CA2668547C - Protection des programmes informatiques - Google Patents

Protection des programmes informatiques Download PDF

Info

Publication number
CA2668547C
CA2668547C CA2668547A CA2668547A CA2668547C CA 2668547 C CA2668547 C CA 2668547C CA 2668547 A CA2668547 A CA 2668547A CA 2668547 A CA2668547 A CA 2668547A CA 2668547 C CA2668547 C CA 2668547C
Authority
CA
Canada
Prior art keywords
processor
program
instructions
corruption
instruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CA2668547A
Other languages
English (en)
Other versions
CA2668547A1 (fr
Inventor
Neil Stewart
Graeme Harkness
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Verimatrix France SAS
Original Assignee
Inside Secure SA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from EP20080251985 external-priority patent/EP2131299B1/fr
Application filed by Inside Secure SA filed Critical Inside Secure SA
Publication of CA2668547A1 publication Critical patent/CA2668547A1/fr
Application granted granted Critical
Publication of CA2668547C publication Critical patent/CA2668547C/fr
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Debugging And Monitoring (AREA)

Abstract

Afin de protéger un programme informatique, au moins une fonction de corruption est incluse dans le programme. Également, au moins une instruction est incluse dans le programme qui entraîne le programme à être dirigé vers la fonction de corruption. Un point dinterruption est alors paramétré de sorte que, lorsque lemplacement de début de la fonction de corruption est atteint, une exception est générée et le traitement de lexception entraîne la non-exécution de la fonction de corruption. Un effet est provoqué en cas de tentatives dun utilisateur malicieux dutiliser le point darrêt matériel pour exécuter des actions non autorisées sur le programme informatique qui entraîne lexécution de la fonction de corruption et qui rend le programme informatique inutilisable.
CA2668547A 2008-06-06 2009-06-05 Protection des programmes informatiques Active CA2668547C (fr)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US5943708P 2008-06-06 2008-06-06
EP20080251985 EP2131299B1 (fr) 2008-06-06 2008-06-06 Protection de programmes logiciels
US61/059,437 2008-06-06
EP08251985.1 2008-06-06

Publications (2)

Publication Number Publication Date
CA2668547A1 CA2668547A1 (fr) 2009-12-06
CA2668547C true CA2668547C (fr) 2017-09-05

Family

ID=41412304

Family Applications (1)

Application Number Title Priority Date Filing Date
CA2668547A Active CA2668547C (fr) 2008-06-06 2009-06-05 Protection des programmes informatiques

Country Status (1)

Country Link
CA (1) CA2668547C (fr)

Also Published As

Publication number Publication date
CA2668547A1 (fr) 2009-12-06

Similar Documents

Publication Publication Date Title
Pappas et al. Transparent {ROP} exploit mitigation using indirect branch tracing
Wilander et al. RIPE: Runtime intrusion prevention evaluator
US7996836B1 (en) Using a hypervisor to provide computer security
US7603713B1 (en) Method for accelerating hardware emulator used for malware detection and analysis
Volckaert et al. Cloning your gadgets: Complete ROP attack immunity with multi-variant execution
US8522015B2 (en) Authentication of binaries in memory with proxy code execution
Prakash et al. Enforcing system-wide control flow integrity for exploit detection and diagnosis
US11163645B2 (en) Apparatus and method of control flow integrity enforcement utilizing boundary checking
Kong et al. Improving software security via runtime instruction-level taint checking
Gupta et al. Marlin: Mitigating code reuse attacks using code randomization
US8407523B2 (en) Method for protecting software programs
CN109446799B (zh) 内存数据保护方法、安全组件和计算机设备及存储介质
Jurczyk et al. Identifying and exploiting windows kernel race conditions via memory access patterns
Feng et al. Stealth measurements for cheat detection in on-line games
Resh et al. Preventing execution of unauthorized native-code software
Brandão et al. Employment of secure enclaves in cheat detection hardening
Porter et al. Decker: Attack surface reduction via on-demand code mapping
CA2668547C (fr) Protection des programmes informatiques
Vinck et al. Sharing is caring: Secure and efficient shared memory support for mvees
EP2131299B1 (fr) Protection de programmes logiciels
Philippaerts et al. CPM: Masking code pointers to prevent code injection attacks
Gadaleta et al. Instruction-level countermeasures against stack-based buffer overflow attacks
Geden et al. RegGuard: Leveraging CPU registers for mitigation of control-and data-oriented attacks
EP2720170A1 (fr) Protection automatique contre exploitation d'ordinateur
Li et al. MagBox: Keep the risk functions running safely in a magic box

Legal Events

Date Code Title Description
EEER Examination request

Effective date: 20130412