins
US8910291B2 (en) 2011-06-28 2014-12-09 International Business Machines Corporation Black-box testing of web applications with client-side code evaluation
US8954574B1 (en) 2012-05-23 2015-02-10 Amazon Technologies, Inc. Best practice analysis, migration advisor
US9098709B2 (en) 2012-11-13 2015-08-04 International Business Machines Corporation Protection of user data in hosted application environments
US9584378B1 (en) * 2015-12-22 2017-02-28 International Business Machines Corporation Computer-implemented command control in information technology service environment
US9626710B1 (en) 2012-05-23 2017-04-18 Amazon Technologies, Inc. Best practice analysis, optimized resource use
US20180046810A1 (en) * 2016-08-11 2018-02-15 International Business Machines Corporation Application integrity verification in multi-tier architectures
CN110413322A (en) * 2019-06-28 2019-11-05 苏州浪潮智能科技有限公司 A kind of server network interface management method, system and baseboard management controller
US10681063B1 (en) * 2017-11-29 2020-06-09 NortonLifeLock Inc. Securing a network device from a malicious embedded script hosted on a third-party domain
US10740765B1 (en) 2012-05-23 2020-08-11 Amazon Technologies, Inc. Best practice analysis as a service
US10791119B1 (en) 2017-03-14 2020-09-29 F5 Networks, Inc. Methods for temporal password injection and devices thereof
US10931662B1 (en) 2017-04-10 2021-02-23 F5 Networks, Inc. Methods for ephemeral authentication screening and devices thereof
US11496438B1 (en) 2017-02-07 2022-11-08 F5, Inc. Methods for improved network security using asymmetric traffic delivery and devices thereof
US11609913B1 (en) 2020-10-16 2023-03-21 Splunk Inc. Reassigning data groups from backup to searching for a processing node
US11615082B1 (en) 2020-07-31 2023-03-28 Splunk Inc. Using a data store and message queue to ingest data for a data intake and query system
US11658995B1 (en) 2018-03-20 2023-05-23 F5, Inc. Methods for dynamically mitigating network attacks and devices thereof
US11809395B1 (en) 2021-07-15 2023-11-07 Splunk Inc. Load balancing, failover, and reliable delivery of data in a data intake and query system
US11829415B1 (en) 2020-01-31 2023-11-28 Splunk Inc. Mapping buckets and search peers to a bucket map identifier for searching
US11892996B1 (en) 2019-07-16 2024-02-06 Splunk Inc. Identifying an indexing node to process data using a resource catalog
US11966797B2 (en) 2022-09-19 2024-04-23 Splunk Inc. Indexing data at a data intake and query system based on a node capacity threshold

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9934475B2 (en) * 2015-05-13 2018-04-03 Bank Of America Corporation Managing enterprise data movement using a heuristic data movement detection engine
US9852295B2 (en) * 2015-07-14 2017-12-26 Bitdefender IPR Management Ltd. Computer security systems and methods using asynchronous introspection exceptions
CN110780862B (en) * 2019-10-12 2021-05-11 南京邮电大学 Automatic service combination method based on key path spanning tree

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5657390A (en) * 1995-08-25 1997-08-12 Netscape Communications Corporation Secure socket layer application program apparatus and method
US6073163A (en) * 1997-06-10 2000-06-06 Oracle Corporation Method and apparatus for enabling web-based execution of an application
US20020046286A1 (en) * 1999-12-13 2002-04-18 Caldwell R. Russell Attribute and application synchronization in distributed network environment
US20020112162A1 (en) * 2001-02-13 2002-08-15 Cocotis Thomas Andrew Authentication and verification of Web page content
US20040216150A1 (en) * 2002-11-05 2004-10-28 Sun Microsystems, Inc. Systems and methods for providing object integrity and dynamic permission grants
US20050193269A1 (en) * 2000-03-27 2005-09-01 Accenture Llp System, method, and article of manufacture for synchronization in an automated scripting framework
US20060047604A1 (en) * 2004-08-31 2006-03-02 Kraft-Oz Oded S Methods and apparatus providing portable application and data
US20060143239A1 (en) * 1996-07-18 2006-06-29 Computer Associates International, Inc. Method and apparatus for maintaining data integrity across distributed computer systems
US20070083813A1 (en) * 2005-10-11 2007-04-12 Knoa Software, Inc Generic, multi-instance method and GUI detection system for tracking and monitoring computer applications
US20080071646A1 (en) * 2000-06-02 2008-03-20 David Hodson Integrated electronic shopping cart system and method
US20090119302A1 (en) * 2007-11-05 2009-05-07 Microsoft Corporation Asynchronous client to server updates
US20090150136A1 (en) * 2005-10-10 2009-06-11 Sei Yang Yang Dynamic-based verification apparatus for verification from electronic system level to gate level, and verification method using the same
US20130097677A1 (en) * 2006-11-17 2013-04-18 At&T Intellectual Property I, L.P. Systems, Methods and Computer Program Products Supporting Provision of Web Services Using IMS

