JPWO2020261365A1 - - Google Patents

Info

Publication number
JPWO2020261365A1
JPWO2020261365A1 JP2021528686A JP2021528686A JPWO2020261365A1 JP WO2020261365 A1 JPWO2020261365 A1 JP WO2020261365A1 JP 2021528686 A JP2021528686 A JP 2021528686A JP 2021528686 A JP2021528686 A JP 2021528686A JP WO2020261365 A1 JPWO2020261365 A1 JP WO2020261365A1
Authority
JP
Japan
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
JP2021528686A
Other versions
JPWO2020261365A5 (ja
JP7338686B2 (ja
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed filed Critical
Publication of JPWO2020261365A1 publication Critical patent/JPWO2020261365A1/ja
Publication of JPWO2020261365A5 publication Critical patent/JPWO2020261365A5/ja
Application granted granted Critical
Publication of JP7338686B2 publication Critical patent/JP7338686B2/ja
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/54Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/565Static detection by checking file integrity

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Debugging And Monitoring (AREA)
JP2021528686A 2019-06-25 2019-06-25 半導体装置、制御フロー検査方法、制御フロー検査プログラム及び電子機器 Active JP7338686B2 (ja)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/JP2019/025100 WO2020261365A1 (ja) 2019-06-25 2019-06-25 半導体装置、制御フロー検査方法、非一時的なコンピュータ可読媒体及び電子機器

Publications (3)

Publication Number Publication Date
JPWO2020261365A1 true JPWO2020261365A1 (ja) 2020-12-30
JPWO2020261365A5 JPWO2020261365A5 (ja) 2022-03-10
JP7338686B2 JP7338686B2 (ja) 2023-09-05

Family

ID=74060831

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2021528686A Active JP7338686B2 (ja) 2019-06-25 2019-06-25 半導体装置、制御フロー検査方法、制御フロー検査プログラム及び電子機器

Country Status (3)

Country Link
US (1) US11868467B2 (ja)
JP (1) JP7338686B2 (ja)
WO (1) WO2020261365A1 (ja)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP4004784B1 (en) * 2020-09-30 2024-03-13 Google LLC Determining expected hash-values in functions with control flow

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180225446A1 (en) * 2017-02-06 2018-08-09 Huawei Technologies Co., Ltd. Processor trace-based enforcement of control flow integrity of a computer system
JP2019012498A (ja) * 2017-07-03 2019-01-24 株式会社デンソー 電子制御装置

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3373178A1 (en) 2017-03-08 2018-09-12 Secure-IC SAS Comparison of execution context data signatures with references
US11496506B2 (en) * 2017-07-03 2022-11-08 Denso Corporation Program generation method and electronic control unit for changing importance of functions based on detected operation state in a vehicle

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180225446A1 (en) * 2017-02-06 2018-08-09 Huawei Technologies Co., Ltd. Processor trace-based enforcement of control flow integrity of a computer system
JP2019012498A (ja) * 2017-07-03 2019-01-24 株式会社デンソー 電子制御装置

Also Published As

Publication number Publication date
US20220358211A1 (en) 2022-11-10
WO2020261365A1 (ja) 2020-12-30
JP7338686B2 (ja) 2023-09-05
US11868467B2 (en) 2024-01-09

Similar Documents

Publication Publication Date Title
BR112021017339A2 (ja)
BR112021013854A2 (ja)
BR112021018450A2 (ja)
BR112021017892A2 (ja)
BR112021017939A2 (ja)
BR112021017738A2 (ja)
BR112021017782A2 (ja)
BR112021018168A2 (ja)
BR112021017728A2 (ja)
AU2020104490A5 (ja)
BR112021017234A2 (ja)
BR112021017173A2 (ja)
BR112021018102A2 (ja)
BR112021017083A2 (ja)
BR112021017637A2 (ja)
BR112021018250A2 (ja)
BR112021020262A2 (ja)
BR112021018093A2 (ja)
BR112021018084A2 (ja)
BR112021017703A2 (ja)
BR112021013944A2 (ja)
BR112021013128A2 (ja)
BR112021018484A2 (ja)
BR112021017732A2 (ja)
BR112021015080A2 (ja)

Legal Events

Date Code Title Description
A521 Request for written amendment filed

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20211213

A621 Written request for application examination

Free format text: JAPANESE INTERMEDIATE CODE: A621

Effective date: 20211213

A131 Notification of reasons for refusal

Free format text: JAPANESE INTERMEDIATE CODE: A131

Effective date: 20230214

A521 Request for written amendment filed

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20230406

TRDD Decision of grant or rejection written
A01 Written decision to grant a patent or to grant a registration (utility model)

Free format text: JAPANESE INTERMEDIATE CODE: A01

Effective date: 20230725

A61 First payment of annual fees (during grant procedure)

Free format text: JAPANESE INTERMEDIATE CODE: A61

Effective date: 20230807

R151 Written notification of patent or utility model registration

Ref document number: 7338686

Country of ref document: JP

Free format text: JAPANESE INTERMEDIATE CODE: R151