JP5322620B2 - 情報処理装置、プログラム開発システム、プログラム検証方法及びプログラム - Google Patents

情報処理装置、プログラム開発システム、プログラム検証方法及びプログラム Download PDF

Info

Publication number
JP5322620B2
JP5322620B2 JP2008322907A JP2008322907A JP5322620B2 JP 5322620 B2 JP5322620 B2 JP 5322620B2 JP 2008322907 A JP2008322907 A JP 2008322907A JP 2008322907 A JP2008322907 A JP 2008322907A JP 5322620 B2 JP5322620 B2 JP 5322620B2
Authority
JP
Japan
Prior art keywords
function
protection
argument
input
output
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
JP2008322907A
Other languages
English (en)
Japanese (ja)
Other versions
JP2010146299A5 (enExample
JP2010146299A (ja
Inventor
良太郎 林
幹生 橋本
洋美 春木
由里恵 藤松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Toshiba Corp
Original Assignee
Toshiba Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Toshiba Corp filed Critical Toshiba Corp
Priority to JP2008322907A priority Critical patent/JP5322620B2/ja
Priority to PCT/JP2009/066380 priority patent/WO2010070959A1/ja
Publication of JP2010146299A publication Critical patent/JP2010146299A/ja
Priority to US13/162,955 priority patent/US8683208B2/en
Publication of JP2010146299A5 publication Critical patent/JP2010146299A5/ja
Application granted granted Critical
Publication of JP5322620B2 publication Critical patent/JP5322620B2/ja
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/54Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1416Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights
    • G06F12/1425Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights the protection being physical, e.g. cell, word, block
    • G06F12/1441Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights the protection being physical, e.g. cell, word, block for a range
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1416Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)
JP2008322907A 2008-12-18 2008-12-18 情報処理装置、プログラム開発システム、プログラム検証方法及びプログラム Expired - Fee Related JP5322620B2 (ja)

Priority Applications (3)

Application Number Priority Date Filing Date Title
JP2008322907A JP5322620B2 (ja) 2008-12-18 2008-12-18 情報処理装置、プログラム開発システム、プログラム検証方法及びプログラム
PCT/JP2009/066380 WO2010070959A1 (ja) 2008-12-18 2009-09-18 情報処理装置、プログラム開発装置、プログラム検証方法及びプログラム
US13/162,955 US8683208B2 (en) 2008-12-18 2011-06-17 Information processing device, program developing device, program verifying method, and program product

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP2008322907A JP5322620B2 (ja) 2008-12-18 2008-12-18 情報処理装置、プログラム開発システム、プログラム検証方法及びプログラム

Publications (3)

Publication Number Publication Date
JP2010146299A JP2010146299A (ja) 2010-07-01
JP2010146299A5 JP2010146299A5 (enExample) 2013-07-18
JP5322620B2 true JP5322620B2 (ja) 2013-10-23

Family

ID=42268635

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2008322907A Expired - Fee Related JP5322620B2 (ja) 2008-12-18 2008-12-18 情報処理装置、プログラム開発システム、プログラム検証方法及びプログラム

Country Status (3)

Country Link
US (1) US8683208B2 (enExample)
JP (1) JP5322620B2 (enExample)
WO (1) WO2010070959A1 (enExample)