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5657390A (en) * 1995-08-25 1997-08-12 Netscape Communications Corporation Secure socket layer application program apparatus and method
US20060143239A1 (en) * 1996-07-18 2006-06-29 Computer Associates International, Inc. Method and apparatus for maintaining data integrity across distributed computer systems
US6073163A (en) * 1997-06-10 2000-06-06 Oracle Corporation Method and apparatus for enabling web-based execution of an application
US20020046286A1 (en) * 1999-12-13 2002-04-18 Caldwell R. Russell Attribute and application synchronization in distributed network environment
US20050193269A1 (en) * 2000-03-27 2005-09-01 Accenture Llp System, method, and article of manufacture for synchronization in an automated scripting framework
US20080071646A1 (en) * 2000-06-02 2008-03-20 David Hodson Integrated electronic shopping cart system and method
US20020112162A1 (en) * 2001-02-13 2002-08-15 Cocotis Thomas Andrew Authentication and verification of Web page content
US20040216150A1 (en) * 2002-11-05 2004-10-28 Sun Microsystems, Inc. Systems and methods for providing object integrity and dynamic permission grants
US20060047604A1 (en) * 2004-08-31 2006-03-02 Kraft-Oz Oded S Methods and apparatus providing portable application and data
US20090150136A1 (en) * 2005-10-10 2009-06-11 Sei Yang Yang Dynamic-based verification apparatus for verification from electronic system level to gate level, and verification method using the same
US20070083813A1 (en) * 2005-10-11 2007-04-12 Knoa Software, Inc Generic, multi-instance method and GUI detection system for tracking and monitoring computer applications
US20130097677A1 (en) * 2006-11-17 2013-04-18 At&T Intellectual Property I, L.P. Systems, Methods and Computer Program Products Supporting Provision of Web Services Using IMS
US20090119302A1 (en) * 2007-11-05 2009-05-07 Microsoft Corporation Asynchronous client to server updates

Cited By (36)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8549481B2 (en) * 2009-09-16 2013-10-01 International Business Machines Corporation Web-based integrated test and debugging system
US20110067004A1 (en) * 2009-09-16 2011-03-17 International Business Machines Corporation Web-based integrated test and debugging system
US20110072262A1 (en) * 2009-09-23 2011-03-24 Idan Amir System and Method for Identifying Security Breach Attempts of a Website
US10157280B2 (en) * 2009-09-23 2018-12-18 F5 Networks, Inc. System and method for identifying security breach attempts of a website
US9753713B2 (en) 2010-10-22 2017-09-05 Microsoft Technology Licensing, Llc Coordinated upgrades in distributed systems
WO2012054197A3 (en) * 2010-10-22 2012-06-21 Microsoft Corporation Coordinated upgrades in distributed systems
US8910291B2 (en) 2011-06-28 2014-12-09 International Business Machines Corporation Black-box testing of web applications with client-side code evaluation
US9032528B2 (en) 2011-06-28 2015-05-12 International Business Machines Corporation Black-box testing of web applications with client-side code evaluation
US11941639B1 (en) 2012-05-23 2024-03-26 Amazon Technologies, Inc. Best practice analysis as a service
US9197502B1 (en) 2012-05-23 2015-11-24 Amazon Technologies, Inc. Best practice analysis, migration advisor
US9219648B1 (en) 2012-05-23 2015-12-22 Amazon Technologies, Inc. Best practice analysis, automatic remediation
US9455871B1 (en) 2012-05-23 2016-09-27 Amazon Technologies, Inc. Best practice analysis, migration advisor
US9626710B1 (en) 2012-05-23 2017-04-18 Amazon Technologies, Inc. Best practice analysis, optimized resource use
US8954574B1 (en) 2012-05-23 2015-02-10 Amazon Technologies, Inc. Best practice analysis, migration advisor
US10740765B1 (en) 2012-05-23 2020-08-11 Amazon Technologies, Inc. Best practice analysis as a service
US8769059B1 (en) * 2012-05-23 2014-07-01 Amazon Technologies, Inc. Best practice analysis, third-party plug-ins
US11030669B1 (en) 2012-05-23 2021-06-08 Amazon Technologies, Inc. Best practice analysis, optimized resource use
US9430653B2 (en) 2012-11-13 2016-08-30 International Business Machines Corporation Protection of user data in hosted application environments
US9098709B2 (en) 2012-11-13 2015-08-04 International Business Machines Corporation Protection of user data in hosted application environments
US9584378B1 (en) * 2015-12-22 2017-02-28 International Business Machines Corporation Computer-implemented command control in information technology service environment
US9940466B2 (en) 2015-12-22 2018-04-10 International Business Machines Corporation Computer-implemented command control in information technology service environment
US10073975B2 (en) * 2016-08-11 2018-09-11 International Business Machines Corporation Application integrity verification in multi-tier architectures
US20180046810A1 (en) * 2016-08-11 2018-02-15 International Business Machines Corporation Application integrity verification in multi-tier architectures
US11496438B1 (en) 2017-02-07 2022-11-08 F5, Inc. Methods for improved network security using asymmetric traffic delivery and devices thereof
US10791119B1 (en) 2017-03-14 2020-09-29 F5 Networks, Inc. Methods for temporal password injection and devices thereof
US10931662B1 (en) 2017-04-10 2021-02-23 F5 Networks, Inc. Methods for ephemeral authentication screening and devices thereof
US10681063B1 (en) * 2017-11-29 2020-06-09 NortonLifeLock Inc. Securing a network device from a malicious embedded script hosted on a third-party domain
US11658995B1 (en) 2018-03-20 2023-05-23 F5, Inc. Methods for dynamically mitigating network attacks and devices thereof
CN110413322A (en) * 2019-06-28 2019-11-05 苏州浪潮智能科技有限公司 A kind of server network interface management method, system and baseboard management controller
CN110413322B (en) * 2019-06-28 2022-05-24 苏州浪潮智能科技有限公司 Server network port management method and system and substrate management controller
US11892996B1 (en) 2019-07-16 2024-02-06 Splunk Inc. Identifying an indexing node to process data using a resource catalog
US11829415B1 (en) 2020-01-31 2023-11-28 Splunk Inc. Mapping buckets and search peers to a bucket map identifier for searching
US11615082B1 (en) 2020-07-31 2023-03-28 Splunk Inc. Using a data store and message queue to ingest data for a data intake and query system
US11609913B1 (en) 2020-10-16 2023-03-21 Splunk Inc. Reassigning data groups from backup to searching for a processing node
US11809395B1 (en) 2021-07-15 2023-11-07 Splunk Inc. Load balancing, failover, and reliable delivery of data in a data intake and query system
US11966797B2 (en) 2022-09-19 2024-04-23 Splunk Inc. Indexing data at a data intake and query system based on a node capacity threshold

