HK1243525A1 - 通過二進制和存儲器分集混淆的系統和方法 - Google Patents

通過二進制和存儲器分集混淆的系統和方法

Info

Publication number
HK1243525A1
HK1243525A1 HK18102955.9A HK18102955A HK1243525A1 HK 1243525 A1 HK1243525 A1 HK 1243525A1 HK 18102955 A HK18102955 A HK 18102955A HK 1243525 A1 HK1243525 A1 HK 1243525A1
Authority
HK
Hong Kong
Prior art keywords
obfuscation
binary
memory diversity
diversity
memory
Prior art date
Application number
HK18102955.9A
Other languages
English (en)
Inventor
Andrew Michael Wesie
Brian Sejoon Pak
Original Assignee
Runsafe Security Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Runsafe Security Inc filed Critical Runsafe Security Inc
Publication of HK1243525A1 publication Critical patent/HK1243525A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/14Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45587Isolation or security of virtual machine instances
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2125Just-in-time application of countermeasures, e.g., on-the-fly decryption, just-in-time obfuscation or de-obfuscation

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Stored Programmes (AREA)
  • Storage Device Security (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
HK18102955.9A 2015-04-07 2018-03-01 通過二進制和存儲器分集混淆的系統和方法 HK1243525A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201562144092P 2015-04-07 2015-04-07
PCT/US2016/026335 WO2016164520A1 (en) 2015-04-07 2016-04-07 System and method of obfuscation through binary and memory diversity

Publications (1)

Publication Number Publication Date
HK1243525A1 true HK1243525A1 (zh) 2018-07-13

Family

ID=57072891

Family Applications (1)

Application Number Title Priority Date Filing Date
HK18102955.9A HK1243525A1 (zh) 2015-04-07 2018-03-01 通過二進制和存儲器分集混淆的系統和方法

Country Status (8)

Country Link
US (1) US10140130B2 (zh)
EP (1) EP3281104B1 (zh)
JP (1) JP6895666B2 (zh)
KR (1) KR102582628B1 (zh)
CN (1) CN108027737B (zh)
CA (1) CA2982867A1 (zh)
HK (1) HK1243525A1 (zh)
WO (1) WO2016164520A1 (zh)

Families Citing this family (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10365937B2 (en) * 2015-07-24 2019-07-30 Red Hat Israel, Ltd. Entropy increase by executable loader
US10108798B1 (en) * 2016-01-04 2018-10-23 Smart Information Flow Technologies LLC Methods and systems for defending against cyber-attacks
US10089494B2 (en) * 2016-06-09 2018-10-02 LGS Innovations LLC System and method for securing a network device
US10082975B1 (en) 2017-03-02 2018-09-25 Micron Technology, Inc. Obfuscation-enhanced memory encryption
US11074339B2 (en) * 2017-06-27 2021-07-27 RAM Laboratories, Inc. Software protection through code and control flow data hiding and obfuscation
US10719610B2 (en) * 2017-08-14 2020-07-21 Blackberry Limited Generating security manifests for software components using binary static analysis
US20190065405A1 (en) * 2017-08-29 2019-02-28 Qualcomm Incorporated Security aware non-speculative memory
GB2568527B (en) * 2017-11-20 2020-04-15 Trustonic Ltd Address layout varying process
CN108733990B (zh) * 2018-05-22 2022-04-05 深圳壹账通智能科技有限公司 一种基于区块链的文件保护方法及终端设备
US10904284B2 (en) 2018-09-14 2021-01-26 International Business Machines Corporation Enabling software distribution
US10545850B1 (en) 2018-10-18 2020-01-28 Denso International America, Inc. System and methods for parallel execution and comparison of related processes for fault protection
EP3660715A1 (en) * 2018-11-30 2020-06-03 Conax AS Protecting sensitive data in a software program
CN110389724B (zh) * 2019-07-23 2023-06-06 深圳忆联信息系统有限公司 基于固态硬盘的parity page识别方法和装置
CN110457948A (zh) * 2019-08-13 2019-11-15 中科天御(苏州)科技有限公司 一种基于存储指令随机化的动态数据防护方法及系统
KR20210112923A (ko) 2020-03-06 2021-09-15 삼성전자주식회사 시스템 온 칩 및 이의 동작 방법
CN111459889B (zh) * 2020-03-08 2023-06-16 中电海康集团有限公司 一种用于物联网平台的设备数据模型生成方法和装置
US11693760B2 (en) * 2020-12-21 2023-07-04 RunSafe Security, Inc. System and methods for live debugging of transformed binaries
US11720474B2 (en) * 2020-12-21 2023-08-08 RunSafe Security, Inc. System and methods for post mortem debugging of transformed binaries

