IN2012DN02458A - - Google Patents
Download PDFInfo
- Publication number
- IN2012DN02458A IN2012DN02458A IN2458DEN2012A IN2012DN02458A IN 2012DN02458 A IN2012DN02458 A IN 2012DN02458A IN 2458DEN2012 A IN2458DEN2012 A IN 2458DEN2012A IN 2012DN02458 A IN2012DN02458 A IN 2012DN02458A
- Authority
- IN
- India
- Prior art keywords
- modules
- security
- weaknesses
- secures
- implementation
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/125—Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/14—Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
Abstract
A method and system that provides secure modules that can address Java platform weaknesses and protect Java bytecode during execution time. The secure modules are implemented in C/C++ as an example. Because implementation of the security modules is made in C/C++, this enables use of security technology that secures C/C++ software code.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US26088709P | 2009-11-13 | 2009-11-13 | |
PCT/CA2010/001761 WO2011057393A1 (en) | 2009-11-13 | 2010-11-12 | System and method to protect java bytecode code against static and dynamic attacks within hostile execution environments |
Publications (1)
Publication Number | Publication Date |
---|---|
IN2012DN02458A true IN2012DN02458A (en) | 2015-08-21 |
Family
ID=43991129
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
IN2458DEN2012 IN2012DN02458A (en) | 2009-11-13 | 2010-11-12 |
Country Status (8)
Country | Link |
---|---|
US (1) | US9213826B2 (en) |
EP (2) | EP3923165A1 (en) |
JP (1) | JP5689472B2 (en) |
KR (1) | KR20130018642A (en) |
CN (1) | CN102598017B (en) |
CA (1) | CA2774728C (en) |
IN (1) | IN2012DN02458A (en) |
WO (1) | WO2011057393A1 (en) |
Families Citing this family (57)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8424082B2 (en) | 2008-05-08 | 2013-04-16 | Google Inc. | Safely executing an untrusted native code module on a computing device |
EP2402880A1 (en) * | 2010-07-01 | 2012-01-04 | Aladdin Europe GmbH | Method and device for selectively protecting one of a plurality of methods of a class of an application written in an object-orientated language |
FR2967275B1 (en) * | 2010-11-10 | 2012-12-28 | Oberthur Technologies | METHOD, COMPUTER PROGRAM AND DEVICE FOR SECURING INTERMEDIATE PROGRAMMING CODE FOR ITS EXECUTION BY A VIRTUAL MACHINE |
US8812868B2 (en) | 2011-03-21 | 2014-08-19 | Mocana Corporation | Secure execution of unsecured apps on a device |
US9396325B2 (en) | 2011-03-21 | 2016-07-19 | Mocana Corporation | Provisioning an app on a device and implementing a keystore |
US8955142B2 (en) * | 2011-03-21 | 2015-02-10 | Mocana Corporation | Secure execution of unsecured apps on a device |
US9473485B2 (en) | 2011-03-21 | 2016-10-18 | Blue Cedar Networks, Inc. | Secure single sign-on for a group of wrapped applications on a computing device and runtime credential sharing |
CA2831369C (en) * | 2011-03-31 | 2019-04-30 | Irdeto B.V. | Method of securing non-native code |
WO2013049841A1 (en) * | 2011-09-30 | 2013-04-04 | Newman Infinite, Inc. | Apparatus, method and computer-readable storage medium for securing javascript |
US9021271B1 (en) * | 2011-12-27 | 2015-04-28 | Emc Corporation | Injecting code decrypted by a hardware decryption module into Java applications |
KR101944010B1 (en) * | 2012-02-24 | 2019-01-30 | 삼성전자 주식회사 | Method and apparatus for detecting tampered application |
CN104321782B (en) * | 2012-03-30 | 2018-01-12 | 爱迪德技术有限公司 | The safety execution of web applications |
WO2014133528A1 (en) * | 2013-02-28 | 2014-09-04 | Hewlett-Packard Development Company, L.P. | Determining coverage of dynamic security scans using runtime and static code analyses |
US9141823B2 (en) * | 2013-03-15 | 2015-09-22 | Veridicom, Sa De Cv | Abstraction layer for default encryption with orthogonal encryption logic session object; and automated authentication, with a method for online litigation |