Also Published As

Publication number Publication date
US20140282879A1 (en) 2014-09-18
US9917822B2 (en) 2018-03-13

Similar Documents

Publication Publication Date Title
US9917822B2 (en) Automatically securing distributed applications
Vikram et al. Ripley: automatically securing web 2.0 applications through replicated execution
Junaid et al. Dexteroid: Detecting malicious behaviors in android apps using reverse-engineered life cycle models
US9195809B1 (en) Automated vulnerability and error scanner for mobile applications
Blankstein et al. Automating isolation and least privilege in web services
US11586726B2 (en) Secure web framework
Mao et al. Detecting malicious behaviors in javascript applications
Neasbitt et al. Webcapsule: Towards a lightweight forensic engine for web browsers
Ahmad et al. StaDART: addressing the problem of dynamic code updates in the security analysis of android applications
US9953169B2 (en) Modify execution of application under test so user is power user
Dong et al. A comprehensive client-side behavior model for diagnosing attacks in ajax applications
Chen et al. {MAGE}: Mutual Attestation for a Group of Enclaves without Trusted Third Parties
Yang et al. Vetting Single {Sign-On}{SDK} Implementations via Symbolic Reasoning
Beekman Improving cloud security using secure enclaves
US9075996B2 (en) Evaluating a security stack in response to a request to access a service
Durieux et al. Fully automated HTML and Javascript rewriting for constructing a self‐healing web proxy
Alzaidi et al. DroidRista: a highly precise static data flow analysis framework for android applications
US20220417026A1 (en) Secure execution environment for applications using blockchain
US20140096258A1 (en) Correcting workflow security vulnerabilities via static analysis and virtual patching
Cavalli et al. Design of a secure shield for internet and web-based services using software reflection
Wang et al. Webenclave: protect web secrets from browser extensions with software enclave
Wei et al. A secure information flow architecture for web service platforms
Xue Using redundancy to improve security and testing
Yin et al. Scanner++: Enhanced Vulnerability Detection of Web Applications with Attack Intent Synchronization
Chen From Dependability to Security—A Path in the Trustworthy Computing Research

Legal Events

Date Code Title Description
AS Assignment

Owner name: MICROSOFT CORPORATION,WASHINGTON

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LIVSHITS, BENJAMIN;MEIJER, HENRICUS JOHANNES MARIA;FOURNET, CEDRIC;AND OTHERS;SIGNING DATES FROM 20081022 TO 20081024;REEL/FRAME:021733/0455

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: MICROSOFT TECHNOLOGY LICENSING, LLC, WASHINGTON

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MICROSOFT CORPORATION;REEL/FRAME:034564/0001

Effective date: 20141014