JP6513716B2 - ダイバーシティベースのソフトウェアセキュリティのための動的パッチング - Google Patents

ダイバーシティベースのソフトウェアセキュリティのための動的パッチング Download PDF

Info

Publication number
JP6513716B2
JP6513716B2 JP2016574381A JP2016574381A JP6513716B2 JP 6513716 B2 JP6513716 B2 JP 6513716B2 JP 2016574381 A JP2016574381 A JP 2016574381A JP 2016574381 A JP2016574381 A JP 2016574381A JP 6513716 B2 JP6513716 B2 JP 6513716B2
Authority
JP
Japan
Prior art keywords
module
software
runtime
mobile device
variants
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
JP2016574381A
Other languages
English (en)
Japanese (ja)
Other versions
JP2017523511A (ja
JP2017523511A5 (enExample
Inventor
ナイーム・イスラム
ラジャルシ・グプタ
Original Assignee
クアルコム,インコーポレイテッド
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by クアルコム,インコーポレイテッド filed Critical クアルコム,インコーポレイテッド
Publication of JP2017523511A publication Critical patent/JP2017523511A/ja
Publication of JP2017523511A5 publication Critical patent/JP2017523511A5/ja
Application granted granted Critical
Publication of JP6513716B2 publication Critical patent/JP6513716B2/ja
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44536Selecting among different versions
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • G06F8/656Updates while running
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Stored Programmes (AREA)
JP2016574381A 2014-06-27 2015-06-16 ダイバーシティベースのソフトウェアセキュリティのための動的パッチング Expired - Fee Related JP6513716B2 (ja)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US14/316,961 US10019569B2 (en) 2014-06-27 2014-06-27 Dynamic patching for diversity-based software security
US14/316,961 2014-06-27
PCT/US2015/036014 WO2015200046A1 (en) 2014-06-27 2015-06-16 Dynamic patching of multiple, functionally equivalent variations of various software modules for security reasons

Publications (3)

Publication Number Publication Date
JP2017523511A JP2017523511A (ja) 2017-08-17
JP2017523511A5 JP2017523511A5 (enExample) 2018-07-12
JP6513716B2 true JP6513716B2 (ja) 2019-05-15

Family

ID=53496961

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2016574381A Expired - Fee Related JP6513716B2 (ja) 2014-06-27 2015-06-16 ダイバーシティベースのソフトウェアセキュリティのための動的パッチング

Country Status (5)

Country Link
US (1) US10019569B2 (enExample)
EP (1) EP3161624A1 (enExample)
JP (1) JP6513716B2 (enExample)
CN (1) CN106462429A (enExample)
WO (1) WO2015200046A1 (enExample)

Families Citing this family (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8510596B1 (en) 2006-02-09 2013-08-13 Virsec Systems, Inc. System and methods for run time detection and correction of memory corruption
CA2923231C (en) 2013-09-12 2020-06-02 Virsec Systems, Inc. Automated runtime detection of malware
CA2953793C (en) 2014-06-24 2021-10-19 Virsec Systems, Inc. System and methods for automated detection of input and output validation and resource management vulnerability
EP2963891A1 (en) * 2014-07-04 2016-01-06 Doro AB Improved remote assistance for a mobile communications terminal
US9772837B2 (en) * 2015-06-29 2017-09-26 Verizon Patent And Licensing Inc. Dynamic delivery of code and fixes
JP6949951B2 (ja) * 2016-06-16 2021-10-13 ヴァーセック システムズ,インコーポレイテッド コンピュータアプリケーション内のメモリ破損を修復するためのシステム及び方法
EP3437011B1 (en) * 2016-07-28 2020-12-16 Hewlett-Packard Development Company, L.P. Code package variants
GB2563618B (en) * 2017-06-20 2020-09-16 Arm Ip Ltd Electronic system vulnerability assessment
JP6759169B2 (ja) * 2017-09-11 2020-09-23 株式会社東芝 情報処理装置、情報処理方法、および情報処理プログラム
US10671513B2 (en) * 2018-06-11 2020-06-02 Walgreen Co. System and method of capturing system configuration data to resolve an application malfunction
US12170684B2 (en) 2018-07-25 2024-12-17 Arizona Board Of Regents On Behalf Of Arizona State University Systems and methods for predicting the likelihood of cyber-threats leveraging intelligence associated with hacker communities
US11520900B2 (en) 2018-08-22 2022-12-06 Arizona Board Of Regents On Behalf Of Arizona State University Systems and methods for a text mining approach for predicting exploitation of vulnerabilities
EP3722981B1 (en) 2019-04-12 2025-01-01 Nxp B.V. System and method for applying patches to executable codes
US12235969B2 (en) 2019-05-20 2025-02-25 Securin Inc. System and method for calculating and understanding aggregation risk and systemic risk across a population of organizations with respect to cybersecurity for purposes of damage coverage, consequence management, and disaster avoidance
JP7505198B2 (ja) * 2020-02-12 2024-06-25 富士フイルムビジネスイノベーション株式会社 情報処理装置、情報処理システムおよびプログラム
CN111338942B (zh) * 2020-02-21 2022-09-09 郑州昂视信息科技有限公司 一种软件多样性的评估方法及系统
US12333020B2 (en) 2022-05-16 2025-06-17 Microsoft Technology Licensing, Llc Systems and processes for creating software bill of materials for large distributed builds
US20230367883A1 (en) * 2022-05-16 2023-11-16 Microsoft Technology Licensing, Llc Systems and processes for tailoring risk mitigation of threat events associated with software bill of materials
US12197586B2 (en) 2022-05-16 2025-01-14 Microsoft Technology Licensing, Llc Systems and processes for facilitating edits to software bill of materials

