IN2012DN02458A - - Google Patents

Download PDF

Info

Publication number
IN2012DN02458A
IN2012DN02458A IN2458DEN2012A IN2012DN02458A IN 2012DN02458 A IN2012DN02458 A IN 2012DN02458A IN 2458DEN2012 A IN2458DEN2012 A IN 2458DEN2012A IN 2012DN02458 A IN2012DN02458 A IN 2012DN02458A
Authority
IN
India
Prior art keywords
modules
security
weaknesses
secures
implementation
Prior art date
Application number
Inventor
Yuan Xiang Gu
Garney Adams
Jack Rong
Original Assignee
Irdeto Canada Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Irdeto Canada Corp filed Critical Irdeto Canada Corp
Publication of IN2012DN02458A publication Critical patent/IN2012DN02458A/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/125Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/14Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating

Abstract

A method and system that provides secure modules that can address Java platform weaknesses and protect Java bytecode during execution time. The secure modules are implemented in C/C++ as an example. Because implementation of the security modules is made in C/C++, this enables use of security technology that secures C/C++ software code.
IN2458DEN2012 2009-11-13 2010-11-12 IN2012DN02458A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US26088709P 2009-11-13 2009-11-13
PCT/CA2010/001761 WO2011057393A1 (en) 2009-11-13 2010-11-12 System and method to protect java bytecode code against static and dynamic attacks within hostile execution environments

Publications (1)

Publication Number Publication Date
IN2012DN02458A true IN2012DN02458A (en) 2015-08-21

Family

ID=43991129

Family Applications (1)

Application Number Title Priority Date Filing Date
IN2458DEN2012 IN2012DN02458A (en) 2009-11-13 2010-11-12

Country Status (8)

Country Link
US (1) US9213826B2 (en)
EP (2) EP3923165A1 (en)
JP (1) JP5689472B2 (en)
KR (1) KR20130018642A (en)
CN (1) CN102598017B (en)
CA (1) CA2774728C (en)
IN (1) IN2012DN02458A (en)
WO (1) WO2011057393A1 (en)

