ATE456837T1 - Verschleierung von ausführungsspuren eines computerprogrammcodes - Google Patents
Verschleierung von ausführungsspuren eines computerprogrammcodesInfo
- Publication number
- ATE456837T1 ATE456837T1 AT07388048T AT07388048T ATE456837T1 AT E456837 T1 ATE456837 T1 AT E456837T1 AT 07388048 T AT07388048 T AT 07388048T AT 07388048 T AT07388048 T AT 07388048T AT E456837 T1 ATE456837 T1 AT E456837T1
- Authority
- AT
- Austria
- Prior art keywords
- execution
- program code
- computer program
- occasioning
- traces
- Prior art date
Links
- 238000004590 computer program Methods 0.000 title abstract 5
- 238000000034 method Methods 0.000 abstract 2
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/14—Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/75—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation
- G06F21/755—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation with measures against power attack
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2145—Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Mathematical Physics (AREA)
- Stored Programmes (AREA)
- Devices For Executing Special Programs (AREA)
- Debugging And Monitoring (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP07388048A EP2009572B1 (de) | 2007-06-29 | 2007-06-29 | Verschleierung von Ausführungsspuren eines Computerprogrammcodes |
Publications (1)
Publication Number | Publication Date |
---|---|
ATE456837T1 true ATE456837T1 (de) | 2010-02-15 |
Family
ID=38683575
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AT07388048T ATE456837T1 (de) | 2007-06-29 | 2007-06-29 | Verschleierung von ausführungsspuren eines computerprogrammcodes |
Country Status (7)
Country | Link |
---|---|
US (1) | US8522047B2 (de) |
EP (1) | EP2009572B1 (de) |
CN (1) | CN101689232B (de) |
AT (1) | ATE456837T1 (de) |
DE (1) | DE602007004587D1 (de) |
ES (1) | ES2340086T3 (de) |
WO (1) | WO2009003894A1 (de) |
Families Citing this family (41)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8434059B2 (en) | 2009-05-01 | 2013-04-30 | Apple Inc. | Systems, methods, and computer-readable media for fertilizing machine-executable code |
JP5185242B2 (ja) * | 2009-12-04 | 2013-04-17 | 株式会社東芝 | コンパイル装置 |
US9134977B2 (en) * | 2010-02-26 | 2015-09-15 | Red Hat, Inc. | Compiler operation for handling conditional statements |
EP2402880A1 (de) * | 2010-07-01 | 2012-01-04 | Aladdin Europe GmbH | Verfahren und Vorrichtung zum selektiven Schutz von einem von mehreren Verfahren einer in objektorientierter Sprache geschriebenen Anwendungsklasse |
CN103348319B (zh) | 2010-07-29 | 2017-03-01 | 爱迪德技术有限公司 | 用于有效部署整体多样化程序实例以抵抗差分攻击的系统和方法 |
US20130014267A1 (en) * | 2011-07-07 | 2013-01-10 | Farrugia Augustin J | Computer protocol generation and obfuscation |
US9111072B1 (en) * | 2011-08-23 | 2015-08-18 | Tectonic Labs, LLC | Anti-reverse engineering unified process |
DE112012004301T5 (de) | 2011-10-12 | 2014-07-31 | International Business Machines Corporation | Erzeugen einer vorhersagenden Datenstruktur |
EP2648125B1 (de) * | 2012-03-05 | 2014-11-19 | Steinberg Media Technologies GmbH | Verfahren zur Autorisierung eines Programmablaufs |
EP2831795B1 (de) | 2012-03-30 | 2019-01-09 | Irdeto B.V. | Sicherung zugänglicher systeme mit variablenabhängiger codierung |
US9400639B2 (en) * | 2012-06-22 | 2016-07-26 | Microsoft Technology Licensing, Llc | Generating programs using context-free compositions and probability of determined transformation rules |
DE102012015897A1 (de) * | 2012-08-10 | 2014-02-13 | Giesecke & Devrient Gmbh | Verfahren zum Ausführen vom Programmcode |
DE102012015899A1 (de) * | 2012-08-10 | 2014-02-13 | Giesecke & Devrient Gmbh | Verfahren zum Erzeugen von ausführbarem Programmcode |
US9207923B2 (en) | 2013-06-18 | 2015-12-08 | International Business Machines Corporation | Compiler optimization for memoization of pure function arguments |
