ATE456837T1 - Verschleierung von ausführungsspuren eines computerprogrammcodes - Google Patents

Verschleierung von ausführungsspuren eines computerprogrammcodes

Info

Publication number
ATE456837T1
ATE456837T1 AT07388048T AT07388048T ATE456837T1 AT E456837 T1 ATE456837 T1 AT E456837T1 AT 07388048 T AT07388048 T AT 07388048T AT 07388048 T AT07388048 T AT 07388048T AT E456837 T1 ATE456837 T1 AT E456837T1
Authority
AT
Austria
Prior art keywords
execution
program code
computer program
occasioning
traces
Prior art date
Application number
AT07388048T
Other languages
English (en)
Inventor
Johan Eker
Platen Carl Von
Bjoern Johansson
Original Assignee
Ericsson Telefon Ab L M
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ericsson Telefon Ab L M filed Critical Ericsson Telefon Ab L M
Application granted granted Critical
Publication of ATE456837T1 publication Critical patent/ATE456837T1/de

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/14Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/75Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation
    • G06F21/755Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation with measures against power attack
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2145Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Mathematical Physics (AREA)
  • Stored Programmes (AREA)
  • Devices For Executing Special Programs (AREA)
  • Debugging And Monitoring (AREA)
  • Storage Device Security (AREA)
AT07388048T 2007-06-29 2007-06-29 Verschleierung von ausführungsspuren eines computerprogrammcodes ATE456837T1 (de)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP07388048A EP2009572B1 (de) 2007-06-29 2007-06-29 Verschleierung von Ausführungsspuren eines Computerprogrammcodes

Publications (1)

Publication Number Publication Date
ATE456837T1 true ATE456837T1 (de) 2010-02-15

Family

ID=38683575

Family Applications (1)

Application Number Title Priority Date Filing Date
AT07388048T ATE456837T1 (de) 2007-06-29 2007-06-29 Verschleierung von ausführungsspuren eines computerprogrammcodes

Country Status (7)

Country Link
US (1) US8522047B2 (de)
EP (1) EP2009572B1 (de)
CN (1) CN101689232B (de)
AT (1) ATE456837T1 (de)
DE (1) DE602007004587D1 (de)
ES (1) ES2340086T3 (de)
WO (1) WO2009003894A1 (de)

