JP5322620B2 - 情報処理装置、プログラム開発システム、プログラム検証方法及びプログラム - Google Patents
情報処理装置、プログラム開発システム、プログラム検証方法及びプログラム Download PDFInfo
- Publication number
- JP5322620B2 JP5322620B2 JP2008322907A JP2008322907A JP5322620B2 JP 5322620 B2 JP5322620 B2 JP 5322620B2 JP 2008322907 A JP2008322907 A JP 2008322907A JP 2008322907 A JP2008322907 A JP 2008322907A JP 5322620 B2 JP5322620 B2 JP 5322620B2
- Authority
- JP
- Japan
- Prior art keywords
- function
- protection
- argument
- input
- output
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1416—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights
- G06F12/1425—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights the protection being physical, e.g. cell, word, block
- G06F12/1441—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights the protection being physical, e.g. cell, word, block for a range
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1416—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Databases & Information Systems (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Priority Applications (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP2008322907A JP5322620B2 (ja) | 2008-12-18 | 2008-12-18 | 情報処理装置、プログラム開発システム、プログラム検証方法及びプログラム |
| PCT/JP2009/066380 WO2010070959A1 (ja) | 2008-12-18 | 2009-09-18 | 情報処理装置、プログラム開発装置、プログラム検証方法及びプログラム |
| US13/162,955 US8683208B2 (en) | 2008-12-18 | 2011-06-17 | Information processing device, program developing device, program verifying method, and program product |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP2008322907A JP5322620B2 (ja) | 2008-12-18 | 2008-12-18 | 情報処理装置、プログラム開発システム、プログラム検証方法及びプログラム |
Publications (3)
| Publication Number | Publication Date |
|---|---|
| JP2010146299A JP2010146299A (ja) | 2010-07-01 |
| JP2010146299A5 JP2010146299A5 (enExample) | 2013-07-18 |
| JP5322620B2 true JP5322620B2 (ja) | 2013-10-23 |
Family
ID=42268635
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2008322907A Expired - Fee Related JP5322620B2 (ja) | 2008-12-18 | 2008-12-18 | 情報処理装置、プログラム開発システム、プログラム検証方法及びプログラム |
Country Status (3)
| Country | Link |
|---|---|
| US (1) | US8683208B2 (enExample) |
| JP (1) | JP5322620B2 (enExample) |
| WO (1) | WO2010070959A1 (enExample) |
Families Citing this family (24)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP5466763B2 (ja) * | 2010-07-23 | 2014-04-09 | 日本電信電話株式会社 | 暗号化装置、復号装置、暗号化方法、復号方法、プログラム、及び記録媒体 |
| JP5171907B2 (ja) | 2010-09-13 | 2013-03-27 | 株式会社東芝 | 情報処理装置、情報処理プログラム |
| KR101859646B1 (ko) | 2011-12-16 | 2018-05-18 | 삼성전자주식회사 | 보안 데이터를 보호하는 메모리 장치 및 보안 데이터를 이용한 데이터 보호 방법 |
| KR20130093800A (ko) * | 2012-01-04 | 2013-08-23 | 삼성전자주식회사 | 통신 시스템에서 패킷을 이용하여 어플리케이션을 식별하기 위한 장치 및 방법 |
| CN104335219B (zh) * | 2012-03-30 | 2018-06-05 | 爱迪德技术有限公司 | 使用变量相关编码来保护可访问的系统 |
| US20140096270A1 (en) * | 2012-09-28 | 2014-04-03 | Richard T. Beckwith | Secure data containers and data access control |
| US9720716B2 (en) * | 2013-03-12 | 2017-08-01 | Intel Corporation | Layered virtual machine integrity monitoring |
| WO2014147748A1 (ja) | 2013-03-19 | 2014-09-25 | 株式会社東芝 | コード処理装置およびプログラム |
| US10515231B2 (en) * | 2013-11-08 | 2019-12-24 | Symcor Inc. | Method of obfuscating relationships between data in database tables |
| JP6181004B2 (ja) | 2014-06-20 | 2017-08-16 | 株式会社東芝 | メモリ管理装置、プログラム、及び方法 |
| JP6584823B2 (ja) | 2014-06-20 | 2019-10-02 | 株式会社東芝 | メモリ管理装置、プログラム、及び方法 |
