HK1173790A1 - 在受限應用執行環境中的應用執行 - Google Patents

在受限應用執行環境中的應用執行

Info

Publication number
HK1173790A1
HK1173790A1 HK13100634.7A HK13100634A HK1173790A1 HK 1173790 A1 HK1173790 A1 HK 1173790A1 HK 13100634 A HK13100634 A HK 13100634A HK 1173790 A1 HK1173790 A1 HK 1173790A1
Authority
HK
Hong Kong
Prior art keywords
application execution
restricted
environment
execution environment
restricted application
Prior art date
Application number
HK13100634.7A
Other languages
English (en)
Inventor
.雷厄森
.安德森
Original Assignee
微軟技術許可有限責任公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 微軟技術許可有限責任公司 filed Critical 微軟技術許可有限責任公司
Publication of HK1173790A1 publication Critical patent/HK1173790A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/468Specific access rights for resources, e.g. using capability register
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/541Interprogram communication via adapters, e.g. between incompatible applications
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/545Interprogram communication where tasks reside in different layers, e.g. user- and kernel-space
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2209/00Indexing scheme relating to G06F9/00
    • G06F2209/54Indexing scheme relating to G06F9/54
    • G06F2209/542Intercept
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Stored Programmes (AREA)
  • Debugging And Monitoring (AREA)
  • Storage Device Security (AREA)
HK13100634.7A 2010-12-27 2013-01-15 在受限應用執行環境中的應用執行 HK1173790A1 (zh)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US12/978,664 US8789138B2 (en) 2010-12-27 2010-12-27 Application execution in a restricted application execution environment

Publications (1)

Publication Number Publication Date
HK1173790A1 true HK1173790A1 (zh) 2013-05-24

Family

ID=46318664

Family Applications (1)

Application Number Title Priority Date Filing Date
HK13100634.7A HK1173790A1 (zh) 2010-12-27 2013-01-15 在受限應用執行環境中的應用執行

Country Status (6)

Country Link
US (3) US8789138B2 (zh)
EP (1) EP2659421B1 (zh)
CN (1) CN102609279B (zh)
HK (1) HK1173790A1 (zh)
TW (1) TWI533204B (zh)
WO (1) WO2012092111A2 (zh)