KR101500512B1 (en) * | 2013-05-15 | 2015-03-18 | 소프트캠프(주) | Device and method for securing computer |
US9378034B2 (en) | 2013-05-16 | 2016-06-28 | Sap Se | Dynamic bytecode modification of classes and class hierarchies |
US8943592B1 (en) | 2013-07-15 | 2015-01-27 | Eset, Spol. S.R.O. | Methods of detection of software exploitation |
KR101350390B1 (en) * | 2013-08-14 | 2014-01-16 | 숭실대학교산학협력단 | A apparatus for code obfuscation and method thereof |
KR101471589B1 (en) * | 2013-08-22 | 2014-12-10 | (주)잉카엔트웍스 | Method for Providing Security for Common Intermediate Language Program |
KR101490047B1 (en) * | 2013-09-27 | 2015-02-04 | 숭실대학교산학협력단 | Apparatus for tamper protection of application code based on self modification and method thereof |
US20150095842A1 (en) | 2013-09-30 | 2015-04-02 | Microsoft Corporation | Extendable blade sequence along pannable canvas direction |
US9740854B2 (en) * | 2013-10-25 | 2017-08-22 | Red Hat, Inc. | System and method for code protection |
KR101556908B1 (en) * | 2013-11-14 | 2015-10-02 | (주)잉카엔트웍스 | Apparatus For Protecting Binary Code |
GB201405754D0 (en) * | 2014-03-31 | 2014-05-14 | Irdeto Bv | Protecting an item of software comprising conditional code |
KR101566142B1 (en) * | 2014-10-21 | 2015-11-06 | 숭실대학교산학협력단 | User Terminal and Method for Protecting Core Codes of Applications Using the same |
CN104375938B (en) * | 2014-11-20 | 2017-09-05 | 工业和信息化部电信研究院 | The dynamic behaviour monitoring method and system of Android application program |
EP3026559A1 (en) * | 2014-11-28 | 2016-06-01 | Thomson Licensing | Method and device for providing verifying application integrity |
WO2016112338A1 (en) * | 2015-01-08 | 2016-07-14 | Intertrust Technologies Corporation | Cryptographic systems and methods |
WO2016139078A1 (en) * | 2015-03-02 | 2016-09-09 | Inventio Ag | Protecting a computer program against reverse engineering |
US9460284B1 (en) * | 2015-06-12 | 2016-10-04 | Bitdefender IPR Management Ltd. | Behavioral malware detection using an interpreter virtual machine |
KR101740134B1 (en) | 2015-08-10 | 2017-05-26 | 라인 가부시키가이샤 | System and method for application code obfuscation |
KR101740133B1 (en) * | 2015-08-10 | 2017-05-26 | 라인 가부시키가이샤 | System and method for protecting code of application |
WO2017056194A1 (en) * | 2015-09-29 | 2017-04-06 | 株式会社 東芝 | Information device, information communication terminal, and information processing method |
EP3391583B1 (en) * | 2015-12-15 | 2019-07-24 | Koninklijke Philips N.V. | A computation device and method |
EP3188063A1 (en) * | 2015-12-29 | 2017-07-05 | GuardSquare NV | A build system |
MA44905A (en) * | 2016-04-05 | 2018-05-09 | Mi Group B V | FLIGHT INFORMATION SYSTEM AND PROCESS |
US10073975B2 (en) | 2016-08-11 | 2018-09-11 | International Business Machines Corporation | Application integrity verification in multi-tier architectures |
US10394554B1 (en) * | 2016-09-09 | 2019-08-27 | Stripe, Inc. | Source code extraction via monitoring processing of obfuscated byte code |
US11423140B1 (en) * | 2017-03-27 | 2022-08-23 | Melih Abdulhayoglu | Auto-containment of guest user applications |
US10951644B1 (en) | 2017-04-07 | 2021-03-16 | Comodo Security Solutions, Inc. | Auto-containment of potentially vulnerable applications |
CN107294702B (en) * | 2017-07-17 | 2020-04-28 | 四川长虹电器股份有限公司 | Front-end code encryption method based on Hybrid APP self characteristics |
CA3072266A1 (en) | 2017-08-08 | 2019-02-14 | Crypto4A Technologies Inc. | Secure machine executable code deployment and execution method and system |
CN107480478B (en) * | 2017-08-14 | 2019-08-13 | 钟尚亮 | A kind of encryption method and operation method of JAVA application program |
EP3861469B1 (en) * | 2018-10-23 | 2023-05-31 | Huawei Technologies Co., Ltd. | Device and method for validation of virtual function pointers |
EP3709560A1 (en) * | 2019-03-14 | 2020-09-16 | Thales Dis France SA | Method for provisioning white-box assets and corresponding device, server and system |
