MX391018B - Metodo y aparato para comprobacion ejecutable dinamica. - Google Patents
Metodo y aparato para comprobacion ejecutable dinamica.Info
- Publication number
- MX391018B MX391018B MX2018013818A MX2018013818A MX391018B MX 391018 B MX391018 B MX 391018B MX 2018013818 A MX2018013818 A MX 2018013818A MX 2018013818 A MX2018013818 A MX 2018013818A MX 391018 B MX391018 B MX 391018B
- Authority
- MX
- Mexico
- Prior art keywords
- functions
- subset
- dev
- dynamic verification
- verification
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/22—Indexing; Data structures therefor; Storage structures
- G06F16/2228—Indexing structures
- G06F16/2255—Hash tables
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/125—Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
- G06F9/44521—Dynamic linking or loading; Link editing at or after load time, e.g. Java class loading
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
- Stored Programmes (AREA)
Abstract
Se describe un método y aparato para Comprobación Ejecutable Dinámica (DEV) que incluye un prefijo aleatorio de funciones de una aplicación binaria, una función de comprobación para al menos un subconjunto de las funciones y una tabla de saltos para al menos un subconjunto de las funciones. DEV proporciona protección de integridad dinámica de bajo impacto para aplicaciones que son compatibles con métodos estándar de firma y verificación de códigos, y garantiza que el software no pueda ser manipulado de forma estática o dinámica sin detección.
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US201662333332P | 2016-05-09 | 2016-05-09 | |
| US15/589,976 US10503931B2 (en) | 2016-05-09 | 2017-05-08 | Method and apparatus for dynamic executable verification |
| PCT/US2017/031652 WO2017196777A1 (en) | 2016-05-09 | 2017-05-09 | Method and apparatus for dynamic executable verification |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| MX2018013818A MX2018013818A (es) | 2019-07-04 |
| MX391018B true MX391018B (es) | 2025-03-21 |
Family
ID=60243529
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| MX2018013818A MX391018B (es) | 2016-05-09 | 2017-05-09 | Metodo y aparato para comprobacion ejecutable dinamica. |
Country Status (7)
| Country | Link |
|---|---|
| US (1) | US10503931B2 (es) |
| EP (1) | EP3455764B1 (es) |
| CN (1) | CN109313677B (es) |
| AU (1) | AU2017262658B2 (es) |
| CA (1) | CA3023939C (es) |
| MX (1) | MX391018B (es) |
| WO (1) | WO2017196777A1 (es) |
Families Citing this family (11)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10938855B1 (en) * | 2017-06-23 | 2021-03-02 | Digi International Inc. | Systems and methods for automatically and securely provisioning remote computer network infrastructure |
| EP3506100A1 (en) * | 2017-12-28 | 2019-07-03 | GuardSquare NV | Automated software application verification system |
| US11449617B2 (en) * | 2018-02-02 | 2022-09-20 | Nec Corporation | Information processing device, information processing method, and storage medium |
| EP3696698A1 (en) * | 2019-02-18 | 2020-08-19 | Verimatrix | Method of protecting a software program against tampering |
| CN112668004B (zh) * | 2019-10-16 | 2022-06-21 | 武汉斗鱼网络科技有限公司 | 一种基于llvm的函数校验方法及相关装置 |
| WO2021222306A1 (en) | 2020-04-27 | 2021-11-04 | Arris Enterprises Llc | Cloud-based dynamic executable verification |
| US12124565B2 (en) * | 2021-03-19 | 2024-10-22 | Adobe Inc. | Tamper detection for executable applications |
| US11586725B2 (en) | 2021-03-30 | 2023-02-21 | Netapp, Inc. | Methods for managing verification and validation of third-party code and devices thereof |
| US11615181B2 (en) | 2021-03-30 | 2023-03-28 | Netapp, Inc. | Methods for managing verification and validation of third-party code and devices thereof |
| US11799857B2 (en) * | 2021-08-31 | 2023-10-24 | Cisco Technology, Inc. | Software posture for zero trust access |
| DE102021214183B3 (de) * | 2021-12-13 | 2023-05-17 | Continental Automotive Technologies GmbH | Verfahren und Prozessorschaltung zum Absichern eines Codes gegen Manipulationen einer Anwendungssoftware, sowie Kraftfahrzeug-Steuergerät und Kraftfahrzeug mit einem solchen Steuergerät |
Family Cites Families (45)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5799186A (en) * | 1990-12-20 | 1998-08-25 | Eastman Kodak Company | Method and apparatus for programming a peripheral processor with a serial output memory device |
