ES2527581T3 - Procedimiento de protección de la ejecución de un código informático mediante redundancia dinámica - Google Patents

Procedimiento de protección de la ejecución de un código informático mediante redundancia dinámica Download PDF

Info

Publication number
ES2527581T3
ES2527581T3 ES11752574.1T ES11752574T ES2527581T3 ES 2527581 T3 ES2527581 T3 ES 2527581T3 ES 11752574 T ES11752574 T ES 11752574T ES 2527581 T3 ES2527581 T3 ES 2527581T3
Authority
ES
Spain
Prior art keywords
redundancy
execution
function
executed
counter
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
ES11752574.1T
Other languages
English (en)
Inventor
Karine Villegas
Laurent Gauteron
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Thales DIS France SA
Original Assignee
Gemalto SA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gemalto SA filed Critical Gemalto SA
Application granted granted Critical
Publication of ES2527581T3 publication Critical patent/ES2527581T3/es
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/75Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation
    • G06F21/755Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation with measures against power attack

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Hardware Redundancy (AREA)
  • Retry When Errors Occur (AREA)

Abstract

Procedimiento de proteccion de la ejecución de un c6digo informatico por un microprocesador, estando dividido dicho codigo en funciones elementales (1, 2, 3, 4, 5, 6), comprendiendo dicha ejecución la utilización de un contador, llamado NC, actualizado (11, 12, 13, 14, 15) despues de la ejecución de cada dicha función elemental, y de al menos dos variables de protección r0 y r1, caracterizado porque comprende al menos las etapas de: inicialización de las variables de protección, identificación de un punto de redundancia, despues de cada incremento de contador NC, por la aplicacion de una función de comparación FC a dicho contador NC y a dicha variable, Desencadenamiento de una etapa de redundancia cuando dicha función de comparación FC devuelve un exito, consistiendo dicha etapa de redundancia en la aplicacion de una función booleanas "SENS" a la citada variable r1, y en un inicio, en función del valor de retorno de dicha función SENS, de una función "redundancia posterior" o de as funciones elementales ya ejecutadas antes de que el punto de redundancia sea ejecutado de nuevo, o de una función "redundancia anterior" o las funciones elementales ejecutadas despues de que el punto de redundancia identificado sea ejecutado de nuevo, reanudación de la ejecución de dichas funciones elementales que queden eventualmente por ejecutar.

Description

imagen1
imagen2
imagen3
imagen3
imagen3
imagen3

Claims (1)

  1. imagen1
    imagen2
ES11752574.1T 2010-10-21 2011-09-09 Procedimiento de protección de la ejecución de un código informático mediante redundancia dinámica Active ES2527581T3 (es)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
EP10306148 2010-10-21
EP10306148A EP2450816A1 (fr) 2010-10-21 2010-10-21 Procédé de sécurisation de l'exécution d'un code informatique par redondance dynamique
PCT/EP2011/065679 WO2012052228A1 (fr) 2010-10-21 2011-09-09 Procede de securisation de l'execution d'un code informatique par redondance dynamique

Publications (1)

Publication Number Publication Date
ES2527581T3 true ES2527581T3 (es) 2015-01-27

Family

ID=43881027

Family Applications (1)

Application Number Title Priority Date Filing Date
ES11752574.1T Active ES2527581T3 (es) 2010-10-21 2011-09-09 Procedimiento de protección de la ejecución de un código informático mediante redundancia dinámica

Country Status (3)

Country Link
EP (2) EP2450816A1 (es)
ES (1) ES2527581T3 (es)
WO (1) WO2012052228A1 (es)

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1271317A1 (en) * 2001-06-29 2003-01-02 Nagracard S.A. System-on-chip with time redundancy operation
US7152193B2 (en) * 2002-08-13 2006-12-19 Lsi Logic Corporation Embedded sequence checking
US20100107245A1 (en) * 2008-10-29 2010-04-29 Microsoft Corporation Tamper-tolerant programs

Also Published As

Publication number Publication date
WO2012052228A1 (fr) 2012-04-26
EP2450816A1 (fr) 2012-05-09
EP2630605A1 (fr) 2013-08-28
EP2630605B1 (fr) 2014-08-06

Similar Documents

Publication Publication Date Title
USD703784S1 (en) Reticle for a riflescope or other projectile-weapon aiming device
USD753785S1 (en) Reticle for a riflescope or other projectile-weapon aiming device
WO2015200510A8 (en) Automated code lockdown to reduce attack surface for software
WO2016073625A3 (en) Data management system
WO2014193953A3 (en) Intraocular lens peripheral surgical systems
ES2552881B1 (es) Dispositivo portable y método de control mediante gestos
EP2759922A3 (en) Method of performing a function of a device based on motion of the device and device for performing the method
EP2733578A3 (en) User gesture input to wearable electronic device involving movement of device
EP2778854A3 (en) Wearable device and augmented reality device
CL2007003565A1 (es) Compuestos derivados de piperidinas sustituidas; composicion farmaceutica que comprende a dichos compuestos; y su uso para tratar una infeccion vih.
ATE519514T1 (de) Nadelschutzvorrichtung
BRPI0510480A (pt) dispositivo de injeção
WO2011159739A3 (en) Register mapping techniques for efficient dynamic binary translation
WO2008013826A3 (en) User space virtualization system
EP2164017A3 (en) Automatic hardware-based recovery of a compromised computer
BRPI0610699A2 (pt) dispositivo de injeção
WO2010002526A3 (en) User defined names for displaying monitored location
CL2007002865A1 (es) Microparticulas que comprenden una sal de baja solubilidad de un bifosfonato, sal o hidrato del mismo, empotrado en una matriz polimerica, en donde la sal se selecciona de calcio, magnesio y zinc; procedimiento de preparacion; composicion farmaceutic
TW200627278A (en) Embedded sytsem, automatic loading system and method capable of automatically loading a root file system
MX349569B (es) Sistemas y metodos de reglas a base de riesgo para control de aplicaciones.
EP2590106A3 (en) Security and safety manager implementation in a multi-core processor
WO2013052175A3 (en) Military occupations and skills management system
BR112016020631A2 (pt) óxido de cério (iv) com excepcionais propriedades de remoção de arsênico
TW200731068A (en) Storage of transformed units of data in a memory system having fixed sized storage blocks
WO2014028663A3 (en) Protection scheme for embedded code