US11468881B2 (en) * | 2019-03-29 | 2022-10-11 | Samsung Electronics Co., Ltd. | Method and system for semantic intelligent task learning and adaptive execution |
KR102243378B1 (en) * | 2019-04-02 | 2021-04-22 | (주)드림시큐리티 | Method and apparatus for ensuring integrity of java library |
US11150915B2 (en) | 2019-09-13 | 2021-10-19 | International Business Machines Corporation | Deferred bytecode class verification in managed runtime environments |
US10963275B1 (en) | 2019-10-31 | 2021-03-30 | Red Hat, Inc. | Implementing dependency injection via direct bytecode generation |
CN110826031B (en) * | 2019-10-31 | 2022-08-02 | 望海康信(北京)科技股份公司 | Encryption method, device, computer equipment and storage medium |
US11403075B2 (en) | 2019-11-25 | 2022-08-02 | International Business Machines Corporation | Bytecode verification using class relationship caching |
CN111143029B (en) * | 2019-12-19 | 2024-03-22 | 浪潮软件股份有限公司 | Method for realizing consistent and automatic telescopic continuous construction environment of virtual machine based on Gitleab-CI callback integration |
KR102338885B1 (en) * | 2020-01-21 | 2021-12-14 | 주식회사 행복소프트 | A Method and an Apparatus for Detecting Dynamic Defacement in Application |
KR20210112923A (en) | 2020-03-06 | 2021-09-15 | 삼성전자주식회사 | A system-on chip and operation method thereof |
US11550883B2 (en) * | 2020-09-08 | 2023-01-10 | Assured Information Security, Inc. | Code protection |
CN113239330A (en) * | 2021-06-10 | 2021-08-10 | 杭州安恒信息技术股份有限公司 | Anti-debugging method based on hash algorithm and related device |
CN114928550A (en) * | 2022-04-29 | 2022-08-19 | 杭州默安科技有限公司 | Database interaction account security detection method and system |
Family Cites Families (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5692047A (en) | 1995-12-08 | 1997-11-25 | Sun Microsystems, Inc. | System and method for executing verifiable programs with facility for using non-verifiable programs from trusted sources |
US6668325B1 (en) * | 1997-06-09 | 2003-12-23 | Intertrust Technologies | Obfuscation techniques for enhancing software security |
US6594761B1 (en) | 1999-06-09 | 2003-07-15 | Cloakware Corporation | Tamper resistant software encoding |
US6779114B1 (en) | 1999-08-19 | 2004-08-17 | Cloakware Corporation | Tamper resistant software-control flow encoding |
CA2304433A1 (en) | 2000-04-05 | 2001-10-05 | Cloakware Corporation | General purpose access recovery scheme |
CA2305078A1 (en) | 2000-04-12 | 2001-10-12 | Cloakware Corporation | Tamper resistant software - mass data encoding |
US7020882B1 (en) * | 2000-09-14 | 2006-03-28 | International Business Machines Corporation | Method, system, and program for remotely manipulating a user interface over a network |
GB0024918D0 (en) | 2000-10-11 | 2000-11-22 | Sealedmedia Ltd | Method of providing java tamperproofing |
CA2327911A1 (en) | 2000-12-08 | 2002-06-08 | Cloakware Corporation | Obscuring functions in computer software |
US7039814B2 (en) * | 2001-03-07 | 2006-05-02 | Sony Corporation | Method for securing software via late stage processor instruction decryption |
CA2348355A1 (en) | 2001-05-24 | 2002-11-24 | Cloakware Corporation | General scheme of using encodings in computations |
CA2350029A1 (en) | 2001-06-08 | 2002-12-08 | Cloakware Corporation | Sustainable digital watermarking via tamper-resistant software |
CA2354470A1 (en) | 2001-07-30 | 2003-01-30 | Cloakware Corporation | Active content for secure digital media |
US7516331B2 (en) * | 2003-11-26 | 2009-04-07 | International Business Machines Corporation | Tamper-resistant trusted java virtual machine and method of using the same |
JP2005293109A (en) * | 2004-03-31 | 2005-10-20 | Canon Inc | Software execution management device, software execution management method, and control program |
US20100146304A1 (en) * | 2005-07-22 | 2010-06-10 | Kazufumi Miyatake | Execution device |
US7788730B2 (en) * | 2006-01-17 | 2010-08-31 | International Business Machines Corporation | Secure bytecode instrumentation facility |
