HK1243525A1 - 通過二進制和存儲器分集混淆的系統和方法 - Google Patents
通過二進制和存儲器分集混淆的系統和方法Info
- Publication number
- HK1243525A1 HK1243525A1 HK18102955.9A HK18102955A HK1243525A1 HK 1243525 A1 HK1243525 A1 HK 1243525A1 HK 18102955 A HK18102955 A HK 18102955A HK 1243525 A1 HK1243525 A1 HK 1243525A1
- Authority
- HK
- Hong Kong
- Prior art keywords
- obfuscation
- binary
- memory diversity
- diversity
- memory
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/14—Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/4401—Bootstrapping
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
- G06F2009/45587—Isolation or security of virtual machine instances
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2125—Just-in-time application of countermeasures, e.g., on-the-fly decryption, just-in-time obfuscation or de-obfuscation
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Technology Law (AREA)
- Multimedia (AREA)
- Stored Programmes (AREA)
- Storage Device Security (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201562144092P | 2015-04-07 | 2015-04-07 | |
PCT/US2016/026335 WO2016164520A1 (en) | 2015-04-07 | 2016-04-07 | System and method of obfuscation through binary and memory diversity |
Publications (1)
Publication Number | Publication Date |
---|---|
HK1243525A1 true HK1243525A1 (zh) | 2018-07-13 |
Family
ID=57072891
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
HK18102955.9A HK1243525A1 (zh) | 2015-04-07 | 2018-03-01 | 通過二進制和存儲器分集混淆的系統和方法 |
Country Status (8)
Country | Link |
---|---|
US (1) | US10140130B2 (zh) |
EP (1) | EP3281104B1 (zh) |
JP (1) | JP6895666B2 (zh) |
KR (1) | KR102582628B1 (zh) |
CN (1) | CN108027737B (zh) |
CA (1) | CA2982867A1 (zh) |
HK (1) | HK1243525A1 (zh) |
WO (1) | WO2016164520A1 (zh) |
Families Citing this family (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10365937B2 (en) * | 2015-07-24 | 2019-07-30 | Red Hat Israel, Ltd. | Entropy increase by executable loader |
US10108798B1 (en) * | 2016-01-04 | 2018-10-23 | Smart Information Flow Technologies LLC | Methods and systems for defending against cyber-attacks |
US10089494B2 (en) * | 2016-06-09 | 2018-10-02 | LGS Innovations LLC | System and method for securing a network device |
US10082975B1 (en) | 2017-03-02 | 2018-09-25 | Micron Technology, Inc. | Obfuscation-enhanced memory encryption |
US11074339B2 (en) * | 2017-06-27 | 2021-07-27 | RAM Laboratories, Inc. | Software protection through code and control flow data hiding and obfuscation |
US10719610B2 (en) * | 2017-08-14 | 2020-07-21 | Blackberry Limited | Generating security manifests for software components using binary static analysis |
US20190065405A1 (en) * | 2017-08-29 | 2019-02-28 | Qualcomm Incorporated | Security aware non-speculative memory |
GB2568527B (en) * | 2017-11-20 | 2020-04-15 | Trustonic Ltd | Address layout varying process |
CN108733990B (zh) * | 2018-05-22 | 2022-04-05 | 深圳壹账通智能科技有限公司 | 一种基于区块链的文件保护方法及终端设备 |
US10904284B2 (en) | 2018-09-14 | 2021-01-26 | International Business Machines Corporation | Enabling software distribution |
US10545850B1 (en) | 2018-10-18 | 2020-01-28 | Denso International America, Inc. | System and methods for parallel execution and comparison of related processes for fault protection |
EP3660715A1 (en) * | 2018-11-30 | 2020-06-03 | Conax AS | Protecting sensitive data in a software program |
CN110389724B (zh) * | 2019-07-23 | 2023-06-06 | 深圳忆联信息系统有限公司 | 基于固态硬盘的parity page识别方法和装置 |
CN110457948A (zh) * | 2019-08-13 | 2019-11-15 | 中科天御(苏州)科技有限公司 | 一种基于存储指令随机化的动态数据防护方法及系统 |
KR20210112923A (ko) | 2020-03-06 | 2021-09-15 | 삼성전자주식회사 | 시스템 온 칩 및 이의 동작 방법 |
CN111459889B (zh) * | 2020-03-08 | 2023-06-16 | 中电海康集团有限公司 | 一种用于物联网平台的设备数据模型生成方法和装置 |
US11693760B2 (en) * | 2020-12-21 | 2023-07-04 | RunSafe Security, Inc. | System and methods for live debugging of transformed binaries |
US11720474B2 (en) * | 2020-12-21 | 2023-08-08 | RunSafe Security, Inc. | System and methods for post mortem debugging of transformed binaries |
Family Cites Families (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4568489B2 (ja) * | 2003-09-11 | 2010-10-27 | 富士通株式会社 | プログラム保護方法、プログラム保護プログラムおよびプログラム保護装置 |
JP4514473B2 (ja) * | 2004-02-23 | 2010-07-28 | 富士通株式会社 | コンピュータシステム、中央装置及びプログラム実行方法 |
US20050268189A1 (en) * | 2004-05-28 | 2005-12-01 | Hewlett-Packard Development Company, L.P. | Device testing using multiple test kernels |
JP4575350B2 (ja) * | 2006-02-14 | 2010-11-04 | レノボ・シンガポール・プライベート・リミテッド | コンピューター・システム内で悪意あるソフトウェアの実行を防止するための方法 |
US8694797B2 (en) * | 2006-02-14 | 2014-04-08 | Lenovo (Sinapore) Pte Ltd | Method for preventing malicious software from execution within a computer system |
