IN2013CH05777A - - Google Patents

Download PDF

Info

Publication number
IN2013CH05777A
IN2013CH05777A IN5777CH2013A IN2013CH05777A IN 2013CH05777 A IN2013CH05777 A IN 2013CH05777A IN 5777CH2013 A IN5777CH2013 A IN 5777CH2013A IN 2013CH05777 A IN2013CH05777 A IN 2013CH05777A
Authority
IN
India
Application number
Other languages
English (en)
Inventor
Janakiram Dr Dharanipragada
Original Assignee
Indian Inst Technology Madras
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Indian Inst Technology Madras filed Critical Indian Inst Technology Madras
Priority to IN5777CH2013 priority Critical patent/IN2013CH05777A/en
Priority to US14/568,668 priority patent/US9507934B2/en
Publication of IN2013CH05777A publication Critical patent/IN2013CH05777A/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Debugging And Monitoring (AREA)
IN5777CH2013 2013-12-13 2013-12-13 IN2013CH05777A (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
IN5777CH2013 IN2013CH05777A (fr) 2013-12-13 2013-12-13
US14/568,668 US9507934B2 (en) 2013-12-13 2014-12-12 Filtering mechanism for securing Linux kernel

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
IN5777CH2013 IN2013CH05777A (fr) 2013-12-13 2013-12-13

Publications (1)

Publication Number Publication Date
IN2013CH05777A true IN2013CH05777A (fr) 2015-06-19

Family

ID=53368815

Family Applications (1)

Application Number Title Priority Date Filing Date
IN5777CH2013 IN2013CH05777A (fr) 2013-12-13 2013-12-13

Country Status (2)

Country Link
US (1) US9507934B2 (fr)
IN (1) IN2013CH05777A (fr)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109902241B (zh) * 2019-02-01 2020-12-25 珠海天燕科技有限公司 一种资源的加载方法、装置及其设备
KR102370848B1 (ko) * 2020-11-17 2022-03-07 주식회사 시큐브 분할된 보안 모듈을 구비하는 컴퓨터 장치 및 보안 모듈 업데이트 방법
US11409864B1 (en) 2021-06-07 2022-08-09 Snowflake Inc. Tracing supervisor for UDFs in a database system

Family Cites Families (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6282703B1 (en) * 1998-10-29 2001-08-28 International Business Machines Corporation Statically linking an application process with a wrapper library
US7085928B1 (en) * 2000-03-31 2006-08-01 Cigital System and method for defending against malicious software
US20030005168A1 (en) * 2001-06-29 2003-01-02 Leerssen Scott Alan System and method for auditing system call events with system call wrappers
US7103914B2 (en) 2002-06-17 2006-09-05 Bae Systems Information Technology Llc Trusted computer system
US7353507B2 (en) * 2002-10-30 2008-04-01 Hewlett-Packard Development, L.P. Intercepting function cells
US20050108516A1 (en) * 2003-04-17 2005-05-19 Robert Balzer By-pass and tampering protection for application wrappers
US20050216895A1 (en) * 2004-03-23 2005-09-29 Tran Hieu T Method and apparatus for remote debugging of kernel and application software
CA2569527A1 (fr) * 2004-06-01 2005-12-15 L-3 Communications Corporation Alarme visuelle/par flash video
GB2417579A (en) * 2004-08-26 2006-03-01 Hewlett Packard Development Co Method for dynamically inserting code into a process by enabling taken branch traps to intercept a branch during the execution of the process
US8181219B2 (en) * 2004-10-01 2012-05-15 Microsoft Corporation Access authorization having embedded policies
US7506364B2 (en) * 2004-10-01 2009-03-17 Microsoft Corporation Integrated access authorization
US20070050369A1 (en) * 2005-01-31 2007-03-01 Stiegler Marc D Accessing file under confinement
KR100651435B1 (ko) * 2005-02-19 2006-11-29 삼성전자주식회사 효율적인 실시간 패킷 전송을 위한 적응적 큐 메커니즘과그의 적응적 큐 설정 시스템
US7644271B1 (en) 2005-11-07 2010-01-05 Cisco Technology, Inc. Enforcement of security policies for kernel module loading
US7685638B1 (en) * 2005-12-13 2010-03-23 Symantec Corporation Dynamic replacement of system call tables
US20080022353A1 (en) 2006-03-06 2008-01-24 Tresys Technology, Llc Framework to simplify security engineering
GB2436627B (en) * 2006-03-29 2011-04-20 Bridgeworks Ltd Message handling
US7992156B1 (en) * 2006-04-03 2011-08-02 Trend Micro Incorporated Determining the address of a system call table to perform antivirus tasks in a computer
US7934083B2 (en) * 2007-09-14 2011-04-26 Kevin Norman Taylor Configurable access kernel
US8561090B2 (en) * 2009-02-26 2013-10-15 Red Hat, Inc. Method and an apparatus to implement secure system call wrappers
US20100250903A1 (en) * 2009-03-26 2010-09-30 Celio Technology Corporation Apparatuses and systems including a software application adaptation layer and methods of operating a data processing apparatus with a software adaptation layer
US9189620B2 (en) * 2009-06-30 2015-11-17 Intel Corporation Protecting a software component using a transition point wrapper
US8381284B2 (en) 2009-08-21 2013-02-19 Mcafee, Inc. System and method for enforcing security policies in a virtual environment
US8838644B2 (en) * 2009-11-25 2014-09-16 International Business Machines Corporation Extensible access control list framework
US8352797B2 (en) * 2009-12-08 2013-01-08 Microsoft Corporation Software fault isolation using byte-granularity memory protection
US8516455B2 (en) * 2011-06-14 2013-08-20 International Business Machines Corporation Dynamic loading of kernel extensions
US20130263278A1 (en) * 2012-03-28 2013-10-03 Ae Squared Ltd. Method and apparatus for controlling operations performed by a mobile co
EP2680138B1 (fr) * 2012-06-28 2019-02-27 RES Software Development B.V. Gestion de règles dynamiques pour pilotes de filtre en mode noyau
US9047463B2 (en) * 2012-06-29 2015-06-02 Sri International Method and system for protecting data flow at a mobile device
US9038075B2 (en) * 2012-11-26 2015-05-19 Red Hat, Inc. Batch execution of system calls in an operating system
US8706798B1 (en) * 2013-06-28 2014-04-22 Pepperdata, Inc. Systems, methods, and devices for dynamic resource monitoring and allocation in a cluster system

Also Published As

Publication number Publication date
US9507934B2 (en) 2016-11-29
US20150169865A1 (en) 2015-06-18

Similar Documents

Publication Publication Date Title
AP2016009275A0 (fr)
BR112015007533A2 (fr)
BR102016010778A2 (fr)
BR112014017733A2 (fr)
BR112014017739A2 (fr)
BR112016012616A2 (fr)
BR112014018480A2 (fr)
BR112014017855A2 (fr)
BR112014017765A2 (fr)
BR112016008738A2 (fr)
BR112014017669A2 (fr)
BR112014021878A2 (fr)
BR112016005219A2 (fr)
BR112015029139A2 (fr)
BR112014018468A2 (fr)
BR112014017901A2 (fr)
BR112014018207A2 (fr)
BR112016001494A2 (fr)
BR112015015948A2 (fr)
BR112016015864A2 (fr)
BR112014018578A2 (fr)
BR112014017653A2 (fr)
BR112014017794A2 (fr)
BR112016013799A2 (fr)
BR112014017601A2 (fr)