CA2668547C - Protection des programmes informatiques - Google Patents
Protection des programmes informatiques Download PDFInfo
- Publication number
- CA2668547C CA2668547C CA2668547A CA2668547A CA2668547C CA 2668547 C CA2668547 C CA 2668547C CA 2668547 A CA2668547 A CA 2668547A CA 2668547 A CA2668547 A CA 2668547A CA 2668547 C CA2668547 C CA 2668547C
- Authority
- CA
- Canada
- Prior art keywords
- processor
- program
- instructions
- corruption
- instruction
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Debugging And Monitoring (AREA)
Abstract
Afin de protéger un programme informatique, au moins une fonction de corruption est incluse dans le programme. Également, au moins une instruction est incluse dans le programme qui entraîne le programme à être dirigé vers la fonction de corruption. Un point dinterruption est alors paramétré de sorte que, lorsque lemplacement de début de la fonction de corruption est atteint, une exception est générée et le traitement de lexception entraîne la non-exécution de la fonction de corruption. Un effet est provoqué en cas de tentatives dun utilisateur malicieux dutiliser le point darrêt matériel pour exécuter des actions non autorisées sur le programme informatique qui entraîne lexécution de la fonction de corruption et qui rend le programme informatique inutilisable.
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US5943708P | 2008-06-06 | 2008-06-06 | |
EP20080251985 EP2131299B1 (fr) | 2008-06-06 | 2008-06-06 | Protection de programmes logiciels |
US61/059,437 | 2008-06-06 | ||
EP08251985.1 | 2008-06-06 |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2668547A1 CA2668547A1 (fr) | 2009-12-06 |
CA2668547C true CA2668547C (fr) | 2017-09-05 |
Family
ID=41412304
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA2668547A Active CA2668547C (fr) | 2008-06-06 | 2009-06-05 | Protection des programmes informatiques |
Country Status (1)
Country | Link |
---|---|
CA (1) | CA2668547C (fr) |
-
2009
- 2009-06-05 CA CA2668547A patent/CA2668547C/fr active Active
Also Published As
Publication number | Publication date |
---|---|
CA2668547A1 (fr) | 2009-12-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Pappas et al. | Transparent {ROP} exploit mitigation using indirect branch tracing | |
Wilander et al. | RIPE: Runtime intrusion prevention evaluator | |
US7996836B1 (en) | Using a hypervisor to provide computer security | |
US7603713B1 (en) | Method for accelerating hardware emulator used for malware detection and analysis | |
Volckaert et al. | Cloning your gadgets: Complete ROP attack immunity with multi-variant execution | |
US8522015B2 (en) | Authentication of binaries in memory with proxy code execution | |
Prakash et al. | Enforcing system-wide control flow integrity for exploit detection and diagnosis | |
US11163645B2 (en) | Apparatus and method of control flow integrity enforcement utilizing boundary checking | |
Kong et al. | Improving software security via runtime instruction-level taint checking | |
Gupta et al. | Marlin: Mitigating code reuse attacks using code randomization | |
US8407523B2 (en) | Method for protecting software programs | |
CN109446799B (zh) | 内存数据保护方法、安全组件和计算机设备及存储介质 | |
Jurczyk et al. | Identifying and exploiting windows kernel race conditions via memory access patterns | |
Feng et al. | Stealth measurements for cheat detection in on-line games | |
Resh et al. | Preventing execution of unauthorized native-code software | |
Brandão et al. | Employment of secure enclaves in cheat detection hardening | |
Porter et al. | Decker: Attack surface reduction via on-demand code mapping | |
CA2668547C (fr) | Protection des programmes informatiques | |
Vinck et al. | Sharing is caring: Secure and efficient shared memory support for mvees | |
EP2131299B1 (fr) | Protection de programmes logiciels | |
Philippaerts et al. | CPM: Masking code pointers to prevent code injection attacks | |
Gadaleta et al. | Instruction-level countermeasures against stack-based buffer overflow attacks | |
Geden et al. | RegGuard: Leveraging CPU registers for mitigation of control-and data-oriented attacks | |
EP2720170A1 (fr) | Protection automatique contre exploitation d'ordinateur | |
Li et al. | MagBox: Keep the risk functions running safely in a magic box |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request |
Effective date: 20130412 |