MY188366A - A system and method for establishing trustworthiness of an application - Google Patents

A system and method for establishing trustworthiness of an application

Info

Publication number
MY188366A
MY188366A MYPI2012005264A MYPI2012005264A MY188366A MY 188366 A MY188366 A MY 188366A MY PI2012005264 A MYPI2012005264 A MY PI2012005264A MY PI2012005264 A MYPI2012005264 A MY PI2012005264A MY 188366 A MY188366 A MY 188366A
Authority
MY
Malaysia
Prior art keywords
application
module
trustworthiness
secure container
interceptor module
Prior art date
Application number
MYPI2012005264A
Inventor
Faizal Mubarak Mohd
Abd Aziz Norazah
Hazwan Halim Muhamad
Ahmad Zaid
Original Assignee
Mimos Berhad
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mimos Berhad filed Critical Mimos Berhad
Priority to MYPI2012005264A priority Critical patent/MY188366A/en
Priority to PCT/MY2013/000215 priority patent/WO2014088395A1/en
Publication of MY188366A publication Critical patent/MY188366A/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Virology (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Multi Processors (AREA)
  • Storage Device Security (AREA)

Abstract

A system (10) for establishing trustworthiness of an application is provided. The system comprises: a trusted host platform (12); an interceptor module (14) associated with said trusted host platform (12); a secure container (16) in communication with said interceptor module(14), said secure container (16) being embedded with a formal proof code module(18); and an integrity detection system (20) in communication with said interceptor module (14); characterised in that said interceptor module (14) is provided with means for intercepting said application to hold the executable process of the application and communicate executable code of said application to said secure container (16), and in that said formal proof code module (18) is provided with means for checking and verifying said executable code to determine trustworthiness of said application.
MYPI2012005264A 2012-12-05 2012-12-05 A system and method for establishing trustworthiness of an application MY188366A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
MYPI2012005264A MY188366A (en) 2012-12-05 2012-12-05 A system and method for establishing trustworthiness of an application
PCT/MY2013/000215 WO2014088395A1 (en) 2012-12-05 2013-11-29 A system and method for establishing trustworthiness of an application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
MYPI2012005264A MY188366A (en) 2012-12-05 2012-12-05 A system and method for establishing trustworthiness of an application

Publications (1)

Publication Number Publication Date
MY188366A true MY188366A (en) 2021-12-06

Family

ID=50029180

Family Applications (1)

Application Number Title Priority Date Filing Date
MYPI2012005264A MY188366A (en) 2012-12-05 2012-12-05 A system and method for establishing trustworthiness of an application

Country Status (2)

Country Link
MY (1) MY188366A (en)
WO (1) WO2014088395A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105138904B (en) * 2015-08-25 2018-06-15 华为技术有限公司 A kind of access control method and device
US10853090B2 (en) * 2018-01-22 2020-12-01 Hewlett Packard Enterprise Development Lp Integrity verification of an entity

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6167520A (en) * 1996-11-08 2000-12-26 Finjan Software, Inc. System and method for protecting a client during runtime from hostile downloadables
US6694434B1 (en) * 1998-12-23 2004-02-17 Entrust Technologies Limited Method and apparatus for controlling program execution and program distribution
US7673137B2 (en) * 2002-01-04 2010-03-02 International Business Machines Corporation System and method for the managed security control of processes on a computer system

Also Published As

Publication number Publication date
WO2014088395A1 (en) 2014-06-12

Similar Documents

Publication Publication Date Title
MX362308B (en) Method and system for verifying an access request.
WO2014078585A3 (en) Methods, systems and computer readable media for detecting command injection attacks
GB2494738B (en) Detecting stored cross-site scripting vulnerabilities in web applications
WO2012058629A3 (en) System and method for inductively pairing devices to share data or resources
EP3869332A3 (en) Roots-of-trust for measurement of virtual machines
GB201015283D0 (en) Data security in a cloud computing environment
WO2013103812A3 (en) Providing secure execution of mobile device workflows
MX2013007804A (en) Data improvement system and method.
WO2013040042A9 (en) Systems and methods of performing link setup and authentication
GB201010546D0 (en) Method of indentity verification
IN2015DN00884A (en)
GB2504226A (en) System, apparatus, and method for aligning registers
MX356520B (en) Fault handling method, device and system based on network function virtualization.
GB2569915A (en) Handling sensitive data in application using external processing
IN2015DN01210A (en)
GB2505104A (en) Malware detection
GB2506803A (en) Apparatus and method for enhancing security of data on a host computing device and a peripheral device
MX353246B (en) FUEL DISTRIBUTOR USER INTERFACE SYSTEM ARCHITECTURE.
GB201307478D0 (en) Systems and methods for data access protection
WO2011163263A3 (en) System and method for n-ary locality in a security co-processor
WO2012087582A3 (en) Secure and private location
BR112014019044A8 (en) APPARATUS, METHOD AND COMPUTER PROGRAM FOR A MOBILE RELAY STATION TRANSCEIVER, SYSTEM AND MEDIA FOR MASS TRANSPORT
GB2533727A (en) Registry apparatus, agent device, application providing apparatus and corresponding methods
GB2511017A (en) Providing a malware analysis using a secure malware detection process
GB2497366B (en) Phishing processing method and system and computer readable storage medium applying the method