IDENTIFYING AND DETERMINISTICALLY AVOIDING USE OF INJECTED OR ALTERED QUERY FILES
In one embodiment, a method includes obtaining a list of registered applications, each application indicated by the list having been provided permission and authenticated to operate within a network. The list includes: an identifier, one or more first hash values obtained individually for each of th...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | In one embodiment, a method includes obtaining a list of registered applications, each application indicated by the list having been provided permission and authenticated to operate within a network. The list includes: an identifier, one or more first hash values obtained individually for each of the registered applications, and a plurality of second hash values obtained individually for each dependent file associated with each of the registered applications. The method also includes detecting unauthorized alterations of and injections into the dependent files associated with each of the registered applications based on the list, and performing an action in response to detecting unauthorized alterations of and injections into the dependent files. Other systems, methods, and computer program products are described in accordance with more embodiments. |
---|