Families Citing this family (57)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8424082B2 (en) 2008-05-08 2013-04-16 Google Inc. Safely executing an untrusted native code module on a computing device
EP2402880A1 (en) * 2010-07-01 2012-01-04 Aladdin Europe GmbH Method and device for selectively protecting one of a plurality of methods of a class of an application written in an object-orientated language
FR2967275B1 (en) * 2010-11-10 2012-12-28 Oberthur Technologies METHOD, COMPUTER PROGRAM AND DEVICE FOR SECURING INTERMEDIATE PROGRAMMING CODE FOR ITS EXECUTION BY A VIRTUAL MACHINE
US8812868B2 (en) 2011-03-21 2014-08-19 Mocana Corporation Secure execution of unsecured apps on a device
US9396325B2 (en) 2011-03-21 2016-07-19 Mocana Corporation Provisioning an app on a device and implementing a keystore
US8955142B2 (en) * 2011-03-21 2015-02-10 Mocana Corporation Secure execution of unsecured apps on a device
US9473485B2 (en) 2011-03-21 2016-10-18 Blue Cedar Networks, Inc. Secure single sign-on for a group of wrapped applications on a computing device and runtime credential sharing
CA2831369C (en) * 2011-03-31 2019-04-30 Irdeto B.V. Method of securing non-native code
WO2013049841A1 (en) * 2011-09-30 2013-04-04 Newman Infinite, Inc. Apparatus, method and computer-readable storage medium for securing javascript
US9021271B1 (en) * 2011-12-27 2015-04-28 Emc Corporation Injecting code decrypted by a hardware decryption module into Java applications
KR101944010B1 (en) * 2012-02-24 2019-01-30 삼성전자 주식회사 Method and apparatus for detecting tampered application
CN104321782B (en) * 2012-03-30 2018-01-12 爱迪德技术有限公司 The safety execution of web applications
WO2014133528A1 (en) * 2013-02-28 2014-09-04 Hewlett-Packard Development Company, L.P. Determining coverage of dynamic security scans using runtime and static code analyses
US9141823B2 (en) * 2013-03-15 2015-09-22 Veridicom, Sa De Cv Abstraction layer for default encryption with orthogonal encryption logic session object; and automated authentication, with a method for online litigation
KR101500512B1 (en) * 2013-05-15 2015-03-18 소프트캠프(주) Device and method for securing computer
US9378034B2 (en) 2013-05-16 2016-06-28 Sap Se Dynamic bytecode modification of classes and class hierarchies
US8943592B1 (en) 2013-07-15 2015-01-27 Eset, Spol. S.R.O. Methods of detection of software exploitation
KR101350390B1 (en) * 2013-08-14 2014-01-16 숭실대학교산학협력단 A apparatus for code obfuscation and method thereof
KR101471589B1 (en) * 2013-08-22 2014-12-10 (주)잉카엔트웍스 Method for Providing Security for Common Intermediate Language Program
KR101490047B1 (en) * 2013-09-27 2015-02-04 숭실대학교산학협력단 Apparatus for tamper protection of application code based on self modification and method thereof
US20150095842A1 (en) 2013-09-30 2015-04-02 Microsoft Corporation Extendable blade sequence along pannable canvas direction
US9740854B2 (en) * 2013-10-25 2017-08-22 Red Hat, Inc. System and method for code protection
KR101556908B1 (en) * 2013-11-14 2015-10-02 (주)잉카엔트웍스 Apparatus For Protecting Binary Code
GB201405754D0 (en) * 2014-03-31 2014-05-14 Irdeto Bv Protecting an item of software comprising conditional code
KR101566142B1 (en) * 2014-10-21 2015-11-06 숭실대학교산학협력단 User Terminal and Method for Protecting Core Codes of Applications Using the same
CN104375938B (en) * 2014-11-20 2017-09-05 工业和信息化部电信研究院 The dynamic behaviour monitoring method and system of Android application program
EP3026559A1 (en) * 2014-11-28 2016-06-01 Thomson Licensing Method and device for providing verifying application integrity
WO2016112338A1 (en) * 2015-01-08 2016-07-14 Intertrust Technologies Corporation Cryptographic systems and methods
WO2016139078A1 (en) * 2015-03-02 2016-09-09 Inventio Ag Protecting a computer program against reverse engineering
US9460284B1 (en) * 2015-06-12 2016-10-04 Bitdefender IPR Management Ltd. Behavioral malware detection using an interpreter virtual machine
KR101740134B1 (en) 2015-08-10 2017-05-26 라인 가부시키가이샤 System and method for application code obfuscation
KR101740133B1 (en) * 2015-08-10 2017-05-26 라인 가부시키가이샤 System and method for protecting code of application
WO2017056194A1 (en) * 2015-09-29 2017-04-06 株式会社 東芝 Information device, information communication terminal, and information processing method
EP3391583B1 (en) * 2015-12-15 2019-07-24 Koninklijke Philips N.V. A computation device and method
EP3188063A1 (en) * 2015-12-29 2017-07-05 GuardSquare NV A build system
MA44905A (en) * 2016-04-05 2018-05-09 Mi Group B V FLIGHT INFORMATION SYSTEM AND PROCESS
US10073975B2 (en) 2016-08-11 2018-09-11 International Business Machines Corporation Application integrity verification in multi-tier architectures
US10394554B1 (en) * 2016-09-09 2019-08-27 Stripe, Inc. Source code extraction via monitoring processing of obfuscated byte code
US11423140B1 (en) * 2017-03-27 2022-08-23 Melih Abdulhayoglu Auto-containment of guest user applications
US10951644B1 (en) 2017-04-07 2021-03-16 Comodo Security Solutions, Inc. Auto-containment of potentially vulnerable applications
CN107294702B (en) * 2017-07-17 2020-04-28 四川长虹电器股份有限公司 Front-end code encryption method based on Hybrid APP self characteristics
CA3072266A1 (en) 2017-08-08 2019-02-14 Crypto4A Technologies Inc. Secure machine executable code deployment and execution method and system
CN107480478B (en) * 2017-08-14 2019-08-13 钟尚亮 A kind of encryption method and operation method of JAVA application program
EP3861469B1 (en) * 2018-10-23 2023-05-31 Huawei Technologies Co., Ltd. Device and method for validation of virtual function pointers
EP3709560A1 (en) * 2019-03-14 2020-09-16 Thales Dis France SA Method for provisioning white-box assets and corresponding device, server and system
US11468881B2 (en) * 2019-03-29 2022-10-11 Samsung Electronics Co., Ltd. Method and system for semantic intelligent task learning and adaptive execution
KR102243378B1 (en) * 2019-04-02 2021-04-22 (주)드림시큐리티 Method and apparatus for ensuring integrity of java library
US11150915B2 (en) 2019-09-13 2021-10-19 International Business Machines Corporation Deferred bytecode class verification in managed runtime environments
US10963275B1 (en) 2019-10-31 2021-03-30 Red Hat, Inc. Implementing dependency injection via direct bytecode generation
CN110826031B (en) * 2019-10-31 2022-08-02 望海康信(北京)科技股份公司 Encryption method, device, computer equipment and storage medium
US11403075B2 (en) 2019-11-25 2022-08-02 International Business Machines Corporation Bytecode verification using class relationship caching
CN111143029B (en) * 2019-12-19 2024-03-22 浪潮软件股份有限公司 Method for realizing consistent and automatic telescopic continuous construction environment of virtual machine based on Gitleab-CI callback integration
KR102338885B1 (en) * 2020-01-21 2021-12-14 주식회사 행복소프트 A Method and an Apparatus for Detecting Dynamic Defacement in Application
KR20210112923A (en) 2020-03-06 2021-09-15 삼성전자주식회사 A system-on chip and operation method thereof
US11550883B2 (en) * 2020-09-08 2023-01-10 Assured Information Security, Inc. Code protection
CN113239330A (en) * 2021-06-10 2021-08-10 杭州安恒信息技术股份有限公司 Anti-debugging method based on hash algorithm and related device
CN114928550A (en) * 2022-04-29 2022-08-19 杭州默安科技有限公司 Database interaction account security detection method and system