| JP6162652B2 (ja) * | 2014-06-20 | 2017-07-12 | 株式会社東芝 | メモリ管理装置、プログラム、及び方法 |
| JP6579735B2 (ja) * | 2014-08-05 | 2019-09-25 | キヤノン株式会社 | 情報処理システム、情報処理装置、情報処理システムの制御方法、情報処理装置の制御方法、及びプログラム |
| US20160077151A1 (en) * | 2014-09-12 | 2016-03-17 | Qualcomm Incorporated | Method and apparatus to test secure blocks using a non-standard interface |
| JPWO2016067565A1 (ja) * | 2014-10-29 | 2017-09-21 | 日本電気株式会社 | 情報処理システム、情報処理装置、情報処理方法、及び、プログラム |
| US10079845B2 (en) | 2016-03-31 | 2018-09-18 | Mcafee, Llc | IoT and PoS anti-malware strategy |
| US11190499B2 (en) * | 2016-07-19 | 2021-11-30 | Nippon Telegraph And Telephone Corporation | Communication terminals, server devices, and programs |
| JP6852337B2 (ja) * | 2016-09-29 | 2021-03-31 | 富士通株式会社 | 情報処理装置、情報処理プログラム、情報処理システム及び情報処理方法 |
| US20190121816A1 (en) * | 2017-04-17 | 2019-04-25 | Mitsubishi Electric Corporation | Program creating device |
| GB2564878B (en) * | 2017-07-25 | 2020-02-26 | Advanced Risc Mach Ltd | Parallel processing of fetch blocks of data |
| FR3092923B1 (fr) * | 2019-02-19 | 2021-05-21 | Sangle Ferriere Bruno | Méthode cryptographique de vérification des données |
| US20220327454A1 (en) * | 2019-09-09 | 2022-10-13 | Pactum Ai Oü | Method and system for generating and using value functions for users |
| JP7563281B2 (ja) * | 2021-04-12 | 2024-10-08 | オムロン株式会社 | 制御装置、制御システム、管理方法およびプログラム |
| JPWO2024079897A1 (enExample) * | 2022-10-14 | 2024-04-18 |
Family Cites Families (27)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6470450B1 (en) * | 1998-12-23 | 2002-10-22 | Entrust Technologies Limited | Method and apparatus for controlling application access to limited access based data |
| JP2000267844A (ja) * | 1999-03-16 | 2000-09-29 | Nippon Telegr & Teleph Corp <Ntt> | ソフトウェア開発システム |
| US7043553B2 (en) * | 1999-10-07 | 2006-05-09 | Cisco Technology, Inc. | Method and apparatus for securing information access |
| US6983374B2 (en) | 2000-02-14 | 2006-01-03 | Kabushiki Kaisha Toshiba | Tamper resistant microprocessor |
| JP4067757B2 (ja) | 2000-10-31 | 2008-03-26 | 株式会社東芝 | プログラム配布システム |
| JP4153653B2 (ja) | 2000-10-31 | 2008-09-24 | 株式会社東芝 | マイクロプロセッサおよびデータ保護方法 |
| JP4074057B2 (ja) | 2000-12-28 | 2008-04-09 | 株式会社東芝 | 耐タンパプロセッサにおける暗号化データ領域のプロセス間共有方法 |
| JP4098478B2 (ja) | 2001-01-31 | 2008-06-11 | 株式会社東芝 | マイクロプロセッサ |
| JP2003051819A (ja) | 2001-08-08 | 2003-02-21 | Toshiba Corp | マイクロプロセッサ |
| JP2003101533A (ja) | 2001-09-25 | 2003-04-04 | Toshiba Corp | 機器認証管理システム及び機器認証管理方法 |
| JP4226816B2 (ja) | 2001-09-28 | 2009-02-18 | 株式会社東芝 | マイクロプロセッサ |
| JP3866597B2 (ja) | 2002-03-20 | 2007-01-10 | 株式会社東芝 | 内部メモリ型耐タンパプロセッサおよび秘密保護方法 |
| US6785820B1 (en) * | 2002-04-02 | 2004-08-31 | Networks Associates Technology, Inc. | System, method and computer program product for conditionally updating a security program |
| JP2003330365A (ja) | 2002-05-09 | 2003-11-19 | Toshiba Corp | コンテンツ配布/受信方法 |
| JP4115759B2 (ja) | 2002-07-01 | 2008-07-09 | 株式会社東芝 | 耐タンパプロセッサにおける共有ライブラリの使用方法およびそのプログラム |
| JP2004118494A (ja) * | 2002-09-26 | 2004-04-15 | Hitachi Software Eng Co Ltd | 異種言語プログラム間インターフェイスのチェックプログラム及びチェック方法 |
| JP3880933B2 (ja) | 2003-01-21 | 2007-02-14 | 株式会社東芝 | 耐タンパマイクロプロセッサ及びキャッシュメモリ搭載プロセッサによるデータアクセス制御方法 |
| JP4347582B2 (ja) | 2003-02-04 | 2009-10-21 | パナソニック株式会社 | 情報処理装置 |
| JP2005004301A (ja) * | 2003-06-10 | 2005-01-06 | Fujitsu Ltd | プログラムチェック装置 |