Families Citing this family (39)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2450792B1 (en) * 2010-10-22 2020-01-15 Orange Method for allowing distributed running of an application and related pre-processing unit
EP2450794B1 (en) 2010-10-22 2018-08-29 Orange Method for allowing distributed running of an application and related device and inference engine
US8789138B2 (en) 2010-12-27 2014-07-22 Microsoft Corporation Application execution in a restricted application execution environment
GB2508174B (en) * 2012-11-22 2015-04-08 F Secure Corp Detecting application behavior
US9521040B2 (en) 2013-04-03 2016-12-13 Salesforce.Com, Inc. System and method for generic configuration management system application programming interface
US9547689B2 (en) 2013-10-24 2017-01-17 Salesforce.Com, Inc. Security descriptors for record access queries
US9519466B2 (en) * 2013-12-20 2016-12-13 Oracle International Corporation Executable code for constrained computing environments
US9710316B1 (en) 2014-12-18 2017-07-18 Amazon Technologies, Inc. Flexible scripting platform for troubleshooting
US9785489B1 (en) * 2014-12-18 2017-10-10 Amazon Technologies, Inc. Secure script execution using sandboxed environments
WO2016122623A1 (en) * 2015-01-30 2016-08-04 Hewlett Packard Enterprise Development Lp Secure api communication
US10834054B2 (en) 2015-05-27 2020-11-10 Ping Identity Corporation Systems and methods for API routing and security
US11403099B2 (en) * 2015-07-27 2022-08-02 Sony Interactive Entertainment LLC Backward compatibility by restriction of hardware resources
US10235219B2 (en) 2015-07-27 2019-03-19 Sony Interactive Entertainment America Llc Backward compatibility by algorithm matching, disabling features, or throttling performance
US10419401B2 (en) * 2016-01-08 2019-09-17 Capital One Services, Llc Methods and systems for securing data in the public cloud
US10382491B2 (en) 2016-02-11 2019-08-13 CYBRIC, Inc. Continuous security delivery fabric
US10540498B2 (en) * 2016-08-12 2020-01-21 Intel Corporation Technologies for hardware assisted native malware detection
US10681012B2 (en) 2016-10-26 2020-06-09 Ping Identity Corporation Methods and systems for deep learning based API traffic security
US11443033B2 (en) 2017-01-24 2022-09-13 Microsoft Technology Licensing, Llc Abstract enclave identity
US11023292B1 (en) * 2017-08-02 2021-06-01 Styra, Inc. Method and apparatus for using a single storage structure to authorize APIs
US11681568B1 (en) 2017-08-02 2023-06-20 Styra, Inc. Method and apparatus to reduce the window for policy violations with minimal consistency assumptions
EP3471007B1 (en) 2017-10-13 2022-02-23 Ping Identity Corporation Methods and apparatus for analyzing sequences of application programming interface traffic to identify potential malicious actions
US10747587B2 (en) * 2017-10-30 2020-08-18 Microsoft Technology Licensing, Llc Dynamic rule-based transformation of API calls
US10452454B1 (en) 2018-06-07 2019-10-22 International Business Machines Corporation Instructing the use of application programming interface commands in a runtime environment
US11853463B1 (en) 2018-08-23 2023-12-26 Styra, Inc. Leveraging standard protocols to interface unmodified applications and services
US10719373B1 (en) 2018-08-23 2020-07-21 Styra, Inc. Validating policies and data in API authorization system
US11080410B1 (en) 2018-08-24 2021-08-03 Styra, Inc. Partial policy evaluation
US11080416B2 (en) * 2018-10-08 2021-08-03 Microsoft Technology Licensing, Llc Protecting selected disks on a computer system
US11477239B1 (en) 2018-10-16 2022-10-18 Styra, Inc. Simulating policies for authorizing an API
EP3678348A1 (en) 2019-01-04 2020-07-08 Ping Identity Corporation Methods and systems for data traffic based adpative security
US20220129542A1 (en) * 2019-03-05 2022-04-28 Intel Corporation Deterministic trusted execution container through managed runtime language metadata
US11593525B1 (en) 2019-05-10 2023-02-28 Styra, Inc. Portable policy execution using embedded machines
US11502992B1 (en) 2020-01-27 2022-11-15 Styra, Inc. Local controller and local agent for local API authorization
US11645423B1 (en) 2020-03-02 2023-05-09 Styra, Inc. Method and apparatus for distributing policies for authorizing APIs
WO2021236083A1 (en) * 2020-05-21 2021-11-25 Hewlett-Packard Development Company, L.P. Call modification based on policies
US12003543B1 (en) 2020-07-24 2024-06-04 Styra, Inc. Method and system for modifying and validating API requests
US11513778B1 (en) 2020-08-14 2022-11-29 Styra, Inc. Graphical user interface and system for defining and maintaining code-based policies
EP4204972A4 (en) * 2020-08-31 2024-03-06 Seraphic Algorithms Ltd. METHOD AND SYSTEM FOR EXPLOIT PREVENTION AND MALICIOUS CODE NEUTRALIZATION FOR JAVASCRIPT ENABLED APPLICATIONS
US11593363B1 (en) 2020-09-23 2023-02-28 Styra, Inc. Comprehension indexing feature
US11520579B1 (en) 2020-11-30 2022-12-06 Styra, Inc. Automated asymptotic analysis