Families Citing this family (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5466763B2 (ja) * 2010-07-23 2014-04-09 日本電信電話株式会社 暗号化装置、復号装置、暗号化方法、復号方法、プログラム、及び記録媒体
JP5171907B2 (ja) 2010-09-13 2013-03-27 株式会社東芝 情報処理装置、情報処理プログラム
KR101859646B1 (ko) 2011-12-16 2018-05-18 삼성전자주식회사 보안 데이터를 보호하는 메모리 장치 및 보안 데이터를 이용한 데이터 보호 방법
KR20130093800A (ko) * 2012-01-04 2013-08-23 삼성전자주식회사 통신 시스템에서 패킷을 이용하여 어플리케이션을 식별하기 위한 장치 및 방법
CN104335219B (zh) * 2012-03-30 2018-06-05 爱迪德技术有限公司 使用变量相关编码来保护可访问的系统
US20140096270A1 (en) * 2012-09-28 2014-04-03 Richard T. Beckwith Secure data containers and data access control
US9720716B2 (en) * 2013-03-12 2017-08-01 Intel Corporation Layered virtual machine integrity monitoring
WO2014147748A1 (ja) 2013-03-19 2014-09-25 株式会社東芝 コード処理装置およびプログラム
US10515231B2 (en) * 2013-11-08 2019-12-24 Symcor Inc. Method of obfuscating relationships between data in database tables
JP6181004B2 (ja) 2014-06-20 2017-08-16 株式会社東芝 メモリ管理装置、プログラム、及び方法
JP6584823B2 (ja) 2014-06-20 2019-10-02 株式会社東芝 メモリ管理装置、プログラム、及び方法
JP6162652B2 (ja) * 2014-06-20 2017-07-12 株式会社東芝 メモリ管理装置、プログラム、及び方法
JP6579735B2 (ja) * 2014-08-05 2019-09-25 キヤノン株式会社 情報処理システム、情報処理装置、情報処理システムの制御方法、情報処理装置の制御方法、及びプログラム
US20160077151A1 (en) * 2014-09-12 2016-03-17 Qualcomm Incorporated Method and apparatus to test secure blocks using a non-standard interface
JPWO2016067565A1 (ja) * 2014-10-29 2017-09-21 日本電気株式会社 情報処理システム、情報処理装置、情報処理方法、及び、プログラム
US10079845B2 (en) 2016-03-31 2018-09-18 Mcafee, Llc IoT and PoS anti-malware strategy
US11190499B2 (en) * 2016-07-19 2021-11-30 Nippon Telegraph And Telephone Corporation Communication terminals, server devices, and programs
JP6852337B2 (ja) * 2016-09-29 2021-03-31 富士通株式会社 情報処理装置、情報処理プログラム、情報処理システム及び情報処理方法
US20190121816A1 (en) * 2017-04-17 2019-04-25 Mitsubishi Electric Corporation Program creating device
GB2564878B (en) * 2017-07-25 2020-02-26 Advanced Risc Mach Ltd Parallel processing of fetch blocks of data
FR3092923B1 (fr) * 2019-02-19 2021-05-21 Sangle Ferriere Bruno Méthode cryptographique de vérification des données
US20220327454A1 (en) * 2019-09-09 2022-10-13 Pactum Ai Oü Method and system for generating and using value functions for users
JP7563281B2 (ja) * 2021-04-12 2024-10-08 オムロン株式会社 制御装置、制御システム、管理方法およびプログラム
JPWO2024079897A1 (enExample) * 2022-10-14 2024-04-18

Family Cites Families (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6470450B1 (en) * 1998-12-23 2002-10-22 Entrust Technologies Limited Method and apparatus for controlling application access to limited access based data
JP2000267844A (ja) * 1999-03-16 2000-09-29 Nippon Telegr & Teleph Corp <Ntt> ソフトウェア開発システム
US7043553B2 (en) * 1999-10-07 2006-05-09 Cisco Technology, Inc. Method and apparatus for securing information access
US6983374B2 (en) 2000-02-14 2006-01-03 Kabushiki Kaisha Toshiba Tamper resistant microprocessor
JP4067757B2 (ja) 2000-10-31 2008-03-26 株式会社東芝 プログラム配布システム
JP4153653B2 (ja) 2000-10-31 2008-09-24 株式会社東芝 マイクロプロセッサおよびデータ保護方法
JP4074057B2 (ja) 2000-12-28 2008-04-09 株式会社東芝 耐タンパプロセッサにおける暗号化データ領域のプロセス間共有方法
JP4098478B2 (ja) 2001-01-31 2008-06-11 株式会社東芝 マイクロプロセッサ
JP2003051819A (ja) 2001-08-08 2003-02-21 Toshiba Corp マイクロプロセッサ
JP2003101533A (ja) 2001-09-25 2003-04-04 Toshiba Corp 機器認証管理システム及び機器認証管理方法
JP4226816B2 (ja) 2001-09-28 2009-02-18 株式会社東芝 マイクロプロセッサ
JP3866597B2 (ja) 2002-03-20 2007-01-10 株式会社東芝 内部メモリ型耐タンパプロセッサおよび秘密保護方法
US6785820B1 (en) * 2002-04-02 2004-08-31 Networks Associates Technology, Inc. System, method and computer program product for conditionally updating a security program
JP2003330365A (ja) 2002-05-09 2003-11-19 Toshiba Corp コンテンツ配布/受信方法
JP4115759B2 (ja) 2002-07-01 2008-07-09 株式会社東芝 耐タンパプロセッサにおける共有ライブラリの使用方法およびそのプログラム
JP2004118494A (ja) * 2002-09-26 2004-04-15 Hitachi Software Eng Co Ltd 異種言語プログラム間インターフェイスのチェックプログラム及びチェック方法
JP3880933B2 (ja) 2003-01-21 2007-02-14 株式会社東芝 耐タンパマイクロプロセッサ及びキャッシュメモリ搭載プロセッサによるデータアクセス制御方法
JP4347582B2 (ja) 2003-02-04 2009-10-21 パナソニック株式会社 情報処理装置
JP2005004301A (ja) * 2003-06-10 2005-01-06 Fujitsu Ltd プログラムチェック装置
JP4263976B2 (ja) 2003-09-24 2009-05-13 株式会社東芝 オンチップマルチコア型耐タンパプロセッサ
JP4282472B2 (ja) 2003-12-26 2009-06-24 株式会社東芝 マイクロプロセッサ
JP4559794B2 (ja) 2004-06-24 2010-10-13 株式会社東芝 マイクロプロセッサ
JP4612461B2 (ja) 2004-06-24 2011-01-12 株式会社東芝 マイクロプロセッサ
JP4204522B2 (ja) 2004-07-07 2009-01-07 株式会社東芝 マイクロプロセッサ
JP2007058588A (ja) 2005-08-24 2007-03-08 Toshiba Corp プログラム保護機能を持つプロセッサ
US7752223B2 (en) * 2006-08-07 2010-07-06 International Business Machines Corporation Methods and apparatus for views of input specialized references
JP4976991B2 (ja) * 2007-11-22 2012-07-18 株式会社東芝 情報処理装置、プログラム検証方法及びプログラム