Families Citing this family (41)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8434059B2 (en) 2009-05-01 2013-04-30 Apple Inc. Systems, methods, and computer-readable media for fertilizing machine-executable code
JP5185242B2 (ja) * 2009-12-04 2013-04-17 株式会社東芝 コンパイル装置
US9134977B2 (en) * 2010-02-26 2015-09-15 Red Hat, Inc. Compiler operation for handling conditional statements
EP2402880A1 (de) * 2010-07-01 2012-01-04 Aladdin Europe GmbH Verfahren und Vorrichtung zum selektiven Schutz von einem von mehreren Verfahren einer in objektorientierter Sprache geschriebenen Anwendungsklasse
CN103348319B (zh) 2010-07-29 2017-03-01 爱迪德技术有限公司 用于有效部署整体多样化程序实例以抵抗差分攻击的系统和方法
US20130014267A1 (en) * 2011-07-07 2013-01-10 Farrugia Augustin J Computer protocol generation and obfuscation
US9111072B1 (en) * 2011-08-23 2015-08-18 Tectonic Labs, LLC Anti-reverse engineering unified process
DE112012004301T5 (de) 2011-10-12 2014-07-31 International Business Machines Corporation Erzeugen einer vorhersagenden Datenstruktur
EP2648125B1 (de) * 2012-03-05 2014-11-19 Steinberg Media Technologies GmbH Verfahren zur Autorisierung eines Programmablaufs
EP2831795B1 (de) 2012-03-30 2019-01-09 Irdeto B.V. Sicherung zugänglicher systeme mit variablenabhängiger codierung
US9400639B2 (en) * 2012-06-22 2016-07-26 Microsoft Technology Licensing, Llc Generating programs using context-free compositions and probability of determined transformation rules
DE102012015897A1 (de) * 2012-08-10 2014-02-13 Giesecke & Devrient Gmbh Verfahren zum Ausführen vom Programmcode
DE102012015899A1 (de) * 2012-08-10 2014-02-13 Giesecke & Devrient Gmbh Verfahren zum Erzeugen von ausführbarem Programmcode
US9207923B2 (en) 2013-06-18 2015-12-08 International Business Machines Corporation Compiler optimization for memoization of pure function arguments
US9547758B2 (en) * 2014-05-19 2017-01-17 Nxp B.V. Program cable obfuscation based upon recently executed program code
US9454470B2 (en) 2015-02-10 2016-09-27 International Business Machines Corporation Sharing and executing sensitive logic semantics
CN106407754B (zh) * 2015-07-30 2021-06-18 中兴通讯股份有限公司 一种生成随机布局程序的方法及装置
CN106919833A (zh) * 2015-12-28 2017-07-04 上海华虹集成电路有限责任公司 安全芯片中防止功耗泄露的方法
US11002829B2 (en) 2016-04-15 2021-05-11 Mediatek Inc. Radar interference mitigation method and apparatus
US10394554B1 (en) * 2016-09-09 2019-08-27 Stripe, Inc. Source code extraction via monitoring processing of obfuscated byte code
CN106548046B (zh) * 2016-10-25 2020-11-20 北京纬百科技有限公司 一种保护代码的装置和方法
US10261763B2 (en) 2016-12-13 2019-04-16 Palantir Technologies Inc. Extensible data transformation authoring and validation system
EP3355219A1 (de) * 2017-01-26 2018-08-01 Gemalto Sa Verfahren zur sicherung eines softwarecodes
US9934127B1 (en) 2017-03-08 2018-04-03 Microsoft Technology Licensing, Llc Indexing a trace by insertion of key frames for replay responsiveness
US9959194B1 (en) 2017-03-08 2018-05-01 Microsoft Technology Licensing, Llc Indexing a trace by insertion of memory snapshots for replay responsiveness
US10185645B2 (en) 2017-03-08 2019-01-22 Microsoft Technology Licensing, Llc Resource lifetime analysis using a time-travel trace
US9934126B1 (en) 2017-03-08 2018-04-03 Microsoft Technology Licensing, Llc Indexing a trace by insertion of reverse lookup data structures
US9983978B1 (en) 2017-03-08 2018-05-29 Microsoft Technology Licensing, Llc Querying an indexed time-travel trace
US10282274B2 (en) 2017-06-14 2019-05-07 Microsoft Technology Licensing, Llc Presenting differences between code entity invocations
CN107506651B (zh) * 2017-07-04 2021-10-22 环玺信息科技(上海)有限公司 一种代码加密方法及系统
CN107357706B (zh) * 2017-07-17 2021-01-08 深圳天珑无线科技有限公司 数据处理方法、装置及非临时性计算机可读介质
US12007908B2 (en) * 2017-12-14 2024-06-11 Arris Enterprises Llc Method and apparatus to dynamically encode data at runtime
US10481998B2 (en) * 2018-03-15 2019-11-19 Microsoft Technology Licensing, Llc Protecting sensitive information in time travel trace debugging
CN111310172B (zh) * 2018-12-12 2022-03-11 北京忆芯科技有限公司 通过反汇编验证处理器执行轨迹的方法及控制部件
EP3671497A1 (de) * 2018-12-18 2020-06-24 Koninklijke Philips N.V. Geschützte verarbeitung von operationen
GB201821248D0 (en) 2018-12-27 2019-02-13 Palantir Technologies Inc Data pipeline management system and method
CN112711427A (zh) * 2019-10-24 2021-04-27 华为技术有限公司 一种镜像文件的获取方法以及装置
CN112860262B (zh) * 2021-02-09 2024-06-07 上海商汤智能科技有限公司 一种代码解析的方法、装置、电子设备及存储介质
WO2022199864A1 (en) * 2021-03-26 2022-09-29 Verimatrix Uk Ltd Input driven execution randomization
CN114021200B (zh) * 2022-01-07 2022-04-15 每日互动股份有限公司 一种用于pkg模糊化的数据处理系统
CN115795418B (zh) * 2023-01-17 2023-04-14 泉州艾奇科技有限公司 水印嵌入方法、装置、计算机、存储介质