Family Cites Families (58)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5974549A (en) * 1997-03-27 1999-10-26 Soliton Ltd. Security monitor
US7017188B1 (en) 1998-11-16 2006-03-21 Softricity, Inc. Method and apparatus for secure content delivery over broadband access networks
US7225264B2 (en) 1998-11-16 2007-05-29 Softricity, Inc. Systems and methods for delivering content over a computer network
US6763370B1 (en) 1998-11-16 2004-07-13 Softricity, Inc. Method and apparatus for content protection in a secure content delivery system
US7370071B2 (en) 2000-03-17 2008-05-06 Microsoft Corporation Method for serving third party software applications from servers to client computers
US6938096B1 (en) 1999-04-12 2005-08-30 Softricity, Inc. Method and system for remote networking using port proxying by detecting if the designated port on a client computer is blocked, then encapsulating the communications in a different format and redirecting to an open port
US7200632B1 (en) 1999-04-12 2007-04-03 Softricity, Inc. Method and system for serving software applications to client computers
US7730169B1 (en) 1999-04-12 2010-06-01 Softricity, Inc. Business method and system for serving third party software applications
US6745385B1 (en) 1999-09-01 2004-06-01 Microsoft Corporation Fixing incompatible applications by providing stubs for APIs
US7032213B1 (en) 1999-09-01 2006-04-18 Microsoft Corporation Fixing incompatible applications using a light debugger
US7398532B1 (en) * 2000-03-02 2008-07-08 Hewlett-Packard Development Company, L.P. System and method for establishing a secure execution environment for a software process
GB0011020D0 (en) * 2000-05-09 2000-06-28 Ibm Intercepting system API calls
US6721809B1 (en) 2000-08-21 2004-04-13 Oracle International Corporation Method and apparatus for configuring extensible application programming interfaces
US7107587B1 (en) 2000-09-18 2006-09-12 Microsoft Corporation Access redirector and entry reflector
US7055146B1 (en) * 2001-03-08 2006-05-30 Microsoft Corporation Method and system for dynamically inserting modifications for identified programs
US7028305B2 (en) 2001-05-16 2006-04-11 Softricity, Inc. Operating system abstraction and protection layer
US20040083465A1 (en) 2002-10-28 2004-04-29 Weijia Zhang Method and system for connecting to an application programming interface
US20040267778A1 (en) * 2003-06-27 2004-12-30 Microsoft Corporation Media foundation topology application programming interface
US7590743B2 (en) 2003-12-23 2009-09-15 Softricity, Inc. Method and system for associating a process on a multi-user device with a host address unique to a user session associated with the process
US7376970B2 (en) * 2004-02-20 2008-05-20 Microsoft Corporation System and method for proactive computer virus protection
WO2006020094A2 (en) 2004-07-20 2006-02-23 Softricity, Inc. Method and system for minimizing loss in a computer application
US7984192B2 (en) * 2004-09-27 2011-07-19 Citrix Systems, Inc. System and method for assigning unique identifiers to each remote display protocol session established via an intermediary device
US7831995B2 (en) * 2004-10-29 2010-11-09 CORE, SDI, Inc. Establishing and enforcing security and privacy policies in web-based applications
WO2006101549A2 (en) * 2004-12-03 2006-09-28 Whitecell Software, Inc. Secure system for allowing the execution of authorized computer program code
US8549149B2 (en) * 2004-12-30 2013-10-01 Citrix Systems, Inc. Systems and methods for providing client-side accelerated access to remote applications via TCP multiplexing
US7587724B2 (en) * 2005-07-13 2009-09-08 Symantec Corporation Kernel validation layer
US20070094496A1 (en) * 2005-10-25 2007-04-26 Michael Burtscher System and method for kernel-level pestware management
US7941813B1 (en) * 2006-02-17 2011-05-10 Parallels Holdings, Ltd. System and method for using virtual machine for driver installation sandbox
US7765307B1 (en) * 2006-02-28 2010-07-27 Symantec Operating Corporation Bulk network transmissions using multiple connections primed to optimize transfer parameters
US8181244B2 (en) * 2006-04-20 2012-05-15 Webroot Inc. Backward researching time stamped events to find an origin of pestware
US7877806B2 (en) * 2006-07-28 2011-01-25 Symantec Corporation Real time malicious software detection
US8392996B2 (en) * 2006-08-08 2013-03-05 Symantec Corporation Malicious software detection
US8769674B2 (en) * 2006-09-07 2014-07-01 Symantec Corporation Instant message scanning
US7761485B2 (en) * 2006-10-25 2010-07-20 Zeugma Systems Inc. Distributed database
US9396328B2 (en) * 2007-01-11 2016-07-19 Symantec Corporation Determining a contributing entity for a window
AU2008202532A1 (en) * 2007-06-18 2009-01-08 Pc Tools Technology Pty Ltd Method of detecting and blocking malicious activity
US8272041B2 (en) 2007-06-21 2012-09-18 International Business Machines Corporation Firewall control via process interrogation
JP5065805B2 (ja) * 2007-08-10 2012-11-07 京セラドキュメントソリューションズ株式会社 電子機器、サービス提供方法及びプログラム
US8245289B2 (en) * 2007-11-09 2012-08-14 International Business Machines Corporation Methods and systems for preventing security breaches
US8438542B2 (en) * 2007-12-17 2013-05-07 Microsoft Corporation Generating a management pack at program build time
US20100175104A1 (en) * 2008-03-03 2010-07-08 Khalid Atm Shafiqul Safe and secure program execution framework with guest application space
US8805995B1 (en) * 2008-05-23 2014-08-12 Symantec Corporation Capturing data relating to a threat
US20090319674A1 (en) 2008-06-24 2009-12-24 Microsoft Corporation Techniques to manage communications between relay servers
US8473941B2 (en) * 2008-07-08 2013-06-25 Sandisk Il Ltd. Dynamic file system restriction for portable storage devices
US8448255B2 (en) * 2008-07-14 2013-05-21 Apple Inc. Secure file processing
US8286197B2 (en) * 2008-07-17 2012-10-09 Sharp Laboratories Of America, Inc. Method and system for comprehensive socket application programming interface loopback processing
US8935789B2 (en) * 2008-07-21 2015-01-13 Jayant Shukla Fixing computer files infected by virus and other malware
US8775333B1 (en) * 2008-08-20 2014-07-08 Symantec Corporation Systems and methods for generating a threat classifier to determine a malicious process
GB2475011B (en) * 2008-09-09 2013-06-26 Kace Networks Inc Deployment and management of virtual containers
US8032742B2 (en) * 2008-12-05 2011-10-04 Unisys Corporation Dynamic updating of trusted certificates and certificate revocation lists in a computing system
CN101458630B (zh) * 2008-12-30 2011-07-27 中国科学院软件研究所 一种基于硬件模拟器的自修改代码识别方法
US8407787B1 (en) * 2009-01-22 2013-03-26 Trend Micro Incorporated Computer apparatus and method for non-intrusive inspection of program behavior
US8510838B1 (en) * 2009-04-08 2013-08-13 Trend Micro, Inc. Malware protection using file input/output virtualization
US8224796B1 (en) * 2009-09-11 2012-07-17 Symantec Corporation Systems and methods for preventing data loss on external devices
US8479286B2 (en) * 2009-12-15 2013-07-02 Mcafee, Inc. Systems and methods for behavioral sandboxing
US8578487B2 (en) * 2010-11-04 2013-11-05 Cylance Inc. System and method for internet security
US8438640B1 (en) * 2010-12-21 2013-05-07 Adobe Systems Incorporated Method and apparatus for reverse patching of application programming interface calls in a sandbox environment
US8789138B2 (en) 2010-12-27 2014-07-22 Microsoft Corporation Application execution in a restricted application execution environment