Also Published As

Publication number Publication date
US8683208B2 (en) 2014-03-25
US20110296192A1 (en) 2011-12-01
JP2010146299A (ja) 2010-07-01
WO2010070959A1 (ja) 2010-06-24

Similar Documents

Publication Publication Date Title
JP5322620B2 (ja) 情報処理装置、プログラム開発システム、プログラム検証方法及びプログラム
JP4976991B2 (ja) 情報処理装置、プログラム検証方法及びプログラム
JP5171907B2 (ja) 情報処理装置、情報処理プログラム
Sinha et al. Moat: Verifying confidentiality of enclave programs
US10395012B2 (en) Media client device authentication using hardware root of trust
KR102396071B1 (ko) 소프트웨어 시스템의 자동화된 검증 기법
US7577852B2 (en) Microprocessor, a node terminal, a computer system and a program execution proving method
Arzt et al. Towards secure integration of cryptographic software
JP2008524726A (ja) Risc形式アセンブリコードの情報フローの強制
US20110271350A1 (en) method for protecting software
JP2012118956A (ja) インデックステーブル基盤のコード暗号化及び復号化装置及びその方法
EP3742665A1 (en) Semiconductor device, update data-providing method, update data-receiving method, and program
JP4664055B2 (ja) プログラム分割装置、プログラム実行装置、プログラム分割方法及びプログラム実行方法
CN114139117A (zh) 应用程序加固方法、装置、电子设备及存储介质
JP2007148962A (ja) サブプログラム、そのサブプログラムを実行する情報処理装置、及びそのサブプログラムを実行する情報処理装置におけるプログラム制御方法
CN118445020A (zh) 基于浏览器bs架构的数据存储方法及装置
CN116964575A (zh) 代码部署
Getreu Embedded system security with Rust
Singleton Automated Tool Support for Finding and Repairing Security Bugs in Mobile Applications
Sluys et al. Partial Key Overwrite Attacks in Microcontrollers: A Survey
Kafader et al. A Fluent Wrapper for the NodeJS Crypto API
Langsworth Using static analysis tools to detect and correct non-compliant cryptography
Sinha et al. Verification of Confidentiality Properties of Enclave Programs
Sinha et al. Moat
Steel Analysing Cryptographic Hardware Interfaces with Tookan

Legal Events

Date Code Title Description
A521 Request for written amendment filed

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20110324

A621 Written request for application examination

Free format text: JAPANESE INTERMEDIATE CODE: A621

Effective date: 20110324

A521 Request for written amendment filed

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20130603

TRDD Decision of grant or rejection written
A01 Written decision to grant a patent or to grant a registration (utility model)

Free format text: JAPANESE INTERMEDIATE CODE: A01

Effective date: 20130625

A61 First payment of annual fees (during grant procedure)

Free format text: JAPANESE INTERMEDIATE CODE: A61

Effective date: 20130716

LAPS Cancellation because of no payment of annual fees