Family Cites Families (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5692047A (en) 1995-12-08 1997-11-25 Sun Microsystems, Inc. System and method for executing verifiable programs with facility for using non-verifiable programs from trusted sources
US6668325B1 (en) * 1997-06-09 2003-12-23 Intertrust Technologies Obfuscation techniques for enhancing software security
US6594761B1 (en) 1999-06-09 2003-07-15 Cloakware Corporation Tamper resistant software encoding
US6779114B1 (en) 1999-08-19 2004-08-17 Cloakware Corporation Tamper resistant software-control flow encoding
CA2304433A1 (en) 2000-04-05 2001-10-05 Cloakware Corporation General purpose access recovery scheme
CA2305078A1 (en) 2000-04-12 2001-10-12 Cloakware Corporation Tamper resistant software - mass data encoding
US7020882B1 (en) * 2000-09-14 2006-03-28 International Business Machines Corporation Method, system, and program for remotely manipulating a user interface over a network
GB0024918D0 (en) 2000-10-11 2000-11-22 Sealedmedia Ltd Method of providing java tamperproofing
CA2327911A1 (en) 2000-12-08 2002-06-08 Cloakware Corporation Obscuring functions in computer software
US7039814B2 (en) * 2001-03-07 2006-05-02 Sony Corporation Method for securing software via late stage processor instruction decryption
CA2348355A1 (en) 2001-05-24 2002-11-24 Cloakware Corporation General scheme of using encodings in computations
CA2350029A1 (en) 2001-06-08 2002-12-08 Cloakware Corporation Sustainable digital watermarking via tamper-resistant software
CA2354470A1 (en) 2001-07-30 2003-01-30 Cloakware Corporation Active content for secure digital media
US7516331B2 (en) * 2003-11-26 2009-04-07 International Business Machines Corporation Tamper-resistant trusted java virtual machine and method of using the same
JP2005293109A (en) * 2004-03-31 2005-10-20 Canon Inc Software execution management device, software execution management method, and control program
US20100146304A1 (en) * 2005-07-22 2010-06-10 Kazufumi Miyatake Execution device
US7788730B2 (en) * 2006-01-17 2010-08-31 International Business Machines Corporation Secure bytecode instrumentation facility
CN101473333B (en) * 2006-06-21 2011-09-07 威步系统股份公司 Method and system for intrusion detection
JP2009258772A (en) * 2006-08-09 2009-11-05 Panasonic Corp Application execution device
DE102007045743A1 (en) * 2007-09-25 2009-04-02 Siemens Ag Method and system for protection against access to a machine code of a device
US20110035601A1 (en) 2007-12-21 2011-02-10 University Of Virginia Patent Foundation System, method and computer program product for protecting software via continuous anti-tampering and obfuscation transforms
CN101978647A (en) * 2008-01-31 2011-02-16 耶德托公司 Securing a smart card
EP2196934A1 (en) * 2008-12-09 2010-06-16 Gemalto SA Method for securing java bytecode

