IN2012DN02458A - - Google Patents
Download PDFInfo
- Publication number
- IN2012DN02458A IN2012DN02458A IN2458DEN2012A IN2012DN02458A IN 2012DN02458 A IN2012DN02458 A IN 2012DN02458A IN 2458DEN2012 A IN2458DEN2012 A IN 2458DEN2012A IN 2012DN02458 A IN2012DN02458 A IN 2012DN02458A
- Authority
- IN
- India
- Prior art keywords
- modules
- security
- weaknesses
- secures
- implementation
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/125—Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/14—Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Devices For Executing Special Programs (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US26088709P | 2009-11-13 | 2009-11-13 | |
PCT/CA2010/001761 WO2011057393A1 (fr) | 2009-11-13 | 2010-11-12 | Système et procédé de protection d'un code en code binaire java contre des attaques statiques et dynamiques dans des environnements d'exécution hostiles |
Publications (1)
Publication Number | Publication Date |
---|---|
IN2012DN02458A true IN2012DN02458A (fr) | 2015-08-21 |
Family
ID=43991129
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
IN2458DEN2012 IN2012DN02458A (fr) | 2009-11-13 | 2010-11-12 |
Country Status (8)
Country | Link |
---|---|
US (1) | US9213826B2 (fr) |
EP (2) | EP3923165A1 (fr) |
JP (1) | JP5689472B2 (fr) |
KR (1) | KR20130018642A (fr) |
CN (1) | CN102598017B (fr) |
CA (1) | CA2774728C (fr) |
IN (1) | IN2012DN02458A (fr) |
WO (1) | WO2011057393A1 (fr) |
Families Citing this family (60)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8424082B2 (en) | 2008-05-08 | 2013-04-16 | Google Inc. | Safely executing an untrusted native code module on a computing device |
EP2402880A1 (fr) * | 2010-07-01 | 2012-01-04 | Aladdin Europe GmbH | Procédé et dispositif de protection sélective de l'un des multiples procédés d'une classe d'application écrite dans un langage orienté objet |
FR2967275B1 (fr) * | 2010-11-10 | 2012-12-28 | Oberthur Technologies | Procede, programme d'ordinateur et dispositif de securisation de code intermediaire de programmation pour son execution par une machine virtuelle |
US8812868B2 (en) | 2011-03-21 | 2014-08-19 | Mocana Corporation | Secure execution of unsecured apps on a device |
US9396325B2 (en) | 2011-03-21 | 2016-07-19 | Mocana Corporation | Provisioning an app on a device and implementing a keystore |
US9473485B2 (en) | 2011-03-21 | 2016-10-18 | Blue Cedar Networks, Inc. | Secure single sign-on for a group of wrapped applications on a computing device and runtime credential sharing |
US8955142B2 (en) * | 2011-03-21 | 2015-02-10 | Mocana Corporation | Secure execution of unsecured apps on a device |
CN103827880B (zh) * | 2011-03-31 | 2017-06-16 | 爱迪德技术有限公司 | 保护非本机代码安全的方法 |
WO2013049841A1 (fr) * | 2011-09-30 | 2013-04-04 | Newman Infinite, Inc. | Appareil, procédé et support de stockage lisible par ordinateur pour sécurisation de scriptjava |
US9021271B1 (en) * | 2011-12-27 | 2015-04-28 | Emc Corporation | Injecting code decrypted by a hardware decryption module into Java applications |
KR101944010B1 (ko) * | 2012-02-24 | 2019-01-30 | 삼성전자 주식회사 | 애플리케이션의 변조 감지 방법 및 장치 |
US9471776B2 (en) * | 2012-03-30 | 2016-10-18 | Irdeto B.V. | Secured execution of a web application |
US10699017B2 (en) | 2013-02-28 | 2020-06-30 | Micro Focus Llc | Determining coverage of dynamic security scans using runtime and static code analyses |
US9141823B2 (en) * | 2013-03-15 | 2015-09-22 | Veridicom, Sa De Cv | Abstraction layer for default encryption with orthogonal encryption logic session object; and automated authentication, with a method for online litigation |
KR101500512B1 (ko) * | 2013-05-15 | 2015-03-18 | 소프트캠프(주) | 데이터 프로세싱 시스템 보안 장치와 보안방법 |