US8041958B2 (en) * | 2006-02-14 | 2011-10-18 | Lenovo (Singapore) Pte. Ltd. | Method for preventing malicious software from execution within a computer system |
US8176337B2 (en) * | 2008-03-12 | 2012-05-08 | Apple Inc. | Computer object code obfuscation using boot installation |
WO2013176711A2 (en) * | 2012-02-15 | 2013-11-28 | The Trustees Of Columbia University In The City Of New York | Methods, systems, and media for inhibiting attacks on embedded devices |
US8904190B2 (en) | 2010-10-20 | 2014-12-02 | Advanced Micro Devices, Inc. | Method and apparatus including architecture for protecting sensitive code and data |
JP5772031B2 (ja) * | 2011-02-08 | 2015-09-02 | 富士通株式会社 | 通信装置およびセキュアモジュール |
US8775826B2 (en) | 2011-02-09 | 2014-07-08 | Apple Inc. | Counteracting memory tracing on computing systems by code obfuscation |
US8812868B2 (en) * | 2011-03-21 | 2014-08-19 | Mocana Corporation | Secure execution of unsecured apps on a device |
US20120260106A1 (en) | 2011-04-07 | 2012-10-11 | Apple Inc. | System and method for binary layout randomization |
US8615735B2 (en) * | 2011-05-03 | 2013-12-24 | Apple Inc. | System and method for blurring instructions and data via binary obfuscation |
US8751823B2 (en) * | 2011-08-01 | 2014-06-10 | Apple Inc. | System and method for branch function based obfuscation |
US8694738B2 (en) * | 2011-10-11 | 2014-04-08 | Mcafee, Inc. | System and method for critical address space protection in a hypervisor environment |
CN102412963B (zh) * | 2011-12-30 | 2014-06-18 | 桂林电子科技大学 | 基于随机序列的具有误导功能的加密方法 |
US10193927B2 (en) * | 2012-02-27 | 2019-01-29 | University Of Virginia Patent Foundation | Method of instruction location randomization (ILR) and related system |
US9122873B2 (en) * | 2012-09-14 | 2015-09-01 | The Research Foundation For The State University Of New York | Continuous run-time validation of program execution: a practical approach |
CN103823664B (zh) * | 2012-11-19 | 2017-12-15 | 中兴通讯股份有限公司 | 一种二进制合一Boot程序及内核程序的设计方法 |
CN103150493B (zh) * | 2013-02-28 | 2016-06-22 | 浙江中控技术股份有限公司 | 一种JavaScript代码的混淆方法和装置 |
CN103324872B (zh) * | 2013-07-12 | 2016-04-27 | 上海交通大学 | 基于指令混淆的Android应用程序保护方法及系统 |
US9147070B2 (en) | 2013-08-12 | 2015-09-29 | Cisco Technology, Inc. | Binary translation and randomization system for application security |
CN103544414B (zh) * | 2013-10-25 | 2015-08-19 | 江苏通付盾信息科技有限公司 | 一种Android系统应用的深度代码混淆方法 |
CN104573427B (zh) * | 2015-01-06 | 2017-09-08 | 北京邮电大学 | 一种可执行应用的混淆方法和装置 |
-
2016
- 2016-04-07 CN CN201680030156.1A patent/CN108027737B/zh active Active
- 2016-04-07 CA CA2982867A patent/CA2982867A1/en not_active Abandoned
- 2016-04-07 US US15/093,269 patent/US10140130B2/en active Active
- 2016-04-07 EP EP16777240.9A patent/EP3281104B1/en active Active
- 2016-04-07 KR KR1020177032249A patent/KR102582628B1/ko active IP Right Grant
- 2016-04-07 WO PCT/US2016/026335 patent/WO2016164520A1/en unknown
- 2016-04-07 JP JP2017553185A patent/JP6895666B2/ja active Active
-
2018
- 2018-03-01 HK HK18102955.9A patent/HK1243525A1/zh unknown
Also Published As
Publication number | Publication date |
---|---|
WO2016164520A1 (en) | 2016-10-13 |
EP3281104B1 (en) | 2024-01-24 |
CN108027737A (zh) | 2018-05-11 |
US10140130B2 (en) | 2018-11-27 |
JP2018517965A (ja) | 2018-07-05 |
CN108027737B (zh) | 2021-07-27 |
EP3281104A1 (en) | 2018-02-14 |
KR20180019515A (ko) | 2018-02-26 |
JP6895666B2 (ja) | 2021-06-30 |
US20160299765A1 (en) | 2016-10-13 |
CA2982867A1 (en) | 2016-10-13 |
KR102582628B1 (ko) | 2023-09-22 |
EP3281104A4 (en) | 2018-12-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
HK1243525A1 (zh) | 通過二進制和存儲器分集混淆的系統和方法 | |
HK1244921A1 (zh) | 加密和解密系統和方法 | |
SG11201707149UA (en) | Method and system for encryption | |
HK1258246A1 (zh) | 認證方法和系統 | |
SG11201708917SA (en) | Data processing method and system | |
GB201505500D0 (en) | Communications system and method | |
GB201514674D0 (en) | Distributed encryption system and method | |
GB2587113B (en) | System and method | |
GB201510480D0 (en) | System and method | |
SG10201609225QA (en) | Memory Devices And Methods | |
GB201515115D0 (en) | System and method | |
GB201803529D0 (en) | Radio-station-recommendation system and method | |
IL242717A0 (en) | Systems and methods for authentication of cache memory | |
GB201521577D0 (en) | Method and system | |
IL238694A0 (en) | A hologram-based communication system and method | |
GB201509030D0 (en) | Authentication methods and systems | |
GB201509031D0 (en) | Authentication methods and systems | |
GB201510272D0 (en) | Data processing system and method |