Also Published As

Publication number Publication date
JP2013511077A (en) 2013-03-28
CN102598017A (en) 2012-07-18
JP5689472B2 (en) 2015-03-25
CA2774728C (en) 2019-02-12
EP3923165A1 (en) 2021-12-15
EP2467800A4 (en) 2016-03-16
KR20130018642A (en) 2013-02-25
CA2774728A1 (en) 2011-05-19
US9213826B2 (en) 2015-12-15
EP2467800A1 (en) 2012-06-27
CN102598017B (en) 2016-03-09
WO2011057393A1 (en) 2011-05-19
EP2467800B1 (en) 2021-06-30
US20120246487A1 (en) 2012-09-27

Similar Documents

Publication Publication Date Title
IN2012DN02458A (en)
EP2579817A4 (en) Implant components and methods
WO2017171987A8 (en) System, apparatus and method for performing secure memory training and management in a trusted environment
GB2481563A (en) Method and apparatus to provide secure application execution
IN2012DN00473A (en)
GB2558826A8 (en) Mitigation of anti-sandbox malware techniques
EP2657871A3 (en) Secure configuration of mobile application
IN2015DN02657A (en)
HK1159279A1 (en) Method and system for executing applications using native code modules
GB2459036B (en) Method and system for implementing a secure chain of trust
BR112013016628A2 (en) mobile payment system and method
MX341086B (en) Passcode operating system, passcode apparatus, and super-passcode generating method.
GB2458426A (en) Password protection system and method
EP2281258A4 (en) Method for safely executing an untrusted native code module on a computing device
WO2009014779A3 (en) System for malware normalization and detection
SG165286A1 (en) Source-to-processing file conversion in an electronic discovery enterprise system
TR201820650T4 (en) METHOD, APP SERVER AND SYSTEM FOR PROTECTION OF PERSONAL PRIVACY IN VIDEO CALL
IN2014KN02283A (en)
MX2010007394A (en) Isolation of content by processes in an application.
MX339259B (en) Fiber structures containing encapsulation complex.
MY160671A (en) Protection against passive sniffing
HK1174123A1 (en) Confidential information leakage prevention system, confidential information leakage prevention method and confidential information leakage prevention program
WO2016069080A3 (en) Key derivation in smart card operating system
MY189174A (en) Network based management of protected data sets
EP2648437A4 (en) Method, apparatus and system for key generation