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060185018A1 (en) * 2005-02-17 2006-08-17 Microsoft Corporation Systems and methods for shielding an identified vulnerability
WO2008008401A2 (en) 2006-07-12 2008-01-17 Global Info Tek, Inc. A diversity-based security system and method
US9128741B2 (en) * 2007-10-05 2015-09-08 Mcafee, Inc. System, method, and computer program product for conditionally preventing use of hardware virtualization
US9058483B2 (en) * 2008-05-08 2015-06-16 Google Inc. Method for validating an untrusted native code module
US8706745B1 (en) * 2008-05-30 2014-04-22 Symantec Corporation Systems and methods for determining a file set
US8321949B1 (en) * 2008-08-29 2012-11-27 Adobe Systems Incorporated Managing software run in a computing system
CA2792304C (en) * 2010-03-31 2018-07-31 Irdeto Canada Corporation Method for linking and loading to protect applications
KR20130094522A (ko) * 2012-02-16 2013-08-26 한국전자통신연구원 보안 진단을 위한 휴대 단말기 및 보안 진단 방법
CN104303148B (zh) * 2012-03-22 2018-10-19 爱迪德技术有限公司 更新软件组件
US9210044B2 (en) 2012-07-27 2015-12-08 Dell Products L.P. Automated remediation with an appliance
US20150220734A1 (en) * 2012-10-19 2015-08-06 Mcafee, Inc. Mobile application management
US20140129686A1 (en) * 2012-11-08 2014-05-08 Nvidia Corporation Mobile computing device configured to filter and detect application profiles, a method of manufacturing the same and an external source for delivering hierarchical filtered application profiles to mobile computing devices
US9189619B2 (en) * 2012-11-13 2015-11-17 International Business Machines Corporation Runtime based application security and regulatory compliance in cloud environment
US20140259168A1 (en) * 2013-03-11 2014-09-11 Alcatel-Lucent Usa Inc. Malware identification using a hybrid host and network based approach

Also Published As

Publication number Publication date
JP2017523511A (ja) 2017-08-17
EP3161624A1 (en) 2017-05-03
CN106462429A (zh) 2017-02-22
US10019569B2 (en) 2018-07-10
WO2015200046A1 (en) 2015-12-30
US20150379262A1 (en) 2015-12-31

Similar Documents

Publication Publication Date Title
JP6513716B2 (ja) ダイバーシティベースのソフトウェアセキュリティのための動的パッチング
US9596257B2 (en) Detection and prevention of installation of malicious mobile applications
US11086983B2 (en) System and method for authenticating safe software
EP2696282B1 (en) System and method for updating authorized software
US10848563B2 (en) On-device, application-specific compliance enforcement
US20130097660A1 (en) System and method for whitelisting applications in a mobile network environment
US20130097659A1 (en) System and method for whitelisting applications in a mobile network environment
US10867049B2 (en) Dynamic security module terminal device and method of operating same
CN112534432A (zh) 不熟悉威胁场景的实时缓解
TW200536327A (en) System and method for securing a computer system connected to a network from attacks
WO2014168954A1 (en) Security policies for loading, linking, and executing native code by mobile applications running inside of virtual machines
US11503053B2 (en) Security management of an autonomous vehicle
US10277631B1 (en) Self-preserving policy engine and policy-based content transmission
CN112544054B (zh) 通过众包安全性解决方案自动生成威胁修复步骤
CN105207802B (zh) 节点的版本升级方法、装置和系统
US20220318393A1 (en) Trusted Boot-Loader Authentication
CN107545178A (zh) 一种云应用的检测方法及云应用检测装置
KR20160039234A (ko) 영역 지향 프로그래밍을 통한 모바일 보안 향상 시스템 및 방법
WO2015138931A1 (en) Systems and methods for enforcing security in mobile computing
US8881291B2 (en) System and method for inhibiting the processing of new code modules by an outdated runtime environment
Choi et al. Large‐Scale Analysis of Remote Code Injection Attacks in Android Apps
EP4481602A1 (en) Remediation responsive to a pattern of alerts
US20200244461A1 (en) Data Processing Method and Apparatus
US10554629B2 (en) Push based encryption

Legal Events

Date Code Title Description
A521 Request for written amendment filed

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20161228

A521 Request for written amendment filed

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20180601

A621 Written request for application examination

Free format text: JAPANESE INTERMEDIATE CODE: A621

Effective date: 20180601

A977 Report on retrieval

Free format text: JAPANESE INTERMEDIATE CODE: A971007

Effective date: 20190228

TRDD Decision of grant or rejection written
A01 Written decision to grant a patent or to grant a registration (utility model)

Free format text: JAPANESE INTERMEDIATE CODE: A01

Effective date: 20190318

A61 First payment of annual fees (during grant procedure)

Free format text: JAPANESE INTERMEDIATE CODE: A61

Effective date: 20190410

R150 Certificate of patent or registration of utility model

Ref document number: 6513716

Country of ref document: JP

Free format text: JAPANESE INTERMEDIATE CODE: R150

LAPS Cancellation because of no payment of annual fees