DE19944991B4 - Verfahren zur Sicherung eines Programmablaufs - Google Patents
Verfahren zur Sicherung eines Programmablaufs Download PDFInfo
- Publication number
- DE19944991B4 DE19944991B4 DE19944991A DE19944991A DE19944991B4 DE 19944991 B4 DE19944991 B4 DE 19944991B4 DE 19944991 A DE19944991 A DE 19944991A DE 19944991 A DE19944991 A DE 19944991A DE 19944991 B4 DE19944991 B4 DE 19944991B4
- Authority
- DE
- Germany
- Prior art keywords
- program
- checksum
- calling
- subroutine
- parameters
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/28—Error detection; Error correction; Monitoring by checking the correct order of processing
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2151—Time stamp
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/448—Execution paradigms, e.g. implementations of programming paradigms
- G06F9/4482—Procedural
- G06F9/4484—Executing subprograms
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Quality & Reliability (AREA)
- Detection And Correction Of Errors (AREA)
- Storage Device Security (AREA)
- Debugging And Monitoring (AREA)
Priority Applications (8)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| DE19944991A DE19944991B4 (de) | 1999-09-20 | 1999-09-20 | Verfahren zur Sicherung eines Programmablaufs |
| PCT/EP2000/009131 WO2001022223A1 (de) | 1999-09-20 | 2000-09-18 | Verfahren zur sicherung eines programmablaufs |
| RU2002109465/09A RU2254608C2 (ru) | 1999-09-20 | 2000-09-18 | Способ защиты хода выполнения программы |
| JP2001525524A JP4732651B2 (ja) | 1999-09-20 | 2000-09-18 | プログラム実行を保護するための方法 |
| AU72884/00A AU7288400A (en) | 1999-09-20 | 2000-09-18 | Method for protecting a program flow |
| EP00960677.3A EP1224546B1 (de) | 1999-09-20 | 2000-09-18 | Verfahren zur sicherung eines programmablaufs |
| CNB008131139A CN1144126C (zh) | 1999-09-20 | 2000-09-18 | 保护程序流的方法 |
| US10/070,444 US6934887B1 (en) | 1999-09-20 | 2000-09-18 | Method for protecting a program flow |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| DE19944991A DE19944991B4 (de) | 1999-09-20 | 1999-09-20 | Verfahren zur Sicherung eines Programmablaufs |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| DE19944991A1 DE19944991A1 (de) | 2001-04-12 |
| DE19944991B4 true DE19944991B4 (de) | 2004-04-29 |
Family
ID=7922630
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| DE19944991A Expired - Lifetime DE19944991B4 (de) | 1999-09-20 | 1999-09-20 | Verfahren zur Sicherung eines Programmablaufs |
Country Status (8)
| Country | Link |
|---|---|
| US (1) | US6934887B1 (enExample) |
| EP (1) | EP1224546B1 (enExample) |
| JP (1) | JP4732651B2 (enExample) |
| CN (1) | CN1144126C (enExample) |
| AU (1) | AU7288400A (enExample) |
| DE (1) | DE19944991B4 (enExample) |
| RU (1) | RU2254608C2 (enExample) |
| WO (1) | WO2001022223A1 (enExample) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| DE102004021088A1 (de) * | 2004-04-29 | 2005-11-17 | Giesecke & Devrient Gmbh | Verfahren zum Schützen von Daten eines Datenträgers gegen DFA-Angriffe |
Families Citing this family (25)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| AU2002340566A1 (en) | 2001-10-17 | 2003-04-28 | Infineon Technologies Ag | Method and device for guaranteeing a calculation in a cryptographic algorithm |
| WO2003034268A2 (de) | 2001-10-17 | 2003-04-24 | Infineon Technologies Ag | Verfahren und vorrichtung zum absichern einer exponentiations-berechnung mittels dem chinesischen restsatz (crt) |