| US5903718A (en) * | 1996-09-16 | 1999-05-11 | International Business Machines Corporation | Remote program monitor method and system using a system-under-test microcontroller for self-debug |
| US6411392B1 (en) * | 1998-04-15 | 2002-06-25 | Massachusetts Institute Of Technology | Method and apparatus for data hiding in printed images |
| US7409546B2 (en) * | 1999-10-20 | 2008-08-05 | Tivo Inc. | Cryptographically signed filesystem |
| US7650504B2 (en) * | 1999-07-22 | 2010-01-19 | Macrovision Corporation | System and method of verifying the authenticity of dynamically connectable executable images |
| US7430670B1 (en) | 1999-07-29 | 2008-09-30 | Intertrust Technologies Corp. | Software self-defense systems and methods |
| FR2832824A1 (fr) * | 2001-11-28 | 2003-05-30 | St Microelectronics Sa | Blocage du fonctionnement d'un circuit integre |
| EP1561301B1 (en) * | 2002-11-08 | 2008-01-09 | Nokia Corporation | Software integrity test in a mobile telephone |
| JP2004297792A (ja) * | 2003-03-13 | 2004-10-21 | Ricoh Co Ltd | 画像形成装置及び機能キー割り付け方法 |
| JP2004348677A (ja) * | 2003-05-26 | 2004-12-09 | Sony Corp | プログラムおよび情報処理方法 |
| US7984304B1 (en) * | 2004-03-02 | 2011-07-19 | Vmware, Inc. | Dynamic verification of validity of executable code |
| US7603562B2 (en) * | 2005-02-02 | 2009-10-13 | Insyde Software Corporation | System and method for reducing memory requirements of firmware |
| EP1851670B1 (en) * | 2005-02-11 | 2016-08-10 | Simplex Major SDN. BHD., | Software protection method |
| US8555061B2 (en) * | 2005-05-13 | 2013-10-08 | Microsoft Corporation | Transparent code |
| US20070028217A1 (en) * | 2005-07-29 | 2007-02-01 | Microsoft Corporation | Testing software using verification data defined independently of the testing code |
| US9274974B1 (en) * | 2005-10-21 | 2016-03-01 | Vmware, Inc. | Isolating data within a computer system using private shadow mappings |
| US7757215B1 (en) | 2006-04-11 | 2010-07-13 | Oracle America, Inc. | Dynamic fault injection during code-testing using a dynamic tracing framework |
| US8763115B2 (en) * | 2007-08-08 | 2014-06-24 | Vmware, Inc. | Impeding progress of malicious guest software |
| EP2196936A4 (en) * | 2007-10-05 | 2012-05-02 | Panasonic Corp | SAFE START-UP END UNIT, SAFE START-UP PROCEDURE, SAFE STARTER PROGRAM, RECORDING MEDIA AND INTEGRATED CIRCUIT |
| US8667597B2 (en) | 2008-06-25 | 2014-03-04 | Lockheed Martin Corporation | Systems, methods, and products for secure code execution |
| JP5206263B2 (ja) * | 2008-09-12 | 2013-06-12 | 株式会社リコー | 情報処理装置、ライセンス判定方法、及びプログラム |
| WO2010054120A2 (en) * | 2008-11-06 | 2010-05-14 | Deluxe Digital Studios, Inc. | Methods, systems and apparatuses for use in updating a portable storage medium |
| US9141787B2 (en) * | 2009-05-06 | 2015-09-22 | Irdeto B.V. | Interlocked binary protection using whitebox cryptography |
| CN101650664B (zh) * | 2009-06-30 | 2012-06-27 | 飞天诚信科技股份有限公司 | 链接方法和链接器 |
| WO2011078855A1 (en) * | 2009-12-22 | 2011-06-30 | Intel Corporation | Method and apparatus to provide secure application execution |
| US10339575B2 (en) * | 2010-03-05 | 2019-07-02 | International Business Machines Corporation | Method and system for provenance tracking in software ecosystems |
| US8458798B2 (en) * | 2010-03-19 | 2013-06-04 | Aspect Security Inc. | Detection of vulnerabilities in computer systems |
| US20120260106A1 (en) * | 2011-04-07 | 2012-10-11 | Apple Inc. | System and method for binary layout randomization |
| US8955149B1 (en) * | 2011-12-06 | 2015-02-10 | Amazon Technologies, Inc. | Impersonation authorizations |
| US9098627B2 (en) * | 2013-03-06 | 2015-08-04 | Red Hat, Inc. | Providing a core dump-level stack trace |
| US9600397B2 (en) * | 2013-08-29 | 2017-03-21 | Stmicroelectronics (Grenoble 2) Sas | Dynamic debugging method of a software module and corresponding device |
| CN104573490A (zh) * | 2013-10-29 | 2015-04-29 | 桂林电子科技大学 | Android平台上已安装软件保护方法 |
| US20150186649A1 (en) * | 2013-12-31 | 2015-07-02 | Cincinnati Bell, Inc. | Function Fingerprinting |
| US9292367B2 (en) * | 2014-04-08 | 2016-03-22 | Microsoft Corporation | Efficient migration of client-side web state |
| US9110737B1 (en) * | 2014-05-30 | 2015-08-18 | Semmle Limited | Extracting source code |
| US9390260B2 (en) * | 2014-06-09 | 2016-07-12 | Lehigh University | Methods for enforcing control flow of a computer program |