Family Cites Families (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4568489B2 (ja) * 2003-09-11 2010-10-27 富士通株式会社 プログラム保護方法、プログラム保護プログラムおよびプログラム保護装置
JP4514473B2 (ja) * 2004-02-23 2010-07-28 富士通株式会社 コンピュータシステム、中央装置及びプログラム実行方法
US20050268189A1 (en) * 2004-05-28 2005-12-01 Hewlett-Packard Development Company, L.P. Device testing using multiple test kernels
JP4575350B2 (ja) * 2006-02-14 2010-11-04 レノボ・シンガポール・プライベート・リミテッド コンピューター・システム内で悪意あるソフトウェアの実行を防止するための方法
US8694797B2 (en) * 2006-02-14 2014-04-08 Lenovo (Sinapore) Pte Ltd Method for preventing malicious software from execution within a computer system
US8041958B2 (en) * 2006-02-14 2011-10-18 Lenovo (Singapore) Pte. Ltd. Method for preventing malicious software from execution within a computer system
US8176337B2 (en) * 2008-03-12 2012-05-08 Apple Inc. Computer object code obfuscation using boot installation
WO2013176711A2 (en) * 2012-02-15 2013-11-28 The Trustees Of Columbia University In The City Of New York Methods, systems, and media for inhibiting attacks on embedded devices
US8904190B2 (en) 2010-10-20 2014-12-02 Advanced Micro Devices, Inc. Method and apparatus including architecture for protecting sensitive code and data
JP5772031B2 (ja) * 2011-02-08 2015-09-02 富士通株式会社 通信装置およびセキュアモジュール
US8775826B2 (en) 2011-02-09 2014-07-08 Apple Inc. Counteracting memory tracing on computing systems by code obfuscation
US8812868B2 (en) * 2011-03-21 2014-08-19 Mocana Corporation Secure execution of unsecured apps on a device
US20120260106A1 (en) 2011-04-07 2012-10-11 Apple Inc. System and method for binary layout randomization
US8615735B2 (en) * 2011-05-03 2013-12-24 Apple Inc. System and method for blurring instructions and data via binary obfuscation
US8751823B2 (en) * 2011-08-01 2014-06-10 Apple Inc. System and method for branch function based obfuscation
US8694738B2 (en) * 2011-10-11 2014-04-08 Mcafee, Inc. System and method for critical address space protection in a hypervisor environment
CN102412963B (zh) * 2011-12-30 2014-06-18 桂林电子科技大学 基于随机序列的具有误导功能的加密方法
US10193927B2 (en) * 2012-02-27 2019-01-29 University Of Virginia Patent Foundation Method of instruction location randomization (ILR) and related system
US9122873B2 (en) * 2012-09-14 2015-09-01 The Research Foundation For The State University Of New York Continuous run-time validation of program execution: a practical approach
CN103823664B (zh) * 2012-11-19 2017-12-15 中兴通讯股份有限公司 一种二进制合一Boot程序及内核程序的设计方法
CN103150493B (zh) * 2013-02-28 2016-06-22 浙江中控技术股份有限公司 一种JavaScript代码的混淆方法和装置
CN103324872B (zh) * 2013-07-12 2016-04-27 上海交通大学 基于指令混淆的Android应用程序保护方法及系统
US9147070B2 (en) 2013-08-12 2015-09-29 Cisco Technology, Inc. Binary translation and randomization system for application security
CN103544414B (zh) * 2013-10-25 2015-08-19 江苏通付盾信息科技有限公司 一种Android系统应用的深度代码混淆方法
CN104573427B (zh) * 2015-01-06 2017-09-08 北京邮电大学 一种可执行应用的混淆方法和装置

Also Published As

Publication number Publication date
WO2016164520A1 (en) 2016-10-13
EP3281104B1 (en) 2024-01-24
CN108027737A (zh) 2018-05-11
US10140130B2 (en) 2018-11-27
JP2018517965A (ja) 2018-07-05
CN108027737B (zh) 2021-07-27
EP3281104A1 (en) 2018-02-14
KR20180019515A (ko) 2018-02-26
JP6895666B2 (ja) 2021-06-30
US20160299765A1 (en) 2016-10-13
CA2982867A1 (en) 2016-10-13
KR102582628B1 (ko) 2023-09-22
EP3281104A4 (en) 2018-12-19

Similar Documents

Publication Publication Date Title
HK1243525A1 (zh) 通過二進制和存儲器分集混淆的系統和方法
HK1244921A1 (zh) 加密和解密系統和方法
SG11201707149UA (en) Method and system for encryption
HK1258246A1 (zh) 認證方法和系統
SG11201708917SA (en) Data processing method and system
GB201505500D0 (en) Communications system and method
GB201514674D0 (en) Distributed encryption system and method
GB2587113B (en) System and method
GB201510480D0 (en) System and method
SG10201609225QA (en) Memory Devices And Methods
GB201515115D0 (en) System and method
GB201803529D0 (en) Radio-station-recommendation system and method
IL242717A0 (en) Systems and methods for authentication of cache memory
GB201521577D0 (en) Method and system
IL238694A0 (en) A hologram-based communication system and method
GB201509030D0 (en) Authentication methods and systems
GB201509031D0 (en) Authentication methods and systems
GB201510272D0 (en) Data processing system and method