US9547758B2 (en) * | 2014-05-19 | 2017-01-17 | Nxp B.V. | Program cable obfuscation based upon recently executed program code |
US9454470B2 (en) | 2015-02-10 | 2016-09-27 | International Business Machines Corporation | Sharing and executing sensitive logic semantics |
CN106407754B (zh) * | 2015-07-30 | 2021-06-18 | 中兴通讯股份有限公司 | 一种生成随机布局程序的方法及装置 |
CN106919833A (zh) * | 2015-12-28 | 2017-07-04 | 上海华虹集成电路有限责任公司 | 安全芯片中防止功耗泄露的方法 |
US11002829B2 (en) | 2016-04-15 | 2021-05-11 | Mediatek Inc. | Radar interference mitigation method and apparatus |
US10394554B1 (en) * | 2016-09-09 | 2019-08-27 | Stripe, Inc. | Source code extraction via monitoring processing of obfuscated byte code |
CN106548046B (zh) * | 2016-10-25 | 2020-11-20 | 北京纬百科技有限公司 | 一种保护代码的装置和方法 |
US10261763B2 (en) | 2016-12-13 | 2019-04-16 | Palantir Technologies Inc. | Extensible data transformation authoring and validation system |
EP3355219A1 (de) * | 2017-01-26 | 2018-08-01 | Gemalto Sa | Verfahren zur sicherung eines softwarecodes |
US9934127B1 (en) | 2017-03-08 | 2018-04-03 | Microsoft Technology Licensing, Llc | Indexing a trace by insertion of key frames for replay responsiveness |
US9959194B1 (en) | 2017-03-08 | 2018-05-01 | Microsoft Technology Licensing, Llc | Indexing a trace by insertion of memory snapshots for replay responsiveness |
US10185645B2 (en) | 2017-03-08 | 2019-01-22 | Microsoft Technology Licensing, Llc | Resource lifetime analysis using a time-travel trace |
US9934126B1 (en) | 2017-03-08 | 2018-04-03 | Microsoft Technology Licensing, Llc | Indexing a trace by insertion of reverse lookup data structures |
US9983978B1 (en) | 2017-03-08 | 2018-05-29 | Microsoft Technology Licensing, Llc | Querying an indexed time-travel trace |
US10282274B2 (en) | 2017-06-14 | 2019-05-07 | Microsoft Technology Licensing, Llc | Presenting differences between code entity invocations |
CN107506651B (zh) * | 2017-07-04 | 2021-10-22 | 环玺信息科技(上海)有限公司 | 一种代码加密方法及系统 |
CN107357706B (zh) * | 2017-07-17 | 2021-01-08 | 深圳天珑无线科技有限公司 | 数据处理方法、装置及非临时性计算机可读介质 |
US12007908B2 (en) * | 2017-12-14 | 2024-06-11 | Arris Enterprises Llc | Method and apparatus to dynamically encode data at runtime |
US10481998B2 (en) * | 2018-03-15 | 2019-11-19 | Microsoft Technology Licensing, Llc | Protecting sensitive information in time travel trace debugging |
CN111310172B (zh) * | 2018-12-12 | 2022-03-11 | 北京忆芯科技有限公司 | 通过反汇编验证处理器执行轨迹的方法及控制部件 |
EP3671497A1 (de) * | 2018-12-18 | 2020-06-24 | Koninklijke Philips N.V. | Geschützte verarbeitung von operationen |
GB201821248D0 (en) | 2018-12-27 | 2019-02-13 | Palantir Technologies Inc | Data pipeline management system and method |
CN112711427A (zh) * | 2019-10-24 | 2021-04-27 | 华为技术有限公司 | 一种镜像文件的获取方法以及装置 |
CN112860262B (zh) * | 2021-02-09 | 2024-06-07 | 上海商汤智能科技有限公司 | 一种代码解析的方法、装置、电子设备及存储介质 |
WO2022199864A1 (en) * | 2021-03-26 | 2022-09-29 | Verimatrix Uk Ltd | Input driven execution randomization |
CN114021200B (zh) * | 2022-01-07 | 2022-04-15 | 每日互动股份有限公司 | 一种用于pkg模糊化的数据处理系统 |
CN115795418B (zh) * | 2023-01-17 | 2023-04-14 | 泉州艾奇科技有限公司 | 水印嵌入方法、装置、计算机、存储介质 |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1999001815A1 (en) * | 1997-06-09 | 1999-01-14 | Intertrust, Incorporated | Obfuscation techniques for enhancing software security |
US7430670B1 (en) * | 1999-07-29 | 2008-09-30 | Intertrust Technologies Corp. | Software self-defense systems and methods |
WO2001009702A2 (en) * | 1999-07-30 | 2001-02-08 | Intertrust Technologies Corp. | Methods and systems for transaction record delivery using thresholds and multi-stage protocol |
US6829710B1 (en) * | 2000-03-14 | 2004-12-07 | Microsoft Corporation | Technique for producing, through watermarking, highly tamper-resistant executable code and resulting “watermarked” code so formed |
