MY188366A - A system and method for establishing trustworthiness of an application - Google Patents
A system and method for establishing trustworthiness of an applicationInfo
- Publication number
- MY188366A MY188366A MYPI2012005264A MYPI2012005264A MY188366A MY 188366 A MY188366 A MY 188366A MY PI2012005264 A MYPI2012005264 A MY PI2012005264A MY PI2012005264 A MYPI2012005264 A MY PI2012005264A MY 188366 A MY188366 A MY 188366A
- Authority
- MY
- Malaysia
- Prior art keywords
- application
- module
- trustworthiness
- secure container
- interceptor module
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
Abstract
A system (10) for establishing trustworthiness of an application is provided. The system comprises: a trusted host platform (12); an interceptor module (14) associated with said trusted host platform (12); a secure container (16) in communication with said interceptor module(14), said secure container (16) being embedded with a formal proof code module(18); and an integrity detection system (20) in communication with said interceptor module (14); characterised in that said interceptor module (14) is provided with means for intercepting said application to hold the executable process of the application and communicate executable code of said application to said secure container (16), and in that said formal proof code module (18) is provided with means for checking and verifying said executable code to determine trustworthiness of said application.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
MYPI2012005264A MY188366A (en) | 2012-12-05 | 2012-12-05 | A system and method for establishing trustworthiness of an application |
PCT/MY2013/000215 WO2014088395A1 (en) | 2012-12-05 | 2013-11-29 | A system and method for establishing trustworthiness of an application |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
MYPI2012005264A MY188366A (en) | 2012-12-05 | 2012-12-05 | A system and method for establishing trustworthiness of an application |
Publications (1)
Publication Number | Publication Date |
---|---|
MY188366A true MY188366A (en) | 2021-12-06 |
Family
ID=50029180
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
MYPI2012005264A MY188366A (en) | 2012-12-05 | 2012-12-05 | A system and method for establishing trustworthiness of an application |
Country Status (2)
Country | Link |
---|---|
MY (1) | MY188366A (en) |
WO (1) | WO2014088395A1 (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105138904B (en) * | 2015-08-25 | 2018-06-15 | 华为技术有限公司 | A kind of access control method and device |
US10853090B2 (en) * | 2018-01-22 | 2020-12-01 | Hewlett Packard Enterprise Development Lp | Integrity verification of an entity |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6167520A (en) * | 1996-11-08 | 2000-12-26 | Finjan Software, Inc. | System and method for protecting a client during runtime from hostile downloadables |
US6694434B1 (en) * | 1998-12-23 | 2004-02-17 | Entrust Technologies Limited | Method and apparatus for controlling program execution and program distribution |
US7673137B2 (en) * | 2002-01-04 | 2010-03-02 | International Business Machines Corporation | System and method for the managed security control of processes on a computer system |
-
2012
- 2012-12-05 MY MYPI2012005264A patent/MY188366A/en unknown
-
2013
- 2013-11-29 WO PCT/MY2013/000215 patent/WO2014088395A1/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
WO2014088395A1 (en) | 2014-06-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
MX362308B (en) | Method and system for verifying an access request. | |
WO2012058629A3 (en) | System and method for inductively pairing devices to share data or resources | |
GB2494738B (en) | Detecting stored cross-site scripting vulnerabilities in web applications | |
EP4318489A3 (en) | Compatibility check for continuous glucose monitoring application | |
WO2017171987A8 (en) | System, apparatus and method for performing secure memory training and management in a trusted environment | |
GB2509036A (en) | Providing a network-accessible malware analysis | |
MX2016005769A (en) | Sensor data time alignment. | |
TR201902104T4 (en) | Systems and methods for secure communication. | |
GB201015283D0 (en) | Data security in a cloud computing environment | |
WO2013103812A3 (en) | Providing secure execution of mobile device workflows | |
WO2013040042A9 (en) | Systems and methods of performing link setup and authentication | |
MX2013007804A (en) | Data improvement system and method. | |
MX356520B (en) | Fault handling method, device and system based on network function virtualization. | |
EP2713548A4 (en) | Key generation, backup and migration method and system based on trusted computing | |
IN2015DN00884A (en) | ||
GB201010546D0 (en) | Method of indentity verification | |
MY173137A (en) | Run-time error repairing method, device and system | |
GB2507015A (en) | Communication with a virtual trusted runtime bios | |
GB2504226A (en) | System, apparatus, and method for aligning registers | |
WO2012087582A3 (en) | Secure and private location | |
GB2533727A (en) | Registry apparatus, agent device, application providing apparatus and corresponding methods | |
GB2506803A (en) | Apparatus and method for enhancing security of data on a host computing device and a peripheral device | |
GB2511017A (en) | Providing a malware analysis using a secure malware detection process | |
GB2497366B (en) | Phishing processing method and system and computer readable storage medium applying the method | |
WO2011163263A3 (en) | System and method for n-ary locality in a security co-processor |