HK1218172A1 - 用於動態地控制對代碼的執行的計算機實現方法和系統 - Google Patents
用於動態地控制對代碼的執行的計算機實現方法和系統Info
- Publication number
- HK1218172A1 HK1218172A1 HK16106050.6A HK16106050A HK1218172A1 HK 1218172 A1 HK1218172 A1 HK 1218172A1 HK 16106050 A HK16106050 A HK 16106050A HK 1218172 A1 HK1218172 A1 HK 1218172A1
- Authority
- HK
- Hong Kong
- Prior art keywords
- execution
- code
- implemented method
- computer implemented
- controlling dynamically
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/70—Software maintenance or management
- G06F8/75—Structural analysis for program understanding
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6281—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database at program execution time, where the protection is within the operating system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/034—Test or assess a computer or a system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2125—Just-in-time application of countermeasures, e.g., on-the-fly decryption, just-in-time obfuscation or de-obfuscation
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP14305954.1A EP2958044B1 (en) | 2014-06-20 | 2014-06-20 | A computer implemented method and a system for controlling dynamically the execution of a code |
Publications (1)
Publication Number | Publication Date |
---|---|
HK1218172A1 true HK1218172A1 (zh) | 2017-02-03 |
Family
ID=51485531
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
HK16106050.6A HK1218172A1 (zh) | 2014-06-20 | 2016-05-27 | 用於動態地控制對代碼的執行的計算機實現方法和系統 |
Country Status (5)
Country | Link |
---|---|
US (1) | US10354064B2 (zh) |
EP (1) | EP2958044B1 (zh) |
CN (1) | CN107077562B (zh) |
HK (1) | HK1218172A1 (zh) |
WO (1) | WO2015193500A1 (zh) |
Families Citing this family (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10365937B2 (en) * | 2015-07-24 | 2019-07-30 | Red Hat Israel, Ltd. | Entropy increase by executable loader |
US10007787B2 (en) * | 2015-12-28 | 2018-06-26 | International Business Machines Corporation | Runtime return-oriented programming detection |
US10268601B2 (en) | 2016-06-17 | 2019-04-23 | Massachusetts Institute Of Technology | Timely randomized memory protection |
US10310991B2 (en) * | 2016-08-11 | 2019-06-04 | Massachusetts Institute Of Technology | Timely address space randomization |
CN106407809B (zh) * | 2016-09-20 | 2019-03-01 | 四川大学 | 一种Linux平台恶意软件检测方法 |
US10768979B2 (en) * | 2016-09-23 | 2020-09-08 | Apple Inc. | Peer-to-peer distributed computing system for heterogeneous device types |
US20180203885A1 (en) * | 2017-01-18 | 2018-07-19 | Microsoft Technology Licensing, Llc | Controlling creation/access of physically senses features |
CN107545174B (zh) * | 2017-08-22 | 2020-03-10 | 武汉大学 | 一种基于llvm的抵御控制流劫持的系统和方法 |
FR3071633B1 (fr) | 2017-09-22 | 2022-06-03 | Commissariat Energie Atomique | Procede d'execution d'un code machine d'une fonction securisee |
US10657025B2 (en) * | 2018-10-18 | 2020-05-19 | Denso International America, Inc. | Systems and methods for dynamically identifying data arguments and instrumenting source code |
US10628286B1 (en) | 2018-10-18 | 2020-04-21 | Denso International America, Inc. | Systems and methods for dynamically identifying program control flow and instrumenting source code |
KR102569820B1 (ko) * | 2018-10-25 | 2023-08-24 | 에스케이하이닉스 주식회사 | 메모리 컨트롤러 및 그 동작 방법 |
US11809563B2 (en) * | 2021-07-07 | 2023-11-07 | University Of South Florida | System and method for protecting against control-flow attacks |
CN116501378B (zh) * | 2023-06-27 | 2023-09-12 | 武汉大数据产业发展有限公司 | 一种逆向工程还原源代码的实现方法、装置和电子设备 |
CN117270878B (zh) * | 2023-11-22 | 2024-02-09 | 常熟理工学院 | 程序执行路径中程序变量的约束条件提取方法及设备 |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7721275B2 (en) * | 2004-05-14 | 2010-05-18 | Sap Ag | Data-flow based post pass optimization in dynamic compilers |