| JP4263976B2 (ja) | 2003-09-24 | 2009-05-13 | 株式会社東芝 | オンチップマルチコア型耐タンパプロセッサ |
| JP4282472B2 (ja) | 2003-12-26 | 2009-06-24 | 株式会社東芝 | マイクロプロセッサ |
| JP4559794B2 (ja) | 2004-06-24 | 2010-10-13 | 株式会社東芝 | マイクロプロセッサ |
| JP4612461B2 (ja) | 2004-06-24 | 2011-01-12 | 株式会社東芝 | マイクロプロセッサ |
| JP4204522B2 (ja) | 2004-07-07 | 2009-01-07 | 株式会社東芝 | マイクロプロセッサ |
| JP2007058588A (ja) | 2005-08-24 | 2007-03-08 | Toshiba Corp | プログラム保護機能を持つプロセッサ |
| US7752223B2 (en) * | 2006-08-07 | 2010-07-06 | International Business Machines Corporation | Methods and apparatus for views of input specialized references |
| JP4976991B2 (ja) * | 2007-11-22 | 2012-07-18 | 株式会社東芝 | 情報処理装置、プログラム検証方法及びプログラム |
-
2008
- 2008-12-18 JP JP2008322907A patent/JP5322620B2/ja not_active Expired - Fee Related
-
2009
- 2009-09-18 WO PCT/JP2009/066380 patent/WO2010070959A1/ja not_active Ceased
-
2011
- 2011-06-17 US US13/162,955 patent/US8683208B2/en not_active Expired - Fee Related
Also Published As
| Publication number | Publication date |
|---|---|
| US8683208B2 (en) | 2014-03-25 |
| US20110296192A1 (en) | 2011-12-01 |
| JP2010146299A (ja) | 2010-07-01 |
| WO2010070959A1 (ja) | 2010-06-24 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP5322620B2 (ja) | 情報処理装置、プログラム開発システム、プログラム検証方法及びプログラム | |
| JP4976991B2 (ja) | 情報処理装置、プログラム検証方法及びプログラム | |
| JP5171907B2 (ja) | 情報処理装置、情報処理プログラム | |
| Sinha et al. | Moat: Verifying confidentiality of enclave programs | |
| US10395012B2 (en) | Media client device authentication using hardware root of trust | |
| KR102396071B1 (ko) | 소프트웨어 시스템의 자동화된 검증 기법 | |
| US7577852B2 (en) | Microprocessor, a node terminal, a computer system and a program execution proving method | |
| Arzt et al. | Towards secure integration of cryptographic software | |
| JP2008524726A (ja) | Risc形式アセンブリコードの情報フローの強制 | |
| US20110271350A1 (en) | method for protecting software | |
| JP2012118956A (ja) | インデックステーブル基盤のコード暗号化及び復号化装置及びその方法 | |
| EP3742665A1 (en) | Semiconductor device, update data-providing method, update data-receiving method, and program | |
| JP4664055B2 (ja) | プログラム分割装置、プログラム実行装置、プログラム分割方法及びプログラム実行方法 | |
| CN114139117A (zh) | 应用程序加固方法、装置、电子设备及存储介质 | |
| JP2007148962A (ja) | サブプログラム、そのサブプログラムを実行する情報処理装置、及びそのサブプログラムを実行する情報処理装置におけるプログラム制御方法 | |
| CN118445020A (zh) | 基于浏览器bs架构的数据存储方法及装置 | |
| CN116964575A (zh) | 代码部署 | |
| Getreu | Embedded system security with Rust | |
| Singleton | Automated Tool Support for Finding and Repairing Security Bugs in Mobile Applications | |
| Sluys et al. | Partial Key Overwrite Attacks in Microcontrollers: A Survey | |
| Kafader et al. | A Fluent Wrapper for the NodeJS Crypto API | |
| Langsworth | Using static analysis tools to detect and correct non-compliant cryptography | |
| Sinha et al. | Verification of Confidentiality Properties of Enclave Programs | |
| Sinha et al. | Moat | |
| Steel | Analysing Cryptographic Hardware Interfaces with Tookan |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20110324 |
|
| A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20110324 |
|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20130603 |
|
| TRDD | Decision of grant or rejection written | ||
| A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20130625 |
|
| A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20130716 |
|
| LAPS | Cancellation because of no payment of annual fees |