US9378034B2 (en) | 2013-05-16 | 2016-06-28 | Sap Se | Dynamic bytecode modification of classes and class hierarchies |
US8943592B1 (en) | 2013-07-15 | 2015-01-27 | Eset, Spol. S.R.O. | Methods of detection of software exploitation |
KR101350390B1 (ko) * | 2013-08-14 | 2014-01-16 | 숭실대학교산학협력단 | 코드 난독화 장치 및 그 방법 |
KR101471589B1 (ko) * | 2013-08-22 | 2014-12-10 | (주)잉카엔트웍스 | 공통중간언어 기반 프로그램을 위한 보안 제공 방법 |
KR101490047B1 (ko) * | 2013-09-27 | 2015-02-04 | 숭실대학교산학협력단 | 자가변환 기반 애플리케이션 코드 난독화 장치 및 그 방법 |
US20150095365A1 (en) | 2013-09-30 | 2015-04-02 | Microsoft Corporation | Query building using schema |
US9740854B2 (en) * | 2013-10-25 | 2017-08-22 | Red Hat, Inc. | System and method for code protection |
KR101556908B1 (ko) * | 2013-11-14 | 2015-10-02 | (주)잉카엔트웍스 | 프로그램 보호 장치 |
GB201405754D0 (en) * | 2014-03-31 | 2014-05-14 | Irdeto Bv | Protecting an item of software comprising conditional code |
KR101566142B1 (ko) * | 2014-10-21 | 2015-11-06 | 숭실대학교산학협력단 | 사용자 단말기 및 그것을 이용한 응용 프로그램의 핵심코드 보호 방법 |
CN104375938B (zh) * | 2014-11-20 | 2017-09-05 | 工业和信息化部电信研究院 | 安卓应用程序的动态行为监测方法及系统 |
EP3026559A1 (fr) * | 2014-11-28 | 2016-06-01 | Thomson Licensing | Procédé et dispositif permettant d'assurer la vérification de l'intégrité d'une application |
US10205710B2 (en) * | 2015-01-08 | 2019-02-12 | Intertrust Technologies Corporation | Cryptographic systems and methods |
WO2016139078A1 (fr) * | 2015-03-02 | 2016-09-09 | Inventio Ag | Protection de programme informatique contre l'ingénierie inverse |
US9460284B1 (en) * | 2015-06-12 | 2016-10-04 | Bitdefender IPR Management Ltd. | Behavioral malware detection using an interpreter virtual machine |
KR101740134B1 (ko) | 2015-08-10 | 2017-05-26 | 라인 가부시키가이샤 | 어플리케이션의 코드 난독화를 위한 시스템 및 방법 |
KR101740133B1 (ko) * | 2015-08-10 | 2017-05-26 | 라인 가부시키가이샤 | 어플리케이션의 코드를 보호하기 위한 시스템 및 방법 |
WO2017056194A1 (fr) * | 2015-09-29 | 2017-04-06 | 株式会社 東芝 | Dispositif informatique, terminal de communication informatique, et procédé de traitement informatique |
EP3391583B1 (fr) * | 2015-12-15 | 2019-07-24 | Koninklijke Philips N.V. | Dispositif de calcul et procédé |
EP3188063A1 (fr) | 2015-12-29 | 2017-07-05 | GuardSquare NV | Système de construction |
MA44905A (fr) * | 2016-04-05 | 2018-05-09 | Mi Group B V | Système et procédé d'informations de vol |
US10073975B2 (en) | 2016-08-11 | 2018-09-11 | International Business Machines Corporation | Application integrity verification in multi-tier architectures |
US10394554B1 (en) * | 2016-09-09 | 2019-08-27 | Stripe, Inc. | Source code extraction via monitoring processing of obfuscated byte code |
US11423140B1 (en) * | 2017-03-27 | 2022-08-23 | Melih Abdulhayoglu | Auto-containment of guest user applications |
US10951644B1 (en) | 2017-04-07 | 2021-03-16 | Comodo Security Solutions, Inc. | Auto-containment of potentially vulnerable applications |
CN107294702B (zh) * | 2017-07-17 | 2020-04-28 | 四川长虹电器股份有限公司 | 基于Hybrid APP自身特征的前端代码加密方法 |
EP3665566A4 (fr) | 2017-08-08 | 2021-04-21 | Crypto4A Technologies Inc. | Procédé et système de déploiement et d'exécution de code exécutable par machine sécurisé |
CN107480478B (zh) * | 2017-08-14 | 2019-08-13 | 钟尚亮 | 一种java应用程序的加密方法及运行方法 |
CN112889045B (zh) * | 2018-10-23 | 2024-05-03 | 华为技术有限公司 | 虚拟函数指针验证设备及方法 |
EP3709560A1 (fr) * | 2019-03-14 | 2020-09-16 | Thales Dis France SA | Procédé d'approvisionnement d'actifs de boîte blanche et dispositif, serveur et système correspondants |
US11468881B2 (en) * | 2019-03-29 | 2022-10-11 | Samsung Electronics Co., Ltd. | Method and system for semantic intelligent task learning and adaptive execution |
KR102243378B1 (ko) * | 2019-04-02 | 2021-04-22 | (주)드림시큐리티 | 자바 라이브러리의 무결성을 보장하기 위한 방법 및 장치 |
US11150915B2 (en) | 2019-09-13 | 2021-10-19 | International Business Machines Corporation | Deferred bytecode class verification in managed runtime environments |