CN101473333B (en) * | 2006-06-21 | 2011-09-07 | 威步系统股份公司 | Method and system for intrusion detection |
JP2009258772A (en) * | 2006-08-09 | 2009-11-05 | Panasonic Corp | Application execution device |
DE102007045743A1 (en) * | 2007-09-25 | 2009-04-02 | Siemens Ag | Method and system for protection against access to a machine code of a device |
US20110035601A1 (en) | 2007-12-21 | 2011-02-10 | University Of Virginia Patent Foundation | System, method and computer program product for protecting software via continuous anti-tampering and obfuscation transforms |
CN101978647A (en) * | 2008-01-31 | 2011-02-16 | 耶德托公司 | Securing a smart card |
EP2196934A1 (en) * | 2008-12-09 | 2010-06-16 | Gemalto SA | Method for securing java bytecode |
-
2010
- 2010-11-12 EP EP21175342.1A patent/EP3923165A1/en not_active Withdrawn
- 2010-11-12 CN CN201080048082.7A patent/CN102598017B/en active Active
- 2010-11-12 IN IN2458DEN2012 patent/IN2012DN02458A/en unknown
- 2010-11-12 US US13/499,495 patent/US9213826B2/en active Active
- 2010-11-12 CA CA2774728A patent/CA2774728C/en not_active Expired - Fee Related
- 2010-11-12 JP JP2012538154A patent/JP5689472B2/en not_active Expired - Fee Related
- 2010-11-12 WO PCT/CA2010/001761 patent/WO2011057393A1/en active Application Filing
- 2010-11-12 KR KR1020127015162A patent/KR20130018642A/en active IP Right Grant
- 2010-11-12 EP EP10829403.4A patent/EP2467800B1/en active Active
Also Published As
Publication number | Publication date |
---|---|
JP2013511077A (en) | 2013-03-28 |
CN102598017A (en) | 2012-07-18 |
JP5689472B2 (en) | 2015-03-25 |
CA2774728C (en) | 2019-02-12 |
EP3923165A1 (en) | 2021-12-15 |
EP2467800A4 (en) | 2016-03-16 |
KR20130018642A (en) | 2013-02-25 |
CA2774728A1 (en) | 2011-05-19 |
US9213826B2 (en) | 2015-12-15 |
EP2467800A1 (en) | 2012-06-27 |
CN102598017B (en) | 2016-03-09 |
WO2011057393A1 (en) | 2011-05-19 |
EP2467800B1 (en) | 2021-06-30 |
US20120246487A1 (en) | 2012-09-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
IN2012DN02458A (en) | ||
EP2579817A4 (en) | Implant components and methods | |
WO2017171987A8 (en) | System, apparatus and method for performing secure memory training and management in a trusted environment | |
GB2481563A (en) | Method and apparatus to provide secure application execution | |
IN2012DN00473A (en) | ||
GB2558826A8 (en) | Mitigation of anti-sandbox malware techniques | |
EP2657871A3 (en) | Secure configuration of mobile application | |
IN2015DN02657A (en) | ||
HK1159279A1 (en) | Method and system for executing applications using native code modules | |
GB2459036B (en) | Method and system for implementing a secure chain of trust | |
BR112013016628A2 (en) | mobile payment system and method | |
MX341086B (en) | Passcode operating system, passcode apparatus, and super-passcode generating method. | |
GB2458426A (en) | Password protection system and method | |
EP2281258A4 (en) | Method for safely executing an untrusted native code module on a computing device | |
WO2009014779A3 (en) | System for malware normalization and detection | |
SG165286A1 (en) | Source-to-processing file conversion in an electronic discovery enterprise system | |
TR201820650T4 (en) | METHOD, APP SERVER AND SYSTEM FOR PROTECTION OF PERSONAL PRIVACY IN VIDEO CALL | |
IN2014KN02283A (en) | ||
MX2010007394A (en) | Isolation of content by processes in an application. | |
MX339259B (en) | Fiber structures containing encapsulation complex. | |
MY160671A (en) | Protection against passive sniffing | |
HK1174123A1 (en) | Confidential information leakage prevention system, confidential information leakage prevention method and confidential information leakage prevention program | |
WO2016069080A3 (en) | Key derivation in smart card operating system | |
MY189174A (en) | Network based management of protected data sets | |
EP2648437A4 (en) | Method, apparatus and system for key generation |