US7343494B2 (en) * | 2001-08-01 | 2008-03-11 | Sas Validy | Method to protect software against unwanted use with a “renaming” principle |
US7228426B2 (en) * | 2002-04-03 | 2007-06-05 | Microsoft Corporation | Integrity ordainment and ascertainment of computer-executable instructions with consideration for execution context |
US8332652B2 (en) * | 2003-10-01 | 2012-12-11 | International Business Machines Corporation | Computing device that securely runs authorized software |
-
2007
- 2007-06-29 EP EP07388048A patent/EP2009572B1/de active Active
- 2007-06-29 ES ES07388048T patent/ES2340086T3/es active Active
- 2007-06-29 DE DE602007004587T patent/DE602007004587D1/de active Active
- 2007-06-29 AT AT07388048T patent/ATE456837T1/de not_active IP Right Cessation
-
2008
- 2008-06-25 WO PCT/EP2008/058091 patent/WO2009003894A1/en active Application Filing
- 2008-06-25 CN CN2008800227732A patent/CN101689232B/zh active Active
- 2008-06-25 US US12/664,893 patent/US8522047B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
US20100262839A1 (en) | 2010-10-14 |
US8522047B2 (en) | 2013-08-27 |
EP2009572A1 (de) | 2008-12-31 |
WO2009003894A1 (en) | 2009-01-08 |
DE602007004587D1 (de) | 2010-03-18 |
EP2009572B1 (de) | 2010-01-27 |
CN101689232A (zh) | 2010-03-31 |
CN101689232B (zh) | 2013-05-22 |
ES2340086T3 (es) | 2010-05-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
ATE456837T1 (de) | Verschleierung von ausführungsspuren eines computerprogrammcodes | |
Katsifodimos et al. | Apache flink: Stream analytics at scale | |
ATE432507T1 (de) | Verschleierung von computerprogrammcodes | |
DE602006008166D1 (de) | Verschleierung von Computerprogrammcodes | |
DE602006014415D1 (de) | Synchronisierung und paralleles Ausführen von Kontrollfluss und Datenfluss auf Task-Ebene | |
RU2015142982A (ru) | Компиляция преобразований в пользовательском интерфейсе повторных вычислений | |
WO2011116987A8 (en) | A method for automatically generating a trace data set for a software system, a computer system, and a computer program product | |
JP2013539888A5 (de) | ||
DE602006003705D1 (de) | Transformation von Prozessmodellen für ereignis-basierte Koordination von zusammengesetzten Anwendungen | |
CN101667135B (zh) | 一种交互式并行化编译系统及其编译方法 | |
JP2010204979A5 (ja) | コンパイル方法 | |
ATE463788T1 (de) | Datenverarbeitungseinheit für anweisungen in geschachtelten schleifen | |
JP2016509714A5 (de) | ||
WO2006083046A3 (en) | Methods and apparatus for providing a task change application programming interface | |
DE602006002874D1 (de) | Verfahren zur optimierung des protokollierens und wiederabspielens von multitask-anwendungen in einem einzelprozessor- oder mehrprozessor-computersystem | |
WO2008078322A3 (en) | Method for ensuring unique identification of program elements across multiple executions | |
IN2014CH02634A (de) | ||
UA119058U (uk) | Процес обробляння даних з використанням універсального обчислювального елемента (уое) | |
Mäder et al. | Do developers benefit from requirements traceability when evolving and maintaining a software system? | |
RU2017126073A (ru) | Скрытие исполнения программы | |
Park et al. | A Real-Time Tracing Method for Data-Intensive Workflow | |
Diehl | Make visualization part of your analysis process | |
ATE541763T1 (de) | Verfahren zur erhöhung der genauigkeit einer positionsverfolgung von fahrzeugen in softwarebasierten steuerungssystemen | |
Shoimah et al. | THE EFFECT OF DESTINATION ATTRACTIVENESS ON VISITORS SATISFACTION: THE MEDIATING ROLE OF PLACE ATTACHMENT (Survey on Visitors of Ecotourism: Kampung Wisata Kungkuk, Batu-East Java) | |
ATE495492T1 (de) | Verfahren, computerprogramm, computerlesbares medium und computer |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
RER | Ceased as to paragraph 5 lit. 3 law introducing patent treaties |