Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

286 results about "Injection attacks" patented technology

Injection attacks refer to a broad class of attack vectors that allow an attacker to supply untrusted input to a program, which gets processed by an interpreter as part of a command or query which alters the course of execution of that program. Injection attacks are amongst the oldest and most dangerous web application attacks.

Complementary Character Encoding for Preventing Input Injection in Web Applications

Method to prevent the effect of web application injection attacks, such as SQL injection and cross-site scripting (XSS), which are major threats to the security of the Internet. Method using complementary character coding, a new approach to character level dynamic tainting, which allows efficient and precise taint propagation across the boundaries of server components, and also between servers and clients over HTTP. In this approach, each character has two encodings, which can be used to distinguish trusted and untrusted data. Small modifications to the lexical analyzers in components such as the application code interpreter, the database management system, and (optionally) the web browser allow them to become complement aware components, capable of using this alternative character coding scheme to enforce security policies aimed at preventing injection attacks, while continuing to function normally in other respects. This approach overcomes some weaknesses of previous dynamic tainting approaches by offering a precise protection against persistent cross-site scripting attacks, as taint information is maintained when data is passed to a database and later retrieved by the application program. The technique is effective on a group of vulnerable benchmarks and has low overhead.
Owner:POLYTECHNIC INSTITUTE OF NEW YORK UNIVERSITY

Process memory protecting method based on auxiliary virtualization technology for hardware

The invention provides a process memory safety protecting method based on auxiliary virtualization for hardware. The method comprises the following steps: 1, loading a process memory monitoring module; step 2, informing the monitoring module during the starting of a protected process; step 3, creating an encrypted copy for a protected internal memory space of the protected process; step 4, realizing internal memory virtualization to a virtual machine system by using a shadow page table mechanism; step 5: acquiring rewritten operation and page fault abnormality of a CR3 register. The process memory safety protecting method provided by the invention has the advantages as follows: the monitoring module working at a Root stage is created to monitor page directories, page tables and modification of a page directory register in all processes so as to prevent any process except the protected process from visiting data in the memory space of the protected process, when the protected process is switched to a core state, a page in a user-mode space is replaced so as to prevent codes in a kernel mode from injection attacks, and a data execution prevention technology is used for setting the page of the data area of the protected process to be non-executable. Therefore, codes in the user mode are prevented from injection attacks.
Owner:NANJING UNIV

Security chip design method based on control flow detection and resistant to error injection attack

The invention relates to a security chip design method based on control flow detection and resistant to error injection attack. The security chip design method comprises a first step of compiling a standard assembling file which supports a security chip, a second step of dividing the standard assembling file into basic blocks by means of lexical analysis, a third step of generating basic block signature values and forming an assembling file with a control flow detection instruction, a fourth step of translating the assembling file into a target file, generating basic block checking values and inserting basic block checking instructions, and a fifth step of generating an executable file from the target file and a database file link and executing the executable file on hardware. The security chip design method based on control flow detection and resistant to error injection attack can effectively detect skip errors among the basic blocks and inside each basic block and non-skip errors of a command sequence, has the self checking function on the control flow detection instruction which is newly added, and is simple in implementation and low in redundancy code cost by the adoption of the mode of combination of software and hardware.
Owner:HUAZHONG UNIV OF SCI & TECH

Method of detecting power grid false data injection attack based on nonlinear measurement equation

The invention relates to the technical field of power grid data security, and is a method of detecting the power grid false data injection attack based on the nonlinear measurement equation. The method comprises the steps that in the first step, power grid data are obtained; in the second step, correlation analyses are performed on the states and measuration of the system; in the third step, innovation vectors are computed; in the fourth step, the detection and location of the false data are conducted; in the fifth step, the updates on the false data are carried out; in the sixth step, the estimations of the states are carried out. According to the method of detecting the power grid false data injection attack based on the nonlinear measurement equation, through the analyses of the correlation between states and measuration of the power grid system, the false data injection attacks which cannot be detected by traditional methods based on the measurement residuals are effectively detected, and the detection accuracy is improved; different from the multiple iterative detections in the traditional methods, the method can detect all the attacked measuration at one time, effectively saves on the computation time, and is suitable for the online applications of power grid; the method can locate specific malicious injection data and utilizes the measured predicted values to update the measuration containing fake data, and ensures that the state estimations can be rerun to obtain the system accurate running status.
Owner:新疆电力建设调试所有限责任公司 +2