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1999001815A1 (en) * 1997-06-09 1999-01-14 Intertrust, Incorporated Obfuscation techniques for enhancing software security
US7430670B1 (en) * 1999-07-29 2008-09-30 Intertrust Technologies Corp. Software self-defense systems and methods
WO2001009702A2 (en) * 1999-07-30 2001-02-08 Intertrust Technologies Corp. Methods and systems for transaction record delivery using thresholds and multi-stage protocol
US6829710B1 (en) * 2000-03-14 2004-12-07 Microsoft Corporation Technique for producing, through watermarking, highly tamper-resistant executable code and resulting “watermarked” code so formed
US7343494B2 (en) * 2001-08-01 2008-03-11 Sas Validy Method to protect software against unwanted use with a “renaming” principle
US7228426B2 (en) * 2002-04-03 2007-06-05 Microsoft Corporation Integrity ordainment and ascertainment of computer-executable instructions with consideration for execution context
US8332652B2 (en) * 2003-10-01 2012-12-11 International Business Machines Corporation Computing device that securely runs authorized software

Also Published As

Publication number Publication date
US20100262839A1 (en) 2010-10-14
US8522047B2 (en) 2013-08-27
EP2009572A1 (de) 2008-12-31
WO2009003894A1 (en) 2009-01-08
DE602007004587D1 (de) 2010-03-18
EP2009572B1 (de) 2010-01-27
CN101689232A (zh) 2010-03-31
CN101689232B (zh) 2013-05-22
ES2340086T3 (es) 2010-05-28

Similar Documents

Publication Publication Date Title
ATE456837T1 (de) Verschleierung von ausführungsspuren eines computerprogrammcodes
Katsifodimos et al. Apache flink: Stream analytics at scale
ATE432507T1 (de) Verschleierung von computerprogrammcodes
DE602006008166D1 (de) Verschleierung von Computerprogrammcodes
DE602006014415D1 (de) Synchronisierung und paralleles Ausführen von Kontrollfluss und Datenfluss auf Task-Ebene
RU2015142982A (ru) Компиляция преобразований в пользовательском интерфейсе повторных вычислений
WO2011116987A8 (en) A method for automatically generating a trace data set for a software system, a computer system, and a computer program product
JP2013539888A5 (de)
DE602006003705D1 (de) Transformation von Prozessmodellen für ereignis-basierte Koordination von zusammengesetzten Anwendungen
CN101667135B (zh) 一种交互式并行化编译系统及其编译方法
JP2010204979A5 (ja) コンパイル方法
ATE463788T1 (de) Datenverarbeitungseinheit für anweisungen in geschachtelten schleifen
JP2016509714A5 (de)
WO2006083046A3 (en) Methods and apparatus for providing a task change application programming interface
DE602006002874D1 (de) Verfahren zur optimierung des protokollierens und wiederabspielens von multitask-anwendungen in einem einzelprozessor- oder mehrprozessor-computersystem
WO2008078322A3 (en) Method for ensuring unique identification of program elements across multiple executions
IN2014CH02634A (de)
UA119058U (uk) Процес обробляння даних з використанням універсального обчислювального елемента (уое)
Mäder et al. Do developers benefit from requirements traceability when evolving and maintaining a software system?
RU2017126073A (ru) Скрытие исполнения программы
Park et al. A Real-Time Tracing Method for Data-Intensive Workflow
Diehl Make visualization part of your analysis process
ATE541763T1 (de) Verfahren zur erhöhung der genauigkeit einer positionsverfolgung von fahrzeugen in softwarebasierten steuerungssystemen
Shoimah et al. THE EFFECT OF DESTINATION ATTRACTIVENESS ON VISITORS SATISFACTION: THE MEDIATING ROLE OF PLACE ATTACHMENT (Survey on Visitors of Ecotourism: Kampung Wisata Kungkuk, Batu-East Java)
ATE495492T1 (de) Verfahren, computerprogramm, computerlesbares medium und computer

Legal Events

Date Code Title Description
RER Ceased as to paragraph 5 lit. 3 law introducing patent treaties