| CN1682484B (zh) * | 2002-09-11 | 2012-03-21 | 德国捷德有限公司 | 受保护的密码计算 |
| FR2857473B1 (fr) * | 2003-07-11 | 2005-09-16 | Oberthur Card Syst Sa | Procede de securisation de l'execution d'un programme informatique, notamment dans une carte a microcircuit |
| JP2006018765A (ja) * | 2004-07-05 | 2006-01-19 | Infocom Corp | ソフトウエアの一時的な修正方法およびプログラム |
| US8347078B2 (en) | 2004-10-18 | 2013-01-01 | Microsoft Corporation | Device certificate individualization |
| US8887287B2 (en) * | 2004-10-27 | 2014-11-11 | Alcatel Lucent | Method and apparatus for software integrity protection using timed executable agents |
| US8336085B2 (en) | 2004-11-15 | 2012-12-18 | Microsoft Corporation | Tuning product policy using observed evidence of customer behavior |
| US8464348B2 (en) * | 2004-11-15 | 2013-06-11 | Microsoft Corporation | Isolated computing environment anchored into CPU and motherboard |
| US8176564B2 (en) | 2004-11-15 | 2012-05-08 | Microsoft Corporation | Special PC mode entered upon detection of undesired state |
| US8438645B2 (en) | 2005-04-27 | 2013-05-07 | Microsoft Corporation | Secure clock with grace periods |
| US9436804B2 (en) | 2005-04-22 | 2016-09-06 | Microsoft Technology Licensing, Llc | Establishing a unique session key using a hardware functionality scan |
| US8353046B2 (en) | 2005-06-08 | 2013-01-08 | Microsoft Corporation | System and method for delivery of a modular operating system |
| EP1739519A1 (en) * | 2005-06-30 | 2007-01-03 | Axalto SA | Method to secure the execution of a program against attacks by radiation or other |
| JP4844102B2 (ja) * | 2005-11-30 | 2011-12-28 | 富士ゼロックス株式会社 | サブプログラム及びそのサブプログラムを実行する情報処理装置 |
| JP4783163B2 (ja) * | 2006-01-19 | 2011-09-28 | Okiセミコンダクタ株式会社 | マイクロコントローラ |
| WO2008040377A1 (en) * | 2006-10-06 | 2008-04-10 | Agere Systems Inc. | Protecting secret information in a programmed electronic device |
| FR2910144A1 (fr) * | 2006-12-18 | 2008-06-20 | St Microelectronics Sa | Procede et dispositif de detection errones au cours de l'execution d'un programme. |
| CN102183896B (zh) * | 2010-12-07 | 2015-11-25 | 北京广利核系统工程有限公司 | 一种利用Matlab测试核电站保护逻辑的系统 |
| FR2990533B1 (fr) * | 2012-05-09 | 2015-02-13 | Morpho | Procede de suivi d'execution d'un logiciel et logiciel pour la mise en oeuvre du procede |
| DE102014018208A1 (de) * | 2014-12-08 | 2016-06-09 | Giesecke & Devrient Gmbh | Verfahren zum Betreiben eines Sicherheitsmoduls |
| FR3030084B1 (fr) | 2014-12-12 | 2018-02-09 | Oberthur Technologies | Procede d’execution d’un programme par un processeur et entite electronique comportant un tel processeur |
| RU2591020C1 (ru) * | 2015-06-01 | 2016-07-10 | Российская Федерация, от имени которой выступает Государственная корпорация по атомной энергии "Росатом" (Госкорпорация "Росатом") | Способ контроля хода выполнения программы пользователя, исполняющейся на вычислительных узлах вычислительной системы |
| WO2017071763A1 (en) * | 2015-10-29 | 2017-05-04 | Hewlett-Packard Development Company, L.P. | Checking a security value calculated for a part of a program code |
| FR3134907A1 (fr) | 2022-04-26 | 2023-10-27 | STMicroelectronics (Grand Ouest) SAS | Procédé de surveillance d’une exécution d’une portion de code programme et système sur puce correspondant |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| DE3502387C2 (enExample) * | 1985-01-25 | 1988-03-31 | Kloeckner-Moeller Elektrizitaets Gmbh, 5300 Bonn, De | |
