- Santa Clara CA, US Xiaoming Zhou - Sunnyvale CA, US Xiaohan Huang - Cupertino CA, US Subramanian Varadarajan - San Jose CA, US Roger S. Hoover - Granite Canon WY, US
Assignee:
Shape Security, Inc. - Santa Clara CA
International Classification:
H04L 29/06 G06F 21/54 G06F 21/56 H04L 29/08
Abstract:
Techniques for code modification for detecting abnormal activity are described. Web code is obtained. Modified web code is generated by changing a particular programmatic element to a modified programmatic element throughout the web code. Instrumentation code is generated configured to monitor and report on one or more interactions with versions of the particular programmatic element. The instrumentation code is caused to be provided in association with the modified web code to the first client device in response to the first request from the first client device. Report data generated by the instrumentation code is received. The report data describes abnormal activity at the first client device, the abnormal activity comprising an interaction with a version of the particular programmatic element that does not exist in the modified web code. Based on the report, it is determined that the first client device is likely controlled by malware.
- Mountain View CA, US Sumit Agarwal - Palo Alto CA, US Subramanian Varadarajan - San Jose CA, US Justin D. Call - Santa Clara CA, US
Assignee:
Shape Security, Inc. - Mountain View CA
International Classification:
G06F 21/12 G06F 21/56 G06F 16/958
Abstract:
A computer-implemented method for coordinating content transformation includes receiving, at a computer server subsystem and from a web server system, computer code to be served in response to a request from a computing client over the internet; modifying the computer code to obscure operation of the web server system that could be determined from the computer code; generating transformation information that is needed in order to reverse the modifications of the computer code to obscure the operation of the web server system; and serving to the computing client the modified code and the reverse transformation information.
Using Instrumentation Code To Detect Bots Or Malware
- Mountain View CA, US Xiaohan Huang - Cupertino CA, US Xiaoming Zhou - Sunnyvale CA, US Subramanian Varadarajan - San Jose CA, US Marc R. Hansen - Mountain View CA, US
Techniques are provided for using instrumentation code to detect bots or malware. Data corresponding to requests from a plurality of client devices for a web resource comprising web code is obtained. The web resource is hosted by a first web server system. For a first client device of the plurality of client devices, instrumentation code is served. The instrumentation code is configured to execute on the first client device to monitor execution of the web code of the web resource at the first client device. One or more responses generated by the instrumentation code at the first client device are received from the first client device. The one or more responses are based one or more interactions with the web code at the first client device.
Automatically Determining Whether A Page Of A Web Site Is Broken Despite Elements On The Page That May Change
- Mountain View CA, US SUBRAMANIAN VARADARAJAN - San Jose CA, US
Assignee:
SHAPE SECURITY, INC. - Mountain View CA
International Classification:
G06F 11/36 G06F 17/22
Abstract:
In an embodiment, a method comprises rendering a first image of a first user interface based on a first set of instructions; rendering a second image of a second user interface based on a second set of instructions; generating a first mask comprising a plurality of points, wherein each point in the first mask indicates whether a first point in the first image and a second point in the second image are different; rendering a third image of a third user interface based on a third set of instructions, wherein the first set of instructions are different than the third set of instructions and the first image is different than the third image; determining that the first image is equivalent to the third image based on the first image, the first mask, and the third image.
- Milpitas CA, US Subramanian Varadarajan - Los Gatos CA, US
International Classification:
H04L 12/721 H04L 12/761 H04L 12/707 H04L 12/26
Abstract:
Exemplary methods, apparatuses, and systems include a path management hub and proxy server nodes that form a mesh network. The hub receives link performance metrics from each of the nodes. The hub determines optimal paths between first and second nodes for each of a plurality of metric types or a combination of metric types using the received link performance metrics. The hub maps a service identifier to a plurality of the determined optimal paths for a context representing one or more link performance metric types. The hub transmits a next hop for each of the plurality of mapped optimal paths along with the mapping to the first node. The first node receives the service identifier mapped to the next hops and traffic for the first connection. In response to determining the received traffic is for the service, the first node selects a first next hop and forwards the traffic.
Detecting The Execution Of Alien Content On A Client Computing Device
- Mountain View CA, US Subramanian Varadarajan - San Jose CA, US Xiaohan Huang - Cupertino CA, US Xiaoming Zhou - Sunnyvale CA, US Marc R. Hansen - Mountain View CA, US
International Classification:
H04L 29/06 H04L 29/08
Abstract:
Techniques detecting the execution of alien content on a client computing device are provided. A set of web code is supplemented with a set of instrumentation code, which when executed at a client computing device, collects and reports information that describes execution of the set of web code at the client computing device, wherein the client computing device receives the set of web code and the set of instrumentation code. A set of information is received from the client computing device that is generated by the set of instrumentation code when the set of instrumentation code is executed at the client computing device. The presence of alien content interacting with the set of web code on the client computing device is determined based on the set of information.
- Palo Alto CA, US Xiaoming Zhou - Sunnyvale CA, US Xiaohan Huang - Cupertino CA, US Subramanian Varadarajan - San Jose CA, US Roger S. Hoover - Granite Canon WY, US
International Classification:
H04L 29/06 G06F 21/56 H04L 29/08 G06F 21/54
Abstract:
Techniques for code modification for automation detection are described. Web code is obtained corresponding to content to be served to a first client device in response to a first request from the first client device. Instances of a particular programmatic element in the web code are identified. In response to the first request, modified web code is generated from the web code by consistently changing the particular programmatic element to a modified programmatic element throughout the web code. The modified web code is caused to be provided to the first client device in response to the first request from the first client device. A communication is received from the first client device that is made in response to the modified web code. The communication includes an attempt to interact with the particular programmatic element that exists in the web code but not in the modified web code.
Using Instrumentation Code To Detect Bots Or Malware
- Mountain View CA, US Xiaohan Huang - Cupertino CA, US Xiaoming Zhou - Sunnyvale CA, US Subramanian Varadarajan - San Jose CA, US Marc R. Hansen - Mountain View CA, US
Techniques are provided for using instrumentation code to detect bots or malware. Data corresponding to requests from a plurality of client devices for a web resource comprising web code is obtained. The web resource is hosted by a first web server system. For a first client device of the plurality of client devices, instrumentation code is served. The instrumentation code is configured to execute on the first client device to monitor execution of the web code of the web resource at the first client device. One or more responses generated by the instrumentation code at the first client device are received from the first client device. The one or more responses are based one or more interactions with the web code at the first client device.
Youtube
SANJAY SUBRAHMANYAN presents "19th Century Ta...
MARGAZHI MAHA UTSAVAM - fondly called as MMU, is the most popular and ...
Duration:
48m 52s
Tanam - Hamsadhwani
Singer: Sanjay Subrahmanyan Violin: S Varadarajan Mrudangam: Neyveli B...
Duration:
7m 50s
Increase your ground Energy | | Maithili Vara...
Maithili Varadarajan is a veteran Reiki Master and Life coach with vas...
Duration:
35s
(Muruga) - Saveri
Singer: Sanjay Subrahmanyan Composer: P Sivan Violin: S Varadarajan Mr...
Duration:
5m 54s
October 11, 2019
Duration:
15s
Sanjay Subrahmanyan-S Varadarajan-Neyv... Ve...
Live at the Music Academy, Madras (December 27th, 2018) Sanjay Subrahm...