US10963275B1 (en) | 2019-10-31 | 2021-03-30 | Red Hat, Inc. | Implementing dependency injection via direct bytecode generation |
CN110826031B (zh) * | 2019-10-31 | 2022-08-02 | 望海康信(北京)科技股份公司 | 加密方法、装置、计算机设备及存储介质 |
JP7079502B2 (ja) * | 2019-11-14 | 2022-06-02 | 株式会社アクセル | 推論システム |
US11403075B2 (en) | 2019-11-25 | 2022-08-02 | International Business Machines Corporation | Bytecode verification using class relationship caching |
CN111143029B (zh) * | 2019-12-19 | 2024-03-22 | 浪潮软件股份有限公司 | 基于Gitlab-CI回调集成实现虚拟机一致、自动伸缩的持续构建环境的方法 |
KR102338885B1 (ko) * | 2020-01-21 | 2021-12-14 | 주식회사 행복소프트 | 응용프로그램의 동적 변조 탐지 방법 및 장치 |
KR20210112923A (ko) | 2020-03-06 | 2021-09-15 | 삼성전자주식회사 | 시스템 온 칩 및 이의 동작 방법 |
US11550883B2 (en) * | 2020-09-08 | 2023-01-10 | Assured Information Security, Inc. | Code protection |
CN113239330A (zh) * | 2021-06-10 | 2021-08-10 | 杭州安恒信息技术股份有限公司 | 一种基于散列算法的反调试方法及相关装置 |
CN114928550B (zh) * | 2022-04-29 | 2024-05-03 | 杭州默安科技有限公司 | 一种数据库交互账户安全检测方法及系统 |
CN117932648B (zh) * | 2024-03-20 | 2024-06-04 | 厦门星纵数字科技有限公司 | 一种字节码保护方法、终端设备及存储介质 |
CN118260750B (zh) * | 2024-05-27 | 2024-09-17 | 北京升鑫网络科技有限公司 | 攻击行为检测方法和装置、攻击行为阻断方法和装置 |
Family Cites Families (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5692047A (en) | 1995-12-08 | 1997-11-25 | Sun Microsystems, Inc. | System and method for executing verifiable programs with facility for using non-verifiable programs from trusted sources |
US6668325B1 (en) * | 1997-06-09 | 2003-12-23 | Intertrust Technologies | Obfuscation techniques for enhancing software security |
US6594761B1 (en) | 1999-06-09 | 2003-07-15 | Cloakware Corporation | Tamper resistant software encoding |
US6779114B1 (en) * | 1999-08-19 | 2004-08-17 | Cloakware Corporation | Tamper resistant software-control flow encoding |
CA2304433A1 (fr) | 2000-04-05 | 2001-10-05 | Cloakware Corporation | Code d'acces polyvalent |
CA2305078A1 (fr) | 2000-04-12 | 2001-10-12 | Cloakware Corporation | Logiciel infalsifiable - encodage d'information massive |
US7020882B1 (en) * | 2000-09-14 | 2006-03-28 | International Business Machines Corporation | Method, system, and program for remotely manipulating a user interface over a network |
GB0024918D0 (en) * | 2000-10-11 | 2000-11-22 | Sealedmedia Ltd | Method of providing java tamperproofing |
CA2327911A1 (fr) | 2000-12-08 | 2002-06-08 | Cloakware Corporation | Fonctions logicielles d'obscurcissement |
US7039814B2 (en) * | 2001-03-07 | 2006-05-02 | Sony Corporation | Method for securing software via late stage processor instruction decryption |
CA2348355A1 (fr) | 2001-05-24 | 2002-11-24 | Cloakware Corporation | Methode generale d'utilisation des codages dans les calculs |
CA2350029A1 (fr) | 2001-06-08 | 2002-12-08 | Cloakware Corporation | Production de filigranes numeriques durables a l'aide d'un logiciel inviolable |
CA2354470A1 (fr) | 2001-07-30 | 2003-01-30 | Cloakware Corporation | Contenu actif de support numerique protege |
US7516331B2 (en) * | 2003-11-26 | 2009-04-07 | International Business Machines Corporation | Tamper-resistant trusted java virtual machine and method of using the same |
JP2005293109A (ja) | 2004-03-31 | 2005-10-20 | Canon Inc | ソフトウェア実行管理装置、ソフトウェア実行管理方法、及び制御プログラム |
CN101228531A (zh) * | 2005-07-22 | 2008-07-23 | 松下电器产业株式会社 | 执行装置 |
US7788730B2 (en) * | 2006-01-17 | 2010-08-31 | International Business Machines Corporation | Secure bytecode instrumentation facility |
JP5054768B2 (ja) | 2006-06-21 | 2012-10-24 | ヴィーブ−システムズ アクチエンゲゼルシャフト | 侵入検出のための方法と装置 |
JP2009258772A (ja) | 2006-08-09 | 2009-11-05 | Panasonic Corp | アプリケーション実行装置 |
DE102007045743A1 (de) * | 2007-09-25 | 2009-04-02 | Siemens Ag | Verfahren und System zum Schutz gegen einen Zugriff auf einen Maschinencode eines Gerätes |