Complementary character encoding for preventing input injection in web applications

Method to prevent the effect of web application injection attacks, such as SQL injection and cross-site scripting (XSS), which are major threats to the security of the Internet. Method using complementary character coding, a new approach to character level dynamic tainting, which allows efficient and precise taint propagation across the boundaries of server components, and also between servers and clients over HTTP. In this approach, each character has two encodings, which can be used to distinguish trusted and untrusted data. Small modifications to the lexical analyzers in components such as the application code interpreter, the database management system, and (optionally) the web browser allow them to become complement aware components, capable of using this alternative character coding scheme to enforce security policies aimed at preventing injection attacks, while continuing to function normally in other respects. This approach overcomes some weaknesses of previous dynamic tainting approaches by offering a precise protection against persistent cross-site scripting attacks, as taint information is maintained when data is passed to a database and later retrieved by the application program. The technique is effective on a group of vulnerable benchmarks and has low overhead.
Owner:POLYTECHNIC INSTITUTE OF NEW YORK UNIVERSITY

Method and apparatus for detecting structured query language injection attack

The invention discloses a method and an apparatus for detecting structured query language (SQL) injection attack. The method and the apparatus for detecting the SQL injection attack are used for improving the detection efficiency of the SQL injection attack and reducing the false and missing alarm rate. The method for detecting the SQL injection attack comprises the steps: acquiring a to-be-detected SQL statement, analyzing the to-be-detected SQL statement to obtain morphologies and a morphology sequence contained in the to-be-detected SQL statement, and transforming the to-be-detected SQL statement into a to-be-detected character string according to a corresponding relation between each morphology and a specified character or a specified character string as well as the morphologies and the morphology sequence contained in the to-be-detected SQL statement; matching the to-be-detected character string with the character string in a character string library corresponding to a prestored SQL injection (SQLI) statement; and determining that the SQL injection attack exists when the to-be-detected character string is matched with any character string in the character string library corresponding to the prestored SQLI statement.
Owner:NSFOCUS INFORMATION TECHNOLOGY CO LTD +1

Aware-data-based wireless sensor network abnormity type discriminating method

The invention provides an aware-data-based wireless sensor network abnormity type discriminating method, which relates to the security field of wireless sensor network information. According to the method of the invention, the wireless sensor network nodes collect a group of aware data every a fixed interval and transmit the data to a base station. In a normal time period, the detection characteristic set generated by the base station is used as a training set and the training set is normalized with the column mean value and the column variance unchanged. The training set undergoes dimension reduction through a main component analyzing method and the characteristic vector matrix and the column mean value vector are kept. The clustering of the training set is divided into normal clustering and abnormal clustering through a density-based competitive clustering algorithm. When new detection characteristics arise, based on the normalization of the column mean value and the column variance and through the dimension reduction of the characteristic vector matrix and the column mean value vector, it is possible to detect whether the network is abnormal or not according to the gains of the normal clustering and the abnormal clustering the network is divided into. The deployment of the method is simple and is low in cost. Despite that, the method can detect network protocol attacks and malicious data injection attacks, and can reduce the energy of the nodes.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

Structured query language (SQL) injection attack detection method and device

The invention discloses a structured query language (SQL) injection attack detection method and device. The SQL injection attack detection device comprises a plug-in association module, an analysis module, a self-learning module and a detection module. Based on a webpage application system server of a Java virtual machine environment, URL and parameter information in business request information of a client are associated with a triggered SQL statement, syntax analysis is carried out on the SQL statement to construct an SQL syntax tree through self-learning of the URL to identify effective parameter information, after the self-learning process, a relation model of the business request information which the URL and the effective parameter information belong to, and the SQL syntax tree of the associated SQL statement is established, the relation model is taken as the inspection reference, the relationship between the subsequent business request information and the SQL syntax tree of the associated SQL statement is inspected by being compared with the reference, if the inspection result is not consistent, it is determined that an SQL injection attack is detected, business access is rejected, and therefore the SQL injection attack can be detected accurately, and the business access safety of the network application is guaranteed.
Owner:BEIJING VENUS INFORMATION SECURITY TECH +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products