| US9361102B2 (en) * | 2014-06-09 | 2016-06-07 | Lehigh University | Methods for enforcing control flow of a computer program |
| EP3021216A1 (en) * | 2014-11-14 | 2016-05-18 | Semmle Limited | Incremental source code analysis |
| US10048960B2 (en) * | 2014-12-17 | 2018-08-14 | Semmle Limited | Identifying source code used to build executable files |
| CN107580765B (zh) | 2015-01-27 | 2021-10-26 | 艾锐势有限责任公司 | 用于保护流媒体和其它数据流的混淆 |
| US9953158B1 (en) * | 2015-04-21 | 2018-04-24 | Symantec Corporation | Systems and methods for enforcing secure software execution |
| CN104778923B (zh) * | 2015-04-28 | 2016-06-01 | 京东方科技集团股份有限公司 | 一种像素电路及其驱动方法、显示装置 |
| US9946529B2 (en) * | 2015-05-01 | 2018-04-17 | Samsung Electronics Co., Ltd. | Function-based dynamic application extension framework |
| US9953167B2 (en) * | 2015-10-12 | 2018-04-24 | Microsoft Technology Licensing, Llc | Trusted platforms using minimal hardware resources |
| US10341409B2 (en) * | 2016-05-09 | 2019-07-02 | International Business Machines Corporation | Software version control without affecting a deployed container |
-
2017
- 2017-05-08 US US15/589,976 patent/US10503931B2/en active Active
- 2017-05-09 EP EP17724698.0A patent/EP3455764B1/en active Active
- 2017-05-09 WO PCT/US2017/031652 patent/WO2017196777A1/en not_active Ceased
- 2017-05-09 CN CN201780035705.9A patent/CN109313677B/zh active Active
- 2017-05-09 CA CA3023939A patent/CA3023939C/en active Active
- 2017-05-09 AU AU2017262658A patent/AU2017262658B2/en active Active
- 2017-05-09 MX MX2018013818A patent/MX391018B/es unknown
Also Published As
| Publication number | Publication date |
|---|---|
| US10503931B2 (en) | 2019-12-10 |
| WO2017196777A1 (en) | 2017-11-16 |
| MX2018013818A (es) | 2019-07-04 |
| AU2017262658B2 (en) | 2020-05-21 |
| CA3023939A1 (en) | 2017-11-16 |
| US20170323120A1 (en) | 2017-11-09 |
| CA3023939C (en) | 2021-02-09 |
| AU2017262658A1 (en) | 2019-01-03 |
| CN109313677B (zh) | 2022-02-11 |
| EP3455764A1 (en) | 2019-03-20 |
| EP3455764B1 (en) | 2020-01-29 |
| CN109313677A (zh) | 2019-02-05 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| MX391018B (es) | Metodo y aparato para comprobacion ejecutable dinamica. | |
| BR112017003050A2 (pt) | método e sistema para o tratamento de uma formação subterrânea, composição curável para o tratamento de uma formação subterrânea, e, método de preparo de uma composição curável para o tratamento de uma formação subterrânea | |
| CL2019002007A1 (es) | Identidad de enclave multiplataforma. | |
| GB2558826A (en) | Mitigation of anti-sandbox malware techniques | |
| MX362082B (es) | Metodo y dispositivo para procesar el modo niños. | |
| AR109155A1 (es) | Sistemas y métodos de modelización agronómica | |
| CO2017011525A2 (es) | Manejo de compromisos y solicitudes extraidas de comunicaciones y contenido | |
| BR112017014135A2 (pt) | métodos e sistemas para gerenciar permissões para acessar recursos de dispositivo móvel | |
| MX2017016676A (es) | Composicion envasada. | |
| AR099619A1 (es) | Polímero viscosificante para el tratamiento de una formación subterránea | |
| CN107851157A8 (zh) | 恶意软件的检测 | |
| MX2018007736A (es) | Sistema para control de velocidad de un vehiculo. | |
| AR088973A1 (es) | Aparato de procesamiento de informacion, metodo de procesamiento de informacion, y programa | |
| MX2021010460A (es) | Metodo de tratamiento con tradipitant. | |
| BR112016023619A8 (pt) | técnicas para otimização de potência com base em parâmetros de rede | |
| WO2016045641A3 (zh) | 数据块储存方法、数据查询方法和数据修改方法 | |
| CO2019014715A2 (es) | Aparato de comunicación, método y programa informático | |
| MX2017015383A (es) | Sistema y metodo para la oferta de paquetes de funcionalidades con base en un analisis de sitios web editados y sus usos. | |
| BR102017028271A2 (pt) | sistema e processo de monitoramento de desempenhos de aplicativos do sistema informático | |
| PH12018550216A1 (en) | Workflow-based object destruction | |
| BR112016017609A2 (pt) | Composição, e, processo | |
| EP3182298A3 (en) | Smart elastic scaling based on application scenarios | |
| CL2017003277A1 (es) | Índice de búsqueda personal con privacidad mejorada. | |
| IL268681A (en) | An apparatus, computer program and method | |
| EA201792664A1 (ru) | Улучшенная обфускация или рандомизация для защищенной идентификации и проверки продукта |