Also Published As

Publication number Publication date
US8789138B2 (en) 2014-07-22
TW201227502A (en) 2012-07-01
US9443080B2 (en) 2016-09-13
CN102609279B (zh) 2015-06-17
WO2012092111A3 (en) 2013-01-17
US20140250494A1 (en) 2014-09-04
US20140304771A1 (en) 2014-10-09
TWI533204B (zh) 2016-05-11
EP2659421A4 (en) 2015-04-29
WO2012092111A2 (en) 2012-07-05
US20120167121A1 (en) 2012-06-28
EP2659421A2 (en) 2013-11-06
US9443079B2 (en) 2016-09-13
CN102609279A (zh) 2012-07-25
EP2659421B1 (en) 2019-11-06

Similar Documents

Publication Publication Date Title
HK1173790A1 (zh) 在受限應用執行環境中的應用執行
GB2486891B (en) A fan
GB2483448B (en) A fan
GB201305501D0 (en) Performing a multiply-multiply-accumulate instruction
GB2486892B (en) A fan
SG10201406545TA (en) A well
GB201009606D0 (en) Software application development tool
GB201004813D0 (en) A fan
GB201004814D0 (en) A fan
EP2656210A4 (en) PROVIDING A USER-BASED APPLICATION EXPERIENCE
GB2486890B (en) A fan
GB2482521B (en) A fastener
EP2611352A4 (en) DISHWASHER
GB2486889B (en) A fan
EP2524470A4 (en) COMMUNICATIONS IN A POST-TO-POST COMPUTING ENVIRONMENT
EP2504772A4 (en) CONNECTION OF RESOURCES IN A COMMON COMPUTER ENVIRONMENT
GB201007327D0 (en) A fireseal
GB2491793B (en) A buffer
GB2486738B (en) Instruction execution
KR101209432B9 (ko) 복근재활기구
GB201003609D0 (en) A phantom
GB201002966D0 (en) A bedchair
GB201004349D0 (en) A parts washer
GB2486737B (en) Instruction execution
AU335771S (en) A sawhorse