US7506217B2 (en) * | 2005-12-30 | 2009-03-17 | Intel Corporation | Apparatus and method for software-based control flow checking for soft error detection to improve microprocessor reliability |
US20090307500A1 (en) * | 2006-02-06 | 2009-12-10 | Taichi Sato | Program obfuscator |
US8046751B1 (en) * | 2007-01-11 | 2011-10-25 | The Mathworks, Inc. | Structuring unstructured regions in a control flow graph |
US8359583B2 (en) * | 2007-08-22 | 2013-01-22 | Coverity, Inc. | Methods for selectively pruning false paths in graphs that use high-precision state information |
CN102047261B (zh) * | 2008-05-30 | 2014-01-29 | Nxp股份有限公司 | 改编和执行计算机程序的方法及其计算机体系结构 |
US8285999B1 (en) * | 2008-12-05 | 2012-10-09 | The Research Foundation Of State University Of New York | System and method for authenticating remote execution |
US8516467B2 (en) * | 2010-01-29 | 2013-08-20 | Nintendo Co., Ltd. | Method and apparatus for enhancing comprehension of code time complexity and flow |
US9965744B1 (en) * | 2012-06-29 | 2018-05-08 | Google Llc | Automatic dynamic vetting of browser extensions and web applications |
US9298453B2 (en) * | 2012-07-03 | 2016-03-29 | Microsoft Technology Licensing, Llc | Source code analytics platform using program analysis and information retrieval |
US9824214B2 (en) * | 2014-08-15 | 2017-11-21 | Securisea, Inc. | High performance software vulnerabilities detection system and methods |
-
2014
- 2014-06-20 EP EP14305954.1A patent/EP2958044B1/en active Active
-
2015
- 2015-06-19 WO PCT/EP2015/063880 patent/WO2015193500A1/en active Application Filing
- 2015-06-19 US US15/317,325 patent/US10354064B2/en active Active
- 2015-06-19 CN CN201580033156.2A patent/CN107077562B/zh active Active
-
2016
- 2016-05-27 HK HK16106050.6A patent/HK1218172A1/zh unknown
Also Published As
Publication number | Publication date |
---|---|
WO2015193500A1 (en) | 2015-12-23 |
CN107077562A (zh) | 2017-08-18 |
US10354064B2 (en) | 2019-07-16 |
CN107077562B (zh) | 2020-11-06 |
US20170124322A1 (en) | 2017-05-04 |
EP2958044B1 (en) | 2019-09-18 |
EP2958044A1 (en) | 2015-12-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
HK1218172A1 (zh) | 用於動態地控制對代碼的執行的計算機實現方法和系統 | |
HUE039284T2 (hu) | Rendszer és eljárás haptikus visszacsatolás optimalizálására | |
GB2526255B (en) | Drilling system and method of operating a drilling system | |
GB201408703D0 (en) | Control system and method | |
GB2523199B (en) | Control system and method | |
GB201409181D0 (en) | Control system and method | |
GB201418017D0 (en) | A system for, and method of, building a taxonomy | |
GB2523193B (en) | Control system and method | |
GB201409141D0 (en) | Control system and method | |
HK1218945A1 (zh) | 風扇及其控制方法 | |
GB201402937D0 (en) | Control system and method | |
GB2542067B (en) | Method and system for controlling well operations | |
GB2523195B (en) | Control system and method | |
SG11201701605XA (en) | Controlling data processing tasks | |
GB2523203B (en) | Control System and method | |
GB2523198B (en) | Control System and method | |
EP2891783A4 (en) | WHEEL LOADER AND METHOD OF CONTROLLING WHEEL LOADER | |
TWI560536B (en) | Apparutus of fully-auto loader and control method thereof | |
GB201400380D0 (en) | Controlling the configuration of computer systems | |
HK1205804A1 (zh) | 種用於計算機系統的軟件自動部署方法 | |
GB2523194B (en) | Control system and method | |
GB201402881D0 (en) | Control system and method | |
GB2529722B (en) | Control system and method | |
EP3108797A4 (en) | Manipulator system and control method therefor | |
EP3176692A4 (en) | Instruction execution method and processor |