EP2240857A4 (fr) * | 2007-12-21 | 2013-12-25 | Univ Virginia Patent Found | Système, procédé et programme informatique de protection d'un logiciel par le biais d'anti-falsification et de transformations par obscurcissement |
WO2009095838A1 (fr) | 2008-01-31 | 2009-08-06 | Koninklijke Philips Electronics N.V. | Sécuriser une carte à puce |
EP2196934A1 (fr) * | 2008-12-09 | 2010-06-16 | Gemalto SA | Procédé de sécurisation de code octet java |
-
2010
- 2010-11-12 KR KR1020127015162A patent/KR20130018642A/ko active IP Right Grant
- 2010-11-12 EP EP21175342.1A patent/EP3923165A1/fr not_active Withdrawn
- 2010-11-12 IN IN2458DEN2012 patent/IN2012DN02458A/en unknown
- 2010-11-12 CN CN201080048082.7A patent/CN102598017B/zh active Active
- 2010-11-12 US US13/499,495 patent/US9213826B2/en active Active
- 2010-11-12 JP JP2012538154A patent/JP5689472B2/ja not_active Expired - Fee Related
- 2010-11-12 CA CA2774728A patent/CA2774728C/fr not_active Expired - Fee Related
- 2010-11-12 EP EP10829403.4A patent/EP2467800B1/fr active Active
- 2010-11-12 WO PCT/CA2010/001761 patent/WO2011057393A1/fr active Application Filing
Also Published As
Publication number | Publication date |
---|---|
EP3923165A1 (fr) | 2021-12-15 |
EP2467800A4 (fr) | 2016-03-16 |
EP2467800A1 (fr) | 2012-06-27 |
CN102598017B (zh) | 2016-03-09 |
CA2774728A1 (fr) | 2011-05-19 |
WO2011057393A1 (fr) | 2011-05-19 |
KR20130018642A (ko) | 2013-02-25 |
EP2467800B1 (fr) | 2021-06-30 |
JP2013511077A (ja) | 2013-03-28 |
JP5689472B2 (ja) | 2015-03-25 |
CN102598017A (zh) | 2012-07-18 |
CA2774728C (fr) | 2019-02-12 |
US9213826B2 (en) | 2015-12-15 |
US20120246487A1 (en) | 2012-09-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
IN2012DN02458A (fr) | ||
EP2579817A4 (fr) | Composants d'implant et procédés | |
GB2481563A (en) | Method and apparatus to provide secure application execution | |
IN2012DN00473A (fr) | ||
GB2558826A8 (en) | Mitigation of anti-sandbox malware techniques | |
IN2015DN02657A (fr) | ||
MX341086B (es) | Sistema operativo de contraseña, aparato de contraseña y metodo generador de supercontraseña. | |
BR112013016628A2 (pt) | sistema e método de pagamento móvel | |
EP2310949A4 (fr) | Procédé et système pour exécuter des applications à l'aide de modules de code natifs | |
GB2458426A (en) | Password protection system and method | |
EP2281258A4 (fr) | Procédé d' exécution en toute sécurité d' un module en code natif sans certificat sur un dispositif informatique | |
WO2009014779A3 (fr) | Système de normalisation et de détection de programmes malveillants | |
GB0906117D0 (en) | Method and system for implementing a secure chain of trust | |
MX2016010086A (es) | Metodo y sistema para generar una llave de almacenamiento avanzada en un dispositivo movil sin elementos de seguridad. | |
MX2008012891A (es) | Sistema y metodo de deteccion de software dañino para plataformas moviles de acceso limitado. | |
SG165286A1 (en) | Source-to-processing file conversion in an electronic discovery enterprise system | |
IN2014KN02283A (fr) | ||
MX2013008218A (es) | Sistema y metodo para soportar jit en un sistema seguro con intervalos de memoria asignados en forma aleatoria. | |
MY178309A (en) | Method and system for running encrypted files | |
WO2013106798A3 (fr) | Procédé et appareil de génération d'une clé basée sur les privilèges | |
MY160671A (en) | Protection against passive sniffing | |
WO2016069080A3 (fr) | Fonctions de calcul de clé sécurisée | |
MY189174A (en) | Network based management of protected data sets | |
TW201144798A (en) | Run-time correction of defect locations during defect review | |
FR2969787B1 (fr) | Protection des applets |