| DE19701166A1 (de) * | 1997-01-15 | 1998-07-23 | Siemens Ag | Verfahren zur Überwachung der bestimmungsgemäßen Ausführung von Softwareprogrammen |
Family Cites Families (14)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| SU1191912A1 (ru) * | 1984-05-16 | 1985-11-15 | Рыбинский Авиационный Технологический Институт | Устройство дл контрол хода программ |
| JPH04127340A (ja) * | 1990-09-19 | 1992-04-28 | Canon Inc | 電子機器 |
| JP2721294B2 (ja) * | 1993-01-29 | 1998-03-04 | 本田技研工業株式会社 | コンピュータシステムのオンライン監視システム |
| JPH0784786A (ja) * | 1993-09-09 | 1995-03-31 | Casio Comput Co Ltd | プログラム実行制御方法 |
| EP0686916A1 (en) | 1994-06-07 | 1995-12-13 | Digital Equipment Corporation | Method and apparatus for testing software |
| US5768591A (en) | 1995-09-08 | 1998-06-16 | Iq Systems | Method of de-bugging host-processor software in a distributed processing system having a host processor and at least one object oriented processor |
| US5757914A (en) * | 1995-10-26 | 1998-05-26 | Sun Microsystems, Inc. | System and method for protecting use of dynamically linked executable modules |
| JPH09160807A (ja) | 1995-12-06 | 1997-06-20 | Mitsuba Corp | マイクロプロセッサの誤動作検出方法 |
| US5909580A (en) | 1996-02-08 | 1999-06-01 | Inprise Corporation | Development system and methods with direct compiler support for detecting invalid use and management of resources and memory at runtime |
| JP3683031B2 (ja) * | 1996-04-17 | 2005-08-17 | 株式会社リコー | プログラム保護装置 |
| JPH11215120A (ja) * | 1998-01-27 | 1999-08-06 | Fujitsu Ltd | 通信装置 |
| US6654954B1 (en) * | 1998-02-17 | 2003-11-25 | International Business Machines Corporation | Computer system, program product and method utilizing executable file with alternate program code attached as a file attribute |
| US6314532B1 (en) * | 1998-12-04 | 2001-11-06 | Lucent Technologies Inc. | Method and system for recovering from a software failure |
| US6766458B1 (en) * | 2000-10-03 | 2004-07-20 | Networks Associates Technology, Inc. | Testing a computer system |
-
1999
- 1999-09-20 DE DE19944991A patent/DE19944991B4/de not_active Expired - Lifetime
-
2000
- 2000-09-18 CN CNB008131139A patent/CN1144126C/zh not_active Expired - Fee Related
- 2000-09-18 US US10/070,444 patent/US6934887B1/en not_active Expired - Lifetime
- 2000-09-18 RU RU2002109465/09A patent/RU2254608C2/ru not_active IP Right Cessation
- 2000-09-18 JP JP2001525524A patent/JP4732651B2/ja not_active Expired - Fee Related
- 2000-09-18 WO PCT/EP2000/009131 patent/WO2001022223A1/de not_active Ceased
- 2000-09-18 EP EP00960677.3A patent/EP1224546B1/de not_active Expired - Lifetime
- 2000-09-18 AU AU72884/00A patent/AU7288400A/en not_active Abandoned
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| DE3502387C2 (enExample) * | 1985-01-25 | 1988-03-31 | Kloeckner-Moeller Elektrizitaets Gmbh, 5300 Bonn, De | |
| DE19701166A1 (de) * | 1997-01-15 | 1998-07-23 | Siemens Ag | Verfahren zur Überwachung der bestimmungsgemäßen Ausführung von Softwareprogrammen |
Non-Patent Citations (1)
| Title |
|---|
| US-Z: IEEE Transaction on Computer-Aided Design, Vol. 9, 6/90, S. 665-669 * |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| DE102004021088A1 (de) * | 2004-04-29 | 2005-11-17 | Giesecke & Devrient Gmbh | Verfahren zum Schützen von Daten eines Datenträgers gegen DFA-Angriffe |
Also Published As
| Publication number | Publication date |
|---|---|
| WO2001022223A1 (de) | 2001-03-29 |
| RU2254608C2 (ru) | 2005-06-20 |
| JP4732651B2 (ja) | 2011-07-27 |
