US 12,141,292 B2
Tracking and mitigating security threats and vulnerabilities in browser extension engines
Charles Philip, Mumbai (IN); and Priya Birendra Yadav, Dombivli (IN)
Assigned to Bank of America Corporation, Charlotte, NC (US)
Filed by Bank of America Corporation, Charlotte, NC (US)
Filed on Aug. 6, 2021, as Appl. No. 17/396,229.
Prior Publication US 2023/0039079 A1, Feb. 9, 2023
Int. Cl. G06F 21/57 (2013.01)
CPC G06F 21/577 (2013.01) [G06F 2221/033 (2013.01)] 17 Claims
OG exemplary drawing
 
1. A computing platform comprising:
at least one processor;
a communication interface communicatively coupled to the at least one processor; and
memory storing computer-readable instructions that, when executed by the at least one processor, cause the computing platform to:
receive, via the communication interface, an indication of a user request to use a first browser extension at a first user computing device;
analyze the first browser extension, wherein the analyzing the first browser extension includes performing an examination process on code associated with the first browser extension, wherein the examination process includes reviewing code associated with the first browser extension for commands that match a predefined list of commands associated with vulnerabilities, and wherein the predefined list of commands is dynamically updated with a machine learning engine based on vulnerability reports received from an enterprise computing device tracking identified vulnerabilities from a plurality of computing devices of an enterprise system and associated corrective actions for the identified vulnerabilities;
identify one or more vulnerabilities based on analyzing the first browser extension, wherein identifying one or more vulnerabilities includes training a machine learning model to iteratively refine optimization rules used to identify one or more vulnerabilities based on data in a use record establishing one or more factors for a potential vulnerability in the first browser extension and based on one or more updates from an administrator computing device associated with the enterprise system;
based on the identifying one or more vulnerabilities, determine whether the user has an exception associated with each vulnerability based on accessing an exception list of a plurality of enterprise users from the enterprise system;
upon detecting a lack of an exception for the user for at least one vulnerability, identify at least one corrective action associated with each vulnerability;
transmit, to the first user computing device, instructions to perform the at least one corrective action; and
transmit, to the administrator computing device, a result report, wherein the result report includes a list of one or more browser extensions that the first user computing device used or attempted to use and an analysis of potential vulnerabilities associated with each of the one or more browser extensions, wherein the administrator computing device is configured to compile the result report associated with the first user computing device and result reports associated with other user computing devices to create a compiled result report dataset, and to retrain the machine learning model to the compiled result report dataset to iteratively refine optimization rules used to identify one or more vulnerabilities in a browser extension.