| AU7288400A (en) | 2001-04-24 |
| US6934887B1 (en) | 2005-08-23 |
| EP1224546B1 (de) | 2015-09-02 |
| CN1144126C (zh) | 2004-03-31 |
| CN1375084A (zh) | 2002-10-16 |
| DE19944991A1 (de) | 2001-04-12 |
| JP2003510684A (ja) | 2003-03-18 |
| EP1224546A1 (de) | 2002-07-24 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| DE19944991B4 (de) | Verfahren zur Sicherung eines Programmablaufs | |
| DE102008014922B4 (de) | Speicher-Auslesesystem für eine Fahrzeugsteuervorrichtung | |
| EP2447843B1 (de) | Verfahren zur Verifizierung eines Anwendungsprogramms einer fehlersicheren Speicherprogrammierbaren Steuerung, und Speicherprogrammierbare Steuerung zur Ausführung des Verfahrens | |
| WO2009021789A1 (de) | Verfahren und vorrichtung zur sicherung eines programms gegen eine kontrollflussmanipulation und gegen einen fehlerhaften programmablauf | |
| DE3521081A1 (de) | Mikrocomputeranordnung | |
| EP0011685A1 (de) | Programmierbare Speicherschutzeinrichtung für Mikroprozessorsysteme und Schaltungsanordnung mit einer derartigen Einrichtung | |
| DE19839680B4 (de) | Verfahren und Vorrichtung zur Veränderung des Speicherinhalts von Steuergeräten | |
| DE19701166A1 (de) | Verfahren zur Überwachung der bestimmungsgemäßen Ausführung von Softwareprogrammen | |
| EP0067364B1 (de) | Verfahren und Anordnung zum nichtflüchtigen Speichern des Zählerstandes einer elektronischen Zählschaltung | |
| EP1012003B1 (de) | Verfahren und vorrichtung zur steuerung der datenübertragung zwischen zwei in einem kraftfahrzeug vorhandenen modulen | |
| EP1449084B1 (de) | Kontrollierte programmausführung durch einen tragbaren datenträger | |
| EP0615211B1 (de) | Verfahren zum Speichern sicherheitsrelevanter Daten | |
| EP1664978B1 (de) | Vorrichtung und verfahren zur sicheren ausführung eines programmes | |
| WO2021233696A1 (de) | Verfahren zur sicheren nutzung von kryptografischem material | |
| DE102005016050A1 (de) | Speicherfehlererkennungsvorrichtung und Verfahren zum Erkennen eines Speicherfehlers | |
| DE3926377A1 (de) | Elektronisches steuergeraet fuer eine brennkraftmaschine | |
| DE102010026392B4 (de) | Verfahren zur sicheren Parametrierung eines Sicherheitsgeräts | |
| EP3127763A2 (de) | Verfahren zur betriebsvalidierung einer sensoreinheit, sensoreinheit und tachographsystem | |
| EP0834175B1 (de) | Verfahren zum betreiben eines steuergerätes mit einer programmierbaren speichereinrichtung | |
| EP1293858B1 (de) | Verfahren zum Schutz eines Mikrorechner-Systems gegen Manipulation seines Programms | |
| EP1274097B1 (de) | Überprüfung von in einer Speicheranordnung abgelegten Daten | |
| DE102005016051B4 (de) | Speicherüberprüfungsvorrichtung und Verfahren zum Überprüfen eines Speichers | |
| DE10148157B4 (de) | Programmgesteuerte Einheit | |
| DE102023114064A1 (de) | Sicherheitssystem mit einem Sicherheitskanal zur Ausführung und Verwaltung von Sicherheitsfunktionen | |
| DE202023102955U1 (de) | Sicherheitssystem mit einem Sicherheitskanal zur Ausführung und Verwaltung von Sicherheitsfunktionen |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| OP8 | Request for examination as to paragraph 44 patent law | ||
| 8364 | No opposition during term of opposition | ||
| R084 | Declaration of willingness to licence | ||
| R081 | Change of applicant/patentee |
Owner name: GIESECKE+DEVRIENT MOBILE SECURITY GMBH, DE Free format text: FORMER OWNER: GIESECKE & DEVRIENT GMBH, 81677 MUENCHEN, DE |
|
| R071 | Expiry of right |